See these topics for instructions on configuring SSL for WebSphere Application Server:
Note: For these steps, it is assumed that you have a network drive mapped from your workstation to your iSeries system.
Configure SSL for WebSphere plug-ins
A WebSphere plug-in interfaces with a Web server to handle client requests for server-side resources and routes them to the application server for processing. WebSphere Application Server includes plug-ins for IBM HTTP Server for iSeries and Domino Web Server for iSeries.
After SSL is working between your browser and Web server, proceed to configure SSL between the Web server plug-in and the WebSphere Application Server product. This is not required if the link between the plug-in and application server is known to be secure or if your applications are not sensitive. If privacy of application data is a concern, however, this connection should be an SSL connection.
Using the product-provided certificates to configure SSL for WebSphere plug-ins
WebSphere Application Server Version 6 application server instances contain an SSL key file. The pathname for the key file is user_root/profile_name/etc/plugin-key.kdb, where user_root is your profile installation directory. The default location is /QIBM/UserData/WebSphere/AppServer/V6/edition/profiles.
The plugin-key.kdb file contains a digital certificate. The digital certificate is required for the Web server plug-in to trust the signer of the Web container's certificate when an HTTPS transport is configured with the default SSL repertoire. The default Web container is created with such an HTTPS transport.
This default HTTPS transport should be removed or reconfigured to replace the product-provided certificates before putting the server into production. Using the product-provided certificates to configure SSL for the WebSphere plug-ins significantly reduces configuration complexity, but they should not be used for production servers. The tasks below demonstrate how to create your own certificates. Alternatively, you can obtain certificates from a commercial certificate authority.
Creating an SSL key file for the WebSphere Web server plug-in
The following is an example of how to create an SSL key file for your WebSphere plug-in:
Warning: You may need to renew digital certificates signed by the Digital Certificate Manager local certificate authority before proceeding. See WebSphere Application Server Technical Notes for more information.
/QIBM/UserData/WebSphere/AppServer/V6/edition/profiles/ profile_name/etc/myplugin-key.kdb
The remainder of these instructions refers to the directory above etc as user_root/profile_name.
Use MyPluginCert as the key label. Fill in the other required fields, and then click Continue.
Use SSL configuration repertoires to manage SSL settings for resources in the administrative domain. The default repertoire is DefaultSSLSettings. You can use DefaultSSLSettings for testing or create new SSL configuration repertoires for production applications and associate them with individual resources. For more information, see Creating a Secure Sockets Layer repertoire configuration entry.
Configuring SSL for the application server's HTTPS transport
To configure SSL for the application server's HTTPS transport, first create an SSL key file. The contents of this file depend on whom you want to allow to communicate directly with the application server over the HTTPS port (in other words, you are defining the HTTPS server security policy).
This topic presents a restrictive security policy, in which only a well-defined set of clients (those whose certificates are signed by your local certificate authority) are allowed to connect to the application server HTTPS port. IBM recommends that you follow this security policy when your application's deployment descriptor specifies the use of the client certificate authentication method. The procedure for creating an SSL key file without the default signer certificates conforms to this policy.
To configure SSL for the application server's HTTPS transport, follow these steps:
Step 1: Create an SSL key file without the default signer certificates.
Step 2: Add the signer certificate of the application server to the plug-in's SSL key file.
Step 3: Grant access to the key files.
It is very important to protect your key files from unauthorized access. Set the following protections by using the OS/400 Change Authority (CHGAUT) command:
PROFILE | ACCESS |
---|---|
*PUBLIC | *EXCLUDE |
QEJBSVR | *R |
PROFILE | ACCESS |
---|---|
*PUBLIC | *EXCLUDE |
QTMHHTTP | *RX |
Note: QTMHHTTP is the default user profile for the IBM HTTP Server for iSeries. If your Web server runs under another profile, grant that profile *RX authority for plug-inKeys.kdb instead of QTMHHTTP.
For example, to grant read and execute (*RX) authority for myplugin-key.kdb to the QTMHHTTP user profile, run the Change Authority (CHGAUT) command. For example:
CHGAUT OBJ('/QIBM/UserData/WebSphere/AppServer/V6/Base/profiles/default/etc/myplugin-key.kdb') USER(QTMHHTTP) DTAAUT(*RX)
Step 4: (Optional) Configure an alias for the SSL port
If you have not already configured an alias for your Web server's SSL port in your WebSphere virtual host, do so now.
Step 5: Configure HTTPS transport for the Web container
For more information, see Configure HTTPS transport for your application server's Web container.
Step 6: Modify the Web server plug-in file
Use the administrative console to modify the plugin-cfg.xml file. You must specify the local path to the myplugin-key.kdb file in the plugin-cfg.xml file.
If you want to access the Web server plug-in from the Web server, click Servers --> Web servers --> Web_server_name, and then click the Generate Plug-in option.
The configuration is complete.
As an alternative, you can implement an even more restrictive security policy by configuring the plugin to use a self signed certificate for authenticating to the application server's Web container. Assuming you have successfully completed all steps in the above task, follow these steps to implement this more restrictive policy:
Note: DCM treats self signed certificates as signer certificates and adds the certificate to the list of signer certificates, even though the certificate contains a private key.
Related concepts
Secure Sockets Layer
Related tasks
Managing digital certificates
Creating a Secure Sockets Layer repertoire configuration entry
Related reference
Port number settings in WebSphere Application Server versions