Previous versions of this connector server were named Java CS or JCS. From CA Identity Manager 12.6 onwards, the connector server is named CA IAM Connector Server At the same time, we changed the way configuration is handled.
The configuration for CA IAM Connector Server is stored in five configuration files, which are described in Configuration Files for CA IAM Connector Server.
When you upgrade CA IAM Connector Server, any changes you made to the XML configuration files are lost. This loss happens whether you are upgrading from Java CS or from CA IAM Connector Server.
However, any changes you made to the following files are preserved:
The settings in these files override the settings in the XML configuration files.
For this reason, we recommend that you do not change the settings in the XML configuration files. Instead, add any settings that you want to configure to the properties files in the override folder.
Note: Each XML configuration file has a matching override file. However, the filenames of the override files do not contain _osgi. Otherwise they match. For example, server_ad.properties is the override file for server_osgi_ad.xml.
Follow these steps:
Ensure that you use property names that match the nested structure of the entries in the XML configuration files.
You can configure the Exception Map setting to contain groups of exception messages that require special handling (and optionally associated retry delay and retry count settings).
In particular, the JDBC connector defines entries for exceptions signifying these conditions which drive retrying when connections to the endpoint experience problems:
In addition to these triggering exceptions, each ExceptionRetryGroup has associated resilientDelay and resilientMaxRetries settings which specify how many retry attempts are required when a matching exception is encountered, and the delay between each attempt.
When you install CA IAM Connector Server, you can enable FIPS. If you upgrade to CA IAM Connector Server from a Java CS that had FIPS enabled, it is still enabled after the upgrade.
In either of these situations, you can disable FIPS without running the installation program again.
The FIPS setting is in the server_osgi_shared.xml. We recommend that you customize this setting in an override file.
Follow these steps:
cs_home/conf/override/server_shared.properties
If it does not already exist, follow the steps in Customize the Configuration for CA IAM Connector Server to create it.
JsafeJCE.fipsEnabled=false
We recommend that you consider carefully the ulimit -n setting for the user for which you install CA IAM Connector Server. The default setting is too low to allow CA IAM Connector Server to function properly under load.
When this problem occurs the Java virtual machine shuts down and the following message appears in the jcs_daily log:
exiting because of 120 exceptions in a row: Too many open files
CA IAM Connector Server requires a minimum ulimit -n setting of around 80.
Follow these steps:
The default value is stored in the following file:
cs_home/jcs/conf/server_osgi_ad.xml
If a custom value has been specified, it is stored in the following file:
cs_home/jcs/conf/override/server_ad.properties
CA IAM Connector Server uses two certificates: one for each of the following roles:
When you install CA IAM Connector Server these certificates each have a temporary password. We recommend that you update these passwords.
By default, these certificates are stored in the same keystore. However you can store them in separate keystores if you prefer.
Follow these steps:
cs_home/jcs/tools/ldaps_password
ldaps_password new-password
This command updates the encrypted commonConfiguration.keystorePassword value in server_shared.properties.
ldaps_password new-password connectorManager.connectorClientCertStorePassword ../conf/override/server_jcs.properties
This command updates the encrypted connectorManager.connectorClientCertStorePassword value in server_jcs.properties.
Note: The password for the keystore is the password that you set during CA IAM Connector Server installation.
Note: Alternatively, you can manage the keystore using the keytool utility included in the Java Runtime Environment. This lets you install your own certificate instead of the default Provisioning Server certificate that the installer configures.
|
Copyright © 2014 CA.
All rights reserved.
|
|