Switching default Copy Services Manager server and client certificates
You can switch the default server and client certificates for Copy Services Manager. This manual process involves uploading the
.jks
files.
About this task
The server and client certificates are used for encrypting all connections between any Copy Services Manager client to any Copy Services Manager server. The Copy Services Manager clients include the command-line interface (CLI), the graphical user interface (GUI), and high availability (HA) clients for Copy Services Manager active and standby connections. To switch out the default Copy Services Manager server and client certificates, you need to change these two main files.
- etc/csmKeyStore.jks
- etc/csmTrust.jks
These files are at these locations.
- path_prefix/opt/IBM/CSM/wlp/usr/servers/csmServer/etc/ for z/OS®
- install dir liberty/wlp/usr/servers/csmServer/etc/ for distributed
You can create new versions of these files by using keytool, which is distributed with the Copy Services Manager Java™ version 11.
When you switch default Copy Services Manager certificates, you can use a shared custom certificate for all your Copy Services Manager servers (Active and Standby server), or have dedicated certificates for each Copy Services Manager server. When using dedicated server certificates, you need to ensure that the keystore only contains the dedicated (self) signed server certificate. The truststore that is used by client connections must import each certificate that might be used by any of your servers. Otherwise, it can happen that only local client connections are established, but there are no connections to other Copy Services Manager servers that use a different (self) signed certificate in their keystore.
securityUtility
script to encode a password. The tool is at these locations.- path_prefix/opt/IBM/CSM/wlp/bin/ for z/OS®
- install dir/liberty/wlp/bin/ for distributed
wlp/bin> securityUtility encode --encoding=xor passw0rd
{xor}Lz4sLChvLTs=
Encoding options:
--encoding={xor|aes|hash}
Specify how to encode the password. Supported encodings are xor, aes,
and hash. The default encoding is xor.
Procedure
Follow these steps to switch out the default certificates and key files that are assigned by Copy Services Manager. The example uses different keystore and truststore file names to clearly differentiate the configuration from keystores and certificates. It also prevents you from overwriting the original files.
The next five steps involve the command-line interface (CLI).
Results
The default certificates that are supplied by Copy Services Manager are switched out.