This section provides instructions for creating signed certificates for the routing gateway and its parent server. But first note the following:
CA DLP provides two scripts to generate authentication certificates for the routing gateway and its parent server:
Find these scripts in the \Support\SPT folder on your CA DLP distribution media.
These instructions require that CA DLP is already installed on both the routing gateway and its parent server. They also use the java.exe utility, installed on an isolated, standalone CA DLP installation, to create and request certificates. Find this file in the \Support\SPT folder on your CA DLP distribution media.
To generate authentication certificates
You will generate the authentication certificates on this machine.
These instructions use java.exe to create and request certificates. On the certificate management machine, copy java.exe to the \System\jre160_07\Bin subfolder in the CA DLP installation folder. You will run java.exe from this subfolder.
On the certificate management machine, create a folder to hold the authentication certificates and key store files. You can create the folder anywhere on the certificate management machine and you can give it any name. This is your ‘certificate folder’; you will run the certificate scripts from this folder.
This script generates a self-signed certificate, CAcert.crt, that will be used to sign the certificates for the routing gateway and its parent server. It also creates a key store file to hold the certificate, CAStore.jks.
Important! The information in this key store must be kept secure because it enables anyone to create valid signed certificates to allow communication over the secure private tunnel!
MakeRootCertificateStore <CAStorePassword> <CAKeyPassword>
where:
<CAStorePassword> is the password for the CAStore.jks key store.
<CAKeyPassword> is the password for the root certificate.
Note: Note that the passwords must each contain at least six characters. For example, to generate a root certificate with the password CAKeyPwd, stored in a key store with the password CAStorePwd, run this command:
MakeRootCertificateStore CAStorePwd CAKeyPwd
This script generates a signed certificate and key store file for the parent server.
MakeMachineCertificateStore <MachineStore> <MachineCN> <MachinePW> <CAStorePW> <CAKeyPW>
where:
<MachineStore> is the key store file for the parent server (with no .jks file extension).
<MachineCN> is the common name of the certificate used by the parent server. The name must not contain spaces.
<MachinePW> is the password for the parent server’s key store file.
<CAStorePW> is the password for the root key store created in step 4.a
<CAKeyPW> is the password for the root certificate created in step 4.a.
Note: All passwords must each contain at least six characters. For example, to generate a certificate CustomerCMS in a file store CMSKeyStore.jks with a password of CMSPword, run this command:
MakeMachineCertificateStore CMSKeyStore CustomerCMS CMSPword CAStorePwd CAKeyPwd
Rerun this script to generate a signed certificate and key store file for the routing gateway.
MakeMachineCertificateStore <MachineStore> <MachineCN> <MachinePW> <CAStorePW> <CAKeyPW>
But this time the parameters take the following values:
<MachineStore> is the key store file for the routing gateway (with no .jks file extension).
<MachineCN> is the common name of the certificate used by the routing gateway. The name must not contain spaces.
<MachinePW> is the password for the routing gateway’s key store file.
<CAStorePW> is the password for the CAStore.jks key store created in step 4.a.
<CAKeyPW> is the password for the root certificate created in step 4.a.
Note: All passwords must each contain at least six characters. For example, to generate a certificate RoutingGW in a file store GWKeyStore.jks with a password of GWPword, run this command:
MakeMachineCertificateStore <GWKeyStore> <RoutingGW> <GWPword> <CAStorePW> <CAKeyPW>
Configure the startup.properties file on the parent server, for example:
spt.serverport=56097 spt.hosts=XP-GW-07:56096,10.0.0.17:56096 spt.keystore=CMSKeyStore.jks spt.clientCNlist=RoutingGW
Configure the startup.properties file on the routing gateway, for example:
spt.serverport=56096 spt.hosts=CMS-HARDY:56097, 199.0.0.1:56097 spt.keystore=GWKeyStore.jks spt.clientCNlist=CustomerCMS
wgninfra -exec wigan/infrastruct/serviceutil/SocketRedir SetKeyStorePassword CMSPword
where:
wigan/infrastruct/serviceutil/SocketRedir
is the path and name of the Java class used by the secure private tunnel. To confirm that the password has been successfully set, go to the \data\log subfolder and check the CA DLP command_<date>.log file for the entry: ‘Successfully Set Secure Private Tunnel KeyStore password.’
wgninfra -exec wigan/infrastruct/serviceutil/SocketRedir SetKeyStorePassword GWPword
As above, confirm that the password has been successfully set. Go to the \data\log subfolder and check the CA DLP command_<date>.log file for the entry: ‘Successfully Set Secure Private Tunnel KeyStore password.’
Restart this service on both the routing gateway and its parent server. This causes tunnel configuration messages to be written to the CA DLP Activity log on each machine (viewable in the Administration console). We also recommend that you check the System logs to confirm there are no problems.
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |