Detailed set up examples for the Tivoli WebSEAL performance tests
The detailed setup we performed to enable WebSEAL with cryptographic hardware support is provided here.
Enable and run WebSEAL with cryptographic hardware support
Use the following steps to enable and run WebSEAL with cryptographic hardware support.
- Load the System z9® crypto device driver using the following command (performed at each
system startup): /etc/init.d/z90crypt start
- Start the PKCS11 subsystem using the following command (performed at each
system startup): /etc/init.d/pkcsslotd start
- Configure the PKCS#11 device by doing the following (this is performed
once)
- Initialize the token using the following command: /usr/lib/pkcs11/methods/pkcsconf -c 0 -I
- When prompted, enter the default Security Officer (SO) PIN (87654321)
and a unique token label as shown below: /usr/lib/pkcs11/methods/pkcsconf -c 0 -IFor our example, 87654321 was the SO PIN default password and a token label name of "websealserver" was used.
Enter the SO PIN: ********
Enter a unique token label: websealserver - Set the SO PIN to a value different from the default (87654321) as show
below:
"76543210" is just an example. You can choose any number you wish./usr/lib/pkcs11/methods/pkcsconf -c 0 -P Enter the SO PIN: ******** 87654321 Enter the new SO PIN: ******** 76543210 Re-enter the new SO PIN: ******** 76543210 - Set the user PIN as shown below:
/usr/lib/pkcs11/methods/pkcsconf -c 0 –u Enter the SO PIN: ******** 76543210 Enter the new user PIN: ******** 12345678 Re-enter the new user PIN: ******** 12345678 - Change the user PIN as shown below:
/usr/lib/pkcs11/methods/pkcsconf -c 0 -p Enter user PIN: ******** 12345678 Enter the new user PIN: ******** 01234567 Re-enter the new user PIN: ******** 01234567
- Initialize the token using the following command:
- Create a self-signed certificate using the PKCS#11 token, to be used by
WebSEAL by doing the following (this is performed once). Use the gsk7ikm utility
to add a self-signed certificate to the CMS Cryptographic Token. Note: Before starting the gsk7ikm utility, set the JAVA_HOME environment variable to point to your Java™ JRE and ensure Java is in the PATH as shown below:export JAVA_HOME=/opt/IBMJava2-s390-142/jre/
export PATH=/opt/IBMJava2-s390-142/jre/bin:$PATH
gsk7ikm- Run gsk7ikm.
The following screen appears.
Figure 1. IBM key management screen 
- From Figure 1, select Key Database File –> Open.
- The following box opens.
Figure 2. Key database file entry box 
- Select the Key Database Type of CMS Cryptographic Token.
- Enter PKCS11_API.so for the file name.
- Enter "/usr/lib/pkcs11" for the location.
- Click the OK button and the following screen appears:
Figure 3. Open cryptographic token screen 
- Enter the cryptographic token password that you set before (01234567).
- Deselect the Open existing secondary key database file box.
- Click OK.
- On the IBM® key management screen (see Figure 1), click on New Self-Signed...
The following screen is displayed:
Figure 4. Create new self-signed certificate screen 
- Enter the appropriate information to create the certificate.
- Click OK.
The self-signed certificate you just created will now be visible on the IBM Key Management screen as show below.
Figure 5. IBM Key Management screen showing self-signed certificate 
Exit the gsk7ikm application.
- Run gsk7ikm.
- Configure WebSEAl to use the PKCS#11 devices for cryptographic operations
as detailed below (this is performed once):
- Add ivmgr to group pkcs11 by issuing the following: usermod -G ivmgr,tivoli,pkcs11 ivmgr
- Update the following parameters in the webseald-xxx.conf file (in our
case webseald-default.conf): unix-group = pkcs11
webseal-cert-keyfile-label = websealserver:leeds
[The value for the webseal-cert-keyfile-label directive has the
form – token_label:certificate_label]
[ssl]
pkcs11-driver-path = /usr/lib/pkcs11/PKCS11_API.so
pkcs11-token-label = websealserver
pkcs11-token-pwd = 01234567 (user PIN set during token
initialization)
pkcs11-symmetric-cipher-support = yes (this directive enables the use
of CPACF)
[ssl-qop]
ssl-qop-mgmt = yes
[ssl-qop-mgmt-default]
default = AES-128 or
DES-168
- Add ivmgr to group pkcs11 by issuing the following:
- Start or re-start WebSEAL using one of the following commands: pdweb start or
pdweb restart