Setting up secure communication for UMS
By default, Unified Management Server encrypts data that it passes to Zowe using a self-signed certificate. You can use a different certificate by specifying the location of the certificate keystore in z/OS® UNIX System Services and then running a Unified Management Server script. Follow steps in this task if you did not configure your own certificate when you installed Unified Management Server and want to use a custom certificate.
Before you begin
Using a key ring as a keystore
- Know the PARMLIB member that contains the Unified Management Server configuration parameters. This was first edited when you installed Unified Management Server. The default is IZP.PARMLIB(IZPUMSPM). .
- If you self-generated your server certificate and you want to
enable client authentication, your server certificate must contain the TLS
Web Client Authentication (
1.3.6.1.5.5.7.3.2) value in the extended key usage section. Also, the digital signature and key agreement must be set as extension value in the key usage section.
<zowe_started_task_id> in the example
below. RACDCERT CONNECT(ID(<zowe started task id>) LABEL(‘<SERVER_CERTIFICATE_LABEL>’) RING(<RINGNAME>) USAGE(PERSONAL) DEFAULT) ID(<zowe started task id>)
RACDCERT CONNECT(CERTAUTH LABEL(‘<CA_LABEL>’) RING(<RINGNAME>) USAGE(CERTAUTH)) ID(<zowe started task id>)
SETROPTS RACLIST(DIGTCERT,DIGTRING) REFRESH
Using a file-based keystore
You can use a different certificate by specifying the location of the certificate keystore in z/OS UNIX System Services and then running a Unified Management Server script.
- Make sure that you did not already configure Unified Management Server to use your certificate when you installed it. If you specified the certificate keystore location in the IZP_UMS_CERTIFICATE_DIR parameter before you installed Unified Management Server, you do not need to follow these steps.
- Place the certificate or keystore that you want to use in z/OS UNIX and note the location.
- If your certificate is in a keystore, obtain the keystore password.
Procedure
What to do next
- Using a file-based keystore
If you are using a file-based keystore with UMS, ensure that SQL Tuning Services started task user ID has read permissions on the UMS truststore file.
- Using a key ring as a truststore
If you are using key rings with UMS, SQL Tuning Services started task user ID also needs access to read the UMS key ring. You can select one of the following options:
- Define and permit
UPDATEonIRR.DIGTCERT.LISTRINGin classFACILITYto SQL Tuning Services. This action permits those user IDs the authority to read any key ring on the system. - Define and permit
CONTROLon<UMS keyring owner>.<UMS keyring name>.LSTin classRDATALIBto the UMS and SQL Tuning Services started task user IDs. - Create the connection profiles outside UMS and pass the name of a truststore already used for SQL Tuning Services started tasks. Make sure to connect the appropriate Db2 Root CAs to the key rings so the services can connect securely to Db2.
- Define and permit