PDMgr_config

Configures the Security Access Manager policy server for AIX®, Linux, and Solaris platforms.

Syntax

PDMgr_config [–C compliance] [–d dn_ldap-admin] [–D ldap_dn] [–f response_file] [–F use_fips{yes|no}] [–j standby_server {yes|no}] [–J standby_server_conf_file] [–k key_file] [–K key_file_password] [–l certificate_life] [–L port] –m password [–N key_file_label] [–r port] [–s silent{yes|no}] [–S ldap_suffix] [–v use_minimal_data_format {yes|no}] –w password [–Z use_ssl {yes|no}]

Description

The PDMgr_config utility configures the Security Access Manager policy server on AIX, Linux, and Solaris platforms. You can run this utility directly from the command line.

Parameters

–C compliance
Specifies the compliance value for the [ssl] ssl-compliance configuration file setting. (Optional) If not specified, this value defaults to the [ssl] ssl-compliance value that is currently set in the pd.conf file. The compliance value must be one of the following settings:
fips
Enforces FIPS 140-2 protocols and algorithms.

Security Access Manager servers and applications generate and use SHA1 with 2048-bit RSA certificates. Only TLS versions 1.0, 1.1, and 1.2 are available. SSL versions 2 and 3 are disabled and unavailable. This setting option is equivalent to the previous release setting [ssl] ssl-enable-fips = yes. This value is compatible with previous Tivoli Access Manager releases.

none
Specifies that no special compliance criteria are applied to TLS communication. Security Access Manager servers and applications generate and use SHA1 with 2048-bit RSA certificates. This setting option is equivalent to the previous release setting [ssl] ssl-enable-fips = no. This value is compatible with previous Tivoli Access Manager releases.
sp800-131-strict
Enables strict NIST SP800-131a support. This conformance enforcement is required by some agencies and businesses that start in the year 2014.

Security Access Manager servers and applications generate and use SHA256 with 2048-bit RSA certificates. This value is not compatible with prior releases of Tivoli Access Manager. Older Tivoli Access Manager clients cannot interact with Security Access Manager 7.0 running with this compliance setting. Only TLS version 1.2 is available; all others are disabled.

sp800-131-transition
Enables NIST SP800-131a support at the transition level. This value is valid until the end of the year 2013. This value has fewer restrictions than the strict enforcement. Only TLS versions 1.0, 1.1, and 1.2 are available. SSL versions 2 and 3 are disabled and unavailable.

Security Access Manager servers and applications generate and use SHA256 with 2048-bit RSA certificates. This value is at a higher level than is required by the standard and was chosen as it is a level permitted by the strict enforcement that allows easy migration from transition to strict. This value is not compatible with previous Tivoli Access Manager releases. Older Tivoli Access Manager clients cannot interact with Security Access Manager 7.0 running with this compliance setting.

suite-b-128
Enables NSA Suite B at 128-bit support. Security Access Manager servers and applications generate and use SHA256 with 256-bit ECDSA certificates. This value is not compatible with previous Tivoli Access Manager releases. Older Tivoli Access Manager clients cannot interact with Tivoli Access Manager 7.0 running with this compliance setting. Only TLS version 1.2 is available; all others are disabled.
suite-b-192
Enables NSA Suite B at 192-bit support. Security Access Manager servers and applications generate and use SHA384 with 384-bit ECDSA certificates. This value is not compatible with previous Tivoli Access Manager releases. Older Tivoli Access Manager clients cannot interact with Security Access Manager 7.0 running with this compliance setting. Only TLS version 1.2 is available; all others are disabled.
–d dn_ldap-admin
Specifies the distinguished name of the LDAP administrator. The default value is cn=root. (Optional)
–D ldap_dn
The name of the management domain. Configuring the policy server in the management domain creates the initial administrative domain. The management domain name must be unique within the LDAP server. The name must be an alphanumeric string up to 64 characters long and not case-sensitive. The default value is Default. (Optional)
–f response_file
Specifies the fully qualified path and file name of the response file to use during silent configuration. A response file can be used for configuration. There is no default response file name. The response file contains stanzas and key=value pairs. For information about using response files, see the "Using response files" appendix in the IBM Security Access Manager for Web Command Reference. (Optional)
–F use_fips {yes|no}
Specifies whether to enable Federal Information Processing Standards (FIPS). If FIPS is enabled, the IBM Tivoli Directory Server is configured to use the appropriate FIPS secure communications protocol. The valid responses are yes or no. The default value is no. (Optional)
–j standby_server {yes|no}
If a policy server is already configured to the LDAP server, a second policy server might be configured for standby purposes only. Valid values are yes or no. The default value is no. This parameter applies only to the AIX platform. (Optional)
–J standby_server_conf_file
The fully qualified location of the ivmgrd.conf file, which is the existing primary policy server configuration file. For example, if the shared directory is /share, enter /share/PolicyDirector/ivmgrd.conf. This parameter applies only to the AIX platform. (Optional)
–k key_file
Specifies the fully qualified file name of the client-side key file. This key file holds the server-side certificates that are used in secure communication. This parameter is required when use_ssl is set to yes, which enables SSL communication. (Optional)
–K key_file_password
Specifies the password that is associated with the specified key_file. This password was set when the key file was created. This parameter is required if use_ssl is yes. (Optional)
–l certificate_life
Specifies the number of days that the SSL certificate file is valid. The default number of days is 1460. (Optional)
–L port
Specifies the Secure Sockets Layer (SSL) port number of the LDAP server. Use the LDAP server-configured port number. The default port number is 636. (Optional)
–m password
Specifies the password for the Security Access Manager administrator ID. The default administrator ID is sec_master.
–N key_file_label
Specifies the server certificate label name that is in the key_file. This label was set when the server certificate was imported in the client-side key file. This parameter is required when use_ssl is set to yes, which enables SSL communication. (Optional)
–r port
Specifies the port number for the Security Access Manager policy server. The default value is 7135. (Optional)
–s silent{yes|no}
Specifies silent configuration. The valid responses are yes or no. If set to yes, the utility runs in silent mode. If set to no, the utility runs in interactive mode. (Optional)
–S ldap_suffix
The software creates the secAuthorityInfo object entry on the LDAP server when you create:
  • ASecurity Access Manager domain.
  • The initial management domain.
This object represents the Security Access Manager domain and is named by using the secAuthority attribute with the name of the domain as its value. For example: secAuthority=<domain_name>.
If you do not provide a different name, the default name of the management domain is Default, making the secAuthorityInfo object name secAuthority=Default. (Optional)
–v use_minimal_data_format {yes|no}
When you configure the policy server, you can select the LDAP data format for user and group tracking information. The two LDAP data formats are minimal and standard. The valid responses are yes or no. The default value is yes. (Optional)
–w password
Specifies the password for the dn_ldap_admin.
–Z use_ssl {yes|no}
Specifies whether to enable SSL communication between the Security Access Manager policy server and the registry server. The valid responses are yes or no. The default value is no. (Optional)

Availability

This utility is in /opt/PolicyDirector/sbin, the default installation directory on AIX, Linux, and Solaris operating systems.

When an installation directory other than the default is selected, this utility is in the /sbin directory under the installation directory (for example, installation_directory/sbin).

Return codes

0
The utility ran successfully.
1
The utility failed. When a utility fails, the software displays a description of the error. See the IBM Security Access Manager for Web Error Message Reference. This reference provides a list of the Security Access Manager error messages by decimal or hexadecimal codes.

Examples

The following example configures the Security Access Manager policy server by using LDAP as the user registry and the default management domain. SSL communication with the LDAP server is not enabled.
./PDMgr_config -Z no -F no -d "cn=root" -w password -v yes -m password 
-r 7135 -l 1460 -D Default -s yes