Installing IBM Guardium Cryptography Manager 2.0.1.0 with internal OpenID Connect
You can install IBM® Guardium® Cryptography Manager 2.0.1.0 with internal OpenID Connect by using Helm.
Before you begin
- System requirements and prerequisites
- Load balancer requirements
- Registration for a Red Hat subscription
- Helm with version 3.x
- For successful connectivity and operation of the deployed application, ensure that the following ports are explicitly allowed in your firewall or network access rules:
- TCP Port of the OIDC server.
- TCP Port 31443 for IAG host.
- If you are using an external database with either CA-signed internal OIDC or a self-signed internal OIDC, perform the following steps:
- Create Secure Sockets Layer (SSL) certificate secrets.
- Run the following commands to create Kubernetes secrets for PostgreSQL databases in the gcmapp namespace:
kubectl create secret generic postgres-external-cert \ --from-file=tls.crt=<postgres-cert-name> \ --namespace="gcmapp" \ --dry-run=client -o yaml | kubectl apply -f -Note: Ensure that you configure the namespace. - Run the following commands to create Kubernetes secrets for MongoDB databases in the gcmapp namespace:
kubectl create secret generic mongo-external-cert \ --from-file=tls.crt=<mongodb-cert-name> \ --namespace="gcmapp" \ --dry-run=client -o yaml | kubectl apply -f - - If you are using custom database usernames or passwords, run the following commands to create PostgreSQL certificate secret:
kubectl create secret generic "gcm-postgres-secret" \ --namespace="gcmapp" \ --from-literal=DB_USER=<db-user> \ --from-literal=DB_PASSWORD=<db-password> \ --dry-run=client -o yaml | kubectl apply -f - - If you are using custom database usernames or passwords, run the following commands to create MongoDB certificate secret:
kubectl create secret generic "gcm-mongodb-secret" \ --namespace="gcmapp" \ --from-literal=MONGO_DB_USERNAME=<db-user> \ --from-literal=MONGO_DB_PASSWORD=<db-password> \ --dry-run=client -o yaml | kubectl apply -f -
About this task
You can install the Guardium Cryptography Manager application with internal OpenID Connect through Helm on a single-node or multi-node Kubernetes cluster or on a multi-node OpenShift Container Platform (OCP) cluster.
Procedure
Results
After installing Guardium Cryptography Manager 2.0.1.0, perform the following validations:
- Validate the deployment of by doing these steps:
- Run the following command to check the Helm releases:
helm ls --namespace gcmapp - Run the following command to verify pods:
kubectl get pods --namespace gcmapp - Run the following command to check the logs of pods:
kubectl logs -f <pod-name> --namespace gcmapp
- Run the following command to check the Helm releases:
- Validate OIDC server access, log in using either of the following URLs with username as
gcmadminand password asgcmsecret, and then verify that the gcmadmin exists:- Use https://<ip-address>:<OIDC server port> for Kubernetes cluster
- Use https://<route-url> for OCP cluster
Log in by using the following credentials:
- Username:
gcmadmin - Password:
gcmsecret
What to do next
After installing Guardium Cryptography Manager 2.0.1.0, complete the following tasks:
- Open the Guardium Cryptography Manager application by using either of the following URLs:
- If the Guardium Cryptography Manager application is installed in a Kubernetes cluster, use the URL, https://<ip_address>:31443
- If the Guardium Cryptography Manager application is installed in an OCP cluster, use the URL, https://<route_url>
- Log in to the Guardium Cryptography Manager user interface by using the following credentials:
- Username:
gcmadmin - Password:
<password>
Note: Use the same password that you had configured during the installation process.You can reset gcmadmin user password. See Troubleshooting installation and uninstallation . - Username:
- On the Guardium Cryptography Manager, click Help>About>Version, and verify that the version is as required.