If you want to use SSL to protect data submitted to CA Identity Manager, the Identity Manager Server must be configured to accept HTTPS requests. The following procedure is a sample configuration when using JBoss, on a Windows platform, as the application server for Identity Manager Server. The sample uses the Java utility “keytool.exe” to create and manage key stores for the server. You can refer to CA Identity Manager documentation for information on how to set up SSL when CA Identity Manager is running on another application server.
From the "$JBOSS_HOME/server/default/conf directory
keytool -genkey -alias server -keyalg RSA -keystore server.keystore -validity 3650
<!-- SSL/TLS Connector configuration using the admin devl guide keystore -->
<Connector port="8443" address="${jboss.bind.address}"
maxThreads="100" strategy="ms" maxHttpHeaderSize="8192"
emptySessionPath="true"
scheme="https" secure="true" clientAuth="false"
keystoreFile="${jboss.server.home.dir}/conf/server.keystore"
keystorePass="password" sslProtocol = "TLS" />
keytool -import -alias imserver -file <your_server_cert_file> -keystore "%HOMEDRIVE%%HOMEPATH%\.imbulkloaderkeystore"
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |