Configure the server to accept SSL connections before you enable SSL communication from
the server to a client, a storage agent, or another server.
Procedure
- Specify the port on which the server waits for client communications that are enabled for SSL
or accept the default port number. Optionally, update the dsmserv.opt file in
the server instance directory by specifying the TCPPORT or
TCPADMINPORT options, or both. The SSLTCPPORT and
SSLTCPADMINPORT options can be used for SSL-only connections.
- Create the server key database by starting the server. The server key database file,
cert.kdb, is stored in the server instance directory, and the default
certificate label is automatically set as "TSM Server SelfSigned SHA Key". The certificate is
exported to the cert256.arm file.
- If you are using the default self-signed certificate, the default self-signed certificate
(cert256.arm) file is needed when you connect to the server by using TLS.
- If you are importing a CA signed certificate, complete the following steps:
- Import a unique certificate that is signed by a CA on each server that enables SSL. You can
import both a root and intermediate CA signed certificate. The same CA-signed
certificate is used for each server. Log on to the IBM Spectrum Protect™ server system with
the instance user ID and issue the following example command from the instance directory:
gsk8capicmd_64 -cert -add -db cert.kdb -stashed -label "CA cert" -file ca.crt
- To import an intermediate CA signed certificate, issue the following example command:
gsk8capicmd_64 -cert -add -db cert.kdb -stashed
-label "Intermediate CA cert" -file intca.crt
- The root and intermediate certificates (ca.crt and
intca.crt) are needed when you connect the server by using TLS.
- On the server, create a certificate request for the CA to sign by issuing a command that is
similar to the following example:
gsk8capicmd_64 -certreq -create -db cert.kdb -stashed -label "CA cert"
-sigalg sha256 -size 2048 -ku "digitalSignature,keyEncipherment,keyAgreement"
-eku "clientAuth,serverAuth" -dn "CN=tucson.example.com,OU=Spectrum Protect,O=IBM"
-san_dnsname tucson.example.com -san_ipaddr 9.11.0.0 -file cert_request.csr
- To receive the signed certificate and make it the default for communicating with clients, issue
the following example command:
gsk8capicmd_64 -cert -receive -db cert.kdb -stashed -file cert_signed.crt
-default_cert yes
- If you made any changes, restart the server.
What to do next
Enable SSL communication from a client, a storage agent, or another server to this server.
To complete the following tasks, you must have the server's certificate and the port number that is
defined for the server.
- To enable SSL communication from a client to this server, see Configuring IBM Spectrum Protect client/server communication with Secure Sockets Layer.
- To enable SSL communication from another server to this server, see Configuring the server to connect to another server by using SSL.
- To enable SSL communication from a storage agent to this server, see Configuring a storage agent to use SSL.
- To enable SSL communication from the Operations Center to this server, see Configuring the Operations Center to connect to the hub server by using SSL.