This section contains the following topics:
Implementing Custom Certificates
Add the Trusted Root Certificate to the Management CA User Activity Reporting Module Server
Add the Trusted Root Certificate to All Other CA User Activity Reporting Module Servers
Add the Certificate Common Name to an Access Policy
Implement Custom Certificates on Active Agents
Implement Custom Certificates in OpenAPI
The installation process generates two certificates and places them in the /opt/CA/SharedComponents/iTechnology directory of the CA User Activity Reporting Module server. You can use the installed certificates as is. These certificates have the following names, where ApplicationName is CAELM for the CA User Activity Reporting Module product.
This certificate is used by all CA User Activity Reporting Module services to communicate with the management server. The entry for this certificate also exists under the CALM.cnf file.
This certificate is used by all the Agents to communicate with the CA User Activity Reporting Module server.
To use custom certificates, you must first obtain a trusted root certificate from a Root Certificate Authority (CA). A certificate authority can issue multiple certificates in the form of a tree structure. All certificates below the trusted root certificate inherit the trustworthiness of the root certificate. This process assumes that if both certificates are being replaced, the custom service certificate and the custom agent certificate have the same trusted root.
After you obtain a trusted root certificate, the typical sequence of actions to implement custom certificates are as follows:
First, you obtain a Trusted Root Certificate in PEM format from the Certifying Authority (CA). Then you add this Trusted Root Certificate into the iTechnology SPIN web interface of the management server or standalone CA EEM.
To add the Trusted Root Certificate to the management CA User Activity Reporting Module
https://<management_ELM_hostname>:5250/spin
https://<EEM_hostname>:5250/spin
The CA iTechnology SPIN page appears.
The iTechnology Administrator page appears with a Login link.
The CA iTechnology logon dialog appears.
The confirmation message indicates that the trust root is added to the iAuthority.conf, a file that exists only on the management server or on the standalone CA EEM.
The confirmation message indicates that the trusted root of the custom certificate is added to the iControl.conf file in the iTechnology directory of the management CA User Activity Reporting Module server.
If you are replacing the CAELM_AgentCert.cer certificate with a custom certificate, you must add the Trusted Root Certificate into the iTechnology SPIN web interface of each additional CA User Activity Reporting Module server. In this procedure, you add the Trusted Root Certificate to CA iControl. This procedure is not needed if you are replacing only the CAELMCert.cer certificate.
To add the Trusted Root Certificate to CA iControl of each non-management CA User Activity Reporting Module server
https://<ELM_hostname>:5250/spin/
The CA iTechnology SPIN page appears.
The iTechnology Administrator page appears with a Login link.
The CA iTechnology logon dialog appears.
The trusted root of the custom certificate is added to the iControl.conf file in the iTechnology directory. A confirmation message appears.
The CAELMCert.cer certificate is used by all CA User Activity Reporting Module services to communicate with the management CA User Activity Reporting Module server. If you replace CAELMCert.cer with a custom certificate, you must add this custom certificate's common name (cn) to the AdministerObjects policy on the management server or the standalone CA EEM server.
Note: It is not necessary to delete [User] CERT_CAELM identity, the common name of the default certificate, from this policy.
Follow these steps:
https://<management_server_hostname>:5250/spin/calm
https://<EEM_server_hostname>:5250/spin/eiam
The Policy Table of scoping policies appears in the main pane.
The AdministerObjects policy opens in edit mode.
[User}<custom certificate cn> appears in the Selected Identities list.
The AdministerObjects policy is saved with the addition of the common name of your custom certificate as an identity granted read and write access to the resources listed in this policy.
CA User Activity Reporting Module uses two certificates. You can replace them with custom certificates. To deploy new certificates, you log on to the soft appliance, stop iGateway, add the new certificates, modify the respective configuration files, and then restart iGateway.
Before you deploy new certificates, verify that:
Follow these steps:
su - root
cd $IGW_LOC
./S99igateway stop
./safex -munge <P12_certificate_password>
The munged password is displayed.
echo -n <munged_password> > ApplicationNameCert.munge
Default: pem
./safex -munge <P12_certificate_password>
The munged password is displayed.
echo -n <munged_password> > ApplicationName_AgentCert.munge
Default: pem
./S99igateway start
All agents installed after this deployment automatically use the custom certificate.
You can implement custom certificates on active agents without reinstalling the agents.
Follow these steps:
Windows
agentconfig.exe -redirectagent -server <UARM server> -authcode <authentication key>
UNIX
./agentconfig -redirectagent -server <UARM server> -authcode <authentication key>
Install custom certificates on CA User Activity Reporting Module server and run EEMImportUtility to implement custom certificates in OpenAPI. EEMImportUtility has the following syntax:
EEMImportUitlity.sh -h <Backend> -u "EiamAdmin" [-p <plain_pwd> | -m <munge_pwd>] -a <CAELM_App_instance_name> -type "openAPICustCert" -registerProduct -prodCertName <prod_name> -prodCertPwd <pwd> -prodCustCertName <CUST_CERT.cer|CUST_CERT.p12> -prodCustCertKey <CUST_CERT.key|CUST_CERT.munge>]
Defines the hostname of the CA User Activity Reporting Module server.
Defines the EiamAdmin password in plain text. If you want to use a munged password, do not specify this value.
Defines the munged password of the EiamAdmin password. If you want to use a plain password, do not specify this value. To generate a munged password, navigate to /opt/CA/LogManager/EEM/ and execute the following command:
./safex -munge <password>
Defines the name of the CA User Activity Reporting Module instance.
Default: CAELM
Defines the product name that must be registered with OpenAPI.
Defines the password that must be associated with the product name that you defined.
Defines the custom certificate that you installed CA User Activity Reporting Module server.
Defines the key of the custom certificate.
To register a product with OpenAPI, perform the following steps:
./EEMImportUitlity.sh -h <Backend> -u "EiamAdmin" [-p <plain_pwd>|-m <munge_pwd>] -a <CAELM_App_instance_name> -type "openAPICustCert" -registerProduct -prodCertName <prod_name> -prodCertPwd <pwd> -prodCustCertName <CUST_CERT.cer|CUST_CERT.p12> -prodCustCertKey <CUST_CERT.key|CUST_CERT.munge>]
To unregister a product with OpenAPI, perform the following steps:
EEMImportUtility.sh -h <Backend> -u "EiamAdmin" [-p <plain_pwd> | -m <munge_pwd>] -a <CAELM_App_instance_name> -type "openAPICustCert" -unregisterProduct -prodCertName <prod_name>
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|