Adding credentials
You can use the instructions provided here to add credentials using Web Administration Tool.
About this task
Expand the Replication management category in
the navigation area of the Web Administration Tool and click Manage
credentials
- Select the location that you want to use to store the credentials
from the list of subtrees.The Web Administration Tool allows you to
define credentials in three locations.
- cn=replication,cn=localhost, which keeps the credentials only on the current server.Note: In most replication cases, locating credentials in cn=replication,cn=localhost is preferred because it provides greater security than replicated credentials located on the subtree. However, there are certain situations in which credentials located on cn=replication,cn=localhost are not available. If you are trying to add a replica under a server, for example serverA and you are connected to a different server with the Web Administration Tool, serverB, the Select credentials field does not display the optioncn=replication,cn=localhost. This is because you cannot read the information or update any information under cn=localhost of the serverA when you are connected to serverB. The cn=replication,cn=localhost is only available when the server under which you are trying to add a replica is the same server that you are connected to with the Web Administration Tool.
- cn=replication,cn=IBMpolicies, which is available even when the server under which you are trying to add a replica is not the same server that you are connected to with the Web Administration Tool. Credentials placed under this location are replicate to the servers. Note: The location cn=replication,cn=IBMpolicies is only available, if the IBMpolicies support OID, 1.3.18.0.2.32.18, is present under the ibm-supportedcapabilities of the root DSE.
- Within the replicated subtree, in which case the credentials are replicated with the rest of the subtree. Credentials placed in the replicated subtree are created beneath the ibm-replicagroup=default entry for that subtree.Note: If no subtrees are displayed, go to Adding a subtree for instructions about creating the subtree that you want to replicate.
- Click Add.
- Enter the name for the credentials you are creating, for example, mycreds, cn= is prefilled in the field for you.
- Select the type of authentication method you want to use and click Next.
- If you selected simple bind authentication:
- Enter the DN that the server uses to bind to the replica, for example, cn=any
- Enter the password uses when it binds to the replica, for example, secret.
- Enter the password again to confirm that there are no typographical errors.
- If you want, enter a brief description of the credentials.
- Click Finish.
- If you selected Kerberos authentication:
- Enter your Kerberos bind DN.
- Enter a keyfile (the fully-qualified file specification of the
key database file). Leave this field blank to use the server's LDAP
service name.Note: The
server's LDAP service principal name is service/hostname@realm.This
comes from standard Kerberos conventions.The service is always ldap.For
example, for host myserver.mytown.mycompany.com in Kerberos realm
"MYTOWN.MYCOMPANY.COM", the server's principal name is:
ldap/myserver.mytown.mycompany.com@MYTOWN.MYCOMPANY.COMThe server gets the host name from the system TCP/IP configuration; the realm name comes from the realm name configured on the Kerberos tab on the Security properties panel. - If you want, enter a brief description of the credentials. No other information is necessary. See Kerberos setup for additional information.
- Click Finish.
ibm-kn=xxx@realmand an optional key tab file name (referred to as keyfile on the Web Administration Tool).If a bind DN is specified, the server uses the specified principal name to authenticate to the consumer server.Otherwise, the server's Kerberos service name (ldap/host-name@realm) is used.If a key tab file is used, the server uses the key tab file to obtain the credentials for the specified principal name.If no key tab file is specified, the server uses the key tab file specified in the server's Kerberos configuration.By default, the supplier uses its own service principal to bind with the consumer. For example, if the supplier is named master.our.org.com and the realm is SOME.REALM, the DN isibm-Kn=ldap/master.our.org.com@SOME.REALM. The realm value is case insensitive. Note: If more than one supplier uses Kerberos authentication to replicate to the same consumer, you must configure all suppliers to use the same Kerberos principal rather than letting them default to using their Kerberos service name. - If you selected SSL with certificate authentication you do not
need to provide any additional information, if you are using the server's
certificate. If you choose to use a certificate other than the server's:
- Enter the key file name.
- Enter the key file password.
- Reenter the key file password to confirm it.
- Enter the key label.
- If you want, enter a brief description.
- Select the Enable PKCS#11 interface support check box to enable PKCS#11 support of crypto hardware.
- Click Finish.
- If you selected simple bind authentication:
Note: If an external credential object is selected while you
are adding credentials on consumers during an Add master operation
using the Web Administration Tool, then the following settings need
to be configured on the machine where the Web server is running:
- In the JAVA_HOME\jre\lib\security\java.security file, check if
the following two entries to register JCE provider and CMS provider
are present. If the entries do not exist, add this entry in the java.security
file:
where, X is the next number in the order.security.provider.X=com.ibm.crypto.provider.IBMJCE security.provider.X+1=com.ibm.security.cmskeystore.CMSProvider - GSKit must be installed and install_location\gsk8\lib or install_location\gsk8\lib64 depending on the platform must be in the system path.
- For the Web Administration Tool to read the keyfile containing credentials information that the master server uses to connect to the replica, and create credentials on replica, the keyfile must be present in C:\temp for Windows™ platforms, and in /tmp for UNIX™.