content/enterprise_influxdb/v1/introduction/installation/fips-compliant.md
InfluxDB Enterprise 1.11+ provides builds that are compliant with Federal Information Processing Standards (FIPS). This page provides information on installing and using FIPS-compliant builds of InfluxDB Enterprise.
For new InfluxDB Enterprise clusters:
[meta].password-hash to
either pbkdf2-sha256 or pbkdf2-sha512.
Non-FIPS-compliant password hash configurations, like bcrypt, cause
FIPS-compliant InfluxDB Enterprise builds to return an error on startup.Enable FIPS on an existing InfluxDB Enterprise cluster:
bcrypt to
a FIPS-compliant password hash (pbkdf2-sha256 or pbkdf2-sha512), then
restart all nodes.{{% note %}} Please report any errors encountered when upgrading from a non-FIPS-compliant InfluxDB Enterprise build to FIPS-compliant build to InfluxData support. {{% /note %}}
When using a FIPS-compliant build of InfluxDB Enterprise,
you must use a local license file. License keys do not work in FIPS mode.
Contact InfluxData support to request the
license file.
The [enterprise] section of your data and meta node configuration files
contains the settings that registered each node with the InfluxDB Enterprise
license portal.
In your data and meta node configuration files:
[enterprise].license-path setting
to point to your local license file.[enterprise].license-key setting.Flux queries that query or write to MSSQL, SQLServer, or Snowflake using
sql.from or sql.to
are not supported.
InfluxDB Insights monitoring has not been validated as compatible with FIPS-compliance in InfluxDB Enterprise and is not available when using a FIPS-compliant InfluxDB Enterprise build.
FIPS-compliant InfluxDB Enterprise builds only support the amd64 architecture.
To comply with FIPS standards, the following security practices are applied to FIPS-compliant InfluxDB Enterprise builds:
InfluxDB Enterprise FIPS-compliant builds use the FIPS-validated BoringCrypto cryptography library.
As mandated by FIPS, TLS uses a restricted set of functionality:
As mandated by FIPS, supported digital signatures are limited to the following signature algorithms:
{{% note %}} Digital signature restrictions apply to TLS certificates. {{% /note %}}
As mandated by FIPS, RSA keys are restricted to the following sizes:
{{% note %}} RSA key size restrictions apply to TLS certificates. {{% /note %}}
As mandated by FIPS, supported elliptic-curve (EC) cryptography curves are restricted to the following:
{{% note %}} EC curve restrictions apply to TLS certificates. {{% /note %}}