01.01.2013 Views

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

194 <strong>CICS</strong> <strong>Transaction</strong> <strong>Gateway</strong> <strong>V5</strong><br />

Note: We found that VeriSign would only issue one certificate for a server, so<br />

we were unable to obtain a test certificate to use with our SSL protocol<br />

handler.<br />

Receiving our test certificate<br />

Once we received our test certificate, we copied and pasted this into a file<br />

(verisigncert.arm) on our workstation using the Notepad Editor (being very<br />

careful to remove any trailing space characters), and then transferred this to the<br />

HFS directory /web/scsctg5 on z/OS using FTP in ASCII mode. We then received<br />

this into our key database on z/OS using Option 4 of the Key Database Menu -<br />

Receive a certificate issued for your request.<br />

Example 8-5 Receiving the certificate issued for our request<br />

Enter certificate file name or press ENTER for “cert.arm” verisigncert.arm<br />

Do you want to set the key as the default in your key database?<br />

(1 = yes, 0 = no) [1]<br />

Please wait while certificate is received......<br />

Your request has completed successfully, exit gskkyman?<br />

(1 = yes, 0 = no) [0]: 0<br />

JSSE<br />

For JSSE it was necessary to create a server keystore and create a self-signed<br />

certificate. We used the keytool to complete these steps.<br />

Creating a keystore on z/OS using keytool<br />

We performed the following steps to create our keystore on z/OS using keytool:<br />

1. In a z/OS UNIX System Services shell we changed the directory to the HFS<br />

directory /ctg/scsctg5 we were using for our z/OS <strong>CICS</strong> TG.<br />

2. We used the keytool command in Example 8-6 to invoke the Key<br />

Management Tool to create a keystore with a self-signed certificate in the file<br />

jssesslss.jks.<br />

Example 8-6 Using keytool to create a keystore with a self-signed certificate<br />

keytool -genkey -alias ITSO -keysize 1024<br />

-dname "cn=wtsc66oe.itso.ibm.com,o=<strong>IBM</strong>,ou=ITSO,l=San Jose,s=California,c=US"<br />

-keystore jssesslss.jks -keypass default -storepass default -keyalg RSA<br />

<strong>The</strong> options on the keytool command are as follows:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!