Top
Systemwalker Software Configuration Manager Installation Guide
FUJITSU Software

3.1.1 Pre-setup Tasks for the Admin Server

This section explains the tasks required before setup for the admin server.

3.1.1.1 Stopping ServerView Resource Orchestrator (If Linking to ServerView Resource Orchestrator)

Stop ServerView Resource Orchestrator if linking to it to operate the admin server:

[Windows]

<ServerView Resource Orchestrator installation directory>\SVROR\Manager\bin\rcxmgrctl stop

[Linux]

/opt/FJSVrcvmr/bin/rcxmgrctl stop

Note

If installing Systemwalker Software Configuration Manager on the same admin server as another operation management product such as Systemwalker Runbook Automation Management Server, it is necessary to stop the functions for the other operation management product. Ensure that these functions are stopped before setting up Systemwalker Software Configuration Manager (refer to "Appendix B Installing Operation Management Products on Admin Server" for details).

3.1.1.2 Building the SSL Communication Environment for Management Console

Use SSL communication to access the management console of Systemwalker Software Configuration Manager from a browser.

Note

It is not necessary to perform steps 1. to 3 of the following the procedure, if Systemwalker Software Configuration Manager is linked to ServerView Resource Orchestrator, or if the SSL communication environment has already been built. Start the procedure from step 4.

Build the SSL communication environment using the following procedure:

See

Refer to "Setting and Use of the Interstage Certificate Environment" in the Interstage Application Server Security System Guide for information on how to build the SSL environment.

3.1.1.2.1 Setting the Interstage Certificate Environment Access Permissions [Linux]

Create an owner group that has permissions to access the Interstage certificate environment.
An example of creating the owner group using the command is shown below:

  1. Create the Interstage certificate environment owner group.

    In the following example, the owner group is created as "iscertg".

    # groupadd iscertg

    Note

    The owner group that was created at the time of the Interstage certificate environment build must be specified in the -g option of the Certificate Signing Request (CSR) creation command (scsmakeenv). Refer to "3.1.1.2.2 Creating the Interstage Certificate Environment and the Application to Obtain the Certificate that is used for SSL Communication" for information on the CSR creation command.

  2. Register the executing user in the "iscertg" group.

    In the following example, the executing user is created as "nobody".

    # usermod -G iscertg nobody

    Note

    The executing user that is registered in the Interstage certificate environment owner group must have been set in the User directive of the Interstage HTTP Server environment configuration file (httpd.conf).

3.1.1.2.2 Creating the Interstage Certificate Environment and the Application to Obtain the Certificate that is used for SSL Communication

The CSR creation command (from now on, this is referred to as the "scsmakeenv command") is used to create the CSR that will create the Interstage certificate environment and apply for the certificate that is used for SSL communication.
The creation procedure and execution example are shown below:

Creation procedure

  1. Set the JDK or JRE installation path in the JAVA_HOME environment variable.

    This procedure is only required for Linux. Setting of the environment variable JAVA_HOME is unnecessary for Windows.

  2. Execute the scsmakeenv command.

    [Windows]

    scsmakeenv -n <private key nickname> -f <output destination file name for the CSR>

    [Linux]

    scsmakeenv -n <private key nickname> -f <output destination file name for the CSR> -g <Group that has permissions to access the Interstage certificate environment>

    Change the CSR output destination file name if necessary.

    Note

    The private key nickname specified in the scsmakeenv command will be required when the site certificate obtained from the CA is registered.

    Information

    Refer to " SSL Environment Setting Commands" in the Interstage Application Server Reference Manual (Command Edition) for information on the scsmakeenv command.

  3. Enter a password to access the Interstage certificate environment.

    The password will be required to access the Interstage certificate environment.

  4. Enter an identifier.

    When the "What is your first and last name?" (alphanumeric name) enquiry is made, specify the FQDN of the server used to apply for the certificate as the Web server host name.

  5. As with above step, enter the following items:

    • Name of organizational unit

    • Name of organization

    • Name of City or Locality

    • Name of State or Province

    • Two-letter country code

  6. Check the values that were entered.

    To create the CSR using the values that were entered, enter yes. To change the values that were entered, enter no.

  7. Send the CSR to the CA to request that a certificate be issued.

    If the scsmakeenv command has terminated normally, the CSR will be output to the certificate output destination file name that was specified in the -f option of the scsmakeenv command. Send that file to the CA and request that a certificate be issued. Follow the request method used by the CA.

Execution example

[Windows]

The command execution examples shown below use the following values:

- Site certificate nickname: SERVERCERT
- Applicant output destination file name: C:\temp\ssocert.txt
- Group that has permissions to access the Interstage certificate environment: iscertg
- First and last name: ssoserver.example.com
- Name of organizational unit: FUJITSU TOKYO
- Name of organization: FUJITSU
- Name of City or Locality: Shinjuku
- Name of State or Province: Tokyo
- Two-letter country code for this unit:jp

In the example, the applicant output file name is "C:\temp\ssocert.txt". Change the applicant output file name if necessary.

At the password prompt, enter the password that will be used to access the Interstage certificate environment. (it will not be displayed).

C:\>scsmakeenv -n SERVERCERT -f C:\temp\ssocert.txt
New Password:
Retype:

Input X.500 distinguished names.
What is your first and last name?
  [Unknown]: ssoserver.example.com
What is the name of your organizational unit?
  [Unknown]: FUJITSU TOKYO
What is the name of your organization?
  [Unknown]: FUJITSU
What is the name of your City or Locality?
  [Unknown]: Shinjuku
What is the name of your State or Province?
  [Unknown]: Tokyo
What is the two-letter country code for this unit?
  [Un]: jp

Is <CN=ssoserver.example.com, OU=FUJITSU TOKYO, O=FUJITSU, L=Shinjuku, ST=Tokyo,C=jp> correct?
  [no]: yes
<SCS: INFO: scs0101: CSR was issued <C:\temp\ssocert.txt>
C:\>
[Linux]

The command execution examples shown below use the following values:

- Site certificate nickname: SERVERCERT
- Applicant output destination file name: /tmp/ssocert.txt
- Group that has permissions to access the Interstage certificate environment: iscertg
- First and last name: ssoserver.example.com
- Name of organizational unit: FUJITSU TOKYO
- Name of organization: FUJITSU
- Name of City or Locality: Shinjuku
- Name of State or Province: Tokyo
- Two-letter country code for this unit:jp

In the execution example, a new Interstage certificate environment is created for which "iscertg" access permissions are set, and the CSR is also created. If an Interstage certificate environment has already been created, then set access permissions to it if necessary.

The Bourne shell has been used in the execution example.

# JAVA_HOME=/opt/FJSVawjbk/jdk6;export JAVA_HOME
# scsmakeenv -n SERVERCERT -f /tmp/ssocert.txt -g iscertg
New Password:
Retype:

Input X.500 distinguished names.
What is your first and last name?
  [Unknown]: ssoserver.example.com
What is the name of your organizational unit?
  [Unknown]: FUJITSU TOKYO
What is the name of your organization?
  [Unknown]: FUJITSU
What is the name of your City or Locality?
  [Unknown]: Shinjuku
What is the name of your State or Province?
  [Unknown]: Tokyo
What is the two-letter country code for this unit?
  [Un]: jp

Is <CN=ssoserver.example.com, OU=FUJITSU TOKYO, O=FUJITSU, L=Shinjuku, ST=Tokyo,C=jp> correct?
  [no]: yes
UX:SCS: INFO: scs0101: CSR was issued </tmp/ssocert.txt>
UX:SCS: INFO: scs0180: The owners group of Interstage certificate environment was set.
#

Note

You will be prompted to input password for Interstage certificate environment if Interstage certificate environment is already configured. In this case, input the password that was set when you configured Interstage certificate environment.

Information

Test site certificates can be used in the test environment. Note that these test site certificates are only for test environments, and so should not be used for actual operations.
Refer to Appendix C Creating Test Site Certificates for information on creating test site certificates.

3.1.1.2.3 Registering Certificates used in SSL Communication

Obtain the site certificate that was issued by the CA, and the CA certificate of the issuer of that certificate, and register them using the certificate/CRL registration command (from now on, this is referred to as the "scsenter command").

Information

  • Depending on the CA, it might be necessary to register an intermediate CA certificate. Refer to "Registering Certificates and CRLs" in " Setting and Use of the Interstage Certificate Environment" in the Interstage Application Server Security System Guide for details.

  • This work is unnecessary if you created a test site certificate.

Creation procedure

  1. Set the JDK or JRE installation path in the JAVA_HOME environment variable.

    This is necessary procedure for Linux. For Windows, it is not necessary.

  2. Register the CA certificate using the scsenter command.

    scsenter -n <CA certificate nickname> -f <CA certificate>

    See

    Refer to "SSL Environment Setting Commands" in the Interstage Application Server Reference Manual (Command Edition) for information on the scsenter command.

  3. Enter a password to access the Interstage certificate environment.

    Enter the password that was specified in the scsmakeenv command to access the Interstage certificate environment.

  4. Register the site certificate using the scsenter command.

    scsenter -n <Site certificate nickname> -f <Site certificate> -o

    To register the site certificate that was obtained from the CA, specify the nickname that was specified in the private key in the scsmakeenv command. Note that the -o option must be specified to register the site certificate.

  5. Enter a password to access the Interstage certificate environment.

    Enter the password that was specified in the scsmakeenv command to access the Interstage certificate environment.

Execution example

[Windows]

The command execution examples shown below use the following values:

- CA certificate: C:\temp\ca-cert.cer
- CA certificate nickname: CACERT
- Site certificate: C:\temp\server-cert.cer
- Site certificate nickname: SERVERCERT

In the examples, the CA and site certificates obtained are "C:\temp\ca-cert.cer" and "C:\temp\server-cert.cer". Change the file path name of each certificate if necessary.

At the password prompt, enter the password that will be used to access the Interstage certificate environment (it will not be displayed).

C:\>scsenter -n CACERT -f C:\temp\ca-cert.cer
Password:
Certificate was added to keystore
SCS: INFO: scs0104: Certificate was imported.
C:\>scsenter -n SERVERCERT -f C:\temp\server-cert.cer -o
Password:
Certificate reply was installed in keystore
SCS: INFO: scs0104: Certificate was imported.
C:\>
[Linux]

The command execution examples shown below use the following values:

- CA certificate: /tmp/ca-cert.cer
- CA certificate nickname: CACERT
- Site certificate: /tmp/server-cert.cer
- Site certificate nickname: SERVERCERT

Change the file names of the CA and site certificates that were obtained if necessary.
The Bourne shell has been used in the execution example.

# JAVA_HOME=/opt/FJSVawjbk/jdk6;export JAVA_HOME
# scsenter -n CACERT -f /tmp/ca-cert.cer
Password:
Certificate was added to keystore
UX:SCS: INFO: scs0104: Certificate was imported.
# scsenter -n SERVERCERT -f /tmp/server-cert.cer -o
Password:
Certificate reply was installed in keystore
UX:SCS: INFO: scs0104: Certificate was imported.
#
3.1.1.2.4 Settings for SSL Communication

Using the Interstage Management Console, create the SSL definition.

  1. Start the Interstage Management Console.

    Follow the procedure below to start the Interstage Management Console:

    1. Start the Web browser.

    2. Specify the Interstage Management Console URL.

      http://[host name of the Admin Server]:[port number for the Interstage Management Console]/IsAdmin/

      The default port number is "12000".

    3. Log in to the Interstage Management Console.

      The user should log in as a user of the admin server with Administrators privileges.

  2. Create the SSL definition.

    Select the System >> Security >> SSL >> Create a new SSL Configuration tabs to show General Settings, then select the registered site certificate nickname, then create the SSL definition.
    Specify the following items, then push Create button.

    Settings item

    Settings value

    Configuration name

    Set the name that will identify the SSL definition.

    CFMG-SSL

    [Fixed]

    Site Certificate Nickname

    Set the nickname that was specified when the site certificate was registered in the Interstage certificate environment, in "3.1.1.2.3 Registering Certificates used in SSL Communication". Otherwise, select the site certificate nickname that has been registered. The site certificate that was selected can be checked in the System >> Security >> Certificates >> Site Certificates window of the Interstage Management Console.

    Protocol Version

    Select "SSL 3.0" and "TLS 1.0".

    Verify Client Certificate?

    Select "No".

    Encryption Method

    Refer to the Interstage Management Console Help, and change this if necessary.

    CA Certificate Nickname

    Refer to the Interstage Management Console Help, and change this if necessary.

3.1.1.2.5 Corrective Actions If the Site Certificate has Expired

If the registered site certificate has expired, you will no longer be able to log in to Systemwalker Software Configuration Manager. Follow the procedure to renew an expired site certificate:

Perform this procedure after ServerView Resource Orchestrator environment settings are completed, if operating Systemwalker Software Configuration Manager with ServerView Resource Orchestrator linked.

  1. Stop Systemwalker Software Configuration Manager.

    Execute the following command:

    [Windows]

    <Systemwalker Software Configuration Manger installation directory>\SWCFMGM\bin\swcfmg_stop

    [Linux]

    /opt/FJSVcfmgm/bin/swcfmg_stop

  2. Stop either one of the following depending on the operation environment.

    1. Stop Systemwalker Runbook Automation.

      Execute the following command:

      [Windows]

      %SWRBA_HOME%\bin\swrba_stop

      [Linux]

      /opt/FJSVswrbam/bin/swrba_stop

    2. Stop ServerView Resource Orchestrator [If Linking to ServerView Resource Orchestrator]

      Use the following command to stop ServerView Resource Orchestrator.

      [Windows]

      <ServerView Resource Orchestrator installation directory>\SVROR\Manager\bin\rcxmgrctl stop

      [Linux]

      /opt/FJSVrcvmr/bin/rcxmgrctl stop

  3. Deregister the old site certificate.

    1. Release the SSL communication settings of the Web server.

      1. Start the Interstage Management Console.

        - Start the Web browser

        - Specify the Interstage Management Console URL.

        http://<Host name of the Admin Server>:<Port number for the Interstage Management Console>/IsAdmin/

        Note that the default port number is "12000".

        - Log in to the Interstage Management Console.

        Users must log in as an admin server user with Administrator privileges.

      2. Stop the Web server (CFMG-ext).

        Click System >> Services >>Web Server >> CFMG-ext, and then open the status tab. If the Web server is not stopped, then click the Stop button.

      3. Change the Web server (CFMG-ext) settings.

        Select the Web server name (CFMG-ext), click the environment settings tab, click Detailed Settings >> Show, change the environment settings as shown below, and then click the Update button.

        Settings item

        Settings value

        Enable SSL Encryption

        Do not use

        SSL definition

        Select the SSL definition created at "Building the SSL Communication Environment for Management Console".

        • CFMG-SSL

    2. Remove the registration of the registered site certificate.

    Refer to "4.2.4.1 Deleting the SSL Communication Environment for details.

  4. Register the new site certificate.

    1. Register the new site certificate.

      Refer to "3.1.1.2 Building the SSL Communication Environment for Management Console" for details.

    2. Configure the SSL communication settings of the Web server.

      1. Start the Interstage Management Console.

        - Start the Web browser.

        - Specify the Interstage Management Console URL.

        http://<Host name of the Admin Server>:<Port number for the Interstage Management Console>/IsAdmin/

        Note that the default port number is "12000".

        - Log in to the Interstage Management Console.

        Users must log in as an admin server user with Administrator privileges.

      2. Change the Web server (CFMG-ext) settings.

        Open the environment settings tab from System >> Services >>Web Server >> CFMG-ext, click Detailed Settings >> Show, change the environment settings as shown below, and then click the Update button.

        Settings item

        Settings value

        Enable SSL Encryption

        Use

        SSL definition

        Select the SSL definition created at "Building the SSL Communication Environment for Management Console".

        • CFMG-SSL

      3. Start the Web server (CFMG-ext).

        Click the Status tab, and then click the Start button to start the Web server.

  5. Start either one of the following, depending on the operation environment.

    1. Start Systemwalker Runbook Automation

      Execute the following command to start Systemwalker Runbook Automation:

      [Windows]

      %SWRBA_HOME%\bin\swrba_start

      [Linux]

      /opt/FJSVswrbam/bin/swrba_start

    1. Start ServerView Resource Orchestrator [If Linking to ServerView Resource Orchestrator]

      Use the following command to start ServerView Resource Orchestrator.

      [Windows]

      <ServerView Resource Orchestrator installation directory>\SVROR\Manager\bin\rcxmgrctl start

      [Linux]

      /opt/FJSVrcvmr/bin/rcxmgrctl start

  6. Start Systemwalker Software Configuration Manager.

    Execute the following command to start Systemwalker Software Configuration Manager:

    [Windows]

    <Systemwalker Software Configuration Manger installation directory>\SWCFMGM\bin\swcfmg_start

    [Linux]

    /opt/FJSVcfmgm/bin/swcfmg_start

3.1.1.2.6 Create Apache Certificates
  1. Create a certificate

    1. Open the command prompt on the admin server.

    2. Execute the following command to move to the installation folder.

    [Windows]

    >cd "%SWCFMGM_HOME%\SWCFMGX\Manager\sys\apache\conf" <RETURN>

    [Linux]

    # cd /etc/opt/FJSVcfmgm/SWCFMGX/sys/apache/conf <RETURN>

  2. Back up the current certificate and then execute the certificate creation command (openssl.exe) which comes with this product.

    Example

    [Windows]

    >cd "%SWCFMGM_HOME%\SWCFMGX\Manager\sys\apache\conf" <RETURN>
    >copy ssl.crt\server.crt ssl.crt\server.crt.org <RETURN>
    >copy ssl.key\server.key ssl.key\server.key.org <RETURN>
    >..\bin\openssl.exe req -new -x509 -nodes -out ssl.crt\server.crt -keyout ssl.key\server.key -days 5479 -config openssl.cnf <RETURN>
    Loading 'screen' into random state - done
    Generating a 1024 bit RSA private key
    .................++++++
    ................................++++++
    writing new private key to 'ssl.key\server.key'
    -----
    You are about to be asked to enter information that will be incorporated
    into your certificate request.
    What you are about to enter is what is called a Distinguished Name or a DN.
    There are quite a few fields but you can leave some blank
    For some fields there will be a default value,
    If you enter '.', the field will be left blank.
    -----
    Country Name (2 letter code) []: <RETURN>
    State or Province Name (full name) []: <RETURN>
    Locality Name (eg, city) [Kawasaki]: <RETURN>
    Organization Name (eg, company) []: <RETURN>
    Organizational Unit Name (eg, section) []: <RETURN>
    Common Name (eg, YOUR name) [localhost]: <Host name of the Admin Server (FQDN)> (*1) <RETURN>
    Email Address []: <RETURN>

    [Linux]

    # cd /etc/opt/FJSVcfmgm/SWCFMGX/sys/apache/conf <RETURN>
    # cp ssl.crt/server.crt ssl.crt/server.crt.org <RETURN>
    # cp ssl.key/server.key ssl.key/server.key.org <RETURN>
    # /opt/FJSVcfmgm/SWCFMGX/sys/apache/bin/openssl req -new -x509 -nodes -out ssl.crt/server.crt -keyout ssl.key/server.key -days 5479 -config /opt/FJSVcfmgm/SWCFMGX/sys/apache/ssl/openssl.cnf <RETURN>
    Generating a 1024 bit RSA private key
    .................++++++
    ................................++++++
    writing new private key to 'ssl.key/server.key'
    -----
    You are about to be asked to enter information that will be incorporated
    into your certificate request.
    What you are about to enter is what is called a Distinguished Name or a DN.
    There are quite a few fields but you can leave some blank
    For some fields there will be a default value,
    If you enter '.', the field will be left blank.
    -----
    Country Name (2 letter code) []: <RETURN>
    State or Province Name (full name) []: <RETURN>
    Locality Name (eg, city) [Kawasaki]: <RETURN>
    Organization Name (eg, company) []: <RETURN>
    Organizational Unit Name (eg, section) []: <RETURN>
    Common Name (eg, YOUR name) [localhost]: <Host name (FQDN)> (*1) <RETURN>
    Email Address []: <RETURN>

    *1: Enter the host name (FQDN)to be entered on the Web browser.

    Example:

    Host name: myhost.company.com