You can use different degrees of SSL security:
For a full SSL-secured scenario you must implement all three options. The following examples include a phased approach and show which additional parameters and steps are required in each situation.
For this configuration to work, the Apache Tomcat server must already be configured to use SSL. The Apache Tomcat server that is bundled with the CLM applications already has SSL configured with a self-signed certificate. This example shows how to use this existing configuration from your deployment for the JMX Apache Tomcat interface.
keytool -export -alias ibm-team -keystore ibm-team-ssl.keystore -file jazz.cer -storepass ibm-team
keytool -import -alias jconsole -file jazz.cer -keystore jconsole.truststore -storepass password -noprompt
jconsole -J-Djavax.net.ssl.trustStore=jconsole.truststore -J-Djavax.net.ssl.trustStorePassword=ibm-team service:jmx:rmi:///jndi/rmi://host:1099/jmxrmi
Linux:
JAVA_OPTS="$JAVA_OPTS -Dcom.sun.management.jmxremote.registry.ssl=true"
Microsoft Windows:
set JAVA_OPTS=%JAVA_OPTS -Dcom.sun.management.jmxremote.registry.ssl=true
The rest of the SSL configuration parameters remain the
same. This property makes the virtual machine create an SSL-secured
RMI registry at startup for the clients to use.
Jazz.net channel User Education channel |
Agile learning circle Learning circles |
developerWorks forums |
Deployment wiki Support blog |