See Secure Sockets Layer for an overview of how Secure Sockets Layer (SSL) is used to provide secure connections between WebSphere Application Server clients and servers. When and why to perform this task
After installation, the administrative console HTTPS port and other server ports are configured to use digital certificates that are shipped with the product. Using the default certificates is not safe and you need to replace the default keystore and truststore files as soon as possible. However, it is more secure if you first enable global security and complete this and other configuration tasks after global security is enforced.
iSeries only: Install the Web server plug-ins component on your administrative workstation. Next, map a drive from your administrative workstation to the iSeries system where the application server is installed to use iKeyman to manage keystore files on your iSeries system.
keystore file | public certificate file |
---|---|
appServerKey.jks | appServer.arm |
appClientKey.jks | appClient.arm |
As you create each keystore file, also create a personal self-signed certificate and extract the public certificate to the corresponding public certificate file. For example:
Note: When creating appServerKey.jks and appClientKey.jks, use JKS as the key database type.
Note: Instead of using self-signed certificates you can request certificates from a Certificate Authority (CA).
truststore file | public certificate file |
---|---|
appServerTrust.jks | appClient.arm |
appClientTrust.jks | appServer.arm |
appPluginKey.kdb | appServer.arm |
As you create each truststore file, also delete all of the default signers and add the public certificates for the signers to be trusted. For example:
Note: When creating appPluginKey.kdb, use CMS as the key database type and when prompted for the password select stash the password to a file.
Important: Also, copy the stash (.sth) file created with your CMS keystore. For example, copy appPluginKey.sth to profile_root/etc.
Important: For Network Deployment edition only, each node in the cell contains a default SSL repertoire. Be sure to replace the keystore and truststore files in the SSL repertoires of all nodes in the cell.
Note:For Network Deployment, edit the profile_root/properties/sas.client.props and profile_root/properties/soap.client.props files for the deployment manager and each federated node.
Note: You can use the PropFilePasswordEncoder script to encode plain text passwords in properties files. Refer to Protecting plain text passwords.
Important: Do not restart the deployment manager before you complete the steps for changing the default Secure Sockets Layer repertoire key files for the federated nodes. If you restart the deployment manager before you change the default SSL key files for the federated nodes, the deployment manager cannot communicate with the federated nodes with global security enabled. To fix this, revert the deployment manager default SSL key files back to the original key and trust files and restart the deployment manager.
Note: All WebSphere clients that are running must also be restarted
Note: Skip this step if no Web server is configured for the cell.
Note: SSL is enabled for the Web server plug-in in the default configuration.
Result
The default keystores and truststores are replaced in the SSL configuration protecting the administrative console HTTPS port and in all other default SSL configurations in the cell.
Other than replacing the default keystore and truststore files, the SSL configuration within the cell remains unchanged. If additional SSL configuration changes are required see Configuring Secure Sockets Layer.