Setting up secure communication for UMS
By default, Unified Management Server uses the keystore and truststore that are specified in the zowe.yaml configuration file for Zowe. You can use a different keystore or truststore by specifying its location and type in the ZWEYAML member to be used to configure UMS.
Before you begin
zowe.yaml) for the Zowe instance to be used for your UMS server installation is located. For details of the Zowe configuration for keystore and truststore, see YAML configurations - certificate and Zowe certificate configuration.
About this task
components.izp.security.certificate.keystore.locationcomponents.izp.security.certificate.keystore.typecomponents.izp.security.certificate.keystore.aliascomponents.izp.security.certificate.truststore.locationcomponents.izp.security.certificate.truststore.type
Zowe supports Public Key Cryptography Standards #12 (PKCS12) and SAF key rings of JCERACFKS keystore types for both keystores and truststores. Unified Management Server supports the Java KeyStores (JKS) type for both keystores and truststores in addition to PKCS12 and JCERACFKS-type key rings. It also supports the Java keystore type JCECCARACFKS. For details, see Using the Java keystore type JCECCARACFKS.
- If you are using a key ring as the UMS keystore, the certificate that is connected to the key ring with PERSONAL usage must be a trusted SITE certificate that is not associated with any valid user ID.
- If you are using a key ring as the UMS keystore, the Zowe started task user ID requires
RDATALIBclass authority to access the private key of the certificate that is connected to the key ring with PERSONAL usage at UMS runtime. Since the certificate is owned by SITE, the Zowe started task user ID needs to have CONTROL access to the profile<keyring_owner>.<keyring_name>.LSTin theRDATALIBclass, where <keyring_owner_ID> is the user ID that owns the key ring and <keyring_name> is the name of the key ring. - The keystore that will be used for the Unified Management Server must include only one personal certificate, which has a specified label. You must not include another personal certificate, such as an UMS DBA user certificate. For a DBA user certificate, you must use a separate key ring for the DBA user ID. For details on preparing a key ring for a DBA user certificate, see Configuring the DBA user by using a certificate.
- If you are sharing the keystore between Zowe and Unified Management Server, check whether the requirements on Extended Key Usage (EKU) and Subject Alternate Name (SAN) described in the Zowe certificate requirements section of the Zowe documentation are satisfied for the certificate, which will be commonly used by all Zowe components, including UMS. If any of these requirements are not satisfied, connection errors can occur during Zowe server startup.
- The Zowe App Server
- The Zowe API Gateway
- A REST API client that does not use the API Gateway
- A Zowe ZSS server
- A z/OSMF server
- A Db2 subsystem
- A SQL Tuning Services server for Db2
- An Administration Services server for Db2 Analytics Accelerator
Keystores and truststores are used in TLS communications. They are repositories that contain cryptographic artifacts like certificates and private keys that are used for cryptographic protocols. The procedure below describes how to set up these repositories to enable TLS communications for UMS.
Procedure
What to do next
Applicable to Db2 experiences
Users are required to create connection profiles for the SQL Tuning Service. If you are using SSL encryption for the Db2 connectivity, UMS will pass the name of the UMS truststore to the SQL Tuning Service when the profile is created.UMS will automatically create Db2 connection profiles for the Db2® Analytics Accelerator Administration Services. Again, if you are using SSL encryption for Db2 connectivity, UMS will pass the name of the UMS truststore when the profile is created.
- Using a file-based keystore
If you are using a file-based keystore with UMS, ensure that the SQL Tuning Service started task user ID and the Db2 Analytics Accelerator Administration Services started task user ID have read permissions on the UMS truststore file.
- Using a key ring as a truststore
If you are using key rings with UMS, SQL Tuning Service started task user ID and the Db2 Analytics Accelerator Administration Services started task user ID also need access to read the UMS key ring. You can select one of the following options:
- Define and permit
UPDATEonIRR.DIGTCERT.LISTRINGin classFACILITYto the SQL Tuning Service and the Db2 Analytics Accelerator Administration Services started task user IDs. This action permits those user IDs the authority to read any key ring on the system. - Define and permit
CONTROLon<UMS keyring owner>.<UMS keyring name>.LSTin classRDATALIBto the UMS, SQL Tuning Service, and the Db2 Analytics Accelerator Administration Services started task user IDs. - Create the connection profiles outside UMS and pass the name of a truststore already used for the SQL Tuning Service and the Db2 Analytics Accelerator Administration Services started tasks. Make sure to connect the appropriate Db2 Root CAs to the key ring specified in
components.izp.security.certificate.truststore.location, or if blank, the key ring specified inzowe.certificate.truststore.fileso the services can connect securely to Db2.
- Define and permit