Setting up the keystore
To monitor HTTPS transactions, import keys into the KT5Keystore for all web servers that you want to monitor.
About this task
You can either export the SSL certificates from the web servers that you are monitoring and import them into the HTTPS Keystore by using IBM Key Management (iKeyman), or specify the web server's keystore stash file (.kdb) in the HTTPS Keystore. When you install or configure Response Time Monitoring, you are prompted for the location of the keys.kdb file.
- Go to the install_dir/ibm-jre/jre/lib/security
directory. For example:
/opt/ibm/apm/agent/JRE/lx8266/lib/security
C:\Program Files\IBM\APM\ibm-jre\jre\lib\security
- In the java.security file, add the following statement to the list of
security providers as shown, where number is the last sequence number in the
list.
The list of providers looks like the following example:security.provider.number=com.ibm.security.cmskeystore.CMSProvider## List of providers and their preference orders # security.provider.1=com.ibm.jsse.IBMJSSEProvider security.provider.2=com.ibm.crypto.provider.IBMJCE security.provider.3=com.ibm.security.jgss.IBMJGSSProvider security.provider.4=com.ibm.security.cert.IBMCertPath security.provider.5=com.ibm.security.cmskeystore.CMSProvider ... # - Save and close the file.
Procedure
To enable HTTPS transaction monitoring, collect the SSL certificates from the web servers that you want to monitor and import the certificates and keystore stash files into the HTTPS Keystore by using iKeyman. The following example uses iKeyman to export the certificates from an IBM HTTP Server, and import them to HTTPS Keystore:
Importing keys from Internet Information Services
To extract keys from Internet Information Services and import them into the KT5Keystore, complete the following steps:
- Install a Response Time Monitoring agent on each HTTPS web server that you want to monitor.
- Export a .pfx file from Internet Information Services:
- From the Windows Start menu, select .
- Select the web server and site whose private key you want to export, then right-click and select Properties from the context menu.
- Select the Directory Security tab, then select Server Certificate in the Secure communications section.
- In the IIS Certificate Wizard, click Next.
- Select Export the current certificate to a .pfx file and click Next.
- Enter the path and file name and click Next.
- Enter an export password for the key and click Next.
- Click Next on all subsequent pages, then click Finish.
- Extract Personal and Signer Certificates from the .pfx file:
- Run IBM Key Management (iKeyman) from within the IBM Java
bin directory using the command
c:\IBM\APM\java\java80_x64\jre\bin\ikeyman. Ensure that the environment variableJAVA_HOMEis set. - In the Keystore database, select .
- From the Key database type list, select PKCS12.
- Enter the name and path for the .pfx file you created above, then click OK. When prompted, enter the password, then click OK.
- Select , then click Export/Import.
- Select an Action Type of Export Key and a Key File Type of PKCS12. Enter a file name and location for the exported key and click OK. When prompted, enter an export password, then click OK again.
- If the Personal Certificate was signed by a Certificate Authority, select and click Extract. Select the default file type, and enter a file name and location for the exported certificate, then click OK.
- Run IBM Key Management (iKeyman) from within the IBM Java
bin directory using the command
- Extract Signer .cer files (if needed):
- If a Signer Certificates file was extracted from the .pfx file, navigate to the directory where it was saved, and make a new copy with the extension .cer. Double-click the new copy to open it using the Windows Certificate viewer.
- On the Certification Path tab, you can view the signer certificate chain. The lowest item
in the chain should be the Personal Certificate. For all certificates above it, do the following:
- Select a certificate and click View Certificate.
- Select Details and click Copy to File.
- Accept all defaults in the Certificate Export Wizard and enter a filename with the .cer extension.
- Create a new Keystore database. In the New dialog box, complete the
following steps:
- From the Key database type list, select CMS, and
enter a filename and location. When prompted, enter a password for the new keystore.Note: Ensure you select Stash the password to a file.
- If Signer Certificates were extracted from the .pfx file, do the following:
- Select .
- For each signer certificate, click Add and add the .cer file.
- Select and click Import.
- Select the key file type PKCS12, and the name and location of the .p12 file. When prompted, enter the password.
- Save the keystore and exit the key management utility.
- Copy the .kdb and .sth files to the KT5Keystore on the Response Time Monitoring appliance machine.
- Place the IBM Key Management database files (.kdb) and stash
(.sth) in a safe directory, and ensure that they are only readable by
Administrator or
root(or the user ID that was used to install the Response Time Monitoring agent).
- From the Key database type list, select CMS, and
enter a filename and location. When prompted, enter a password for the new keystore.
