IBM Tivoli Monitoring > Version 6.3 Fix Pack 2 > Administrator's Guide > Securing communications

IBM Tivoli Monitoring, Version 6.3 Fix Pack 2


Configure TLS/SSL communication with the Authorization Policy Server

To use HTTPS, you can configure TLS/SSL communication with the Tivoli Authorization Policy Server.

There are two IBM Tivoli Monitoring components which communicate with the Authorization Policy Server using either Hypertext Transfer Protocol (HTTP) or Hypertext Transfer Protocol Secure (HTTPS):

HTTPS is intended to run on top of Transport Layer Security (TLS) or its predecessor Secure Sockets Layer (SSL). These layers provide encryption using key exchanges.


Roadmap

In order to use HTTPS and its security encryption features, complete the following tasks in the roadmap.

The following instructions assume that the portal server and the tivcmd CLI send requests directly to the IBM Dashboard Application Services Hub application server, and not to a HTTP server that might be used in conjunction with the dashboard hub. If you are using a HTTP server with IBM Dashboard Application Services Hub, then you must also update the certificates that the HTTP server uses.


Roadmap for setting up TLS/SSL for the Authorization Policy Server

Step Description and information provided
1 Use the WebSphere Application Server administrative console for the Dashboard Application Services Hub where the Authorization Policy Server is installed, you can choose one of the following options to obtain a public-private key pair:

2 At each tivcmd Command-Line Interface for Authorization Policy installation:

  1. Create a new clean key database.

  2. Add the public signer certificate used by the Authorization Policy Server to the new key database.

  3. Set an environment variable to enable validation of the server certificate. By default, HTTPS used between the tivcmd CLI and the Authorization Policy Server does not exchange certificates or use security encryption. This environment variable must be set to make this happen.

Follow the steps in Configure the tivcmd CLI for TLS/SSL.

3 At each portal server configured to communicate with the Authorization Policy Server, add the public signer certificate used by the Authorization Policy Server to the TEPS/e trust store. Follow the steps in Configure TLS/SSL communication between the portal server and the Authorization Policy Server.
4 Use the -s argument for the tivcmd login command to indicate that the HTTPS protocol is used when sending requests to the Authorization Policy Server.

If the tivcmd CLI environment variable ITM_AUTHENTICATE_SERVER_CERTIFICATE is set to Y, then the tivcmd CLI will validate the certificate of the Authorization Policy Server before accepting the connection. The public key of the Authorization Policy Server must be imported into the client keystore.


Parent topic:

Securing communications

+

Search Tips   |   Advanced Search