WPG Security
WPG Security
WPG Security
MICHAEL GLENN
Level 2 Support
WebSphere Partner Gateway
Agenda
Creating Certificates With Ikeyman
Exporting/Importing/Extracting Certificates With Ikeyman
Managing Certificates Prior To Version 6.1.1
Changes In Certificate Management in Version 6.1.1 and Later
Certificate Load Wizard
Troubleshooting
Useful Links
Summary
References
Questions and Answers
Select Personal
Certificates
Press Ok
Click on New
Press Ok
Exporting/Importing/Extracting Certificates
Using Ikeyman
Importing CA Certificate
Select Personal
Certificates
Highlight Certificate
Click on Export/Import
Press Ok
Press Ok
Select Personal
Certificates
Highlight Certificate
Press Ok
Send Certificate to
Participant
Click on Add
Press OK
Encryption / Decryption
Client/Server Authentication
Setting Up Encryption/Decryption
Inbound
Load company.p12 as
Hub Operator’s PKCS12
Encryption certificate.
Outbound
Load Participant certificate
in the Participant profile as
encryption certificate. If
signed by a CA, install the
CA certificate in the Hub
Operator profile, as root.
Inbound
Load Participant.der
in the Participant
profile as digital
signature certificate.
If
signed by a CA,
install the CA
certificate in the Hub
Operator profile, as
root.
Enable “AS Signed”
in the Participant
Connection
Outbound
Load company.p12
as Hub Operator’s
PKCS12 digital
signature certificate.
Send public
certificate to the
Participant
Inbound
Import company.p12 to
the receiver.jks keystore.
Note: Starting with 6.1 the
receiver.jks is renamed to
bcgSecurityTrust.jks
Outbound
Load Participant certificate
as Hub Operator’s root
certificate
Inbound
Load Participant certificate (CA
or self-signed) in ReceiverTrust.jks
Note: Starting with 6.1 the receiver.jks
is renamed to bcgSecurityTrust.jks
Run bcgClientAuth script to
enable Client SSL
Turn Client Authentication ON:
bcghub/was/bin/wsadmin.sh –f
bcghub/scripts/bcgClientAuth.jacl -
conntype NONE set
Turn Client Authentication OFF:
bcghub/was/bin/wsadmin.sh –f
bcghub/scripts/bcgClientAuth.jacl -
conntype NONE clear
Outbound
Load company.p12 as Hub Operator
PKCS12 ‘SSL Client’ Certificate
What’s New
All new wizard to simplify loading and configuring
certificates.
New Features
Certificates can be associated to internal partner’s.
Multiple certificates can be loaded for same usage, e.g. Digital
Signature.
Certificate sets to group primary and secondary certificates.
Ability to vary certificates based on
– Partner Pair
– Operation Mode
– Package
Global settings for Internal partner.
Where-Used capability for Certificates and Certificate Sets.
Validate function in console, to validate certificates.
Multiple Certificates
In prior versions , Internal partners could have one
set of active certificates.
Now, we can load multiple certificates for internal
partner for different Certificate Usage (Sign / Encrypt / SSL
Client)
Operation Mode (Production / Test)
It allows user to vary certificates based on
Partner Pair
Operation Mode
Package
Certificate Sets
Introduced in this release to group a primary & secondary
certificate.
User’s associate sets for Sign / Encrypt / Decrypt as
opposed certificates in 6.x.
Set can be marked default so that it is used for ALL possible
combinations of
Receiving partner
Operation mode
Package.
Validate
Allows users to make sure the certificate is valid
by checking
Certificate Expiry
Certificate path validation.
Where-Used
Allows users to lookup participant connections
where a certificate set is used.
Troubleshooting
Resolution:
http://www-01.ibm.com/support/docview.wss?rs=2311&uid=swg21266207
java.lang.SecurityException: Unsupported
keysize or algorithm parameters
Symptom:
java.lang.Exception: java.lang.Exception: java.io.IOException:
Error in loading the keystore: Private key decryption error:
(java.lang.SecurityException: Unsupported keysize or algorithm parameters)
Resolution:
This error is caused by the JCE libraries used by the virtual java’s
machine executing WAS. This JVM is the standard version and it had a
limited support of cryptographic algorithm. To correct this you just
have to substitute two jar files in the configuration of the JVM IBM
(local_policy.jar and US_export_policy.jar).
These files are in the index $JAVA_HOME/jre/lib/security (for example
/usr/lib/jvm/jre-ibm/lib/security or
/opt/IBM/WebSphere/AppServer/java/jre/lib/security).
You can download the non limited libraries from
http://www-128.ibm.com/developerworks/java/jdk/security/142/ (file
unrestrict142.zip)
Useful Links
WPG Support Page:
http://www-01.ibm.com/software/integration/wspartnergateway/
support/
Assist On Site:
http://www-01.ibm.com/support/assistonsite/
Summary
W e discussed how to manage certificates using ikeyman.
View a webcast replay with step-by-step instructions for using the Service Request (SR)
tool for submitting problems electronically:
http://www.ibm.com/software/websphere/support/d2w.html
Sign up to receive weekly technical My Notifications emails:
http://www.ibm.com/software/support/einfo.html