You can configure Microsoft Active Directory as a separate key store.
Complete the following tasks to create the key store:
Note: For more information, see your vendor–specific documentation.
Note: For more information, see your vendor–specific documentation.
Gather Directory Server Information
Specific information is required to configure a separate key store. Gather the following information:
The fully qualified name or the IP Address of the directory server host system.
The port on which the directory server instance is listening. This value is only required if the instance is listening on a non–standard port.
Default values: 636 (SSL) and 389 (non-SSL)
Specifies the LDAP user name of a user that has privileges to:
Note: This permission is only required to import the key store schema. After you deploy the key store, you can configure the Policy Server with a user that does not have the permission.
Specifies the password for the Administrative DN.
Specifies the distinguished name of the node in the LDAP tree where the key store objects must be imported.
Specifies the pathname of the directory where the SSL client certificate database file resides.
Limit: SSL only
Register the Key Store
Registering the key store configures a connection between the key store and the Policy Server. The Policy Server uses the credentials that you supply to manage the key store.
Important! Registration does not configure the Policy Server to use the separate key store. The settings do not take effect until the Policy Server is restarted. Do not restart the Policy Server until the key store is configured and you are ready to deploy it.
Follow these steps:
smldapsetup reg -hhost -pport -dadmin_user -wadmin_password -rroot -k1
Important! Before running a CA SiteMinder® utility or executable on Windows Server 2008, open the command-line window with administrator permissions. Open the command-line window this way, even if your account has administrator privileges.
Note: For more information about these modes and arguments, see the Policy Server Administration Guide.
Example:
smldapsetup reg -host172.16.0.0 -p389 -d"cn=directory manager" -wpassword -r"dc=test" -k1
a. Select Keystore from the Database list.
b. Verify that the connection settings and the administrative user settings appear.
c. Click test LDAP Connection to verify that the Policy Server can communicate with the key store instance.
Note: The Use Policy Store database setting is cleared. The cleared setting is expected normal behavior. The Policy Server continues to use the key store that is collocated with the policy store.
The separate key is registered with the Policy Server.
Create the Key Store Schema
The key store instance requires the schema to store and retrieve CA SiteMinder® web agent keys. Use the smldapsetup utility to create the key store schema file.
Follow these steps:
smldapsetup ldgen -ffile_name -k1
Important! Before running a CA SiteMinder® utility or executable on Windows Server 2008, open the command-line window with administrator permissions. Open the command-line window this way, even if your account has administrator privileges.
Note: For more information about these modes and arguments, see the Policy Server Administration Guide.
Example: smldapsetup ldgen -fkeystoreschema -k1
The key store schema file is created.
Import the Key Store Schema
The key store instance requires the schema to store and retrieve CA SiteMinder® web agent keys. Use the smldapsetup utility to import the key store schema file.
Follow these steps:
smldapsetup ldmod -ffile_name -k1
Important! Before running a CA SiteMinder® utility or executable on Windows Server 2008, open the command-line window with administrator permissions. Open the command-line window this way, even if your account has administrator privileges.
Consider the following items:
Example: smldapsetup ldmod -fkeystoreschema -k1
The key store–specific schema is imported.
Restart the Policy Server
The Policy Server continues to use the collocated key store until you restart the Policy Server. Restart the Policy Server to begin using the separate key store.
Note: For more information, see the Policy Server Administration Guide.
Copyright © 2015 CA Technologies.
All rights reserved.
|
|