+

Search Tips   |   Advanced Search

(ZOS) Secure Sockets Layer security for WAS for z/OS

This topic assumes we understand the SSL protocol and how cryptographic services system SSL works on z/OS . SSL is used by multiple components within WebSphere Application Server to provide trust and privacy. Such components include the built-in HTTP transport, the Object Request Broker (ORB) (client and server), and the secure LDAP client. Configuring SSL is different between client and server with WAS. If we want the added security of protected communications and user authentication in a network, we can use SSL security.

SSL is an integral part of the security provided by WAS for z/OS. It is activated when administrative security is enabled. When administrative security is enabled, SSL is always used by the administrative subsystem to secure administrative commands, the administration console, and communications between WAS processes.

The WAS for z/OS runtime can optionally use SSL when server security is enabled in these cases:

When configuring SSL, there are two types of SSL repertoires on WAS for z/OS. The type of repertoire relates to the underlying services used to process SSL.

All SSL configuration repertoires of the System Secure Sockets Layer (SSSL) type, except those that belong to the daemon, are converted to the JSSE type. System SSL is now only used by the Daemon Address Space because the daemon runs without a JVM and JSSE is only supported in Java.

This topic gives a brief explanation of the SSL protocol and how SSL works on z/OS. For information about the SSL protocol, go to the following website: http://home.netscape.com/eng/ssl3/ssl-toc.html

SSL is used by multiple components within WAS to provide trust and privacy. These components are the built-in HTTP Transport, the ORB (client and server), and the secure LDAP client. Configuring SSL is different between client and server with WAS. If we want the added security of protected communications and user authentication in a network, we can use SSL security. The SSL support in WAS for z/OS has several objectives:

SSL is disabled by default and SSL support is optional. If we are running WAS for z/OS with security turned on, SSL is required by the administrative console. JSSE is the SSL repertoire type used.

Stage Description
Negotiation After the client locates the server, the client and server negotiate the type of security for communications. If SSL is to be used, the client is told to connect to a special SSL port.
Handshake The client connects to the SSL port and the SSL handshake occurs. If successful, encrypted communication starts. The client authenticates the server by inspecting the server's digital certificate.

If client certificates are used during the handshake, the server authenticates the client by inspecting the client's digital certificate.

Ongoing communication During the SSL handshake, the client and server negotiate a cipher spec to be used to encrypt communications.
First client request The determination of client identity depends upon the client authentication mechanism chosen, which is one of the following:

  • CSIv2 user ID and password (GSSUP)
  • CSIv2 asserted identity


Rules

Tip: To define SSL basic authentication security, first request a signed certificate for the server and a certificate authority (CA) certificate from the certificate authority that signed the server certificate. After we have received a signed certificate for the server and a CA certificate from the certificate authority, we must use RACF to authorize the use of digital certificates, store server certificates, and server key rings in RACF, create an SSL repertoire alias, and define SSL security properties for the server through the administrative console.

For clients, create a key ring and attach to it the CA certificate from the certificate authority that issued the server's certificate. For a z/OS client, we must use RACF to create a client key ring and to attach the CA certificate to that key ring. For the client to authenticate the server, the server (actually, the controller user ID) must possess a signed certificate created by a certificate authority. The server passes the signed certificate to prove its identity to the client. The client must possess the CA certificate from the same certificate authority that issued the server's certificate. The client uses the CA certificate to verify that the server's certificate is authentic. After the certificate is verified, the client can be sure that messages are truly coming from that server, not someone else. For the server to authenticate the client, note that there is no client certificate that the client passes to prove its identity to the server. In the SSL basic authentication scheme, the server authenticates the client by challenging the client for a user ID and password (or password phrase).

See Set up a keyring for use by Daemon Secure Sockets Layer for information on creating a keyring for the daemon's MVS user ID.


Subtopics


Related:

  • WAS security for z/OS