20.07.2014 Views

Cognos ReportNetTM Installation and Configuration Guide

Cognos ReportNetTM Installation and Configuration Guide

Cognos ReportNetTM Installation and Configuration Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 7: Advanced <strong>Configuration</strong> Options<br />

The dispatcher information is removed from Content Manager.<br />

Configuring ReportNet to use a Third-Party Certificate<br />

Authority<br />

By default, ReportNet uses its own certificate authority (CA) service to establish the root of trust<br />

in the ReportNet security infrastructure. You can configure ReportNet to use another certificate<br />

authority, if you already have an existing third-party certificate authority, such as iPlanet or<br />

Microsoft, in your reporting environment.<br />

When you configure ReportNet to use a third-party certificate authority, ensure that you specify<br />

the same information in both the comm<strong>and</strong> line utility tool <strong>and</strong> in <strong>Cognos</strong> <strong>Configuration</strong>.<br />

To configure ReportNet to use your third-party certificate authority, you must<br />

❑ generate ReportNet security keys <strong>and</strong> certificate signing requests to use with your<br />

third-party CA<br />

❑ add the ReportNet security keys <strong>and</strong> signing certificates to your third-party certificate<br />

authority<br />

❑ configure ReportNet to use a third-party certificate authority.<br />

Generate Keys <strong>and</strong> Signing Requests<br />

Use the comm<strong>and</strong> line utility to generate all the keys for the ReportNet key stores <strong>and</strong> to<br />

generate the certificate signing requests (CSR).<br />

Ensure that the encryption key store <strong>and</strong> the certificate authority key store are in the same<br />

location. You must run the comm<strong>and</strong> line tool once for each certificate request.<br />

The following table lists the options for the comm<strong>and</strong>-line tool used to generate keys <strong>and</strong> signing<br />

requests.<br />

Comm<strong>and</strong><br />

Main operation mode<br />

Description<br />

-c Create a new CSR<br />

-i Import a certificate<br />

Operation modifiers<br />

-s Work with the signing identity<br />

-e Work with the encryption identity<br />

-T Work with the trust store (only with -i)<br />

<strong>Installation</strong> <strong>and</strong> <strong>Configuration</strong> <strong>Guide</strong> 87

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!