Previous Topic: SiteMinder ReportsNext Topic: Policy Server Configuration Files


Policy Server Tools

This section contains the following topics:

Policy Server Tools Introduced

Import Policy Data Using smobjimport

Overview of the XML-based Data Format

XPSExport

Verify that Federated SAML Partnerships Intended for 12.52 Do Not Have the Same Backchannel Username

XPSImport

smkeyexport

CA SiteMinder® Key Tool

smldapsetup

Delete SiteMinder Data in ODBC Databases

smpatchcheck

SiteMinder Test Tool

smreg

XPSCounter

XPSConfig

XPSEvaluate

XPSExplorer

XPSSecurity

XPSSweeper

Policy Server Tools Introduced

CA SiteMinder® provides a number of administrative tools to help manage your CA SiteMinder® environment. The following list describes the function of each tool.

smobjimport

Imports policy data into the CA SiteMinder® policy store.

Note: This utility is available only to import an existing backup smdif file into the policy store. To migrate a policy store manually, use the XPSExport and XPSImport utilities.

smkeyexport

Exports keys from the key store.

smkeyimport

Imports keys into the key store.

smkeytool

Lets you manage the certificate data store.

You can also use this utility with the access legacy key store flag (-accessLegacyKS) to manage an existing smkeydatabase during a migration to 12.52.

Note: For more information about migrating the contents of a smkeydatabase to the certificate data store, see the CA SiteMinder® Upgrade Guide.

smldapsetup

Manages the CA SiteMinder® policy store in an LDAP directory.

ODBC database SQL scripts

Removes CA SiteMinder® policy store, token data, and log schema from ODBC databases.

smpatchcheck

Verifies that all required/recommended patches are installed on your Solaris system.

smreadclog

Reads RADIUS log files that the Policy Server generates.

smreg

Lets you change the CA SiteMinder® superuser password.

In addition, CA SiteMinder® provides tools for working with policy data. The following list provides an overview of the XPS-family of tools. XPS tools are platform-independent command line utilities that XPS administrators can use to manage policy store data. To learn about the options for a particular tool, enter the tool name and the following parameter at the command line:

?
XPSConfig

Manages configuration data including vendors, products, and product parameters.

Note: To use XPSConfig, your administrator account requires XPSConfig privileges.

XPSEvaluate

Evaluates expressions and lets you test performance.

Note: To use XPSEvaluate, your administrator account requires XPSEvaluate privileges.

XPSExplorer

Manages policy data including vendors, products, and applications.

Note: To use XPSExplorer, your administrator account requires XPSExplorer privileges.

XPSExport

Exports data from a policy store.

XPSImport

Imports data to a policy store.

XPSSecurity

Allows interactive creation and editing of XPS Administrators and their rights. To use this tool, copy it from either \win32\tools or /solaris/tools from the CA SiteMinder® installation file that you downloaded from Support to siteminder_home\bin.

siteminder_home

Specifies the Policy Server installation path.

Important! After you use XPSSecurity, delete it from siteminder_home\bin to prevent unauthorized use.

Note: To use XPSSecurity, your administrator account requires XPSSecurity privileges.

XPSSweeper

Synchronizes XPS and CA SiteMinder® policy stores.

Note: To use XPSSweeper, you require an administrator. No additional rights are required.

Windows 2008 Policy Server Tools Requirement

If you are running a CA SiteMinder® utility or executable on Windows Server 2008, be sure to open the command–line window with Administrator permissions, even if you are logged into the system as an Administrator. For more information, see the release notes for your CA SiteMinder® component.

Requirement When Using the Policy Server Tools on Linux Red Hat

For the Policy Server tools to work correctly on a Linux Red Hat operating system, define the Policy Server host name in /etc/hosts. You define the host name in this location because these utilities generate adminoids and OIDs. The operating system uses the gethostid() and gettimeofday() Linux functions when generating these OIDs.

Import Policy Data Using smobjimport

You can use the smobjimport tool to import the entire policy store or a single policy domain.

Note: This utility is available only to import an existing backup smdif file into the policy store. To migrate a policy store manually, use the XPSExport and XPSImport utilities.

Follow these steps:

  1. Navigate to one of the following locations:
  2. Run the following command:
    smobjimport -ifile_name -dadmin-name -wadmin-pw -v -t [-cf | -cb]
    

    Example 1: smobjimport -ipstore.smdif -dSiteMinder -wpassword -v -t -cf

    Example 2: smobjimport -ipstore.smdif -dSiteMinder -wpassword -v -t -cb

    -cf

    (Optional) Imports sensitive data using FIPS-compatible (AES) cryptographic algorithms.

    Note: This argument is required only if the Policy Server is operating in FIPS-only mode.

    -cb

    (Optional) Imports sensitive data using RC2 cryptographic algorithms.

    Important!

Overview of the XML-based Data Format

Enterprise environments can require policy store data to be moved from one environment to another, such as from a development environment to a staging environment. In releases prior to r12, policy objects are represented using the proprietary SiteMinder Data Interchange Format (SMDIF), using smobjimport and smobjexport for migrating the data. This export format and these tools have been replaced by an XML-based export format, using XPSExport and XPSImport to migrate the data.

The XML-based export format uses the following fundamental schemas:

XPSDeployment.xsd

Describes the top-level schema, which includes the other schemas. It defines the root element and sub-elements. An XML file conforming to this schema can contain an instance of Data Dictionary, Policy, and Security Data.

XPSDataDictionary.xsd

Describes meta-data information about object types and their properties.

XPSPolicyData.xsd

Describes the meta-data information about objects stored in the policy store, such as domains, policies, rules, applications, and the relationships between them.

XPSSecurityData.xsd

Describes meta-data used for representing policy store administrators and their access rights.

XPSGeneric.xsd

Contains definitions of the generic data types used in the other schema files.

This format supports not only exporting and importing policy data in its entirety, but also exporting and importing a subset of the policy data. A granular export presupposes knowledge of how the data will be imported. On export, you can specify the entire policy data, or a portion of the data using an object identifier and optionally one of these three export types:

Note: The XPSExport and XPSImport tools encrypt sensitive data based on the FIPS mode the Policy Server is operating in. There are no additional parameters in these tools to set for data encryption.

More information:

XPSExport

XPSImport

XPSExport

The XPSExport tool supports the following tasks for migrating Policy Store data:

You can export a subset of policy data by specifying the identifier of a root object. Specify this identifier in the command line or in a file (using the -xf parameter). Only those objects that do not have a parent class can be exported. For example, to export a realm object, you specify the identifier (XID) of the parent domain for the realm.

You can also create and edit a custom export file using the "shopping cart", or XCart, capability in XPSExplorer (XPSExplorer -xf). You can set the import mode (ADD, OVERLAY, REPLACE, or DEFAULT) on a per object basis in the XCart file. You can then pass the XCart file to XSPExport using the -xf parameter.

Consider the following factors:

Depending on the mode you select when using XPSExport, these objects could possibly be added to the new environment or can overwrite existing settings. Be sure that you do not adversely affect environment settings when importing the objects.

Syntax

The syntax of the XPSExport is following:

XPSExport output_file [-xo object_XID] [-xo-add object_XID] [-xo-replace object_XID]
[-xo-overlay object_XID] [-xf file_name] [-xb] [-xe] [-xp] [-xs] [-xc] [-xi] [-xm]
[-f] [-fm] [-q] [-m <number>[%]] [-pass <passphrase>][-npass] [-comment comment] 
[-cf commentpath] [-?] [-vT] [-vI] [-vW] [-vE] [-vF] [-l log_file] [-e err_file] 

Parameters

output_file

The output XML file.

-xo object_XID

Specifies one or more objects for granular export. You can optionally specify one of the following export types:

-xo-add object_XID

Specifies only additions are done during an import.

-xo-replace object_XID

Overwrites the policy data during an import.

-xo-overlay object_XID

Updates the policy data during an import.

-xf file_name

(Optional) Specifies the absolute name of a file that contains the list of XIDs of objects to be exported.

The entries in the file have the following format:

CA.SM::UserDirectory@0e-255e2456-556d-40fb-93cd-f2fed81f656e

ADD = CA.SM::AuthScheme@0d-4afc0e41-ae25-11d1-9cdd-006008aac24b

REPLACE = CA.SM::Agent@01-cb8b3401-a6aa-4794-964e-c569712269c0

OVERLAY = CA.SM::Domain@03-7bdf31f2-44d7-4d7b-a8f5-5de2eaa0b634

These entries correspond to the following command-line parameters:

-xo CA.SM::UserDirectory@0e-255e2456-556d-40fb-93cd-f2fed81f656e
-xo-add CA.SM::AuthScheme@0d-4afc0e41-ae25-11d1-9cdd-006008aac24b
-xo-replace CA.SM::Agent@01-cb8b3401-a6aa-4794-964e-c569712269c0
-xo-overlay CA.SM::Domain@03-7bdf31f2-44d7-4d7b-a8f5-5de2eaa0b634
-xb

(Optional) Exports all the objects of a policy store, including the location of the policy store. The policy store location is set on the Data tab of the SiteMinder Policy Server management console.

Important! Any Policy Server to which you import this data uses the policy store that is specified during the export. For example, suppose you export data from Policy Server one, which uses an ODBC database as a policy store. Later, you import the data into Policy Server two, which uses Active Directory as a policy store. The existing Active Directory policy store location of Policy Server two is replaced with the ODBC database location of Policy Server one.

-xe

(Optional) Exports the object types that are related to the execution environment.

-xp

(Optional) Exports the object types that are related to the policies.

Note: The -xe and -xp options cannot be used with -xo, -xo-add, -xo-replace, -xo-overlay, or -xf.

Important! The -xe and -xp options supersede the -xa option to extract all policy data. You can also use the -xb option that lets you take complete backup of the Policy Server location-specific data, such as the policy store location.

-xs

(Optional) Exports the entire security data.

-xc

(Optional) Exports the entire configuration data.

-xi

(Optional) Exports the object types that were initially installed.

Example: AgentType

-xm

(Optional) Exports the objects that are specified in an ExtractManifest object.

-f

(Optional) Overwrites the output file.

-fm

(Optional) Uses less memory, but affects the performance.

-q

(Optional) Suppresses progress messages.

-m <number>[%]

(Optional) Indicates that progress messages are output after every <number> of objects.

If the optional percent sign ("%") is included, then <number> is a percentage of the total objects, not a number of objects.

Default: Ten percent.

-pass <passphrase>

(Optional) Specifies the passphrase that is required for encryption of sensitive data. This passphrase must be at least eight characters long and must contain at least one digit, one uppercase, and one lowercase character. The passphrase can contain a space that is enclosed in quotes. If not specified as a command-line option, the export process prompts for a passphrase when sensitive data is being exported.

-npass

(Optional) Specifies that no passphrase is used.

Important! Sensitive data is exported as clear text.

-comment

(Optional) Adds a comment to the output file.

-cf commentpath

(Optional) Obtains the comment from the <commentpath> and adds it to the output file.

-?

Displays command-line help.

-nb

(Optional) Averts the beeps on error.

-vT

(Optional) Sets the verbosity level to TRACE.

-vI

(Optional) Sets the verbosity level to INFO.

-vW

(Optional) Sets the verbosity level to WARNING (default).

-vE

(Optional) Sets the verbosity level to ERROR.

-vF

(Optional) Sets the verbosity level to FATAL.

-l log_file

(Optional) Outputs log to the specified file.

-e err_file

(Optional) Specifies the file to which errors and exceptions are logged. If omitted, stderr is used.

Example

XPSExport PolicyData.xml -xo CA.SM::UserDirectory@0e-255e2456-556d-40fb-93cd-f2fed81f656e
-xo-overlay CA.SM::Domain@03-7bdf31f2-44d7-4d7b-a8f5-5de2eaa0b634

Note: For granular exports, the export type is specified explicitly on the command line or is retrieved from the data dictionary. For dump exports, the export type attribute for all objects is Replace. A load import of the policy data overwrites all of the policy data in the policy store.

If the XPSExport tool encounters any errors in the command-line options, the tool aborts and records the errors in the exception file (or stderr). The export process also aborts when the export of any object fails. The appropriate errors are logged to the exception file (or stderr) and the XML output file (if it has been created) is deleted.

Add Policy Data

The diagram following shows a SiteMinder policy domain named Domain1 in the source policy store that has to be exported and imported to the target policy store.

Graphic showing a SiteMinder policy domain named Domain1 in the source policy store that has to be exported and imported to the target policy store

The target policy store already has a domain with the same name, but there are differences between the two:

To specify a granular import of only one object (Realm2) into the target policy store, the command line on export would look like this:

XPSExport gran-add.xml -xo-add CA.SM: :Domain@03-0fb7bd02-6986-4bb9-b240-c232358958b1 

After a successful import Domain1 in the target policy store has three realms. The properties of Realm1 are not updated, as shown in the figure following.

Graphic showing Domain1 in the target policy store having three realms with properties of Realm1 not updated

To specify a granular export of an explicitly specified object (domain) into the target policy store using the add method, use the following command:

XPSExport -ma -xo <object_XID>
-ma

Adds all the objects appearing after this parameter on the command line.

To specify a granular export of all the relevant objects of the explicitly specified object (domain) into the target policy store using the add method, use the following command:

XPSExport -ra -xo <object_XID>
-ra

Adds the relevant system objects of the objects appearing after this parameter on the command line.

Overlay Policy Data

The diagram following shows a SiteMinder policy domain named Domain1 in the source policy store that has to be exported and imported to the target policy store.

Graphic showing a SiteMinder policy domain named Domain1 in the source policy store that has to be exported and imported to the target policy store

The target policy store already has a domain with the same name, but there are differences between the two:

To specify a granular import where the target policy store is updated with the latest changes from the source policy store, the command line on export would look like this:

XPSExport gran-add.xml -xo-overlay CA.SM: :Domain@03-0fb7bd02-6986-4bb9-b240-c232358958b1 

After a successful import the properties of Realm1 on the target policy store are updated, as shown in the figure following.

Graphic showing Domain1 in the target policy store having three realms with properties of Realm1 updated

To specify a granular export of an explicitly specified object (domain) into the target policy store using the overlay method, use the following command:

XPSExport -mo -xo <object_XID>
-mo

Overlays all the objects appearing after this parameter on the command line.

To specify a granular export of all the relevant objects of the explicitly specified object (domain) into the target policy store using the overlay method, use the following command:

XPSExport -ro -xo <object_XID>
-ro

Overlays the relevant system objects of the objects appearing after this parameter on the command line.

Replace Policy Data

The diagram following shows a SiteMinder policy domain named Domain1 in the source policy store that has to be exported and imported to the target policy store.

Graphic showing a SiteMinder policy domain named Domain1 in the source policy store that has to be exported and imported to the target policy store

The target policy store already has a domain with the same name, but there are differences between the two:

To duplicate the contents of the source policy store in the target policy store, the command line on export would look like this:

XPSExport gran-add.xml -xo-replace CA.SM: :Domain@03-0fb7bd02-6986-4bb9-b240-c232358958b1 

After a successful import Domain1 in the target policy store is exactly the same as Domain1 in the source policy store, as shown in the figure following.

Graphic showing Domain1 in the target policy store having two realms with the properties of Realm1 updated

To specify a granular export of an explicitly specified object (domain) into the target policy store using the replace method, use the following command:

XPSExport -mr -xo <object_XID>
-mr

Replaces all the objects appearing after this parameter on the command line.

To specify a granular export of all the relevant objects of the explicitly specified object (domain) into the target policy store using the replace method, use the following command:

XPSExport -rr -xo <object_XID>
-rr

Replaces the relevant system objects of the objects appearing after this parameter on the command line.

Merge Policy Data

When you migrate a domain object from one policy store to another, only the explicitly specified object (domain) is migrated. All the relevant objects of the domain (for example, user directories, agents, agent types) are not migrated to the target policy store. Without the relevant system objects, you cannot import the domain to a policy store.

To specify a granular export of an explicitly specified object (domain) into the target policy store using the merge method, use the following command:

XPSExport -mm -xo <object_XID>>
-mm

Merges all the objects appearing after this parameter on the command line.

To specify a granular export of all the relevant objects of the explicitly specified object (domain) into the target policy store using the merge method, use the following command:

XPSExport -rm -xo <object_XID>
-rm

Merges the relevant system objects of the objects appearing after this parameter on the command line.

Note: The Merge option is an alternative to the Add, Replace, or Overlay options. The Merge option is similar to the add option, the only difference being that this option adds not only the missing objects but also adds the missing attributes of the existing objects.

Verify that Federated SAML Partnerships Intended for 12.52 Do Not Have the Same Backchannel Username

In CA SiteMinder® 12.52, no two SAML 2.0 partnerships can share an incoming backchannel username. Similarly, no two SAML 1.0 partnerships can share an incoming backchannel username. A SAML 1.0 and a SAML 2.0 partnership can share an incoming backchannel username but it is not recommended. However, it was possible to configure such partnerships in earlier releases.

Before you export a configuration that features partnerships for backup or import into 12.52, verify that none have such similar incoming backchannel usernames.

If an earlier configuration does have such partnerships, do the following steps before you export the policy store:

  1. Deactivate one of the partnerships.
  2. Change the backchannel username that is defined in that partnership.
  3. Inform the remote partner of the change.
  4. Reactivate the partnership.

Attempting to import a configuration that has incoming backchannel user names (within the same protocol) are the same into 12.52 results in failure.

XPSImport

The XPSImport tool supports the following tasks for migrating policy store data:

Note: XPSImport does not import keys into the key store. You must use smkeyimport for this purpose.

Syntax

The syntax for XPSImport is:

XPSImport input_file [-pass <passphrase>] [-npass] [-validate] [-fo] [-vT] [-vI] [-vW] [-vE] [-vF] [-e file_name] [-l log_path] [-?]

Parameters

input_file

Specifies the input XML file.

-q

(Optional) Suppresses progress messages.

-m <number>[%]

(Optional) Indicates that progress messages are output after every <number> of objects.

If the optional percent sign ("%") is included, then <number> is a percentage of the total objects, not a number of objects.

Default: 10%.

-pass <passphrase>

(Optional) Specifies the passphrase required for decryption of sensitive data. The phrase must be the same as the phrase specified during export, or the decryption will fail.

-npass

(Optional) Specifies that no passphrase is to be used.

Important! Sensitive data is imported as clear text.

-validateOnly

(Optional) Validates the input XML file without updating the database.

-schemaFile

Specifies the schema file to validate the input file. If this option is not specified then input file will not be validated.

-fo

Allows force overwrite of existing policy store date for a dump load.

-?

Displays command-line help.

-nb

(Optional) Averts the beeps on error.

-vT

(Optional) Sets the verbosity level to TRACE.

-vI

(Optional) Sets the verbosity level to INFO.

-vW

(Optional) Sets the verbosity level to WARNING (default).

-vE

(Optional) Sets the verbosity level to ERROR.

-vF

(Optional) Sets the verbosity level to FATAL.

-l log_file

(Optional) Outputs log to the specified file.

-e err_file

(Optional) Specifies the file to which errors and exceptions are logged. If omitted, stderr is used.

Example

XPSImport PolicyData.xml -e C:\\tmp\\ExceptionLog.txt 

This example imports policy data objects as specified in the PolicyData.xml file. It is not immediately evident from the command line if the import is a dump load or a granular import. That information can however be retrieved by looking at the IsDumpExport attribute of <PolicyData> element in the input XML file. If this attribute is set to true, it indicates that the input XML file has to be used for dump load.

Troubleshooting Policy Data Transfer

The following factors might possibly be relevant when transferring policy store data:

smkeyexport

The smexportkey tool exports keys from the key store. The syntax for smkeyexport is following.

smkeyexport -dadminname -wadminpw [-ooutput_filename] [-f] [-c] [-cb] [-cf] [-l] [-v] [-t] [-?]
-d

Specifies the name of the SiteMinder administrator.

-w

Specifies the password of the SiteMinder administrator.

-o

(Optional). Specifies the output file; defaults to stdout.smdif.

-f

(Optional).Overwrites an existing output file.

-c

(Optional). Exports sensitive data unencrypted.

-cb

(Optional). Exports sensitive data encrypted with backward-compatible cryptography.

-cf

(Optional). Exports sensitive data encrypted with FIPS-compatible cryptography.

-l

(Optional). Creates and logs entries to the specified file (filename.log).

-v

(Optional). Specifies verbose messaging.

-t

(Optional). Enables tracing.

-?

(Optional). Displays command options.

CA SiteMinder® Key Tool

The CA SiteMinder® key tool utility (smkeytool):

Follow these steps:

  1. Open a command line or shell.
  2. Run one of the following commands:

Use smkeytool to:

Add a Private Key and Certificate Pair

Use the addPrivKey option to import only a private key/certificate pair into the certificate data store. Consider the following items:

Arguments for this option include the following:

-accessLegacyKS

Specifies that the option applies to the legacy smkeydatabase. If you do not supply this argument, the option applies to the 12.52 certificate data store.

-alias alias

Required. Assigns an alias to a private key/certificate pair in the database. The alias must be a unique string and can contain only alphanumeric characters.

-certfile cert_file

Specifies the full path to the location of the certificate that is associated with the private key/certificate pair. Required for keys in PKCS1, PKCS5, and PKCS8 format.

-keyfile private_key_file

Specifies the full path to the location of the private key file. Required for keys in PKCS1, PKCS5, and PKCS8 format.

-keycertfile key_cert_file

Specifies the full path to the location of the PKCS12 file that contains the private key/certificate pair data. Required for keys in PKCS12 format.

-password password

(Optional) Specifies the password that was used to encrypt the private key/certificate pair when the pair was created. Supply this password to decrypt the key/certificate pair before it gets written to the certificate data store.

Note: This password is not stored in the certificate data store.

After the key/certificate pair is decrypted and placed in the certificate data store, CA SiteMinder® encrypts the pair again using its own password.

Add a Certificate

Use the addCert option to add a public certificate or trusted CA certificate to the certificate data store.

Consider the following items:

Arguments for this option include the following:

-accessLegacyKS

Specifies that the option applies to the legacy smkeydatabase. If you do not supply this argument, the option applies to the 12.52 certificate data store.

-alias alias

Required. Specifies the alias to the certificate associated with the private key in the certificate data store.

Limit: A unique string that contains only alphanumeric characters.

-infile cert_file

Required. Specifies the full path to the location of the newly added certificate.

-trustcacert

Optional. Checks that the user provider certificate being added is a CA certificate. The utility checks that the certificate has a digital signature extension and that the certificate has the same IssuerDN and Subject DN values.

-noprompt

(Optional) The user is not prompted to confirm the addition of the certificate.

Add Revocation Information

Use the addRevocationInfo option to specify the location of a CRL. The certificate data store references the location of the CRL.

Arguments for this option include the following:

-accessLegacyKS

Specifies that the option applies to the legacy smkeydatabase. If you do not supply this argument, the option applies to the 12.52 certificate data store.

-issueralias issuer_alias

Required. Specifies the alias of the Certificate Authority who issues the CRL.

Example: -issueralias verisignCA

-type (ldapcrl | filecrl)

Required. Specifies if the CRL is LDAP–based or file–based.

-location location

Required. Specifies the location of the CRL.

Delete Revocation Information

Use the deleteRevocationInfo option to delete a CRL from the certificate data store.

Arguments for this option include the following:

-accessLegacyKS

Specifies that the option applies to the legacy smkeydatabase. If you do not supply this argument, the option applies to the 12.52 certificate data store.

-issueralias issuer_alias

(Required) Specifies the name of the Certificate Authority who issues the CRL.

-noprompt

(Optional) The user is not prompted to confirm that the CRL can be deleted.

Remove Certificate Data

Use the removeAllCertificateData option to remove all certificate data from the certificate data store.

The argument for this option is the following:

-noprompt

(Optional) The user is not prompted to confirm that the certificate data can be removed.

Delete a Certificate

Use the delete option to remove a certificate from the certificate data store. If the certificate has an associated private key, the key is also deleted.

Arguments for this option include the following:

-accessLegacyKS

Specifies that the option applies to the legacy smkeydatabase. If you do not supply this argument, the option applies to the 12.52 certificate data store.

-alias <alias>

(Required) Specifies the alias of the certificate that the option is to remove.

-noprompt

(Optional) The user is not prompted to confirm that the certificate can be removed.

Export a Certificate or Private Key

Use the export option to export a certificate or private key to a file.

Consider the following items:

Arguments for this option include the following:

-accessLegacyKS

Specifies that the option applies to the legacy smkeydatabase. If you do not supply this argument, the option applies to the 12.52 certificate data store.

-alias alias

(Required) Identifies the certificate or key to be exported.

-outfile out_file

(Required) Specifies the full path to the file to which the data is exported.

-type (key|cert)

(Optional) Specifies whether a certificate or key is being exported.

Default: certificate.

-password password

Required only when exporting a private key. Specifies the password that is used to encrypt the private key when exported. You do not need a password to export the certificate holding the public key because certificates are exported in clear text.

To add this private key back to the certificate data store, use the addPrivKey option with this password.

Find an Alias

Use the findAlias option to find the alias that is associated with a certificate in the certificate data store.

Arguments for this option include the following:

-accessLegacyKS

Specifies that the option applies to the legacy smkeydatabase. If you do not supply this argument, the option applies to the 12.52 certificate data store.

-infile cert_file

(Required) Specifies the full path to the certificate file associated with the alias you want.

-password password

Required only when a password–protected P12 file is specified as the certificate file.

Import Default CA Certificates

Use the importDefaultCACerts option to import all default trusted Certificate Authority certificates that are included with CA SiteMinder® to the certificate data store.

The argument for this option is the following:

-accessLegacyKS

Specifies that the option applies to the legacy smkeydatabase. If you do not supply this argument, the option applies to the 12.52 certificate data store.

List Metadata for all Certificates

Use the listCerts option to list some metadata of all certificates stored in the certificate data store.

Arguments for this option include the following:

-accessLegacyKS

Specifies that the option applies to the legacy smkeydatabase. If you do not supply this argument, the option applies to the 12.52 certificate data store.

-alias alias

(Optional) Lists the metadata details of the certificate and key that are associated with the alias specified.

This option supports an asterisk (*) as a wildcard character. Use the wildcard at the

Enclose the wildcard in quotes to prevent a command shell from interpreting the wildcard character.

List Revocation Information

Use the listRevocationInfo option to display a list of certificate revocation lists in the certificate data store. The following items are listed:

Arguments for this option include the following:

-accessLegacyKS

Specifies that the option applies to the legacy smkeydatabase. If you do not supply this argument, the option applies to the 12.52 certificate data store.

-issueralias issuer_alias

(Optional) Name of the Certificate Authority who issues the CRL.

This option supports an asterisk (*) as a wildcard character. Use the wildcard at the:

Enclose the wildcard in quotes to prevent a command shell from interpreting the wildcard character.

Display Certificate Metadata

Use the printCert option to display some metadata for a specified certificate. This command is useful on systems where viewing certificate properties is difficult.

Arguments for this option include the following:

-accessLegacyKS

Specifies that the option applies to the legacy smkeydatabase. If you do not supply this argument, the option applies to the 12.52 certificate data store.

-infile cert_file

Required. Location of the certificate file.

-password password

The password is required only when a password-protected P12 file is specified as the certificate file.

Rename an Alias

Use the renameAlias option to rename an alias that is associated with a certificate.

Arguments for this option include the following:

-accessLegacyKS

Specifies that the option applies to the legacy smkeydatabase. If you do not supply this argument, the option applies to the 12.52 certificate data store.

-alias current_alias

(Required) Specifies the alias that is associated with a certificate.

-newalias new_alias

(Required) Specifies the new alias name.

Limits: Must be a unique string that contains only alphanumeric characters.

Validate a Certificate

Use the validateCert option to determine if a certificate is revoked.

Arguments for this option include the following:

-accessLegacyKS

Specifies that the option applies to the legacy smkeydatabase. If you do not supply this argument, the option applies to the 12.52 certificate data store.

-alias alias

(Required) Specifies the alias to the certificate associated with the private key in the certificate data store

Limits: Must be a unique string that contains only alphanumeric characters.

-infile crl_file

(Optional) Specifies the CRL that you want the utility to look in for the certificate to validate it.

Load the the OCSP Configuration File

Use the loadOCSPConfigFile option to reload the OCSP configuration file into the certificate data store without restarting the Policy Server. When the file loads, any existing OCSP configuration is removed from the data store and the configuration is replaced with the contents of the file. The OCSPUpdater picks up the configuration changes the next time that it wakes.

The name of the OCSP configuration file is SMocsp.conf.

The command syntax for Windows is:

smkeytool.bat -loadOCSPConfigFile

The command syntax for UNIX is:

smkeytool.sh -loadOCSPConfigFile

smldapsetup

The smldapsetup utility allows you to manage an LDAP policy store from the command line. Using smldapsetup, you can configure an LDAP policy store, generate an LDIF file, and remove policy store data and schema.

To use smldapsetup, specify a mode, which determines the action that smldapsetup will perform, and arguments, which contain the values that are used to configure the LDAP server.

The following table contains the modes you can use with smldapsetup and the arguments each mode uses:

Modes

Arguments

reg

-hhost, -pportnumber, -duserdn,
-wuserpw, -rroot,
-ssl1|0, -ccertdb, -k1

ldgen

-hhost, -pportnumber, -duserdn,
-wuserpw, -rroot,
-mn, -ssl1|0, -ccertdb
-fldif, -ttool, -ssuffix, -e, -k

ldmod

-hhost, -pportnumber, -duserdn,
-wuserpw, -rroot,
-ssl1|0, -ccertdb, -fldif,
-ssuffix, -e, -k, -i

remove

-hhost, -pportnumber, -duserdn,
-wuserpw, -rroot, -ssl1|0,
-ccertdb, -k

switch

none

revert

-v

status

-v

To use smldapsetup

  1. Navigate to one of the following locations:
    siteminder_home

    Specifies the installed location of CA SiteMinder®.

  2. Enter the following command:
    smldapsetup mode arguments
    

    Important! Before running a CA SiteMinder® utility or executable on Windows Server 2008, open the command line window with administrator permissions. Open the command line window this way, even if your account has administrator privileges.

    Example: smldapsetup reg -hldapserver.mycompany.com -d”LDAP User”
    -wMyPassword123 -ro=security.com

    Note: When running smldapsetup, make sure that the LDAP user you specify has the appropriate administrator privileges to modify schema in the LDAP Directory Server. If this user does not have the proper privileges, then the LDAP server will not allow you to generate the policy store schema and to update or remove the policy store data. After running the smldapsetup command, this user appears in the Admin Username field on the Data tab of the Policy Server Management Console.

More Information:

Modes for smldapsetup

Modes for smldapsetup

The mode indicates the action that smldapsetup performs. You can specify a mode to connect to the LDAP server, generate an LDIF file, configure an LDAP policy store and remove policy data.

The modes for smldapsetup include:

reg

Tests the connection to the LDAP server. If the connection succeeds, smldapsetup configures the CA SiteMinder® LDAP server as its policy store using the -hhost, -pportnumber, -duserdn, -wuserpw, -rroot, -ssl1/0 and -ccertdb arguments.

ldgen

Automatically detects supported LDAP servers and generates an LDIF file with the CA SiteMinder® schema. The generated file is used by smldapsetup ldmod to create the CA SiteMinder® schema. If the -e argument is specified, smldapsetup ldgen creates an LDIF file that can be used with ldmod to delete the CA SiteMinder® schema. Use the -m switch to skip automatic detection of LDAP servers. The ldgen mode requires the -f switch unless previously configured in reg mode.

ldmod

Connects to the LDAP server and the CA SiteMinder® schema without populating the policy store with any data. It requires the LDAP modify program and the LDIF file, specified with the -fldif argument. If you specify the -hhost, -pport_number, -duserdn,-wuserpw, -rroot, -ssl1/0 and -ccertdb arguments, smldapsetup ldmod will modify the LDAP directory specified using these arguments. If you do not specify -hhost, -pportnumber, -duserdn, -wuserpw, -rroot, -ssl1/0 and -ccertdb, smldapsetup ldmod uses the LDAP directory previously defined using smldapsetup reg or the Policy Server Management Console.

remove

Connects to the LDAP server, then removes all policy data stored under the CA SiteMinder® LDAP node that corresponds to the current version of smldapsetup. If you specify the -hhost, -pport_number, -duserdn,-wuserpw, -rroot, -ssl1/0 and -ccertdb arguments, smldapsetup remove will remove policy data from the LDAP directory specified by these arguments. If you do not specify -hhost, -pport, -duserdn, -wuserpw, -rroot, -ssl1/0 and -ccertdb, smldapsetup remove will remove the policy data from the LDAP directory previously defined using smldapsetup reg or the Policy Server Management Console.

switch

Reconfigures the Policy Server to use LDAP rather than ODBC. It does not prepare the LDAP store or the LDAP connection parameters before making the change.

revert

Reverts to ODBC policy store from LDAP. The only argument used with this mode is -v.

status

Verifies that the LDAP policy store connection parameters are configured correctly. It requires the -v argument. If you specify the
-hhost, -pport_number, -duserdn, -wuserpw, -rroot,
-ssl1/0 and -ccertdb arguments, smldapsetup status tests the connection to the LDAP directory specified using these arguments. If you do not specify -hhost, -pport_number, -duserdn, -wuserpw,
-rroot, -ssl1/0 and -ccertdb, smldapsetup status verifies the connection to the LDAP directory previously defined using smldapsetup reg or the Policy Server Management Console.

From the Data tab in the Policy Server Management Console, you can view or change the settings you configured with the reg, switch and revert functions using a GUI interface. You must use smldapsetup to perform the ldgen, ldmod, remove, and status functions.

Arguments for smldapsetup

Arguments allow you to specify the information used by the modes to manage the LDAP policy store. If you do not specify arguments, smldapsetup uses the values configured in the Policy Server Management Console.

Note: smldapsetup does not allow spaces between an argument and its value. For example, the -h argument should be specified as follows:
smldapsetup ldmod -hldapserver.mycompany.com

The arguments you can specify in an smldapsetup call are listed below:

-hhost

Specifies the fully qualified name of the LDAP server; the relative name, if the machines are in the same domain (-hldapserver); or the IP address (-h123.12.12.12). If you do not specify a host, smldapsetup uses the previously configured value as the default.

Example: -hldapserver.mycompany.com

-pport_number

Specifies a non-standard LDAP port. The LDAP port must be specified if the LDAP server is using a non-standard port or if you are moving a server to a new server that uses a different port, such as moving from a server using SSL to one that is not. If a port is not specified, the previous configuration values are used. If no previous port configuration has been specified, smldapsetup uses the default ports 389, if SSL is not being used, or 636, if SSL is being used.

-duserdn

Specifies the LDAP user name of a user with the power to create new LDAP directory schema and entries. This is not necessarily the user name of the LDAP server administrator. If you do not specify a user name, smldapsetup uses the previously configured name as the default.

-wuserpw

Specifies the password for the user identified in the -d argument. If you do not specify a password, smldapsetup uses the previously configuration value.

Example: -wMyPassword123

-rroot

Specifies the distinguished name of the node in the LDAP tree where CA SiteMinder® will search for the policy store schema. If you do not specify a root, smldapsetup uses the previously configured root.

Example: -ro=security.com

-e

When specified with smldapsetup ldgen, generates an LDIF file that can delete the CA SiteMinder® schema. The generated file must be used with smldapsetup ldmod to remove the schema.

-mn

Skips automatic detection of LDAP servers and specify type of LDAP policy store where n is one of the following:

2

iPlanet v4 LDAP servers.

3

Active Directory LDAP servers.

4

Oracle Internet Directory.

5

iPlanet v5.

6

Sun Directory Servers.

9

Active Directory Application Mode (ADAM).

-fldif

Specifies the absolute or relative path to an LDIF file from the directory in which smldapsetup is being executed.

Example: -f../siteminder/db/smldap.ldif

Default: if you do not specify a path, smldapsetup uses the current directory as the default.

-ttool

Specifies the absolute or relative path, including filename and extension, of the ldapmodify command line utility. Ldapmodify is used to configure the server schema using the LDIF format commands. LDAP servers and CA SiteMinder® provide a copy of ldapmodify. If the utility is not in the default location, use this argument to specify its location.

-ssl1_or_0

Specify -ssl1 to use an SSL-encrypted connection to the LDAP server, and -ssl0 to use a non-SSL connection. If you do not specify a value for -ssl, smldapsetup uses the previously configured value. If the LDAP connection has not been configured before, the initial default value is 0.

-ccert

This argument must be specified when using an SSL encrypted
(-ssl1) LDAP connection. Specifies the path of the directory where the SSL client Netscape certificate database file, which is usually called cert8.db, exists.

Example: If cert8.db exists in /app/siteminder/ssl, specify -c/app
/siteminder/ssl when running smldapsetup ldmod -f/app/siteminder/pstore.ldif -p81 -ssl1 -c/app/siteminder/ssl.

Note: For policy stores using an SSL-encrypted connection to Sun Java System LDAP, make sure the key3.db file exists in the same directory as cert8.db.

-k-k1

Enables you to use smldapsetup to set up or modify a key store if you are storing key information in a different LDAP directory. If you specify -k, smldapsetup checks to see if the Policy Server is pointing to the key store before performing any functions. If the Policy Server is not pointing to the key store, smldapsetup issues a warning. If you specify -k1, in conjunction with smldapsetup ldgen and the other arguments for a new policy store, smldapsetup creates a separate key store in the location you specify. If you do not specify -k or -k1, smldapsetup will modify the policy store.

-v

Enables verbose mode for troubleshooting. With -v, smldapsetup logs its command-line arguments and configuration entries as it performs each step in the LDAP migration.

-iuserDN

Specifies the distinguished name of an account that should be used by CA SiteMinder® to make modifications to the policy store. This argument allows an administrator account to retain control of the CA SiteMinder® schema while enabling another account that will be used for day-to-day modifications of CA SiteMinder® data. When a change is made using the Administrative UI, the account specified by this argument is used. Be sure to enter the entire DN of an account when using this argument.

-q

Enables quiet mode for no questions to be asked.

-u

Creates a 6.x upgrade schema file (LDIF).

-x

Use the -x argument with ldmod to generate replication indexes for another 5.x Sun Java System Directory Server Enterprise Edition (formerly Sun ONE/iPlanet) LDAP directory server.

-ssuffix

This option allows you to specify a suffix other than the default parent suffix when configuring the 6.x Policy Server's schema in a Sun Java System Directory Server Enterprise Edition (formerly Sun ONE/iPlanet) LDAP directory server.

Example: assume the following:

ou=Apps,o=test.com is the Policy Store root.

o=test.com is the root suffix.

ou=netegrity,ou=Apps,o=test.com is the sub suffix.

If you do not use the -s parameter with smldapsetup, the Policy Server assigns ou=Apps,o=test.com as a parent suffix of ou=netegrity,ou=Apps,o=test.com. To change this and have the appropriate parent suffix set, run smldapsetup using the -s parameter while specifying o=test.com.

-?

Displays the help message.

Note: If the arguments contain spaces, you must enter double quotes around the entire argument. For example, if the name of the CA SiteMinder® administrator is LDAP user, the argument for smldapsetup would be: -d”LDAP user".

smldapsetup and Sun Java System Directory Server Enterprise Edition

In a Sun Java System Directory Server Enterprise Edition (formerly Sun ONE/iPlanet) directory server, smldapsetup creates the ou=Netegrity, root sub suffix and PolicySvr4 database.

root

The directory root you specified in the Root DN field on the Data tab of the Policy Server Management Console. This variable has to be either an existing root suffix or sub suffix.

Example: If your root suffix is dc=netegrity,dc=com then running smldapsetup produces the following in the directory server:

Example: If you want to place the policy store under ou=apps,dc=netegrity,dc=com, then ou=apps,dc=netegrity,dc=com has to be either a root or sub suffix of the root suffix dc=netegrity,dc=com.

If it is a sub suffix, then running smldapsetup produces the following:

Note: For more information about root and sub suffixes, see the Sun Microsystems documentation.

Remove the SiteMinder Policy Store using smldapsetup

To remove the CA SiteMinder® policy store data and schema from an LDAP directory, you must first delete the data, then remove the schema.

Important!

To remove the policy store using smldapsetup

  1. Navigate to the following location:
  2. Remove the policy store data by entering the following command:
    smldapsetup remove -hLDAP_IP_Address -pLDAP_Port 
    -d LDAP_Admin -wLDAP_Admin_Password -rLDAP_Base_DN
    -v
    

    Example: smldapsetup remove -h192.169.125.32 -p552 -d"cn=directory manager" -wfirewall -rdc=ad,dc=test,dc=com -v

    Note: Removing the policy store data may take a few moments.

  3. Generate the LDIF file you will use to delete the schema by entering the following:
    smldapsetup ldgen -e -fldif
    
    ldif

    Specifies the name of the LDIF file you are generating.

    Example: smldapsetup ldgen -e -fdelete.ldif

  4. Remove the CA SiteMinder® schema by executing the following command:
    smldapsetup ldmod -fldif
    
    ldif

    Specifies the name of the LDIF file you generated using smldapsetup ldgen
    -e.

    Example: smldapsetup ldmod -fdelete.ldif

Delete SiteMinder Data in ODBC Databases

CA SiteMinder® provides SQL scripts that delete the CA SiteMinder® schema from ODBC databases. The following list describes each SQL script:

sm_oracle_ps_delete.sql

Removes the CA SiteMinder® policy store and data from an Oracle database.

sm_oracle_logs_delete.sql

If the database was created using sm_oracle_logs.sql, removes CA SiteMinder® logs stored in an Oracle database

sm_oracle_ss_delete.sql

Removes the CA SiteMinder® session store tables and data from an Oracle database.

sm_mssql_ps_delete.sql

Removes the CA SiteMinder® policy store and data from an SQL database.

sm_mssql_logs_delete.sql

If the database was created using sm_mssql_logs.sql, removes CA SiteMinder® logs stored in an SQL database

sm_mssql_ss_delete.sql

Removes the CA SiteMinder® session store tables and data from a SQL database.

sm_db2_ps_delete.sql

Removes the CA SiteMinder® policy store and data from a DB2 database.

sm_db2_logs_delete.sql

If the database was created using sm_db2_logs.sql, removes CA SiteMinder® logs stored in a DB2 database

sm_db2_ss_delete.sql

Removes the CA SiteMinder® session store tables and data from a DB2 database.

The ODBC database SQL scripts are in the following location:

Delete the database objects by running the appropriate SQL script using DB2, SQL Plus for Oracle, or SQL Server Query Analyzer.

Note: For more information about running SQL scripts, see your database documentation.

smpatchcheck

The smpatchcheck tool lets you determine whether you have the Solaris patches required for the Policy Server and Web Agent installed on your system. Smpatchcheck can be run on the Solaris versions listed on the CA SiteMinder® Platform Matrix. To access this matrix, go to Technical Support and search for the CA SiteMinder® Platform Support Matrix.

To use smpatchcheck

  1. Navigate to siteminder_home/bin
    siteminder_home

    Specifies the Policy Server installation path.

  2. Enter smpatchcheck.

    Smpatchcheck looks for each required/recommended patch and then displays its status.

    For example:

    Testing for Required Patches:
      Testing for Patch: 106327-09 ... NOT Installed
    Testing for Recommended Patches:
      Testing for Patch: 106541-08 ... Installed
      Testing for Patch: 106980-00 ... Installed
    SiteMinder Patch Check: Failed
    

Smpatchcheck returns one of the following messages:

Failed

One or more of the required patches is not installed.

Partially Failed

One or more of the recommended patches is not installed.

Success

All of the required and recommended patches are installed.

SiteMinder Test Tool

The CA SiteMinder® Test Tool is a utility that simulates the interaction between Agents and Policy Servers. It tests the functionality of the Policy Server. During testing, the Test Tool acts as the Agent, making the same requests to the Policy Server as a real Agent. This allows you to test your CA SiteMinder® configuration before deploying it.

Note: For further information about this tool, see the Policy Server Configuration Guide.

smreg

To change the super user password

  1. Be sure that the Policy Server is running and pointed at a configured policy store.
  2. Be sure that the smreg utility is located in policy_server_home\bin.
    policy_server_home

    Specifies the Policy Server installation path.

    Note: If the utility is not present, you can find it in the Policy Server installation media available on the Support site.

  3. Run the following command:
    smreg -su password
    
    password

    Specifies the password for the CA SiteMinder® super user account.

    Note: Be sure that there is a space between -su and the password.

    The utility changes the super user account password.

  4. Delete the smreg utility.

    Deleting the utility prevents anyone from changing the super user password.

More information:

Locate the Installation Media

XPSCounter

To comply with the terms of your CA SiteMinder® license, you can count the number of users in your CA SiteMinder® environment. The following process describes how to configure your directories and count the CA SiteMinder® users stored within them:

  1. Make the following changes to each user directory you want to count:

    Note: For more information, see the CA SiteMinder® Policy Server Configuration Guide.

  2. For Microsoft Active Directory user stores, map the inetOrgPerson attribute using the Administrative UI.
  3. Determine the number of users associated with CA SiteMinder® policies.
Map the Active Directory inetOrgPerson Attribute

If your CA SiteMinder® user stores are on Microsoft Active Directory servers, map the inetOrgPerson in each server before counting the CA SiteMinder® users.

Follow these steps:

  1. Log in to the Administrative UI.
  2. Click Infrastructure, Directory.
  3. Click User Directories.
  4. Search for the user directory you want and click the directory name.
  5. Click Modify.
  6. Click Create in the Attribute Mapping List section.
  7. Select the option to create an object and click OK.
  8. Type the following name:

    inetOrgPerson

  9. Type the following description:

    Custom Mapping to Count Active Directory Users (with XPSCounter)

  10. Do the following in the Properties section:
    1. Be sure that the Alias option is selected.
    2. Type the following definition:

      User

  11. Click OK.
  12. Click Submit.

    The inetOrgPerson attribute is mapped.

Determine the Number of Users Associated with CA SiteMinder® Policies

To comply with the CA SiteMinder® licensing terms, you can determine how many users in your organization are associated with CA SiteMinder® policies.

Note: If you do not have write access to the CA SiteMinder® binary files (XPS.dll, libXPS.so, libXPS.sl), an Administrator must grant you permission to use the related XPS command line tools using the Administrative UI or the XPSSecurity tool.

To determine the number of users

  1. Open a command window on the Policy Server, and then enter the following command:
    XPSCounter
    

    The tool starts and displays the name of the log file for this session, and the License Parameters menu opens.

  2. Enter 1.

    The Parameter menu appears.

  3. Enter C.

    The Counter menu appears.

  4. Enter I.
  5. Enter ? to search for a user directory XID. Only those user directories that are defined in your policy store appear in the list.
  6. Enter the number of the directory that contains the users you want to count.

    Note: This tool counts the number of user objects in each directory that you specify. It does not account for the same user object being listed in multiple directories or multiple user objects for the same user in a directory. You must consider this when interpreting the results provided by this tool.

  7. (Optional) Enter a comment to describe the results.

    The users are counted and a confirmation message appears.

  8. (Optional) Repeat Steps 5 through 8 to count the users in another directory.
  9. Enter V.

    The following information appears for each directory counted:

    XID

    Displays the unique identifier for the specified user directory.

    Example: CA.SM::UserDirectory@0e-50ea30f0-b5c0-450c-a135-1e317dd25f11

    Name

    Displays the name of the specified user directory (as defined in the Administrative UI).

    : count

    Displays the most-recent user count of the specified user directory. You do not have to delete any previous values stored in the counter because this value is updated automatically every time the counter is run.

    Example: : 23

    Total

    Displays the total of number of users from all of the user directories you counted. For example, if you counted number of users for two different directories, and each directory has 23 users, the total shown will be 46.

XPSConfig

XPSConfig is an interactive command-line utility that allows administrators and members of operations to view product parameters and, if allowed, edit their settings. While you may have your own product-specific configuration tool using XPS programming interfaces, XPSConfig is available so that this is not a requirement.

For each vendor and installed product, XPSConfig manages the parameters or named settings that are defined in the product's Data Dictionary. Each product can read, write, and validate its own parameter settings.

To use XPSConfig, you must be an administrator with XPSConfig rights.

Parameters have the following attributes:

Name

Specifies the name of the parameter.

Limits:

Type

Specifies the data type of the parameter value:

Logical | Numeric | String
Logical

Specifies a Boolean value: TRUE or FALSE.

Numeric

Specifies an integer.

String

Specifies a string of characters.

Scope

Specifies the value or scope of the parameter:

Ask | Global | Local | Managed | Overrideable | Read Only
Ask

Specifies that the value is managed by the product, not by XPS, and that the value is read only.

Global

Specifies that the value is stored in the policy store and accessible by all Policy Servers sharing that policy store.

Local

Specifies that each Policy Server stores its own value.

Managed

Specifies that the value is managed by the product, not by XPS, and that the value is read-write.

Overrideable

Specifies that a value stored locally on a Policy Server can override a value stored globally on a shared policy store.

Read Only

Specifies that the value is both the default value and read only.

Export

Specifies whether the parameter is included in exports of the policy store.

Type: Boolean

Report

Specifies whether the parameter is included in capabilities reporting for the Policy Server.

Type: Boolean

RemoteAccess

Specifies what type of access the remote API has to the parameter:

None | Read | ReadWrite
Description

Describes the purpose of the parameter.

LicenseType

Specifies the type of license limit:

None | SoftLimit | HardLimit | ExpDate
None

Specifies that the parameter is not a license limit.

SoftLimit

Specifies that the parameter is a soft or advisory license limit.

HardLimit

Specifies that the parameter is a hard or absolute license limit.

ExpDate

Specifies that the parameter is the date on which the license expires.

Default Value

Specifies a default value for use when the current value is undefined.

Note: If the default value is undefined, its value is specified according to its data type:

String

space

Number

zero

Boolean

FALSE

Visible

Specifies whether the parameter is visible to XPSConfig.

Type: Boolean

Syntax

XPSConfig has the following format:

XPSConfig [-vendor vendor] [-product product]
[-?] [-vT | -vI | -vW | -vE | -vF]
[-l log_path] [-e err_path] [-r rec_path]

Parameters

XPSConfig includes the following options:

-vendor

(Optional) Specifies the name of the vendor whose data you want to view.

-product

(Optional) Specifies the name of the product whose data you want to view.

-?

(Optional) Displays help information for this utility.

-vT | -vI | -vW | -vE | -vF

(Optional) Specifies when to log error information to the error file and how much information to log.

-vT

Logs detailed information so that you can TRACE errors.

-vI

Logs information in case there is an error.

-vW

Logs error information in the event of a WARNING, ERROR, or FATAL error.

-vE

Logs error information in the event of an ERROR or FATAL error.

-vF

Logs error information in the event of a FATAL error.

-l

(Optional) Outputs logging information to the specified location.

Default: stdout

-e

(Optional) Outputs error information to the specified location.

Default: stderr

-r

(Optional) Outputs a record of the session to the specified location.

XPSEvaluate

XPSEvaluate is an interactive command-line utility that allows administrators and application developers to evaluate expressions and test performance. To use XPSEvaluate, you must be an administrator with XPSEvaluate rights.

Syntax

XPSEvaluate has the following format:

XPSEvaluate [-np] [-trace] [-dbg debuglist]
[-f DB | formulapath] [-c contextpath] [-u userpath] [-step]
[-?] [-vT | -vI | -vW | -vE | -vF]
[-l log_path] [-e err_path] [-r rec_path]

Parameters

XPSEvaluate includes the following options:

-np

(Optional) Specifies no prompt.

-trace

(Optional) Turns on tracing.

-dbg

(Optional) Specifies the debug list.

-f

(Optional) Specifies the location of the named expressions.

Note: DB specifies the policy store.

-c

(Optional) Specifies the location of the context values.

-u

(Optional) Specifies the location of the user attributes.

-step

(Optional) Shows evaluation steps.

-?

(Optional) Displays help information for this utility.

-vT | -vI | -vW | -vE | -vF

(Optional) Specifies when to log error information to the error file and how much information to log.

-vT

Logs detailed information so that you can TRACE errors.

-vI

Logs information in case there is an error.

-vW

Logs error information in the event of a WARNING, ERROR, or FATAL error.

-vE

Logs error information in the event of an ERROR or FATAL error.

-vF

Logs error information in the event of a FATAL error.

-l

(Optional) Outputs logging information to the specified location.

Default: stdout

-e

(Optional) Outputs error information to the specified location.

Default: stderr

-r

(Optional) Outputs a record of the session to the specified location.

More information:

Attributes and Expressions Reference

XPSExplorer

XPSExplorer is an interactive command-line utility that allows an administrator or application developer to view the data in a policy store. XPSExplorer has two uses:

To use XPSExplorer, you must be an administrator with XPSExplorer rights.

Syntax

XPSExplorer has the following format:

XPSExplorer [-?] [-vT | -vI | -vW | -vE | -vF]
[-l log_path] [-e err_path] [-r rec_path]

Parameters

XPSExplorer includes the following options:

-?

(Optional) Displays help information for this utility.

-vT | -vI | -vW | -vE | -vF

(Optional) Specifies when to log error information to the error file and how much information to log.

-vT

Logs detailed information so that you can TRACE errors.

-vI

Logs information in case there is an error.

-vW

Logs error information in the event of a WARNING, ERROR, or FATAL error.

-vE

Logs error information in the event of an ERROR or FATAL error.

-vF

Logs error information in the event of a FATAL error.

-l

(Optional) Outputs logging information to the specified location.

Default: stdout

-e

(Optional) Outputs error information to the specified location.

Default: stderr

-r

(Optional) Outputs a record of the session to the specified location.

Export a Subset of Policy Store Data

To export a subset of policy store data, you need the identifiers of the objects (XIDs) that you want to export. You can use XPSExplorer to locate object identifiers. To use XPSExplorer, you must be an administrator with XPSExplorer rights.

In this use case, you export the following accounting applications:

Export a subset of policy store data

  1. Open a command prompt on the machine hosting the Policy Server.
  2. Enter the following command:
    XPSExplorer
    

    The main menu opens and lists vendors, products, and classes.

    Note: Only objects in top-level classes can be exported. Top-level classes are marked with asterisks.

  3. Enter the number corresponding to the class of objects that you want to export.

    The Class Menu opens.

    Example: If the number 15 corresponds to accounting, enter 15.

  4. Enter S to view the objects in the class.

    The Search Menu opens and the objects in the class are listed.

    Example Search Results:

    1-CA.SM::Accounting@0e-08c6cadb-e30b-4e06-9e2e-b3d7a866fab8

    (I) Name : "Accounts Payable"

    (C) Desc : "accounts payable"

    2-CA.SM::Accounting@0e-3b0f4ccf-71f3-4968-b095-2b5a830c3244

    (I) Name : "Accounts Receivable"

    (C) Desc : "accounts receivable"

    3-CA.SM::Accounting@03-1c7ac22e-6646-4c61-8f2f-6261a0ef3a92

    (I) Name : "General Ledger"

    (C) Desc : "general ledger"

    4-CA.SM::Accounting@10-8d78bb81-ae15-11d1-9cdd-006008aac24b

    (I) Name : "Payroll"

    (C) Desc : "payroll"

    5-CA.SM::Accounting@@12-88f119a0-3fd1-46d0-b8ac-c1e83f00f97d

    (I) Name : "Job Costing"

    (C) Desc : "job costing"

    Example Object Identifiers (XIDs):

    CA.SM::Accounting@0e-08c6cadb-e30b-4e06-9e2e-b3d7a866fab8

    CA.SM::Accounting@0e-3b0f4ccf-71f3-4968-b095-2b5a830c3244

    CA.SM::Accounting@03-1c7ac22e-6646-4c61-8f2f-6261a0ef3a92

    CA.SM::Accounting@10-8d78bb81-ae15-11d1-9cdd-006008aac24b

    CA.SM::Accounting@@12-88f119a0-3fd1-46d0-b8ac-c1e83f00f97d

  5. Enter Q three times to exit the Search, Class, and Main Menus and return to the command prompt.
  6. Enter the following command at the command prompt:
    XPSExport output_file -xo object_XID_1 -xo object_XID_2
    -xo object_XID_3 -xo object_XID_4
    
    output_file

    Specifies the XML file to which the policy store data is exported.

    -xo object_XID

    Specifies the identifier of each object that you want to export.

    Note: You can copy the object identifiers (XIDs) from the Search results and paste them in the command line.

    Example:

    XPSExport accounting.xml
    -xo CA.SM::Accounting@0e-08c6cadb-e30b-4e06-9e2e-b3d7a866fab8
    -xo CA.SM::Accounting@0e-3b0f4ccf-71f3-4968-b095-2b5a830c3244
    -xo CA.SM::Accounting@03-1c7ac22e-6646-4c61-8f2f-6261a0ef3a92
    -xo CA.SM::Accounting@10-8d78bb81-ae15-11d1-9cdd-006008aac24b
    

    The policy store data for the specified accounting applications is exported to accounting.xml.

More information:

XPSExport

XCart Management

XPSExplorer includes the XCart feature. XCart allows you to collect the identifiers of the objects (XIDs) that you want to export and save them to a file for later use without manually copying and pasting each one. To use XPSExplorer, you must be an administrator with XPSExplorer rights.

To access XCart, enter X for XCart Management in the Main Menu of XPSExplorer. The XCart Menu opens and displays any objects that are in the XCart. The following options are context-sensitive and may or may not be displayed depending on the context:

C - Clear cart.

Empties the XCart.

L - Load cart from file.
S - Save cart to file: xcart_file

Saves the contents of the XCart to the XCart file.

Important! The S command overwrites the contents of the XCart file without prompting first.

N - Save cart to new file.

Saves the contents of the XCart to the specified file and remembers the specified file name as the XCart file.

Note: The N Command prompts before overwriting the specified file.

Each object is tagged with an import mode that determines how it will be imported from the XPS file to the policy store:

A - Set import mode to ADD.

Adds new objects; does not replace existing objects.

O - Set import mode to OVERLAY.

Replaces existing objects; does not add new objects.

R - Set import mode to REPLACE.

Replaces existing objects and adds new objects.

D - Set import mode to default.

Specifies the default import mode.

Note: For each product class, there is a default import mode defined in the product's data dictionary.

Q - Quit

Exits the XCart Menu and returns to the Main Menu.

Export a Subset of Policy Store Data Using XCart

To export a subset of policy store data, you need the identifiers of the objects (XIDs) that you want to export. You can use the XCart feature of XPSExplorer to locate objects and save them in an XCart file for later use when you export. For example, an administrator can set up an XCart file for members of operations to use as needed. To use XPSExplorer, you must be an administrator with XPSExplorer rights.

In this use case, you save the following four accounting applications in a file for later use:

Export a subset of policy store data using XCart

  1. Open a command prompt on the machine hosting the Policy Server.
  2. Enter the following command:
    XPSExplorer
    

    The Main Menu opens and lists vendors, products, and classes.

    Note: Only objects in top-level classes can be exported. Top-level classes are marked with asterisks.

  3. Enter X for XCart Management.

    The XCart Menu opens.

  4. Create a text file.

    Example: C:\xcart\accounting.txt

    Note: This is where you want the contents of the XCart to be saved.

  5. Enter L for Load cart from file.
  6. Enter the path and name of the text file you created.

    The specified file name is remembered as the XCart file.

    Example: C:\xcart\accounting.txt

    Note: The file must exist. If not, L has no effect.

  7. Enter Q to return to the Main Menu.
  8. Enter the number corresponding to the class that you want to export.

    The Class Menu opens.

    Example: If the number 15 corresponds to Accounting, enter 15.

  9. Enter S to view the objects in the class.

    The Search Menu opens and the objects in the class are listed.

    Example Search Results:

    1-CA.SM::Accounting@0e-08c6cadb-e30b-4e06-9e2e-b3d7a866fab8

    (I) Name : "Accounts Payable"

    (C) Desc : "accounts payable"

    2-CA.SM::Accounting@0e-3b0f4ccf-71f3-4968-b095-2b5a830c3244

    (I) Name : "Accounts Receivable"

    (C) Desc : "accounts receivable"

    3-CA.SM::Accounting@03-1c7ac22e-6646-4c61-8f2f-6261a0ef3a92

    (I) Name : "General Ledger"

    (C) Desc : "general ledger"

    4-CA.SM::Accounting@10-8d78bb81-ae15-11d1-9cdd-006008aac24b

    (I) Name : "Payroll"

    (C) Desc : "payroll"

    5-CA.SM::Accounting@@12-88f119a0-3fd1-46d0-b8ac-c1e83f00f97d

    (I) Name : "Job Costing"

    (C) Desc : "job costing"

  10. For Accounting applications one through four:
    1. Enter the number corresponding to the application.
    2. Enter X for Add to XCart.
    3. Enter Q to exit the XCart Menu and return to the Search Menu.

      Note: An asterisk before an application indicates that it is in the XCart.

  11. Enter Q twice to exit the Search and Class Menus and return to the Main Menu.
  12. Enter X for XCart Management.
  13. Enter S to Save the cart to the XCart file: C:\xcart\accounting.txt.
  14. Enter Q twice to exit the XCart and Main Menus and return to the command prompt.
  15. Enter the following command at the command prompt:
    XPSExport output_file -xf xcart_file
    
    output_file

    Specifies the XML file to which the policy store data is exported.

    -xf xcart_file

    Specifies the path and name of the XCart file containing the identifiers of the objects (XIDs) to export.

    Example:

    XPSExport accounting.xml C:\xcart\accounting.txt
    

    The policy store data for the accounting applications saved in the XCart file is exported to accounting.xml.

Add an Application to an XCart File

In this use case, you add a fifth accounting application, Job Costing, to the following four accounting applications already in the XCart file, accounting.txt, using the XCart feature of XPSExplorer:

Note: To use XPSExplorer, you must be an administrator with XPSExplorer rights.

Add an application to an XCart file

  1. Open a command prompt on the machine hosting the Policy Server.
  2. Enter the following command:
    XPSExplorer
    

    The Main Menu opens and lists vendors, products, and classes.

    Note: Only objects in top-level classes can be exported. Top-level classes are marked with asterisks.

  3. Enter X for XCart Management.

    The XCart Menu opens.

  4. Enter L for Load cart from file.
  5. Enter the path and name of the existing text file containing the four accounting applications.

    The specified file name is remembered as the XCart file.

    Example: C:\xcart\accounting.txt

  6. Enter Q to return to the Main Menu.
  7. Enter the number corresponding to the class that you want added to the XCart file.

    The Class Menu opens.

    Example: If the number 15 corresponds to accounting, enter 15.

  8. Enter S to view the objects in the class.

    The Search Menu opens and the objects in the class are listed.

    Example Search Results:

    1-CA.SM::Accounting@0e-08c6cadb-e30b-4e06-9e2e-b3d7a866fab8

    (I) Name : "Accounts Payable"

    (C) Desc : "accounts payable"

    2-CA.SM::Accounting@0e-3b0f4ccf-71f3-4968-b095-2b5a830c3244

    (I) Name : "Accounts Receivable"

    (C) Desc : "accounts receivable"

    3-CA.SM::Accounting@03-1c7ac22e-6646-4c61-8f2f-6261a0ef3a92

    (I) Name : "General Ledger"

    (C) Desc : "general ledger"

    4-CA.SM::Accounting@10-8d78bb81-ae15-11d1-9cdd-006008aac24b

    (I) Name : "Payroll"

    (C) Desc : "payroll"

    5-CA.SM::Accounting@@12-88f119a0-3fd1-46d0-b8ac-c1e83f00f97d

    (I) Name : "Job Costing"

    (C) Desc : "job costing"

    Note: An asterisk before an application indicates that it is in the XCart.

  9. To add Job Costing to the XCart file:
    1. Enter 5 for the Job Costing application.
    2. Enter X for Add to XCart.
    3. Enter Q to exit the XCart menu and return to the Search Menu.

      The asterisk before the application indicates that it is in the XCart.

    4. Enter Q twice to exit the Search and Class Menus and return to the Main Menu.
    5. Enter X for XCart Management.
    6. Enter S to Save the XCart to the XCart file: C:\xcart\accounting.txt.

      Job Costing is added to accounting.txt.

  10. Enter Q twice to exit the XCart and Main Menus and return to the command prompt.

XPSSecurity

XPSSecurity is an interactive command-line utility that allows administrators and members of operations to create and delete administrators and edit their rights. To use XPSSecurity, you must be an administrator with XPSSecurity rights.

Syntax

XPSSecurity has the following format:

XPSSecurity [-?] [-vT | -vI | -vW | -vE | -vF]
[-l log_path] [-e err_path] [-r rec_path]

Parameters

XPSSecurity includes the following options:

-?

(Optional) Displays help information for this utility.

-vT | -vI | -vW | -vE | -vF

(Optional) Specifies when to log error information to the error file and how much information to log.

-vT

Logs detailed information so that you can TRACE errors.

-vI

Logs information in case there is an error.

-vW

Logs error information in the event of a WARNING, ERROR, or FATAL error.

-vE

Logs error information in the event of an ERROR or FATAL error.

-vF

Logs error information in the event of a FATAL error.

-l

(Optional) Outputs logging information to the specified location.

Default: stdout

-e

(Optional) Outputs error information to the specified location.

Default: stderr

-r

(Optional) Outputs a record of the session to the specified location.

Make an Administrator a Super User

A super user is defined when the connection to the external administrator store is configured. The super user is used to create and manage all other administrator accounts. If the super user is unavailable, use XPSSecurity to make any user in the external store a super user.

To make an administrator a super user

  1. Log into the Policy Server host system with a CA SiteMinder® administrator account that has XPSSecurity rights.

    Note: If an administrator with XPSSecurity rights is not available, you can log in as one the following:

  2. Be sure that the XPSSecurity utility is located in policy_server_home/bin.
    policy_server_home

    Specifies the Policy Server installation path.

    Note: If the utility is not present, you can find it in the Policy Server installation media available on the Support site.

  3. Open a command window and run the following command:
    XPSSecurity
    

    The main menu appears.

  4. Type A and press Enter.

    The administrator menu lists the CA SiteMinder® administrators in the external store. Each administrator is prefixed with a number.

  5. Type the number of the administrator and press Enter.

    The administrator menu displays attributes specific to the administrator you chose. Each attribute is prefixed with a number.

  6. Type 2 and press Enter.

    The administrator menu updates with flag settings.

  7. Type a question mark (?) and press Enter.

    The Disabled and Super User flags appear. Each flag is prefixed with a number.

  8. Type 2 and press Enter.

    The Super User flag is selected.

  9. Type Q and press Enter.

    The administrator menu displays attributes specific to the administrator. The Flags attribute is set to Super User.

  10. Type U and press Enter.

    The administrator record is updated.

  11. Type Q and press Enter.

    The administrator menu lists the CA SiteMinder® administrators in the external store. The administrator you chose appears as a super user.

  12. Type Q and press Enter for the next two prompts to exit the utility.

    The administrator you chose is a super user. Use this administrator to restore modified or deleted permissions.

More information:

Locate the Installation Media

XPSSweeper

XPSSweeper is a command-line utility that can also be run as a batch job. You can use XPSSweeper to synchronize XPS and SiteMinder policy stores. Usually, XPS synchronizes the different policy stores. However, when legacy tools are used, the policy stores may need to be resynchronized using XPSSweeper. In any case, XPSSweeper does not harm the policy stores and can be run as a precaution.

Syntax

XPSSweeper has the following format:

XPSSweeper [-f] [-s seconds] [-m entries]
[-?] [-vT | -vI | -vW | -vE | -vF]
[-l log_path] [-e err_path]

Parameters

XPSSweeper includes the following options:

-f

(Optional) Runs XPSSweeper in a loop forever.

Note: Use Control-C to exit.

-s

(Optional) Sleeps for the specified number of seconds between iterations of XPSSweeper.

-m

(Optional) Outputs a milestone message every time the specified number of entries has been logged.

-?

(Optional) Displays help information for this utility.

-vT | -vI | -vW | -vE | -vF

(Optional) Specifies when to log error information to the error file and how much information to log.

-vT

Logs detailed information so that you can TRACE errors.

-vI

Logs INFOrmation in case there is an error.

-vW

Logs error information in the event of a WARNING, ERROR, or FATAL error.

-vE

Logs error information in the event of an ERROR or FATAL error.

-vF

Logs error information in the event of a FATAL error.

-l

(Optional) Outputs logging information to the specified location.

Default: stdout

-e

(Optional) Outputs error information to the specified location.

Default: stderr

Run XPSSweeper as a Batch Job

You can run XPSSweeper as a batch job by setting the following two XPS configuration parameters using XPSConfig:

CA.XPS::$Autosweep

Specifies whether to run XPSweeper according to the Autosweep schedule or not to run XPSSweeper at all.

Type: Boolean

CA.XPS::$AutosweepSchedule

Specifies the Autosweep schedule in GMT using the following format:

DDD@{HH:MM}[,DDD@{HH:MM}] ... [,DDD@{HH:MM}]
DDD

(Optional) Specifies the day of the week:

Sun | Mon | Tue | Wed | Thu | Fri | Sat
HH

Specifies the hour.

Range: 00-23

MM

Specifies the number of minutes past the hour.

Range: 00-59

Examples:
Sun@08:30

Every Sunday at 8:30am GMT

Tue@14:00

Every Tuesday at 2:00pm GMT

15:15

Everyday at 3:15pm GMT

Sun@08:30,Tue@14:00,15:15

Every Sunday at 8:30am, every Tuesday at 2:00pm, and everyday at 3:15pm except Tuesday

Note: Multiple Autosweep times can be separated by commas, spaces, or semicolons.

Policy Servers manage XPSSweeper Autosweep times as follows:

Configure Autosweep to Run Every 24 Hours Using XPSConfig

We recommend configuring the XPSSweeper utility to run once every 24 hours. If the XPSSweeper utility does not run often enough, the Policy Server could have trouble starting. Too many tombstone objects in the policy store produce the following error:

LDAP_SIZELIMIT_EXCEEDED 

Setting the XPSSweeper utility to run automatically uses the following XPS configuration parameters:

Follow these steps:

  1. Open a command-line window on the computer hosting the Policy Server.
  2. Enter the following command:
    XPSConfig
    

    The Products Menu opens and lists the products.

  3. Enter XPS for Extensible Policy Store.

    The Parameters Menu opens and lists the XPS parameters.

  4. Enter 7 for Autosweep.

    The Autosweep Parameter Menu opens.

  5. Verify that the Autosweep value is set to TRUE or enter C to Change the value to TRUE.

    Note: This step specifies running XPSSweeper according to the Autosweep Schedule.

  6. Enter Q to exit the Autosweep Menu and return to the Parameters Menu.
  7. Enter 8 for AutosweepSchedule.

    The AutosweepSchedule Parameter Menu opens.

  8. Enter C to Change the value of the AutosweepSchedule parameter.
  9. Enter the time that you want for the New Value.
  10. Enter Q three times.

    The command prompt appears.