Fix Readme
Abstract
This page contains information about the fix packs that are released for IBM Security Key Lifecycle Manager Version 4.0.0.0.
Before you install a fix pack, you must have previously installed the base version (4.0.0.0) of the product. Fix packs are cumulative and contain all updates released prior to the fix pack.
Content
IBM Security Key Lifecycle Manager Version 4.0.0 Fix Pack 3 (4.0.0.3)
Refer to the Readme for details about the fixed issues, and for instructions to download and apply the fix pack.
IBM Security Key Lifecycle Manager Version 4.0.0 Fix Pack 2 (4.0.0.2)
Refer to the Readme for details about the fixed issues, and for instructions to download and apply the fix pack.
IBM Security Key Lifecycle Manager Version 4.0.0 Fix Pack 1 (4.0.0.1)
Refer to the Readme for details about the fixed issues, and for instructions to download and apply the fix pack.
IBM Security Key Lifecycle Manager Version 4.0.0.1 offers the following enhancements:
- New REST API to update multiple client certificates as per WWNN
- Support for checking chain of trusted certificates
- New unique return code for KMIP requests from untrusted clients
- Simplified authentication and authorization step in using the Swagger UI
The documentation to support the base version of the release is available in the IBM product documentation.
New REST API to update multiple client certificates as per WWNN
- Open a REST client.
- Obtain a unique user authentication identifier to access IBM Security Key Lifecycle Manager REST services. For more information about the authentication process, see Authentication process for REST services.
- Run the Bulk Certificate Update REST Service.
Bulk Certificate Update REST Service
Use Bulk Certificate Update REST Service to update communication certificates for client devices that have the same WWNN (worldwide node name) value as in the new certificate. For example, you can run this REST service to update certificates for devices in multiple PEER_TO_PEER device groups.
- Operation
PUT- URL
- https://<host>:<port>/SKLM/rest/v1/certificates/bulkCertUpdate/
By default, IBM® Security Key Lifecycle Manager server listens to nonsecure port 9080 (HTTP) and secure port 9443 (HTTPS) for communication. During IBM Security Key Lifecycle Manager installation, you can modify these default ports.
Request
| Parameter | Description |
|---|---|
| host | Specify the IP address or host name of the IBM Security Key Lifecycle Manager server. |
| port | Specify the port number on which the IBM Security Key Lifecycle Manager server listens for requests. |
| Header name | Value |
|---|---|
| Content-Type | multipart/form-data |
| Accept | application/json |
| Authorization | SKLMAuth userAuthId=<authIdValue> |
| Accept-Language | Any valid locale that is supported by IBM Security Key Lifecycle Manager. For example: en or de |
| Parameter name | Description |
|---|---|
| fileName | Required. Specify the new certificate file. Ensure that the certificate is trusted in IBM Security Key Lifecycle Manager. |
Response
| Header name | Value and description |
|---|---|
| Status Code |
|
| Content-Type | application/json |
| Content-Language | Locale for the response message. |
JSON object with the following specification:
| JSON property name | Description |
|---|---|
| code | Returns the code that is specified by the status property. |
| status | Returns the status message to indicate whether the certificate is updated or not.
|
JSON object with the following specification.
| JSON property name | Description |
|---|---|
| code | Returns the application error code. |
| message | Returns a message that describes the error. |
Example
- Service request to update certificates
-
PUT https://localhost:<port>/SKLM/rest/v1/certificates/bulkCertUpdate Content-Type: multipart/form-data; boundary=---------------------------293582696224464 Authorization: SKLMAuth userAuthId=139aeh34567m -----------------------------293582696224464 Content-Disposition: form-data; name="fileName"; filename="clientcert.cer" <File Content> -----------------------------293582696224464 -
- Success response
-
{ "code": "0", "status": "CTGKM3491I Device communication certificates are updated. " } -
{ "code": "CTGKM3490E", "status": "CTGKM3490E Failed to update the communication certificates because the new certificate file is invalid." }
Support for checking chain of trusted certificates
When you add the device root certificate to the truststore, all devices with client communication certificates that are signed by this root certificate are automatically trusted. Clients or devices with multiple intermediate signed certificates but a common root certificate authority (CA) can get their client communication certificates trusted by adding only the device root certificate in the truststore.
The chainOfTrustEnabled property specifies whether to trust a client certificate that has the root certificate, from its trust chain, already trusted in the IBM Security Guardium Key Lifecycle Manager server.
chainOfTrustEnabled={true|false}
-
Values true | falseOn a new installation of IBM Security Guardium Key Lifecycle Manager, the value is set tofalse.Set the property-value pair aschainOfTrustEnabled=trueto automatically trust client communication certificates for clients or devices with multiple intermediate signed certificates but a trusted device root certificate.Required or Optional Optional Default false Example chainOfTrustEnabled=true
New unique return code for KMIP requests from untrusted clients
When the communication certificate in a KMIP request has the registered WWNN value but the certificate is not trusted by the server, the following new error message is displayed:
CTGKM3497E Failed to complete the KMIP request. The communication certificate has the registered WWNN value but is not trusted by the server. Use a trusted certificate and retry the operation.
Explanation
System action
The KMIP operation fails.Administrator response
Simplified authentication and authorization step in using the Swagger UI
The high-level step 2 in the procedure to use the Swagger UI is now simplified.
Here is the updated procedure:
- Access the Swagger UI.
In any browser, enter the following URL:
Where, host is the IP address of the host where the IBM Security Key Lifecycle Manager server is installed.https://host:9443/ibm/SKLM/swagger - Authenticate and authorize the REST API operations.
- Click Authorize.
- In the Authorization window, specify the login credentials, and click Login.
- Click Authorize and you can close the window.
All the IBM Security Key Lifecycle Manager REST APIs are now authorized. You can now run and test any REST API.
- Run a REST API.
- Expand the method for the REST API that you want to run.
- Click Try it out.
- Specify the required parameters and click Execute.
- Review the response.
Fix Pack Readme File
Was this topic helpful?
Document Information
Modified date:
02 March 2022
UID
ibm12464551