Top
ServerView Resource Orchestrator Cloud Edition V3.0.0 Setup Guide

4.5.6 Updating from Earlier Versions

This section explains the procedure to configure Single Sign-On environments, when upgrading from earlier versions to this version.

The procedure for configuration differs according to the authentication method used for the earlier version. Refer to the following list:

Authentication methods for earlier versions

  1. Internal authentication in ServerView Resource Coordinator VE (hereinafter RCVE)
    (Authentication is not executed using Single Sign-On)

  2. Authentication using Single Sign-On in RCVE

  3. Internal authentication in ROR

  4. Authentication using directory service in ROR

  5. Authentication using Single Sign-On in ROR

  6. Internal authentication in ROR VE

  7. Authentication using Single Sign-On in ROR VE

Table 4.15 Procedure to Configure Single Sign-On Environments from Earlier Versions

Number

Configuration Procedure

A

B

C

D

E

F

G

1

Installing Resource Orchestrator

Yes

Yes

Yes

Yes

Yes

Yes

Yes

2

Registering CA Certificates of ServerView Operations Manager 1

Yes

-

Yes

Yes (*1)

-

Yes

-

3

Registering CA Certificates of ServerView Operations Manager 2

Yes

Yes

Yes

Yes

Yes

Yes

Yes

4

Registering CA Certificate of Individually Configured OpenDS or Active Directory 1 (*1)

Yes

-

Yes

-

-

Yes

-

5

Registering CA Certificate of Individually Configured OpenDS or Active Directory 2 (*1)

Yes

Yes

Yes

Yes

Yes

Yes

Yes

6

Registering Administrators (Privileged Users)

Yes

-

Yes

-

-

Yes

-

7

Setup

Yes

Yes

Yes

Yes

Yes

Yes

Yes

8

Login on the ROR Console

Yes

Yes

Yes

Yes

Yes

Yes

Yes

9

License Setup

Yes

Yes

Yes

Yes

Yes

Yes

Yes

10

Moving Information in the Directory Service Used in Earlier Versions

-

Yes

-

Yes

Yes

-

-

11

Registering Users in the Directory Service

Yes

-

Yes

-

-

Yes

-

12

Registering Directory Service Connection Information in Resource Orchestrator

Yes

-

Yes

-

-

Yes

-

13

Changing Already Registered Directory Service Connection Information

-

-

-

Yes

-

-

-

14

Role Allocation to Tenant Administrator

-

-

Yes

Yes

Yes

Yes

-

15

Configuration after Installation

Yes

Yes

Yes

Yes

Yes

Yes

Yes

16

Importing a Certificate to a Browser

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes: Required, - : Not Required

*1: This procedure is necessary when using OpenDS or an Active Directory that was configured individually.

  1. Installing Resource Orchestrator

    Refer to "Chapter 4 Upgrading from Earlier Versions" in the "Installation Guide VE".

  2. Registering CA Certificates of ServerView Operations Manager 1

    Refer to "4.5.6.1 Registering CA Certificates of ServerView Operations Manager 1".

  3. Registering CA Certificates of ServerView Operations Manager 2

    Refer to "4.5.6.2 Registering CA Certificates of ServerView Operations Manager 2".

  4. Registering CA Certificate of Individually Configured OpenDS or Active Directory 1

    Refer to "4.5.6.3 Registering CA Certificate of Individually Configured OpenDS or Active Directory 1".

  5. Registering CA Certificate of Individually Configured OpenDS or Active Directory 2

    Refer to "4.5.6.4 Registering CA Certificate of Individually Configured OpenDS or Active Directory 2".

  6. Registering Administrators (Privileged Users)

    For details, refer to "4.5.4 Registering Administrators".

  7. Setup

    Set up the manager. Refer to "2.1.4 Setup" in the "Installation Guide CE".

  8. Login on the ROR Console

    Refer to "7.1 Login".

  9. License Setup

    Refer to "License Setup" in "7.1 Login".

  10. Moving Information in the Directory Service Used in Earlier Versions

    Refer to "4.5.6.5 Moving Information in the Directory Service Used in Earlier Versions".

  11. Registering Users in the Directory Service

    Refer to "4.5.6.6 Registering Users in the Directory Service".

  12. Registering Directory Service Connection Information in Resource Orchestrator

    Refer to "4.5.6.7 Registering Directory Service Connection Information in Resource Orchestrator".

  13. Changing Already Registered Directory Service Connection Information

    Refer to "4.5.6.8 Changing Already Registered Directory Service Connection Information".

  14. Allocating Roles to Tenant Administrator

    For details, refer to "4.5.6.9 Allocating Roles to Tenant Administrator".

  15. Configuration after Installation

    Refer to "Chapter 6 Configuration after Installation".

  16. Importing a Certificate to a Browser

    Refer to "7.4 Importing a Certificate to a Browser".


4.5.6.1 Registering CA Certificates of ServerView Operations Manager 1

Use the following procedure to register CA certificates to Resource Orchestrator.

  1. Copy the keystore of Resource Orchestrator.

    [Windows]

    • Files to Copy

      Installation_folder\SVROR\Manager\runtime\jre6\lib\security\cacerts

    • Copy Destination

      Installation_folder\SVROR\Manager\runtime\jre6\lib\security\cacerts.org


    [Linux]

    • Files to Copy

      /opt/FJSVrcvmr/runtime/jre6/lib/security/cacerts

    • Copy Destination

      /opt/FJSVrcvmr/runtime/jre6/lib/security/cacerts.org


    Note

    Ensure that the keystore of Resource Orchestrator is copied, as it will be necessary when changing the directory service.

  2. Import the CA certificate (keystore) of ServerView Operations Manager to the keystore of Resource Orchestrator.

    The CA certificate (keystore) of ServerView Operations Manager is stored in the following location:

    [Windows]
    ServerView Suite_installation_folder\jboss\server\serverview\conf\pki\keystore

    [Linux]
    /opt/fujitsu/ServerViewSuite/jboss/server/serverview/conf/pki/keystore

    Example

    [Windows]

    >C:\Fujitsu\ROR\SVROR\Manager\runtime\jre6\bin\keytool.exe -importkeystore -srckeystore " C:\Program Files\Fujitsu\ServerView Suite \jboss\server\serverview\conf\pki\keystore" -destkeystore "C:\Fujitsu\ROR\SVROR\Manager\runtime\jre6\lib\security\cacerts" <RETURN>

    [Linux]

    # /opt/FJSVrcvmr/runtime/jre6/bin/keytool -importkeystore -srckeystore /opt/fujitsu/ServerViewSuite/jboss/server/serverview/conf/pki/keystore -destkeystore /opt/FJSVrcvmr/runtime/jre6/lib/security/cacerts <RETURN>

    After executing the command, enter the password.
    The password for the keystore of Resource Orchestrator is set to "changeit" by default.

  3. The following messages will be displayed when import is successfully completed.

    Check the "Another name" section.

    Enter destination keystore password: changeit
    Enter source keystore password: changeit
    Entry for Another name svs_cms successfully imported.
    Import command completed: 1 entries successfully imported. 0 entries failed or cancelled.

  4. Execute the keytool command, and check if the CA certificate has been correctly imported.

    For the -alias option, specify the "another name" checked in 3.

    Example

    [Windows]

    >C:\Fujitsu\ROR\SVROR\Manager\runtime\jre6\bin\keytool.exe -list -alias Another_name -keystore " C:\Fujitsu\ROR\Manager\runtime\jre6\lib\security\cacerts" <RETURN>
    Enter keystore password: changeit
    svs_cms, 2010/10/05, PrivateKeyEntry,
    Certificate fingerprints (MD5): C9:3C:8B:8B:C6:BA:67:92:89:70:D1:00:55:A3:CD:6

    [Linux]

    # /opt/FJSVrcvmr/runtime/jre6/bin/keytool -list -alias Another_name -keystore /opt/FJSVrcvmr/runtime/jre6/lib/security/cacerts <RETURN>
    Enter keystore password: changeit
    svs_cms, 2010/10/05, PrivateKeyEntry,
    Certificate fingerprints (MD5): C9:3C:8B:8B:C6:BA:67:92:89:70:D1:00:55:A3:CD:6


4.5.6.2 Registering CA Certificates of ServerView Operations Manager 2

Use the following procedure to register CA certificates to Resource Orchestrator.

  1. Copy the keystore of Resource Orchestrator.

    [Windows]

    • Files to Copy

      Installation_folder\IAPS\JDK5\jre\lib\security\cacerts

    • Copy Destination

      Installation_folder\IAPS\JDK5\jre\lib\security\cacerts.org


    [Linux]

    • Files to Copy

      /opt/FJSVawjbk/jdk5/jre/lib/security/cacerts

    • Copy Destination

      /opt/FJSVawjbk/jdk5/jre/lib/security/cacerts.org

    Note

    Ensure that the keystore of Resource Orchestrator is copied, as it will be necessary when changing the directory service.

  2. Import the CA certificate (keystore) of ServerView Operations Manager to the keystore of Resource Orchestrator.

    The CA certificate (keystore) of ServerView Operations Manager is stored in the following location:

    [Windows]
    ServerView Suite_installation_folder\jboss\server\serverview\conf\pki\keystore

    [Linux]
    /opt/fujitsu/ServerViewSuite/jboss/server/serverview/conf/pki/keystore

    Example

    [Windows]

    >C:\Fujitsu\ROR\SVROR\Manager\runtime\jre6\bin\keytool.exe -importkeystore -srckeystore " C:\Program Files\Fujitsu\ServerView Suite \jboss\server\serverview\conf\pki\keystore" -destkeystore "C:\Fujitsu\ROR\IAPS\JDK5\jre\lib\security\cacerts"<RETURN>

    [Linux]

    # /opt/FJSVrcvmr/runtime/jre6/bin/keytool -importkeystore -srckeystore /opt/fujitsu/ServerViewSuite/jboss/server/serverview/conf/pki/keystore -destkeystore /opt/FJSVawjbk/jdk5/jre/lib/security/cacerts <RETURN>

    After executing the command, enter the password.
    The password for the keystore of Resource Orchestrator is set to "changeit" by default.

  3. The following messages will be displayed when import is successfully completed.

    Check the "Another name" section.

    Enter destination keystore password: changeit
    Enter source keystore password: changeit
    Entry for Another name svs_cms successfully imported.
    Import command completed: 1 entries successfully imported. 0 entries failed or cancelled.

  4. Execute the keytool command, and check if the CA certificate has been correctly imported.

    For the -alias option, specify the "another name" checked in 3.

    Example

    [Windows]

    >C:\Fujitsu\ROR\SVROR\Manager\runtime\jre6\bin\keytool.exe -list -alias Another_name -keystore " C:\Fujitsu\ROR\IAPS\JDK5\jre\lib\security\cacerts"<RETURN>
    Enter keystore password: changeit
    svs_cms, 2010/10/05, PrivateKeyEntry,
    Certificate fingerprints (MD5): C9:3C:8B:8B:C6:BA:67:92:89:70:D1:00:55:A3:CD:6

    [Linux]

    # /opt/FJSVrcvmr/runtime/jre6/bin/keytool -list -alias Another_name -keystore /opt/FJSVawjbk/jdk5/jre/lib/security/cacerts <RETURN>
    Enter keystore password: changeit
    svs_cms, 2010/10/05, PrivateKeyEntry,
    Certificate fingerprints (MD5): C9:3C:8B:8B:C6:BA:67:92:89:70:D1:00:55:A3:CD:6

  5. Import the server certificate to ServerView Operations Manager. For details, refer to "6.3.5 Importing a Certificate to ServerView SSO Authentication Server".


4.5.6.3 Registering CA Certificate of Individually Configured OpenDS or Active Directory 1

When using a directory service that was individually configured, import the CA certificate of the directory service to the keystore of Resource Orchestrator.

When using a directory service other than OpenDS that comes with ServerView Operations Manager, import the CA certificate of the directory service to the keystore of Resource Orchestrator.
The CA certificate format is the DER encoded binary X.509 (CER) format.

Example

  • When Using Active Directory

    >C:\Fujitsu\ROR\SVROR\Manager\runtime\jre6\bin\keytool.exe -importcert -alias rcve_ldap -trustcacerts -file c:\myserver.serverview.local_svsca.crt -keystore "C:\Fujitsu\ROR\SVROR\Manager\runtime\jre6\lib\security\cacerts"
    Enter keystore password: changeit
    Owner: CN=svsca, DC=serverview, DC=local
    Issuer: CN=svsca, DC=serverview, DC=local
    Serial number: 22646549ec7ac1994cc3a2b8eff66e27
    Valid from: Mon Oct 04 11:19:47 JST 2010 until: Sun Oct 04 11:26:54 JST 2015
    Certificate fingerprints:
    MD5: 70:E3:CB:23:6F:D1:17:00:56:CA:E2:0D:30:73:14:A8
    SHA1: 01:3C:06:81:2D:3F:6D:D9:C3:A6:D4:AA:7B:D5:5E:D5:5F:43:90:E5
    Signature algorithm name: SHA1withRSA
    Version: 3
    ...
    Trust this certificate? [no]: yes

  • When Using OpenDS

    >C:\Fujitsu\ROR\SVROR\Manager\runtime\jre6\bin\keytool.exe -importkeystore -srckeystore "C:\win32app\OpenDS-2.2.0\config\keystore" -destkeystore C:\Fujitsu\ROR\SVROR\Manager\runtime\jre6\lib\security\cacerts
    Enter destination keystore password: changeit
    Enter source keystore password: changeit
    Entry for Another name server-cert successfully imported.
    Import command completed: 1 entries successfully imported. 0 entries failed or cancelled.


4.5.6.4 Registering CA Certificate of Individually Configured OpenDS or Active Directory 2

When using a directory service that was individually configured, import the CA certificate of the directory service to the keystore of Resource Orchestrator.

When using a directory service other than OpenDS that comes with ServerView Operations Manager, import the CA certificate of the directory service to the keystore of Resource Orchestrator.
The CA certificate format is the DER encoded binary X.509 (CER) format.

Example

  • When Using Active Directory

    >C:\Fujitsu\ROR\SVROR\Manager\runtime\jre6\bin\keytool.exe -importcert -alias rcve_ldap -trustcacerts -file c:\myserver.serverview.local_svsca.crt -keystore "C:\Fujitsu\ROR\IAPS\JDK5\jre\lib\security\cacerts"
    Enter keystore password: changeit
    Owner: CN=svsca, DC=serverview, DC=local
    Issuer: CN=svsca, DC=serverview, DC=local
    Serial number: 22646549ec7ac1994cc3a2b8eff66e27
    Valid from: Mon Oct 04 11:19:47 JST 2010 until: Sun Oct 04 11:26:54 JST 2015
    Certificate fingerprints:
    MD5: 70:E3:CB:23:6F:D1:17:00:56:CA:E2:0D:30:73:14:A8
    SHA1: 01:3C:06:81:2D:3F:6D:D9:C3:A6:D4:AA:7B:D5:5E:D5:5F:43:90:E5
    Signature algorithm name: SHA1withRSA
    Version: 3
    ...
    Trust this certificate? [no]: yes

  • When Using OpenDS

    >C:\Fujitsu\ROR\SVROR\Manager\runtime\jre6\bin\keytool.exe -importkeystore -srckeystore "C:\win32app\OpenDS-2.2.0\config\keystore" -destkeystore C:\Fujitsu\ROR\IAPS\JDK5\jre\lib\security\cacerts
    Enter destination keystore password: changeit
    Enter source keystore password: changeit
    Entry for Another name server-cert successfully imported.
    Import command completed: 1 entries successfully imported. 0 entries failed or cancelled.


4.5.6.5 Moving Information in the Directory Service Used in Earlier Versions

When performing user management using a directory service in ServerView Resource Orchestrator V2.3.0, move the resource information in the directory server to the management information in Resource Orchestrator.

Move the following information:

Execute the rcxadm authctl export command to move the information. Move the information as an OS administrator. For details on the rcxadm authctl export command, refer to "1.7.10 rcxadm authctl" in the "Reference Guide (Resource Management) CE".


4.5.6.6 Registering Users in the Directory Service

Register a user to the directory service.


When Using Active Directory

  1. Export the user information which is registered in Resource Orchestrator as files in the LDIF format.

    Example

    >rcxadm user list -format ldif > myusers.ldif <RETURN>

  2. Modify the user information exported as the ldif file in 1. for the actual environment.

    Modify the base names of entries based on the base name of the Active Directory.

  3. Execute the ldifde command to register the ldif file modified in 2. with Active Directory.

    Example

    >ldifde -i -e -k -t 636 -f myusers.ldif <RETURN>

    For details on the ldifde command, refer to the Active Directory documentation.

    Registered user passwords are reset as follows.

    rcxuser@123

  4. Change the user passwords registered in 3. to appropriate values. Use the Active Directory functions, and change the password.

  5. When performing Single Sign-On operations with ServerView Operations Manager, user definitions are necessary for ServerView Operations Manager. For details on how to add user definitions for ServerView Operations Manager, perform settings for Single Sign-On referring to the following manual:

    • "Integrating ServerView User Management into Microsoft Active Directory" of the "ServerView Suite User Management in ServerView"


When Using OpenDS

  1. Export the user and user group information which are registered in Resource Orchestrator as files in the LDIF format.

    Example

    >rcxadm user list -format ldif > myusers.ldif <RETURN>

    The ldif file for the Active Directory is output.

  2. Modify the user information exported as the ldif file in 1. for OpenDS.

    1. Modify the base names of entries based on the base name of the directory service.

    2. Delete the following attributes.

      • samAccountName

      • userAccountControl

      • unicodePwd

    3. Add the following attributes to user entries.

      • sn

      • uid (same value as the cn attribute)

      • userPassword

    4. Modify the values of the objectclass attribute.

      • Change "user" to "inetOrgPerson".

    5. Change "cn=Users" in the "cn=User_name,cn=Users,dc=fujitsu,dc=com" to "ou=Users".

    Example

    • Before editing (ldif file for Active Directory)

      # User
      dn: cn=user01,cn=Users,dc=example,dc=local          # Change cn=Users to ou=Users.
      changetype: add
      objectclass: user                                 # Change to objectclass: inetOrgPerson.
      cn: user01
      samAccountName: user01                              # Delete this line.
      userAccountControl: 512                             # Delete this line.
      unicodePwd:: IgByAGMAeAB1AHMAZQByAEAAMQAyADMAIgA=   # Delete this line.
                                                          # Add sn,uid, and userPassword attributes.
    • After editing (ldif file for OpenDS)

      # User
      dn: cn=user01,ou=Users,dc=fujitsu,dc=com
      changetype: add
      objectclass: inetOrgPerson
      cn: user01
      sn: user01
      uid: user01
      userPassword: mypassword
  3. Use the directory service client function to register the ldif file modified in 3. with the directory service.

    Set the Java SE 6 path for the environment variables JAVA_HOME, before executing the ldapmodify command of OpenDS.

    For details on the command, refer to each directory service manual.

    [Windows]

    >"OpenDS_installation_folder\bat\ldapmodify.bat" -p Port_number -f ldif_file -D Administrator_user_DN -w Password <RETURN>

    [Linux]

    # "OpenDS_installation_folder/bin/ldapmodify" -p Port_number -f ldif_file -D Administrator_user_DN -w Password <RETURN>

    SSL communications are not required when registering a user in OpenDS. The default value of the port number when not using SSL communications is "1473" in the OpenDS provided with ServerView Operations Manager.

    For details on how to configure connection settings of the OpenDS provided with ServerView Operations Manager, refer to README and the manuals of "ServerView Suite User Management in ServerView".

    Example

    >"C:\Program Files\Fujitsu\ServerView Suite\opends\bat\ldapmodify.bat" -p 1473 -f myusers.ldif -D "cn=Directory Manager" -w admin -c <RETURN>

  4. When performing Single Sign-On operations with ServerView Operations Manager, specify users who are defined in ServerView Operations Manager as the user information of Resource Orchestrator.

    For details on how to register the user information, refer to "Appendix C User Management Using Directory Service" of the "Operation Guide CE".

  5. When users of Resource Orchestrator log in to ServerView Operations Manager, user definitions are necessary for ServerView Operations Manager. For details on how to add user definitions for ServerView Operations Manager, perform settings for Single Sign-On referring to the following manual:

    • "Integrating ServerView User Management into Microsoft Active Directory" of the "ServerView Suite User Management in ServerView"

    For OpenDS, perform settings for Single Sign-On referring to the setting procedure of Active Directory.


4.5.6.7 Registering Directory Service Connection Information in Resource Orchestrator

Register the directory service connection information for performing Single Sign-On in Resource Orchestrator.

Check directory service connection information.

Table 4.16 Directory Service Connection Information

Connection Information

Description

IP address

IP address for the directory server to connect to.

Port number

Port number for SSL communication with the directory server to connect to.

When using the OpenDS provided with ServerView Operations Manager, the default value is 1474.

Base name (DN)

Base name (DN) for the directory server to connect to.

When using the OpenDS provided with ServerView Operations Manager, the default value is "dc=fujitsu,dc=com".

Directory server administrator name (DN)

Directory server administrator name (DN) for the directory server to connect to.

When using the OpenDS provided with ServerView Operations Manager, the default value is "cn=Directory Manager".

Directory server administrator password

Password for the directory server to connect to. When using the OpenDS provided with ServerView Operations Manager, refer to the following manual.

ServerView Operations Manager manuals

"ServerView user management with OpenDS" in "ServerView Suite User Management in ServerView"

Use the following procedure to register the directory service connection information in Resource Orchestrator.

  1. Stop the manager.

    For information on stopping managers, refer to "7.2 Starting and Stopping the Manager".

  2. Register the directory service connection information for performing Single Sign-On.

    Execute the rcxadm authctl command and register the directory service connection information.

    For details on the rcxadm authctl command, refer to "1.7.10 rcxadm authctl" of the "Reference Guide (Resource Management) CE".

    Example

    Example when using Active Directory

    >rcxadm authctl register -ip 192.168.1.1 -port 636 -base dc=example,dc=local -bind cn=Administrator,cn=Users,dc=example,dc=local -method SSL -passwd mypasswd <RETURN>

    Example when using the OpenDS Provided with ServerView Operations Manager

    >rcxadm authctl register -ip 192.168.1.1 -port 1474 -base dc=fujitsu,dc=com -bind "cn=Directory Manager" -method SSL -passwd admin <RETURN>

  3. Start the manager.

    For information on starting managers, refer to "7.2 Starting and Stopping the Manager".


4.5.6.8 Changing Already Registered Directory Service Connection Information

Change the already registered directory service connection information from authentication by the directory service to Single Sign-On operations.

  1. Stop the manager.

    For information on stopping managers, refer to "7.2 Starting and Stopping the Manager".

  2. Change the directory service connection information to Single Sign-On operations.

    Execute the rcxadm authctl command and change the directory service connection information.

    For details on the rcxadm authctl command, refer to "1.7.10 rcxadm authctl" of the "Reference Guide (Resource Management) CE".

    >rcxadm authctl modify -auth serverview

  3. Start the manager.

    For information on starting managers, refer to "7.2 Starting and Stopping the Manager".


4.5.6.9 Allocating Roles to Tenant Administrator

Allocate appropriate roles to the users operating as tenant administrators, tenant operators, or tenant monitors among users operating on the earlier versions.

Use the following procedure to allocate roles to users.

  1. Output the user information in files in the XML format.

    >rcxadm user list -format xml > myusers.xml

    For details on the rcxadm user command, refer to "1.6.1 rcxadm user" of the "Reference Guide (Resource Management) CE".

  2. Edit the XML files.

    Delete the information of other users from the XML file, so that only users operating as tenant administrators, tenant operators, and tenant monitors remain.

    Define the tenant administrator roles to allocate to.

    Add the following information:

    • Mail address

    • First name

    • Family name

    For details on the XML definition of tenant administrators, refer to "2.8.1 Tenant Management Roles and Tenant User Role" in the "Reference Guide (Resource Management) CE".

    Example

    Example of the XML definition in which the tenant administrator role of "tenantA" is allocated to the user "john"

    <?xml version="1.0" encoding="utf-8"?>
    <Users>
      <User name="john">
        <Roles>
          <Role name="tenant_admin">
            <Scopes>
              <Scope>tenantA</Scope>
             </Scopes>
          </Role>
        </Roles>
        <MailAddress>john@mail.example.com</MailAddress>
        <ActualName>
          <FirstName>john</FirstName>
          <LastName>fujitsu</LastName>
        </ActualName>
     </User>
    </Users>
  3. Allocate the tenant administrator roles to the user by specifying the XML file edited in the rcxadm user command.

    >rcxadm user modify -file my_tenantadmins.xml