To enable SSL there are two different components that must be configured to completely secure the communication channel.
You can configure the Role Mapping Administrator to have an SSL connection to the Identity Vault. The following explains how to configure the Role Mapping Administrator to use SSL.
Select
during the configuration of the Role Mapping Administrator.Specify the LDAP port for SSL on the Identity Vault during the configuration of the Role Mapping Administrator.
If you have a self-signed certificate, proceed to Step 5. Otherwise, continue with Step 4 to create a self-signed certificate in iManager.
Export a self-signed certificate from the certificate authority in the Identity Vault:
From iManager, in the
view, click .Select the certificate authority object for the Identity Vault, then click
.It is usually found in the Security container and is named something like TREENAME CA.Security.
Click
.Click
.When you are asked if you want to export the private key with the certificate, click
, then click .Select either
or for the certificate, then click .The Role Mapping Administrator uses a Java-based keystore or trust store, so you can choose either format.
Click
.Browse to a location on your computer where you want to save the file, then click
.or
Click
to save the file to the default location.Different browsers act differently.
Click
.Import the self-signed certificate into the Role Mapping Administrator’s trust store.
Use the keytool executable that is included with any Java JDK*.
For more information on keytool, see Keytool - Key and Certificate Management Tool
.
Import the certificate into the Role Mapping Administrator’s trust store or by entering the following command at a command prompt:
keytool -import -file name_of_cert_file -trustcacerts -noprompt -keystore filename -storepass password
For example:
keytool -import -file tree_ca_root.b64 -trustcacerts -noprompt -keystore cacerts -storepass changeit
The trusted certificate must be imported into the trust store of the JRE* that launches the Role Mapping Administrator.
To finish enabling SSL, you need to configuring Tomcat for an SSL connection. For more information, see the Apache* Tomcat Documentation Web site.
Create a certificate with the following command.
JDK_HOME/bin/keytool -genkey -alias tomcat -keyalg RSA
The default file name is $HOME/.keystore, which is the default keystore for Tomcat.
Edit the server.xml file to enable Tomcat for TLS communication. The file is located in /installation_directory/tomcat/conf/serrver.xml.
Locate the following section of the server.xml and unremark the section to enable SSL for Tomcat.
<Connector port="8444" protocol="HTTP/1.1" SSLEnabled="true" maxThreads="150" scheme="https" secure="true" clientAuth="false" sslProtocol="TLS" keystoreFile="/path_to_keystore" keystorePass="password" />
Add the correct path to the keystore file and the correct password for your environment.
Restart Tomcat.