Cognos ReportNetTM Installation and Configuration Guide
Cognos ReportNetTM Installation and Configuration Guide
Cognos ReportNetTM Installation and Configuration Guide
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Chapter 7: Advanced <strong>Configuration</strong> Options<br />
The dispatcher information is removed from Content Manager.<br />
Configuring ReportNet to use a Third-Party Certificate<br />
Authority<br />
By default, ReportNet uses its own certificate authority (CA) service to establish the root of trust<br />
in the ReportNet security infrastructure. You can configure ReportNet to use another certificate<br />
authority, if you already have an existing third-party certificate authority, such as iPlanet or<br />
Microsoft, in your reporting environment.<br />
When you configure ReportNet to use a third-party certificate authority, ensure that you specify<br />
the same information in both the comm<strong>and</strong> line utility tool <strong>and</strong> in <strong>Cognos</strong> <strong>Configuration</strong>.<br />
To configure ReportNet to use your third-party certificate authority, you must<br />
❑ generate ReportNet security keys <strong>and</strong> certificate signing requests to use with your<br />
third-party CA<br />
❑ add the ReportNet security keys <strong>and</strong> signing certificates to your third-party certificate<br />
authority<br />
❑ configure ReportNet to use a third-party certificate authority.<br />
Generate Keys <strong>and</strong> Signing Requests<br />
Use the comm<strong>and</strong> line utility to generate all the keys for the ReportNet key stores <strong>and</strong> to<br />
generate the certificate signing requests (CSR).<br />
Ensure that the encryption key store <strong>and</strong> the certificate authority key store are in the same<br />
location. You must run the comm<strong>and</strong> line tool once for each certificate request.<br />
The following table lists the options for the comm<strong>and</strong>-line tool used to generate keys <strong>and</strong> signing<br />
requests.<br />
Comm<strong>and</strong><br />
Main operation mode<br />
Description<br />
-c Create a new CSR<br />
-i Import a certificate<br />
Operation modifiers<br />
-s Work with the signing identity<br />
-e Work with the encryption identity<br />
-T Work with the trust store (only with -i)<br />
<strong>Installation</strong> <strong>and</strong> <strong>Configuration</strong> <strong>Guide</strong> 87