Securing BMC Impact Integration Web Services

BMC Impact Integration Web Services supports Transport-level security, the SSL security. It does not support WS-Security based authentication. By default, Apache Tomcat 6 is configured to support both HTTP and HTTPS connections for one-way server SSL authentication. The HTTPS SSL protocol is TLS.

After installation, you can connect to the BMC Impact Integration Web Services through both HTTP and HTTPS connectors. If you want to restrict the connection to only HTTPS, you must modify the Tomcat server configuration to set the connectors.

For information about how to limit the HTTP connector, see Modifying the security configuration.

Default keystore files

BMC Impact Integration Web Services provides a set of keystore files for HTTPS connection. The keystore files are located in the following directory:

$IIWS_HOME/Tomcat/webapps/imws/WEB-INF/

Following tables provide details about those default keystore files.


Details for the iiwsssl.jks keystore file

Keystore

Description

FileName

$IIWS_HOME/Tomcat/webapps/imws/WEB-INF/security/iiwsssl.jks Default keystore for BMC Impact Integration Web Services used in HTTPS connector

Type

Java KeyStore (jks)

Alias name

iiwsssl

Keystore Password

bmciiws

Key Password

bmciiws


Details for the iiwscacerts.jks keystore file

Keystore

Description

FileName

$IIWS_HOME/Tomcat/webapps/imws/WEB-INF/security/iiwscacerts.jks This keystore contains the public keys for common trusted certificate authorities. Customer can import this file into the client side and use it as the tustStore.

Type

Java KeyStore (jks)

Password

bmciiws


Details for the iiwsssl.cer keystore file

Keystore

Description

FileName

$IIWS_HOME/Tomcat/webapps/imws/WEB-INF/security/iiwsssl.cer This file is a public x509 certificate for the iiwsssl key pair. If you already have your own certificate file, you can import the iiwsssl.cer file into your current certificate file so that your current certificate is trusted.

Note

BMC Software recommends that you replace the default trustore and certificate files with those that meet your requirements. For more information about replacing the keystore, see Modifying the security configuration.

Was this page helpful? Yes No Submitting... Thank you

Comments