10.02.2013 Views

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

IBM Tivoli Access Manager for e-business: WebSEAL Administration ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Managing<br />

client-side<br />

and<br />

server-side<br />

certificates<br />

This<br />

section<br />

describes<br />

the<br />

administration<br />

and<br />

configuration<br />

tasks<br />

required<br />

to<br />

set<br />

up<br />

<strong>WebSEAL</strong><br />

to<br />

handle<br />

client-side<br />

and<br />

server-side<br />

digital<br />

certificates<br />

used<br />

<strong>for</strong><br />

authentication<br />

over<br />

SSL.<br />

<strong>WebSEAL</strong><br />

requires<br />

certificates<br />

<strong>for</strong><br />

the<br />

following<br />

situations:<br />

v<br />

<strong>WebSEAL</strong><br />

identifies<br />

itself<br />

to<br />

SSL<br />

clients<br />

with<br />

its<br />

server-side<br />

certificate<br />

v<br />

<strong>WebSEAL</strong><br />

identifies<br />

itself<br />

to<br />

a<br />

junctioned<br />

back-end<br />

server<br />

(configured<br />

<strong>for</strong><br />

mutual<br />

authentication)<br />

with<br />

a<br />

client-side<br />

certificate<br />

v<br />

<strong>WebSEAL</strong><br />

refers<br />

to<br />

its<br />

database<br />

of<br />

Certificate<br />

Authority<br />

(CA)<br />

root<br />

certificates<br />

to<br />

validate<br />

clients<br />

accessing<br />

with<br />

client-side<br />

certificates<br />

v<br />

<strong>WebSEAL</strong><br />

refers<br />

to<br />

its<br />

database<br />

of<br />

Certificate<br />

Authority<br />

(CA)<br />

root<br />

certificates<br />

to<br />

validate<br />

junctioned<br />

back-end<br />

servers<br />

<strong>WebSEAL</strong><br />

uses<br />

the<br />

<strong>IBM</strong><br />

Global<br />

Security<br />

Kit<br />

(GSKit)<br />

implementation<br />

of<br />

SSL<br />

to<br />

configure<br />

and<br />

administer<br />

digital<br />

certificates.<br />

GSKit<br />

provides<br />

the<br />

iKeyman<br />

utility<br />

to<br />

set<br />

up<br />

and<br />

manage<br />

the<br />

certificate<br />

key<br />

database<br />

that<br />

contains<br />

one<br />

or<br />

more<br />

<strong>WebSEAL</strong><br />

server/client<br />

certificates<br />

and<br />

the<br />

CA<br />

root<br />

certificates.<br />

<strong>WebSEAL</strong><br />

includes<br />

the<br />

following<br />

components<br />

at<br />

installation<br />

to<br />

support<br />

SSL<br />

authentication<br />

using<br />

digital<br />

certificates:<br />

v<br />

A<br />

default<br />

key<br />

database<br />

(pdsrv.kdb)<br />

v<br />

A<br />

default<br />

key<br />

database<br />

stash<br />

file<br />

(pdsrv.sth)<br />

and<br />

password<br />

(″pdsrv″)<br />

v<br />

Several<br />

common<br />

CA<br />

root<br />

certificates<br />

v<br />

A<br />

self-signed<br />

test<br />

certificate<br />

that<br />

<strong>WebSEAL</strong><br />

can<br />

use<br />

to<br />

identify<br />

itself<br />

to<br />

SSL<br />

clients<br />

It<br />

is<br />

recommended<br />

that<br />

you<br />

apply<br />

<strong>for</strong><br />

a<br />

commonly<br />

recognized<br />

certificate<br />

from<br />

a<br />

known<br />

Certificate<br />

Authority<br />

to<br />

replace<br />

this<br />

test<br />

certificate.<br />

Configuration<br />

<strong>for</strong><br />

<strong>WebSEAL</strong><br />

certificate<br />

handling<br />

includes:<br />

v<br />

“Configuring<br />

<strong>WebSEAL</strong><br />

key<br />

database<br />

parameters”<br />

on<br />

page<br />

229<br />

v<br />

“Using<br />

the<br />

iKeyman<br />

certificate<br />

management<br />

utility”<br />

on<br />

page<br />

230<br />

v<br />

“Configuring<br />

CRL<br />

checking”<br />

on<br />

page<br />

231<br />

GSKit<br />

key<br />

database<br />

file<br />

types<br />

The<br />

<strong>IBM</strong><br />

Key<br />

Management<br />

tool<br />

(iKeyman)<br />

uses<br />

several<br />

file<br />

types<br />

that<br />

are<br />

summarized<br />

in<br />

the<br />

following<br />

table.<br />

A<br />

CMS<br />

key<br />

database<br />

consists<br />

of<br />

a<br />

file<br />

with<br />

the<br />

extension<br />

.kdb<br />

and<br />

possibly<br />

two<br />

or<br />

more<br />

other<br />

files.<br />

The<br />

.kdb<br />

file<br />

is<br />

created<br />

when<br />

you<br />

create<br />

a<br />

new<br />

key<br />

database.<br />

A<br />

key<br />

record<br />

in<br />

a<br />

.kdb<br />

file<br />

can<br />

be<br />

either<br />

a<br />

certificate<br />

or<br />

a<br />

certificate<br />

with<br />

its<br />

encrypted<br />

private<br />

key<br />

in<strong>for</strong>mation.<br />

The<br />

.rdb<br />

and<br />

.crl<br />

files<br />

are<br />

created<br />

when<br />

you<br />

create<br />

a<br />

new<br />

certificate<br />

request.<br />

The<br />

.rdb<br />

file<br />

is<br />

required<br />

throughout<br />

the<br />

CA<br />

certificate<br />

request<br />

process.<br />

File<br />

Type<br />

Description<br />

.kdb<br />

The<br />

″key<br />

database″<br />

file.<br />

Stores<br />

personal<br />

certificates,<br />

personal<br />

certificate<br />

requests,<br />

and<br />

signer<br />

certificates.<br />

For<br />

example,<br />

the<br />

default<br />

<strong>WebSEAL</strong><br />

key<br />

database<br />

file<br />

is<br />

pdsrv.kdb.<br />

.sth<br />

The<br />

″stash″<br />

file.<br />

Stores<br />

an<br />

obfuscated<br />

version<br />

of<br />

the<br />

key<br />

database<br />

password.<br />

The<br />

stem<br />

name<br />

of<br />

this<br />

file<br />

is<br />

the<br />

same<br />

as<br />

the<br />

associated<br />

.kdb<br />

file.<br />

Also<br />

stores<br />

private<br />

keys,<br />

if<br />

there<br />

are<br />

any.<br />

228<br />

<strong>IBM</strong><br />

<strong>Tivoli</strong><br />

<strong>Access</strong><br />

<strong>Manager</strong><br />

<strong>for</strong><br />

e-<strong>business</strong>:<br />

<strong>WebSEAL</strong><br />

<strong>Administration</strong><br />

Guide

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!