Configure inbound transports
By using this configuration, we can configure a different transport for inbound security versus outbound security.
Inbound transports refer to the types of listener ports and their attributes that are opened to receive requests for this server. Both Common Secure Interoperability Specification, v2 (CSIv2) and Secure Authentication Service (SAS) have the ability to configure the transport.
Important: SAS is supported only between v6.0.x and previous version servers that have been federated in a v6.1 cell.
(ZOS) Inbound transports refer to the types of listener ports and their attributes that are opened to receive requests for this server. Both Common Secure Interoperability Specification, v2 (CSIv2) and z/OS Secure Authentication Service (z/SAS) have the ability to configure the transport.
Important: z/SAS is supported only between v6.0.x and previous version servers that have been federated in a v6.1 cell.
However, the following differences between the two protocols exist:
- CSIv2 is more flexible than SAS, which requires SSL; CSIv2 does not require SSL.
- SAS does not support SSL client certificate authentication, while CSIv2 does.
- CSIv2 can require SSL connections, while SAS only supports SSL connections.
- SAS always has two listener ports open: TCP/IP and SSL.
- CSIv2 can have as few as one listener port and as many as three listener ports. We can open one port for just TCP/IP or when SSL is required. We can open two ports when SSL is supported, and open three ports when SSL and SSL client certificate authentication is supported.
(ZOS) CSIv2 and z/SAS support most of the same functions. CSIv2 has the advantage of interoperability with other WebSphere Application Server products and any other platforms that support the CSIv2 protocol.
Configure the Inbound transport panels in the administrative console:
Tasks
- Click Security > Global security.
- Under RMI/IIOP security, click CSIv2 inbound communications.
- Under Transport, select SSL-required. We can choose to use either SSL, TCP/IP or both as the inbound transport that a server supports. If we specify TCP/IP, the server only supports TCP/IP and cannot accept SSL connections. If we specify SSL-supported, this server can support either TCP/IP or SSL connections. If we specify SSL-required, then any server that is communicating with this one must use SSL.
- Click Apply.
- Consider fixing the listener ports that we configured.
You complete this action in a different panel, but think about this action now. Most endpoints are managed at a single location, which is why they do not display in the Inbound transport panels. anaging end points at a single location helps you decrease the number of conflicts in the configuration when we assign the endpoints. The location for SSL end points is at each server. The following port names are defined in the End points panel and are used for Object Request Broker (ORB) security:
- (iSeries) CSIV2_SSL_MUTUALAUTH_LISTENER_ADDRESS - CSIv2 Client Authentication SSL Port
- (iSeries) CSIV2_SSL_SERVERAUTH_LISTENER_ADDRESS - CSIv2 SSL Port
- (iSeries) SAS_SSL_SERVERAUTH_LISTENER_ADDRESS - SAS SSL Port
- ORB_SSL_LISTENER_ADDRESS - SSL Port
- (iSeries) ORB_LISTENER_PORT - TCP/IP Port
- ORB_LISTENER_ADDRESS - IIOP port
For an application server, click Servers > Application servers > server. Under Communications, click Ports. The Ports panel is displayed for the specified server.
(Dist) For a node agent, go to System administration > Node agents > node. Under Additional properties, click Ports. The Ports panel for the node agent and deployment manager already are fixed, but we might consider reassigning the ports. For the deployment manager, click System Administration > Deployment manager. Under Additional properties, click Ports.
The Object Request Broker (ORB) on WAS uses a listener port for Remote Method Invocation over the Internet Inter-ORB Protocol (RMI/IIOP) communications, and is statically specified using configuration dialogs or during migration. (ZOS) The ORB_LISTENER_ADDRESS and the BOOTSTRAP_ADDRESS must specify the same port. If we are working with a firewall, specify a static port for the ORB listener and open that port on the firewall so that communication can pass through the specified port. The endPoint property for setting the ORB listener port is: ORB_LISTENER_ADDRESS.
In the WAS ND environment, the ORB_LISTENER_ADDRESS end point is specified on the node agent. The location service daemon resides on the node agent and piggybacks onto the ORB listener port, which results in needing the port fixed. Also, we must add the ORB_LISTENER_ADDRESS to the other application servers to set their ORB listener port. Each ORB has a distinct listener port. In WAS ND, specify a different listener port. For example, we might specify the following ports:
- Node agent: ORB_LISTENER_ADDRESS=9000
- Server1: ORB_LISTENER_ADDRESS=9811
- Server2: ORB_LISTENER_ADDRESS=9812
Federated servers can run without the node agent running. When ORB_LISTENER_ADDRESS is set to a value of (0) or greater, the server does not depend on the location service daemon to redirect connections to the server. When we set ORB_LISTENER_ADDRESS, all object references in the namespace specify the connection to the server, not the location service daemon. When the server is running without the node agent, all applications must be accessed through the name server that runs on the application server. The client must change the Java Naming Directory Interface (JNDI) reference to use the host and port of the application server.
ORB_LISTENER_ADDRESS
value = 0 The server starts on any available port and does not use the location service daemon. value > 0 The server starts on the port specified by the value you enter. The location service daemon is not used. Work load management might not work without the node agent running.
(ZOS) Complete the following steps using the administrative console to specify the ORB_LISTENER_ADDRESS port or ports.
Complete the following steps for the node agent and the deployment manager.
- Click Servers > Application Servers > server. Under Communications, click Ports > New.
- Select ORB_LISTENER_ADDRESS from the Port name field in the Configuration panel.
- (iSeries) Enter the IP address, the fully qualified Domain Name System (DNS) host name, or the DNS host name by itself in the Host field. For example, if the host name is myhost, the fully qualified DNS name can be myhost.myco.com and the IP address can be 155.123.88.201.
- Enter the IP address or "*" in the Host field. For example the IP address can be 155.123.88.201.
Important: DNS host names are not supported for the ORB_LISTENER_ADDRESS value.
- Enter the port number in the Port field. The port number specifies the port for which the service is configured to accept client requests. The port value is used with the host name. Using the previous example, the port number might be 9000.
- (iSeries) Click Security > Global security. Under RMI/IIOP security, click CSIv2 inbound communications. Select the SSL settings used for inbound requests from CSIv2 clients> Apply. The CSIv2 protocol is used to inter-operate with previous releases. When configuring the keystore and truststore files in the SSL configuration, these files need the right information for inter-operating with previous releases of WAS.
- Click Security > Global security. Under RMI/IIOP security, click z/SAS authentication to select the SSL settings used for inbound requests from z/SAS clients.
The inbound transport configuration is complete. With this configuration, we can configure a different transport for inbound security versus outbound security. For example, if the application server is the first server used by users, the security configuration might be more secure. When requests go to back-end enterprise bean servers, we might lessen the security for performance reasons when you go outbound. With this flexibility, we can design the right transport infrastructure to meet our needs.
What to do next
When we finish configuring security, perform the following steps to save, synchronize, and restart the servers:
- Click Save in the administrative console to save any modifications to the configuration.
- Synchronize the configuration with all node agents.
- Stop and restart all servers, when synchronized.
Subtopics
- Secure Authentication Service inbound transport settings
Specify transport settings for connections that are accepted by this server using the Secure Authentication Service (SAS) authentication protocol. The SAS protocol is used to communicate securely to enterprise beans with previous releases of the application server.- z/OS Secure Authentication Service settings
Specify authentication settings for requests received and sent by a server that uses the z/OS authentication protocol. Use the z/OS Secure Authentication Service (z/SAS) protocol to communicate securely to enterprise beans.
Configure CSIv2 inbound and outbound communication settings Configure inbound messages Configure outbound messages Ports settings