03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table 10-3 <strong>WebSphere</strong> default key stores<br />

File<br />

DummyServerKeyFile.jks<br />

DummyServerTrustFile.jks<br />

DummyClientKeyFile.jks<br />

DummyServerTrustFile.jks<br />

Description<br />

server-based key file<br />

server-based trust file<br />

client-based key file<br />

client-based trust file<br />

The key store type in this case is Java Key Store (JKS), a format that is<br />

supported by both <strong>WebSphere</strong> and the supplied key generation utility, ikeyman.<br />

This utility will be used in the next section to generate a new certificate. There<br />

are, generally, two options when deciding how to create a new certificate.<br />

►<br />

►<br />

Request that a CA generate the certificate on your behalf. This will probably<br />

involve providing enough information so that the CA can validate the identity<br />

of the certificate requestor. The CA will create a new certificate, digitally sign it<br />

and then deliver it to the requestor, presumably in a secure fashion. Popular<br />

Web browsers are pre-configured to trust certificates that are signed by<br />

certain CAs and so no further client configuration is necessary in order for a<br />

client to connect to the server (that this certificate relates to) via an SSL<br />

connection. Therefore, CA-signed certificates are useful where configuration<br />

for each and every client that will access the server is impractical.<br />

Generate a self-signed certificate. This may well be the quickest option and<br />

will probably require fewer details in order to create the certificate. However,<br />

the certificate will not be signed by a CA. This may prove troublesome in<br />

certain cases. Every client that is likely to receive this certificate, in other<br />

words any client that will connect to this server over an SSL connection, will<br />

need to be configured to trust the signer of this certificate. Since the certificate<br />

has been self-signed, the signature is not likely to be in the client's trust file<br />

and so must be added. If access to every client is impractical then this<br />

configuration will simply not occur. Therefore, self-signed certificates are only<br />

useful when each of the clients can be configured to trust the certificate.<br />

Note: It is technically possible in some cases to present a self-signed<br />

certificate to a non-trusting client. In some Web browsers, for instance, when<br />

the certificate is received and is found not to match any of those listed in the<br />

client's trust file, a prompt will appear asking if the certificate should be trusted<br />

for the connection (or even added to the trust file).<br />

Chapter 10. Administering <strong>WebSphere</strong> security 263

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!