13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3. Set the following settings, then click OK when you are done:Key database file: JKSFile name: WASWebContainer.jksLocation: c:\<strong>WebSphere</strong>\Appserver\etc\ (or the directory of your choice)4. At the password prompt window, enter the password of your choice; for thissample, use password.5. Optionally, delete all the public Certificate Authority (CA) certificates under theSigner Certificates.6. From the ikeyman menu, select Create -> New Self-Signed Certificate.Specify the fields with your values; the followings were used fo this sample:Key Label: WASWebContainerVersion: X509 V3Key Size: 1024Common Name: wassrv01.itso.ibm.comOrganization: <strong>IBM</strong>Country: USValidity Period: 365Click OK when you are finished.7. Extract the public self-signed certificate key, as it will be used later by the Webserver plug-in peer to authenticate connections originating from theembedded HTTP server in <strong>WebSphere</strong>.8. Select Personal Certificates from the drop-down list, then select theWASWebContainer certificate that was just created.9. Click the Extract Certificate button, ensuring that WASWebContainerremains selected. Extract the certificate to a file:Data type: Base64-encoded ASCII dataCertificate file name: WASWebContainerPubCert.armLocation: c:\<strong>WebSphere</strong>\Appserver\etcClick OK when you are finished.10.Close the database and quit ikeyman when you are finished.Chapter 10. Administering <strong>WebSphere</strong> security 305

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!