03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

There should now be the four key stores called:<br />

►<br />

►<br />

►<br />

►<br />

WASV5ServerKeyFile.jks<br />

WASV5ServerTrustFile.jks<br />

WASV5ClientKeyFile.jks<br />

WASV5ClientTrustFile.jks<br />

There should also be two extracted certificates called:<br />

► WASV5IntSecPubCert.arm<br />

► WASV5ClientSecPubCert.arm<br />

10.9.2 Requesting a certificate signed by a CA<br />

The ikeyman tool can be used to generate a certificate request. A certificate will<br />

be required for the server and one for each client. The process documented<br />

below is for the server’s key file although the process will be similar for every<br />

certificate with only minor changes needed for each.<br />

1. Launch the ikeyman tool. It may be started from the command line in the bin<br />

directory as ikeyman.bat (on Windows platforms) or ikeyman.sh (on UNIX<br />

platforms)<br />

2. From the menu bar, select Key Database File -> New.<br />

3. Ensure that the Key database type is set to JKS. This section will use the<br />

following file names to represent the appropriate key stores<br />

– WASV5ServerKeyFile.jks - server key file<br />

– WASV5ServerTrustFile.jks - server trust file<br />

– WASV5ClientKeyFile.jks - client key file<br />

– WASV5ClientTrustFile.jks - client trust file<br />

4. Enter WASV5ServerKeyFile.jks as the file name.<br />

5. Enter the directory that will hold the key file as the location, in this case:<br />

c:\<strong>WebSphere</strong>\Appserver\etc.<br />

6. Click OK.<br />

7. A password prompt will appear. Enter a password and repeat to confirm. This<br />

password will be required to read from or write to this file in the future, so do<br />

not forget it. The password strength is determined by the variety of the<br />

characters used in the password<br />

8. Click OK.<br />

9. From the menu bar, select Create -> New Certificate Request.<br />

Chapter 10. Administering <strong>WebSphere</strong> security 271

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!