z/OS Common Information Model User's Guide
|
Previous topic |
Next topic |
Contents |
Index |
Contact z/OS |
Library |
PDF
Example: Configuring AT-TLS for secure communication z/OS Common Information Model User's Guide SC34-2671-00 |
|
Example: Configuring AT-TLS for secure communicationThis topic shows the exemplary setup of the Policy Agent to secure communication for the CIM server.
For a more detailed explanation about Policy Agent AT-TLS policy see z/OS Communications Server: IP Configuration Guide about Policy Agent and policy applications and Application Transparent Transport Layer Security (AT-TLS) policy statements. Prerequisite: Common certificate setupTo enable AT-TLS to secure the communication, a valid server certificate, the associated server private key, and the certificate of trusted Certificate Authority's (CA) are needed. These examples are using a key ring named CFZCIMServerRing to store these credentials. This key ring must be accessible by the CIM server user ID (e.g. CFZSRV), and the server certificate must be the default certificate. For a sample setup with RACF®, see z/OS Security Server RACF Security Administrator’s Guide about RACF and digital certificates, implementation scenario 1 or 2. For handling certificates and key rings, please refer to the documentation of your SAF product. SSL protection onlySimple SSL protection means that the communication between the client and the server is encrypted without having established a trust relationship between the client and the server. So the client still needs to send a user ID and a password for authentication. Note:
It is important to understand that it will
not be sufficient to configure AT-TLS for SSL encryption for the
communication. You also must configure the CIM server's HTTPS port. To set up AT-TLS with simple SSL protection for the CIM server, a policy for the Communications Server Policy Agent has to be created that restricts AT-TLS to the CIM server port 5989 and to inbound TCP/IP communication.
SSL protection including certificate based authenticationSince the CIM server is aware of AT-TLS, you can use SSL secured communications and certificates based authentication between the CIM client and the CIM server. The CIM server queries AT-TLS if the client is identified by a client certificate and mapped to a local user ID. Authentication based on SSL certificates means:
No user ID and password have to be provided by the client. All subsequent authorization checking is done with the mapped user ID. The CIM client sends an SSL certificate to AT-TLS, AT-TLS sends the certificate to RACF and RACF associates the certificate to the appropriate user ID, which then can access the CIM server. Vice versa, the CIM server returns its responses to client requests using SSL certificates. This method of authentication provides more security than sending user IDs and passwords between client and server. If you want to use this enhanced method based on certificates, you must create the inbound/outbound rules as follows:
SSL protected indication deliveryThis topic shows an exemplary setup for the usage of RACF to deliver secured indications with AT-TLS. Delivering secured indications from the CIM server to an indication listener means that the CIM server establishes an encrypted connection to deliver indications. Whether a trusted relationship is established or not depends on the listener configuration. In case a trusted relationship is established, the CIM server is a client to the indication listener and therefore an outbound policy has to be specified with AT-TLS. To deliver secured indications, the job name of the CIM server and the port specified in the indication handler destination property must match. An indication is defined by the application programmer so there has to be an agreement between the application programmer and the system programmer that port secured indications are sent from the CIM server to the indication listeners.
|
Copyright IBM Corporation 1990, 2014 |