Preface. Limitations. Disclaimers. Technical Support. Luna SA and IBM HTTP Server/IBM Web Sphere Application Server Integration Guide



Similar documents
Microsoft IIS Integration Guide

Active Directory Rights Management Service Integration Guide

Microsoft SQL Server Integration Guide

Preface. Microsoft Office Sharepoint Server 2007 Integration Guide SafeNet, Inc. All rights reserved. Part Number: (Rev A, 06/2009)

Apache HTTP Server Integration Guide

SafeNet Authentication Manager Express. Upgrade Instructions All versions

Installation Guide. SafeNet Authentication Service

SafeNet KMIP and Amazon S3 Integration Guide

Integration Guide. SafeNet Authentication Client. Using SAC with Putty-CAC

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Apache HTTP Server

Agent Configuration Guide

Configuration Guide. SafeNet Authentication Service AD FS Agent

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server

Setting Up SSL From Client to Web Server and Plugin to WAS

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce

Lotus Sametime. FIPS Support for IBM Lotus Sametime 8.0. Version 8.0 SC

Integration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway

Integration Guide. SafeNet Authentication Service. Oracle Secure Desktop Using SAS RADIUS OTP Authentication

Integration Guide. SafeNet Authentication Service. VMWare View 5.1

Configuration Guide. SafeNet Authentication Service. Remote Logging Agent

Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services

Integration Guide. SafeNet Authentication Service. Using SAS with Web Application Proxy. Technical Manual Template

Configuration Guide. SafeNet Authentication Service. Token Validator Proxy Agent

Novell Access Manager

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal

SafeNet MSSQL EKM Provider User Guide

Gemalto SafeNet Minidriver 9.0

PrivateServer HSM Integration with Microsoft IIS

Synchronization Agent Configuration Guide

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess

Deploying EMC Documentum WDK Applications with IBM WebSEAL as a Reverse Proxy

Universal Content Management Version 10gR3. Security Providers Component Administration Guide

IBM WEBSPHERE LOAD BALANCING SUPPORT FOR EMC DOCUMENTUM WDK/WEBTOP IN A CLUSTERED ENVIRONMENT

Thales ncipher modules. Version: 1.2. Date: 22 December Copyright 2009 ncipher Corporation Ltd. All rights reserved.

SSL Configuration on WebSphere Oracle FLEXCUBE Universal Banking Release [September] [2013] Part No. E

Junio SSL WebLogic Oracle. Guía de Instalación. Junio, SSL WebLogic Oracle Guía de Instalación CONFIDENCIAL Página 1 de 19

SafeNet MobilePASS Version 8.2.0, Revision B

SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release [August] [2014]

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web App. Technical Manual Template

DEPLOYING EMC DOCUMENTUM BUSINESS ACTIVITY MONITOR SERVER ON IBM WEBSPHERE APPLICATION SERVER CLUSTER

Domino Certification Authority and SSL Certificates

SSL CONFIGURATION GUIDE

Cisco Prime Central Managing Certificates

Setting Up SSL on IIS6 for MEGA Advisor

Secure IIS Web Server with SSL

ncipher Modules Integration Guide for Axway Validation Authority Server 4.11 (Responder)

NetIQ Sentinel Quick Start Guide

Configuring Secure Socket Layer (SSL) for use with BPM 7.5.x

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

User Guide. SafeNet MobilePASS for Windows Phone

WebSphere Application Server security auditing

HTTPS Configuration for SAP Connector

Implementing Secure Sockets Layer on iseries

DIGIPASS CertiID. Getting Started 3.1.0

IBM Security Identity Manager Version 6.0. Security Guide SC

Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N REV A01 January 14, 2011

Instant Chime for IBM Sametime High Availability Server Guide

Deploying Business Objects Crystal Reports Server on IBM InfoSphere Balanced Warehouse C-Class Solution for Windows

Server Installation ZENworks Mobile Management 2.7.x August 2013

Integration Guide. Microsoft Internet Information Services (IIS) 7.0 and ncipher Modules. Windows Server 2008 (32-bit and 64-bit)

Setup Guide Access Manager 3.2 SP3

SolarWinds Technical Reference

Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal

LumInsight CMS Installation Guide

CA Nimsoft Unified Management Portal

ENABLING SINGLE SIGN-ON FOR EMC DOCUMENTUM WDK-BASED APPLICATIONS USING IBM WEBSEAL ON AIX

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management

Symantec Managed PKI. Integration Guide for ActiveSync

Enabling SSL and Client Certificates on the SAP J2EE Engine

Check Point FDE integration with Digipass Key devices

SafeNet Luna SA Client Software Installation

Generating an Apple Push Notification Service Certificate

Steps to import MCS SSL certificates on a Sametime Server. Securing LDAP connections to and from Sametime server using SSL

For Active Directory Installation Guide

CA Spectrum and CA Service Desk

Novell Identity Manager

Chapter 1: How to Configure Certificate-Based Authentication

NSi Mobile Installation Guide. Version 6.2

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

IBM WebSphere Application Server V8.5 lab Basic Liberty profile administration using the job manager

Oracle Fusion Applications Splitting Topology from Single to Multiple Host Servers

How To Manage Storage With Novell Storage Manager 3.X For Active Directory

Jobs Guide Identity Manager February 10, 2012

Kony MobileFabric. Sync Windows Installation Manual - WebSphere. On-Premises. Release 6.5. Document Relevance and Accuracy

LAE 5.1. Windows Server Installation Guide. Version 1.0

IDENTIKEY Server Windows Installation Guide 3.1

Enabling SSO between Cognos 8 and WebSphere Portal

TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS

How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (

Novell Identity Manager

Configure Single Sign on Between Domino and WPS

Configuring IBM WebSphere Application Server 7 for Secure Sockets Layer and Client-Certificate Authentication on SAS 9.3 Enterprise BI Server Web

Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal

IBM WebSphere Adapter for PeopleSoft Enterprise Quick Start Tutorials

Installation Guide. Novell Storage Manager for Active Directory. Novell Storage Manager for Active Directory Installation Guide

EMC Data Protection Search

2 Downloading Access Manager 3.1 SP4 IR1

Transcription:

Luna SA and IBM HTTP Server/IBM Web Sphere Application Server Integration Guide Preface Preface 2012 SafeNet, Inc. All rights reserved. Part Number: 007-012077-001 (Rev B, 06/2012) All intellectual property is protected by copyright. IBM HTTP Server is trademark or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. No part of this document may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, chemical, photocopy, recording or otherwise without the prior written permission of SafeNet. SafeNet makes no representations or warranties with respect to the contents of this document and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Furthermore, SafeNet reserves the right to revise this publication and to make changes from time to time in the content hereof without the obligation upon SafeNet to notify any person or organization of any such revisions or changes. SafeNet invites constructive comments on the contents of this document. These comments, together with your personal and/or company details, should be sent to the address below. SafeNet, Inc. 4690 Millennium Drive Belcamp, Maryland 21017 USA Limitations This document does not include the steps to set up the third-party software. The steps given in this document must be modified accordingly. Refer to Luna SA documentation for general Luna setup procedures. Disclaimers The foregoing integration was performed and tested only with the specific versions of equipment and software and only in the configuration indicated. If your setup matches exactly, you should expect no trouble, and Customer Support can assist with any missteps. If your setup differs, then the foregoing is merely a template and you will need to adjust the instructions to fit your situation. Customer Support will attempt to assist, but cannot guarantee success in setups that we have not tested. Technical Support If you encounter a problem while installing, registering or operating this product, please make sure that you have read the documentation. If you cannot resolve the issue, please contact your supplier or SafeNet support. SafeNet support operates 24 hours a day, 7 days a week. Your level of access to this service is governed by the support plan arrangements made between SafeNet and your organization. Please consult this support plan for further information about your entitlements, including the hours when telephone support is available to you. Technical Support Contact Information: Phone: 800-545-6608, 410-931-7520 Email: support@safenet-inc.com SafeNet Inc. i

Luna SA and IBM HTTP Server/IBM Web Sphere Application Server Integration Guide Preface THIS PAGE INTENTIONALLY LEFT BLANK SafeNet Inc. ii

Luna SA and IBM HTTP Server/IBM Web Sphere Application Server Integration Guide Table of Contents Table of Contents Preface... i Chapter 1 Introduction... 5 Luna SA Setup... 6 IBM HTTP 7.0 & IBM Web Sphere Application Server 7.0 Setup... 6 Chapter 2... 7 Solaris 10 SPARC (64-bit)... 7 SafeNet Inc. iii

Luna SA and IBM HTTP Server/IBM Web Sphere Application Server Integration Guide Table of Contents THIS PAGE INTENTIONALLY LEFT BLANK SafeNet Inc. iv

Luna SA and IBM HTTP Server/IBM Web Sphere Application Server Integration Guide Chapter 1 Introduction Chapter 1 Introduction This document covers the necessary information to install, configure and integrate IBM HTTP Server & IBM Web Sphere Application Server with SafeNet Luna SA Hardware Security Module (HSM). IBM WebSphere Application Server is a software platform for deploying Enterprise Java Based Applications utilizing IBM HTTP Server. We provide Key Management security for Certificates and certificate-based authentication, including import of trusted CA certificates from software based keystore to hardware based keystores, generation of self signed certificates and personal certificate requests via the IBM Key Management Utility. In addition, the IBM HTTP Server can be configured to use our HSM for SSL connectivity. IBM WebSphere Application Server utilizes the following APIs: PKCS #11, JCA/JCE and their own JSSE implementation that makes calls to the PKCS #11 library. The Luna SA solutions for IBM WebSphere Application Server provides secure key management and accelerated signing for private keys associated with the IBM WebSphere Application Server as well as secure SSL Acceleration. SSL acceleration is accomplished by IBM WebSphere Application Server through JSSE (Java Secure Sockets Extension) Provider.. Scope 3 rd Party Application Details IBM HTTP Server V7.0.(32-bit) for Solaris 10 SPARC 64-bit IBM WebSphere Application Server V7.0 (32-bit) for Solaris 10 SPARC 64-bit Supported Platforms The following platforms are supported for Luna SA v4.4.1 & v4.5-12: Solaris 10 SPARC (64-bit) HSMs and Firmware Version K5 HSM f/w 4.8.1 Library and Driver Support PKCS#11 v2.01 dynamic library Distributions Luna SA Client s/w v4.4.1 (32-bit) Luna SA Client s/w v4.5 (32-bit) SafeNet Inc. 5

Luna SA and IBM HTTP Server/IBM Web Sphere Application Server Integration Guide Chapter 1 Introduction Prerequisites Luna SA Setup Please refer to the Luna SA documentation for installation steps and details regarding to configure and setup the box on Solaris systems. Before you get started ensure the following: Luna SA appliance a secure admin password Luna SA a hostname, suitable for your network Luna SA network parameters are set to work with your network Initialized the HSM on the Luna SA appliance. Created and exchanged certificates between the Luna SA and your "Client" system. Created a partition on the HSM, remember the partition password that will be later used by IBM HTTP Server. Register the Client with the partition. And run the "vtl verify" command on the client system to display a partition from Luna SA. The general form of command is /usr/lunasa/bin/vtl verify for Solaris. Enabled Partition "Activation" and "Auto Activation" (Partition policy settings 22 and 23 (applies to Luna SA with Trusted Path Authentication [which is FIPS 140-2 level 3] only). IBM HTTP 7.0 & IBM Web Sphere Application Server 7.0 Setup IBM HTTP Server V7.0 & IBM Web Sphere Application Server 7.0 must be installed on the target machine to carry on with the integration process. For a detailed installation procedure, please refer to the HTTP Server and Web Sphere Application Server documentation. You need to install the following patches- On IBM HTTP Server version 7.0: IHS70 FP21 (32bit) (7.0.0-WS-IHS-SolarisSparc-FP0000021.pak) patch using UpdateInstaller on Solaris 10 SPARC (64-bit). On IBM Web Sphere Application Server 7.0 IBM Web Sphere Application Server70 FP21 (32 bit) (7.0.0-WS-WAS-SolarisSparc-FP0000021.pak) patch using UpdateInstaller on Solaris 10 SPARC (64-bit). SafeNet Inc. 6

Chapter 2 Solaris 10 SPARC (64-bit) Integrating IBM HTTP Server V7.0 with Luna SA To configure IBM Key Management Utility to recognize the Luna SA cryptographic device: 1. Ensure that the file libcryptoki2.so is in the directory: /usr/lunasa/lib 2. Traverse to the directory: /opt/ibm/httpserver/gsk7/classes 3. Rename ikmuser.sample to ikmuser.properties. 4. Uncomment and edit the following setting to use the cryptographic lib: DEFAULT_CRYPTOGRAPHIC_MODULE=/usr/lunasa/lib/libCryptoki2.so 5. Verify the following in the Chrystoki.conf under /etc. Cryptoki with Logging Chrystoki2 = { LibUNIX=/usr/lunasa/lib/libcklog2.so; } Cklog2 = { LibUNIX=/usr/lunasa/lib/libCryptoki2.so; NewFormat=1; Enabled=1; Error=/tmp/ErrorLunaSA2.txt; File=/tmp/LogLunaSA2.txt; } OR Cryptoki without Logging Chrystoki2 = { LibUNIX=/usr/lunasa/lib/libCryptoki2.so; } 6. Set the JAVA_HOME environment variable: /opt/ibm/httpserver/java 7. Stop and start the HTTP Server. /opt/ibm/httpserver/bin/apachectl stop /opt/ibm/httpserver/bin/apachectl start 8. Modify the java.security file located in directory: SafeNet Inc. 7

/opt/ibm/httpserver/java/jre/lib/security to include the following: security.provider.1=com.ibm.security.jgss.ibmjgssprovider security.provider.2=sun.security.provider.sun #security.provider.3=com.ibm.crypto.fips.provider.ibmjcefips security.provider.3=com.ibm.crypto.provider.ibmjce security.provider.4=com.ibm.jsse.ibmjsseprovider security.provider.5=com.ibm.jsse2.ibmjsseprovider2 security.provider.6=com.ibm.security.cert.ibmcertpath security.provider.7=com.ibm.crypto.pkcs11impl.provider.ibmpkcs11impl /usr/lunasa/luna.cfg security.provider.8=com.ibm.security.cmskeystore.cmsprovider security.provider.9=com.ibm.security.jgss.mech.spnego.ibmspnego #security.provider.10=com.ibm.crypto.pkcs11.provider.ibmpkcs11 Create configuration file luna.cfg. The required entries in luna.cfg are : name = LUNA library = /usr/lunasa/lib/ libcryptoki2.so description = Luna config tokenlabel = <partition name> 9. Open IBM Key Management Utility: Traverse to directory /opt/ibm/httpserver/bin/ Execute./ikeyman. 10. Select Key Database File and Open. Specify Key Database Type as PKCS11Config. Click OK. SafeNet Inc. 8

11. The Open Cryptographic Token window appears; where Cryptographic Token Label represents the Partition in which objects will be created. Specify the Luna SA Partition password for Cryptographic Token Password. You should check on PED device if password/key are required to be entered. 12. Check the Create new secondary key database file to create the CMS Key Database key.kdb. You are prompted to create a password to access this file. In addition, check Stash the password to a file. SafeNet Inc. 9

13. The IBM Key Management window appears. Select Signer Certificates from the drop down in Key Database Content block. Select one of the Signer certificates (except for the "... - Persona Not Validated" certificates) and click Extract. 14. When the Extract Certificate to a File dialog appears, make the filename unique such that you can later recall the name of the certificate, and select Binary DER data, and click OK. Repeat for each certificate in the list, (except for the "... - Persona Not Validated" certificates). 15. Next, import each.der Certificate to the HSM, by selecting the certificate in the list, clicking Add and selecting Binary DER Data. Click OK, which opens a label dialog, and enter the label. Repeat for each certificate. 16. Signer Certificates appear as: <token label>:<certificate label> SafeNet Inc. 10

17. For example, if the token label is "HTTP Server" and the certificate label is "Verisign Class 3 Primary Certification Authority" then you will see the "Signer Certificate" as: HTTP Server:Verisign Class 3 Primary Certification Authority. As an example, it is also shown in above figure (high lighted one). 18. Click Create - New Self Signed Certificate... Specify the mandatory settings for Key Label and Organization. Click OK. RSA Public and Private Keys as well as Self Signed Certificate now exist on the Luna SA Partition. Self Signed Certificate will also appear in the form <token label>:<key label>. 19. Select Personal Certificate Request and click New. SafeNet Inc. 11

20. Give the appropriate details as required (as shown above) and the name of the file (*.arm) in which the certificate request will be stored. 21. Generate the CA signed certificate from a CA with this request. (By visiting to CA website and pasting the request where required). Save the generated certificate also in.arm format. 22. Add the root certificate to the HSM. 23. Select Signer Certificates and click Add. 24. Select Data Type as Binary DER data. 25. Enter the Certificate file name and click OK. 26. The root certificate now exists on Luna SA partition. SafeNet Inc. 12

27. Select Personal Certificates and click Receive. 28. Select Data type as Base64-encoded ASCII data. 29. Enter the Certificate file name and click OK. SafeNet Inc. 13

RSA Public and Private Keys as well as Self Signed Certificate and CA certified certificate now exist on the Luna SA Partition. To enable SSL Security: 1. Open the shell and change to directory /usr/ibm/httpserver/bin. 2. To Save the Luna SA Partition Password using the SSLStash Utility, type the following at shell : a../sslstash c /opt/ibm/httpserver/conf/ssl.passwd crypto partition password 3. To enable SSL Security, you must modify and add settings to the file: a. /opt/ibm/httpserver/conf/httpd.conf 4. Add or uncomment the appropriate lines throughout the file, as explained in the associated online documentation (http://httpd.apache.org/docs/2.0/). In the VIRTUAL HOST section, add or uncomment the line as shown in given example: LoadModule ibm_ssl_module modules/mod_ibm_ssl.so Listen localhost:443 <VirtualHost localhost:443> SSLEnable KeyFile /usr/ibm/httpserver/bin/key.kdb SSLServerCert <partition name>:<key label > SSLClientAuth None SafeNet Inc. 14

SSLPKCSDriver /usr/lunasa/lib/libshim.so SSLStashfile /usr/ibm/httpserver/conf/ssl.passwd </VirtualHost> 5. Stop and start the HTTP Server. Open a Browser and type the following as a web address: https://<machinename>. You should receive a message similar to the following: Click Yes. The Welcome to the HTTP Server web page appears. SafeNet Inc. 15

Integrating IBM WebSphere Application Server V7.0 with Luna SA Once you have installed IBM WebSphere Application Server, you must complete the following POST Installation instructions: 1. Modify the java.security file located in directory: /opt/ibm/websphere/appserver/java/jre/lib/security to include the following: security.provider.1=com.ibm.security.jgss.ibmjgssprovider security.provider.2=sun.security.provider.sun #security.provider.3=com.ibm.crypto.fips.provider.ibmjcefips security.provider.3=com.ibm.crypto.provider.ibmjce security.provider.4=com.ibm.jsse.ibmjsseprovider security.provider.5=com.ibm.jsse2.ibmjsseprovider2 security.provider.6=com.ibm.security.cert.ibmcertpath security.provider.7=com.ibm.crypto.pkcs11impl.provider.ibmpkcs11impl /usr/lunasa/luna.cfg security.provider.8=com.ibm.security.cmskeystore.cmsprovider security.provider.9=com.ibm.security.jgss.mech.spnego.ibmspnego #security.provider.10=com.ibm.crypto.pkcs11.provider.ibmpkcs11 Create configuration file luna.cfg. The required entries in luna.cfg are : name = LUNA library = /usr/lunasa/lib/ libcryptoki2.so description = Luna config tokenlabel = <partition name> 2. Restart IBM Websphere Application Server. Configuring a hardware cryptographic keystore Complete the following steps in the administrative console: 1. Click Security > SSL certificate and Key management > Key stores and certificates. 2. Click New. Type a name to identify the keystore. This name is used to enable hardware cryptography in the Web services security configuration. 3. Type the path for the hardware device-specific configuration file (luna.cfg). /usr/lunasa/luna.cfg 4. Type a password if the token login is required. Select the type as Cryptographic Token Device (PKCS11). 5. Select Read only. Click OK and Save. SafeNet Inc. 16

6. Click Security > SSL Certificate and Key Management > SSL Configurations > Node Default SSLSettings. Select Keystore name as new created keystore and click Get Certificate Aliases. 7. Default server certificate alias and Default client certificate alias drop down box will list all the certificates present on hardware. Select any one certificate. Press OK and Save. 8. Click Security > SSL certificate and Key management > Manage endpoint security configurations > Inbound Outbound > SSL_configuration_name. Select SSL configuration as NodeDefaultSSLSettings and click Update certificate alias list. Certificate alias in keystore drop down box will list all the certificates present on the hardware. Select a certificate. Press OK and Save. SafeNet Inc. 17

9. Use Retrievesigners Utility to add server certificate to the ClientDefaulttrust store from CellDefaulttruststore. The utility is located under: /opt/ibm/websphere/appserver/profiles/appsrv01/bin/retrievesigners.sh 10. Logout and restart server. The following page is displayed before the Logging page: SafeNet Inc. 18

View the Certificate and check. It should be same as that selected in step 8 and 9. If yes, press Yes to continue. SafeNet Inc. 19