Importing the CA certificate into the WebSphere Application Server ICFM and Operational Decision Manager node keystore
Import the trusted, root, and intermediate certificates that you received from Certificate Authority into WebSphere® Application Server.
Procedure
- Upload the CA certificate file to the /opt/IBM/HTTPServer/cert directory.
- To stop the Deployment Manager, run the following commands
as wasmgr user on the Core server:
cd /opt/IBM/WebSphere/AppServer/profiles/DMProfile/bin ./stopManager.sh -user was_admin_id -password was_admin_password - Any truststore that is used to validate the signatures of certificate that is obtained from
this certificate authority must have these signer certificates installed. To import the signer
certificates (from root to intermediate), run the following command for your environment:
For a three-server environment, run the following command on the Analytics server:
For example, run the follow commands:/opt/IBM/WebSphere/AppServer/java/jre/bin/ikeycmd -cert -export -db /opt/IBM/cert_files/key.kdb -pw db_password -label label_name -type kdb -target key.p12 -target_pw WebAS -target_type p12cd /opt/IBM/WebSphere/AppServer/profiles/DMProfile/config/cells/CoreCell/nodes/ICFMNode /opt/IBM/WebSphere/AppServer/java/jre/bin/ikeycmd -cert -export -db /opt/IBM/cert_files/key.kdb -pw password -label "icfmdev109ihs" -type kdb -target key.p12 -target_pw WebAS -target_type p12To verify whether the certificate was exported successfully, run the following command for a three-server environment:/opt/IBM/WebSphere/AppServer/java/jre/bin/ikeycmd -cert -list -type p12 -db key.p12 -pw WebASFor a single-server environment, run the following command on ICFM server:
/opt/IBM/HTTPServer/bin/gskcmd -cert -export -db /opt/IBM/HTTPServer/cert/key.kdb -pw db_password -label label_name -type kdb -target key.p12 -target_pw WebAS -target_type p12For example, run the following commands:
cd /opt/IBM/WebSphere/AppServer/profiles/DMProfile/config/cells/CoreCell/nodes/ICFMNode /opt/IBM/HTTPServer/bin/gskcmd -cert -export -db /opt/IBM/HTTPServer/cert/key.kdb -pw password -label "icfmdev109ihs" -type kdb -target key.p12 -target_pw WebAS -target_type p12To verify whether the certificate was exported successfully, run the following command for a single-server environment:/opt/IBM/HTTPServer/bin/gskcmd -cert -list -type p12 -db key.p12 -pw WebAS - Import the signer certificates (root and intermediate) into the WebSphere Application
Server plug-in keystore for CoreWebServer. Run the following command for
each of the root and intermediate certificates as appropriate for your environment. For a three-server environment, run the following command on the Core server. For a single-server environment, run the following command on the ICFM server.
/opt/IBM/HTTPServer/bin/gskcmd -cert -add -type cms -db plugin-key.kdb -pw WebAS -label label_name -trust enable -file /opt/IBM/HTTPServer/cert/signer_cert_filenameFor example, run the following commands:cd /opt/IBM/WebSphere/Plugins/config/CoreWebServer /opt/IBM/HTTPServer/bin/gskcmd -cert -add -type cms -db plugin-key.kdb -pw WebAS -label "carootcert" -trust enable -file /opt/IBM/HTTPServer/cert/carootcert.der - Import the signer certificates (root and intermediate) into the WebSphere Application
Server plug-in keystore for CoreWebServer under WebSphere Application
Server Deployment Manager. Run the following command for each of the root
and intermediate certificates as appropriate for your environment. For a three-server environment, run the following command on the Analytics server.
/opt/IBM/WebSphere/AppServer/java/jre/bin/ikeycmd -cert -add -type cms -db plugin-key.kdb -pw WebAS -label label_name -trust enable -file /opt/IBM/cert_files/signer_cert_filenameFor example, run the following commands:cd /opt/IBM/WebSphere/AppServer/profiles/DMProfile/config/cells/CoreCell/nodes/CoreWebNode/servers/CoreWebServer /opt/IBM/WebSphere/AppServer/java/jre/bin/ikeycmd -cert -add -type cms -db plugin-key.kdb -pw WebAS -label "carootcert" -trust enable -file /opt/IBM/cert_files/carootcert.derFor a single-server environment, run the following command on the ICFM server:/opt/IBM/HTTPServer/bin/gskcmd -cert -add -type cms -db plugin-key.kdb -pw WebAS -label label_name -trust enable -file /opt/IBM/HTTPServer/cert/signer_cert_filenameFor example, run the following commands:cd /opt/IBM/WebSphere/AppServer/profiles/DMProfile/config/cells/CoreCell/nodes/CoreWebNode/servers/CoreWebServer /opt/IBM/HTTPServer/bin/gskcmd -cert -add -type cms -db plugin-key.kdb -pw WebAS -label "carootcert" -trust enable -file /opt/IBM/HTTPServer/cert/carootcert.der - Import the signer certificates (root and intermediate) into the WebSphere Application
Server Cell trust store. Run the following command for each of the root and
intermediate certificates as appropriate for your environment. For a three-server environment, run the following command on the Analytics server:
/opt/IBM/WebSphere/AppServer/java/jre/bin/ikeycmd -cert -add -type p12 -db trust.p12 -pw WebAS -label label_name -trust enable -file /opt/IBM/cert_files/signer_cert_filenameFor example, run the following commands:cd /opt/IBM/WebSphere/AppServer/profiles/DMProfile/config/cells/CoreCell /opt/IBM/WebSphere/AppServer/java/jre/bin/ikeycmd -cert -add -type p12 -db trust.p12 -pw WebAS -label "carootcert" -trust enable -file /opt/IBM/cert_files/carootcert.derFor a single-server environment, run the following command on the ICFM server:/opt/IBM/HTTPServer/bin/gskcmd -cert -add -type p12 -db trust.p12 -pw WebAS -label label_name -trust enable -file /opt/IBM/HTTPServer/cert/signer_cert_filenameFor example, run the following commands:cd /opt/IBM/WebSphere/AppServer/profiles/DMProfile/config/cells/CoreCell /opt/IBM/HTTPServer/bin/gskcmd -cert -add -type p12 -db trust.p12 -pw WebAS -label "carootcert" -trust enable -file /opt/IBM/HTTPServer/cert/carootcert.der - Import the signer certificates (root and intermediate) into the WebSphere Application
Server Deployment Manager profile trust store. Run the following command
for each of the root and intermediate certificates. For a three-server environment, run the following command on the Analytics server:
/opt/IBM/WebSphere/AppServer/java/jre/bin/ikeycmd -cert -add -type p12 -db trust.p12 -pw WebAS -label label_name -trust enable -file /opt/IBM/cert_files/signer_cert_filenameFor example, run the following commands:cd /opt/IBM/WebSphere/AppServer/profiles/DMProfile/etc /opt/IBM/WebSphere/AppServer/java/jre/bin/ikeycmd -cert -add -type p12 -db trust.p12 -pw WebAS -label "carootcert" -trust enable -file /opt/IBM/cert_files/carootcert.derFor a single-server environment, run the following command on the ICFM server:/opt/IBM/HTTPServer/bin/gskcmd -cert -add -type p12 -db trust.p12 -pw WebAS -label label_name -trust enable -file /opt/IBM/HTTPServer/cert/signer_cert_filenameFor example, run the following commands:cd /opt/IBM/WebSphere/AppServer/profiles/DMProfile/etc /opt/IBM/HTTPServer/bin/gskcmd -cert -add -type p12 -db trust.p12 -pw WebAS -label "carootcert" -trust enable -file /opt/IBM/HTTPServer/cert/carootcert.der - Import the signer certificate (only root) into the ICFM
WebSphere Application
Server trust database, which is located in the ICFM
WebSphere Application
Server profile etc directory. Run the
following command as root. For a three-server environment, run the following command on the Core server. For a single-server environment, run the following command on the ICFM server.
/opt/IBM/HTTPServer/bin/gskcmd -cert -add -type p12 -db trust.p12 -pw WebAS -label label_name -trust enable -file /opt/IBM/HTTPServer/cert/signer_cert_filenameFor example, run the following commands:cd /opt/IBM/WebSphere/AppServer/profiles/ICFMProfile/etc /opt/IBM/HTTPServer/bin/gskcmd -cert -add -type p12 -db trust.p12 -pw WebAS -label "carootcert" -trust enable -file /opt/IBM/HTTPServer/cert/carootcert.der - Import the server and signer certificates (from root to intermediate) into the ODM WebSphere Application
Server keystore. For a three-server environment, run the following command on the Analytics server:
/opt/IBM/WebSphere/AppServer/java/jre/bin/ikeycmd -cert -export -db /opt/IBM/cert_files/key.kdb -pw db_password -label label_name -type kdb -target key.p12 -target_pw WebAS -target_type p12For example, run the following commands:cd /opt/IBM/WebSphere/AppServer/profiles/DMProfile/config/cells/CoreCell/nodes/ODMNode /opt/IBM/WebSphere/AppServer/java/jre/bin/ikeycmd -cert -export -db /opt/IBM/cert_files/key.kdb -pw password -label "icfmdev109ihs" -type kdb -target key.p12 -target_pw WebAS -target_type p12To verify whether the certificates were imported successfully, run the following command:/opt/IBM/WebSphere/AppServer/java/jre/bin/ikeycmd -cert -list -type p12 -db key.p12 -pw WebASFor a single-server environment, run the following command on the ICFM server:/opt/IBM/HTTPServer/bin/gskcmd -cert -export -db /opt/IBM/HTTPServer/cert/key.kdb -pw db_password -label label_name -type kdb -target key.p12 -target_pw WebAS -target_type p12For example, run the following commands:cd /opt/IBM/WebSphere/AppServer/profiles/DMProfile/config/cells/CoreCell/nodes/ODMNode /opt/IBM/HTTPServer/bin/gskcmd -cert -export -db /opt/IBM/HTTPServer/cert/key.kdb -pw password -label "icfmdev109ihs" -type kdb -target key.p12 -target_pw WebAS -target_type p12To verify whether the certificates were imported successfully, run the following command:/opt/IBM/HTTPServer/bin/gskcmd -cert -list -type p12 -db key.p12 -pw WebAS - Import the signer certificates into the WebSphere Application
Server Java security
keystore. Run the following command for each of the root and intermediate certificates. For a three-server environment, run the following command on the Core server:
/opt/IBM/WebSphere/AppServer/java_1.8_64/jre/bin/ikeycmd -cert -add -db /opt/IBM/WebSphere/AppServer/java_1.8_64/jre/lib/security/cacerts -pw changeit -type JKS -format ASCII -label label_name -trust enable -file /opt/IBM/HTTPServer/cert/signer_cert_filenameFor example, run the following command:/opt/IBM/WebSphere/AppServer/java_1.8_64/jre/bin/ikeycmd -cert -add -db /opt/IBM/WebSphere/AppServer/java_1.8_64/jre/lib/security/cacerts -pw changeit -type JKS -format ASCII -label "carootcert" -trust enable -file /opt/IBM/HTTPServer/cert/carootcert.derThen, for a three-server environment, run the following command on the Analytics server:/opt/IBM/WebSphere/AppServer/java_1.8_64/jre/bin/ikeycmd -cert -add -db /opt/IBM/WebSphere/AppServer/java_1.8_64/jre/lib/security/cacerts -pw changeit -type JKS -format ASCII -label label_name -trust enable -file //opt/IBM/cert_files/signer_cert_filenameFor example, run the following command:/opt/IBM/WebSphere/AppServer/java_1.8_64/jre/bin/ikeycmd -cert -add -db /opt/IBM/WebSphere/AppServer/java_1.8_64/jre/lib/security/cacerts -pw changeit -type JKS -format ASCII -label "carootcert" -trust enable -file /opt/IBM/cert_files/carootcert.derFor a single-server environment, run the following command on the ICFM server:/opt/IBM/WebSphere/AppServer/java_1.8_64/jre/bin/ikeycmd -cert -add -db /opt/IBM/WebSphere/AppServer/java_1.8_64/jre/lib/security/cacerts -pw changeit -type JKS -format ASCII -label label_name -trust enable -file /opt/IBM/HTTPServer/cert/signer_cert_filenameFor example, run the following command:/opt/IBM/WebSphere/AppServer/java_1.8_64/jre/bin/ikeycmd -cert -add -db /opt/IBM/WebSphere/AppServer/java_1.8_64/jre/lib/security/cacerts -pw changeit -type JKS -format ASCII -label "carootcert" -trust enable -file /opt/IBM/HTTPServer/cert/carootcert.der - To start the Deployment Manager, run the following commands as the wasmgr user
on the ICFM server (Analytics server for a three-server
environment):
cd /opt/IBM/WebSphere/AppServer/profiles/DMProfile/bin ./startManager.sh