Enabling SSL on Linux
This topic describes how to enable SSL for all the BMC Cloud Lifecycle Management components. It also provides detailed configuration steps to make the secured communication between the components.
- CLM applications that support HTTPS on SSL during installation
- Before you begin
- To create a Root CA certificate using OpenSSL
- To configure the Mid Tier SSL
- To integrate the Mid Tier with Platform Manager
- To configure Atrium Web Services SSL
- To integrate Atrium Web Services with BMC Network Automation
- To configure SSL with BMC Server Automation
- To configure SSL with BMC Server Automation and Platform Manager
- To configure BMC Network Automation with SSL
- To configure Platform Manager from HTTPS to HTTP with a Self-Signed Certificate
- To configure Platform Manager from HTTP to HTTPS with a Self-Signed Certificate
- To modify the Platform Manager integration with SSL
- To configure BMC Capacity Optimization with SSL
- To integrate BMC Capacity Optimization and Platform Manager changes into SSL
- To configure BMC Atrium Orchestrator with SSL
- To configure BMC Server Automation and Atrium Orchestrator with SSL
- To configure Atrium Orchestrator and Platform Manager with SSL
- To configure Atrium Orchestrator and ITSM with SSL
- To configure Cloud Portal Web Application from HTTP to HTTPS with a Self-Signed Certificate
- To configure Cloud Portal Web Application from HTTPS to HTTP with a Self-Signed Certificate
- To configure CLM Self-Checker from HTTP to HTTPS with a Self-Signed Certificate
- To configure CLM Self-Checker from HTTPS to HTTP with a Self-Signed Certificate
- Related topic
CLM applications that support HTTPS on SSL during installation
The following table lists the CLM applications that support HTTPS on SSL during installation:
Product | Self-sign certificate? | Notes on integration path |
---|---|---|
Platform Manager | Yes | Import the Platform Manager cacerts file into the JRE of the following products:
|
Cloud Portal Web Application | Yes | Import Self-Checker certificate to display the Dashboard Data. |
CLM Self-Check Monitor | Yes |
|
BMC Server Automation (BBSA) | Yes |
|
BMC Network Automation (BBNA) | Yes |
|
Atrium Core Web Services | Yes | Default HTTPS port is 7776. If you use port 7776, update information in the BMC Network Automation console. |
Mid Tier | No |
|
BMC Atrium Orchestrator | No |
|
Before you begin
- Take a snapshot of your VMs or back up your servers. This precaution is necessary if you make a mistake and need to roll back your changes!
- When importing certificates, keypairs, or keystores, use the JRE embedded with the product or the latest version of JRE/Java installed on your host.
To create a Root CA certificate using OpenSSL
- Download and install the 32-bit and 64-bit OpenSSL packages (openssl-1.0.0-20.el6_2.5.i686.rpm and openssl-1.0.0-20.el6_2.5.x86_64.rpm) on its own host.
For more information, see System requirements for Linux. - Create Keys, Certificates, and CSR folders.
These categories are for placing keys, certificates files, and so on. - Open a command prompt and navigate to openssl (for example, /usr/bin/openssl).
Generate the key pair for root CA.
Store this key pair in the Keys/RootCA.key file.[root@vl-aus-csm-dv01 bin]# ./openssl genrsa -out /data1/Keys/RootCA.key 1024
Generating RSA private key, 1024 bit long modulus
.................................++++++
...........++++++
e is 65537 (0x10001)- Generate a self signed certificate for CA.
This CA certificate is used across all cloud products as a common certificate. Store the certificate in the RootCA.crt file.Enter the following command:
./openssl req -config /opt/bmc/rscd/NSH/share/openssl.cnf -new -x509
-days 365 -key /data1/Keys/RootCA.key -out /data1/Certificates/RootCA.crtCreate a Distinguished Name (DN)..
Make sure that you enter all required information. Many fields contain defaults. Some settings you can leave blank. If you enter a period, the field will be left blank.You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:US
State or Province Name (full name) [Some-State]:CA
Locality Name (eg, city) []:San Jose
Organization Name (eg, company) [Internet Widgits Pty Ltd]:BMC
Organizational Unit Name (eg, section) []:IDD
Common Name (eg, YOUR name) []:John Stamps
Email Address []:jstamps@bmc.com- Press Enter to create the certificate.
To configure the Mid Tier SSL
- On the Mid Tier host, create Keys, Certificates, and CSR folders.
- Copy RootCA.key to /data1/Keys/.
- Copy RootCA.crt to /data1/Certificates/.
Stop the Mid Tier Tomcat server.
For example:/opt/apache/tomcat6.0/bin/shutdown.sh- Open a command prompt and navigate to the jre/bin folder (for example, /usr/java/jdk1.7.0_75/jre/bin for version 4.5).
Create a keypair using the keytool utility.
If the Mid Tier is behind a load balancer, use CN as the load balancer name. But here it is MT../keytool -genkey -alias tomcat -keyalg RSA -keysize 1024
-keypass "changeit" -storepass "changeit" -keystore /data1/Keys/keystore.jksAt the prompts, enter the required information to create the keypair, and then press Enter.
What is your first and last name?
[Unknown]: MT
What is the name of your organizational unit?
[Unknown]: IDD
What is the name of your organization?
[Unknown]: BMC
What is the name of your City or Locality?
[Unknown]: San Jose
What is the name of your State or Province?
[Unknown]: CA
What is the two-letter country code for this unit?
[Unknown]: US
Is CN=MT, OU=IDD, O=BMC, L=San Jose, ST=CA, C=US correct?
[no]: yesCreate the Certificate Signing Request (CSR) from Mid Tier primary to retrieve the certificate from CA (that is, CLM).
./keytool -certreq -keyalg RSA -alias tomcat
-file /data1/CSR/mt.csr -keystore /data1/Keys/keystore.jksAt the prompt, enter changeit as the password.
Use the following openssl command (for example, /usr/bin/openssl)to generate a Mid Tier server certificate (mt_server.crt):
./openssl x509 -req -days 365 -in /data1/CSR/mt.csr
-CA /data1/Certificates/RootCA.crt -CAkey /data1/Keys/RootCA.key
-set_serial 01 -out /data1/Certificates/mt_server.crt- (HA only) After the certificate is generated (mt_server.crt) in the Certificates folder, copy mt_server.crt and RootCA.crt to the Mid Tier primary and secondary computers into their Certificates folder.
On the Mid Tier primary and secondary computers, import the Root CA certificate:
/usr/java/jdk1.7.0_75/jre/bin/keytool -import
-alias root -keystore /data1/Keys/keystore.jks -trustcacerts
-file /data1/Certificates/RootCA.crtAt the prompt, enter changeit as the password.
[root@clm-aus-005120 Certificates]# cd /usr/java/jdk1.7.0_75/jre/bin/
[root@clm-aus-005120 bin]# ./keytool -import -alias root
-keystore /data1/Keys/keystore.jks -trustcacerts
-file /data1/Certificates/RootCA.crt
Enter keystore password:
Owner: EMAILADDRESS=jstamps@bmc.com, CN=John Stamps, OU=IDD,
O=BMC, L=San Jose, ST=CA, C=US
...
Trust this certificate? [no]: yes
Certificate was added to keystore
[root@clm-aus-005120 bin]#- When you see the Trust this certificate prompt, enter yes.
Your certificate is added to the keystore.
Import the mt_server.crt certificate:
./keytool -import -alias tomcat -keystore /data1/Keys/keystore.jks
-trustcacerts -file /data1/Certificates/mt_server.crtAt the prompt, enter changeit as the password.
[root@clm-aus-005120 bin]# ./keytool -import -alias tomcat
-keystore /data1/Keys/keystore.jks -trustcacerts
-file /data1/Certificates/mt_server.crt
Enter keystore password:
Certificate reply was installed in keystoreYour certificate reply is installed in the keystore.
- Open the server.xml file (in Linux, the default location is /opt/apache/tomcat6.0/conf/server.xml) in a text editor and uncomment the SSL related sections.
Search for the following text and uncomment out the Connector port section:
<!-- Define a SSL HTTP/1.1 Connector on port 8443
This connector uses the JSSE configuration, when using APR, the
connector should be using the OpenSSL style configuration
described in the APR documentation -->
<!--
<Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true"
maxThreads="150" scheme="https" secure="true"
clientAuth="false" sslProtocol="TLS" />
-->Modify the Connector port information as follows:
<Connector port="9443" protocol="HTTP/1.1" SSLEnabled="true"
maxThreads="150" scheme="https" secure="true"
clientAuth="false" sslProtocol="TLS"
keystoreFile="/data1/Keys/keystore.jks"
keystorePass="<passwordMustEqualYourKeystorePassword>"
/>Here you change the connector port to 9443 and add the keystore file location and keystore password.
- Save server.xml .
Start the Tomcat server.
/opt/apache/tomcat6.0/bin/startup.sh- Verify your changes to the Mid Tier or Mid Tier Load Balancer by accessing the following URL:
https://<MidTier>:9443/arsys (where 9443 is SSL port)
https://<LoadBalancer>:9443/arsys - Add and confirm any security restrictions in your browser (as shown with Firefox).
- When you access the Mid Tier the first time, review the certificate details, as shown with Internet Explorer.
- Review the General tab and verify who the certificate is issued to (for example, MT) and who it was issued by (for example, bmc.com).
- Click the Details tab and, review the certificate path or hierarchy.
- Confirm the security exception and open the Mid Tier.
To integrate the Mid Tier with Platform Manager
- Open the CMF:PluginConfiguration form in the Cloud Portal and Database AR System server.
- Edit the CallBackURL from http to https.
- Edit the port to 9443.
- Save the record.
- Copy the RootCA.crt certificate from the Mid Tier server to the Platform Manager server (for example, to a Certificates folder).
Open a command window, change directories to /usr/java/jdk1.7.0_75/jre/bin/ (by default), and then import the certificate:
./keytool -import -alias root
-keystore "/usr/java/jdk1.7.0_75/jre7/lib/security/cacerts"
-trustcacerts -file "/data1/Certificates/RootCA.crt"- At the prompt, enter changeit as the password.
When you see the Trust this certificate prompt, enter yes.
Your certificate is added to the keystore.[root@clm-aus-005121 Certificates]# cd /usr/java/jdk1.7.0_75/jre/bin/
[root@clm-aus-005121 bin]# ./keytool -import -alias root
-keystore "/usr/java/jdk1.7.0_75/jre7/lib/security/cacerts"
-trustcacerts -file "/data1/Certificates/RootCA.crt"
Enter keystore password:
Re-enter new password:
Owner: EMAILADDRESS=jstamps@bmc.com, CN=John Stamps,
OU=IDD, O=BMC, L=San Jose, ST=CA, C=US
...
Trust this certificate? [no]: yes
Certificate was added to keystore- Restart the server in the following order – first Platform Manager and second the Cloud Portal and Database AR System server.
To configure Atrium Web Services SSL
The following instructions apply only to Small or Medium deployments.
- On the primary Atrium Core Web Services Registry host, create Keys, Certificates, and CSR folders.
- Copy RootCA.key to /data1/Keys/.
- Copy RootCA.crt to /data1/Certificates/.
Stop the Atrium Tomcat server.
For example:/opt/bmc/AtriumWebRegistry/shared/tomcat/bin/shutdown.sh- Open a command prompt and navigate to the jre/bin folder (for example, /usr/java/jdk1.7.0_75/jre/).
Create a keypair using the keytool utility.
If the Atrium Web Services are behind a load balancer, you can use CN as the load-balancer name. But here it is AWS../keytool -genkey -alias tomcat -keyalg RSA -keysize 1024
-keypass "changeit" -storepass "changeit" -keystore /data1/Keys/keystore.jksAt the prompts, enter the required information to create the keypair, and then press Enter.
[root@clm-aus-005118 bin]# ./keytool -genkey -alias tomcat
-keyalg RSA -keysize 1024 -keypass "changeit" -storepass "changeit"
-keystore /data1/Keys/keystore.jks
What is your first and last name?
[Unknown]: AWS
What is the name of your organizational unit?
[Unknown]: IDD
What is the name of your organization?
[Unknown]: BMC
What is the name of your City or Locality?
[Unknown]: San Jose
What is the name of your State or Province?
[Unknown]: CA
What is the two-letter country code for this unit?
[Unknown]: US
Is CN=AWS, OU=IDD, O=BMC, L=San Jose, ST=CA, C=US correct?
[no]: yesCreate the Certificate Signing Request (CSR) from Atrium Web Services primary to retrieve the certificate from CA (that is, CLM).
[root@clm-aus-005118 bin]# ./keytool -certreq -keyalg RSA
-alias tomcat -file /data1/CSR/aws.csr -keystore /data1/Keys/keystore.jks
Enter keystore password:At the prompt, enter changeit as the password.
Use the following openssl command (for example, /usr/bin/openssl)to generate an Atrium Core Web Server certificate (aws_server.crt):
./openssl x509 -req -days 365 -in /data1/CSR/aws.csr
-CA /data1/Certificates/RootCA.crt -CAkey /data1/Keys/RootCA.key
-set_serial 01 -out /data1/Certificates/aws_server.crt
Signature ok
subject=/C=US/ST=CA/L=San Jose/O=BMC/OU=IDD/CN=AWS
Getting CA Private Key- After the certificate is generated (aws_server.crt) in the Certificates folder, copy aws_server.crt and RootCA.crt to the AWS primary and secondary hosts into their Certificates folder.
On the AWS primary and secondary hosts, import the Root CA certificate:
[root@clm-aus-005118 bin]# ./keytool -import -alias root
-keystore /data1/Keys/keystore.jks -trustcacerts
-file /data1/Certificates/RootCA.crt
Enter keystore password:
Owner: EMAILADDRESS=jstamps@bmc.com, CN=John Stamps,
OU=IDD, O=BMC, L=San Jose, ST=CA, C=US
...
Trust this certificate? [no]: yes
Certificate was added to keystore
[root@clm-aus-005118 bin]#- At the prompt, enter changeit as the password.
- When you see the Trust this certificate prompt, enter yes.
Your certificate is added to the keystore.
- At the prompt, enter changeit as the password.
Import the aws_server.crt certificate:
[root@clm-aus-005118 bin]# ./keytool -import -alias tomcat
-keystore /data1/Keys/keystore.jks -trustcacerts
-file /data1/Certificates/aws_server.crt
Enter keystore password:k
Certificate reply was installed in keystoreAt the prompt, enter changeit as the password.
Your certificate reply is installed in the keystore.- Open the server.xml file (in Linux, the default location is /opt/bmc/AtriumWebRegistry/shared/tomcat/conf/server.xml) in a text editor and uncomment the SSL related sections.
Search for the following text and uncomment out the Connector port section:
<!-- Define a SSL HTTP/1.1 Connector on port 8443
This connector uses the JSSE configuration, when using APR, the
connector should be using the OpenSSL style configuration
described in the APR documentation -->
<!--
<Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true"
maxThreads="150" scheme="https" secure="true"
clientAuth="false" sslProtocol="TLS" />
-->Modify the Connector port information as follows:
<Connector port="9443" protocol="HTTP/1.1" SSLEnabled="true"
maxThreads="150" scheme="https" secure="true"
clientAuth="false" sslProtocol="TLS"
keystoreFile="/data1/Keys/keystore.jks"
/>Here you change the connector port to 9443 and add the keyStore file location.
- Save the server.xml .
Start the AWS Tomcat server.
For example:/opt/bmc/AtriumWebRegistry/shared/tomcat/bin/startup.sh- Verify your changes to the AWS or AWS Load Balancer by accessing the following URL:
https://<AWS>:9443 (where 9443 is SSL port)
https://<LoadBalancer>:9443 - Add and confirm any security restrictions in your browser.
- When you access AWS the first time, review the certificate details.
- Review who the certificate is issued to (for example, AWS) and who the certificate was issued by (for example, bmc.com).
- Review the certificate path or hierarchy.
To integrate Atrium Web Services with BMC Network Automation
The following instructions apply only to Small or Medium deployments.
Log on to the Mid Tier to access the Cloud Portal and Database AR System server.
You can use https://<MidTier>:9443/arsys to access the Cloud Portal and Database AR System server.- Open the Server Information form for the Cloud Portal and Database AR System server.
- Click the Advanced tab, and modify the URL in the Default Web Path field with the updated https and port (for example, 9443).Click the Advanced tab and modify the default web path URL with the updated https and port.
For example, you might enter https://vw-san-clmidd:9443/arsys/. - Restart the Cloud Portal and Database AR System server.
- Log on to BMC Network Automation.
- Click the Admin tab, and navigate to System Admin > System Parameters.
- In the Enable CMDB Integration section, modify the Web Service Endpoint URL field with the updated https and port 9443 URL (for example, https://bnaServer:9443/cmdbws/server/cmdbws.wsdl).
- Click Save.
The BMC Network Automation console verifies your changes.
- When you finish, verify that physical location is accessed by BMC Network Automation during POD creation through the Atrium Web Services.
If you have successfully integrated Atrium Web service and BNA SSL communication, go to BMC Network Automation and try to create a POD. The physical location created in the AR System server should be visible in the list during POD creation.
To configure SSL with BMC Server Automation
For more information on using a CA-issued certificate or certificate chain rather than the default self-signed certificate, see Securing communication with CA certificates in the BMC Server Automation documentation.
- On the BMC Server Automation host, create Keys, Certificates, and CSR folders.
- Copy RootCA.key to /data1/Keys/.
- Copy RootCA.crt to /data1/Certificates/.
- Stop the BladeLogic Application Server.
For example:
/etc/init.d/blappserv stop - Back up the bladelogic.keystore file and then delete the old file. This procedure creates a new bladelogic.keystore file.
By default, this file is located in /opt/bmc/bladelogic/NSH/br/deployments. - Open a command prompt and navigate to the jre/bin folder (for example, /usr/java/jdk1.7.0_75/jre/bin).
On the BMC Server Automation primary host, create a new keystore using the keytool utility.
If BMC Server Automation is behind a load balancer, you can use CN as the load-balancer name.clm-aus-005115# /usr/java/jdk1.7.0_75/jre/bin/keytool -genkey
-alias blade -keyalg RSA -keysize 1024 -keypass "changeit"
-storepass "changeit"
-keystore /opt/bmc/bladelogic/NSH/br/deployments/bladelogic.keystore
What is your first and last name?
[Unknown]: John Stamps
What is the name of your organizational unit?
[Unknown]: IDD
What is the name of your organization?
[Unknown]: BMC
What is the name of your City or Locality?
[Unknown]: San Jose
What is the name of your State or Province?
[Unknown]: CA
What is the two-letter country code for this unit?
[Unknown]: US
Is CN=John Stamps, OU=IDD, O=BMC, L=San Jose, ST=CA, C=US correct?
[no]: yes
clm-aus-005115# pwd
/opt/bmc/bladelogic/NSH/br/deployments
clm-aus-005115# ls -l bl*
-rw-r--r-- 1 root root 1373 May 28 13:32 bladelogic.keystore
-rw-r--r-- 1 bladmin bladmin 2040 May 19 06:43 bladelogic.keystore.bakCreate the Certificate Signing Request (CSR) from BMC Server Automation primary to retrieve the certificate from CA (that is, CLM).
clm-aus-005115# /usr/java/jdk1.7.0_75/jre/bin/keytool -certreq
-keyalg RSA -alias blade -file /data1/CSR/blade.csr
-keystore /opt/bmc/bladelogic/NSH/br/deployments/bladelogic.keystore
Enter keystore password:
clm-aus-005115#At the prompt, enter changeit as the password.
Use the following openssl command (for example, /usr/bin/openssl) to generate a BladeLogic server certificate (blade.crt) on the BMC Server Automation primary host in the Certificates folder:
clm-aus-005115# /usr/bin/openssl x509 -req -days 365
-in /data1/CSR/blade.csr -CA /data1/Certificates/RootCA.crt
-CAkey /data1/Keys/RootCA.key -set_serial 01 -out /data1/Certificates/blade.crt
Signature ok
subject=/C=US/ST=CA/L=San Jose/O=BMC/OU=IDD/CN=John Stamps
Getting CA Private KeyOn the BMC Server Automation primary host, import the Root CA certificate:
clm-aus-005115# /usr/java/jdk1.7.0_75/jre/bin/keytool -import
-alias blade -keystore
/opt/bmc/bladelogic/NSH/br/deployments/bladelogic.keystore
-trustcacerts -file /data1/Certificates/RootCA.crt
Enter keystore password:
Owner: EMAILADDRESS=jstamps@bmc.com, CN=John Stamps,
OU=IDD, O=BMC, L=San Jose, ST=CA, C=US
...
Trust this certificate? [no]: yes
Certificate was added to keystore
clm-aus-005115#- At the prompt, enter changeit as the password.
- When you see the Trust this certificate prompt, enter yes.
Your certificate is added to the keystore.
Import the blade.crt certificate:
clm-aus-005115# /usr/java/jdk1.7.0_75/jre/bin/keytool
-import -alias blade
-keystore /opt/bmc/bladelogic/NSH/br/deployments/bladelogic.keystore
-trustcacerts -file /data1/Certificates/blade.crt
Enter keystore password:
Certificate reply was installed in keystoreYour certificate reply is installed in the keystore.
- Copy the bladelogic.keystore file you just created to each of the deployments server folders (for example, /opt/bmc/bladelogic/NSH/br/deployments/_launcher).
- Start the BladeLogic Application Server.
For example:
/etc/init.d/blappserv start - Verify your changes to the BMC Server Automation URL by accessing the following link:
https://<BladeLogic>:10843 (where 10843 is the SSL port) - When you access BMC Server Automation URL the first time, review the certificate details.
- Log on to the BladeLogic Application Server.through BMC Server Automation Console.
In the login screen, click Options > Certificates > View to view the certificate. This screen displays the certificate details like issued to clm-hou-bbsa and Issued by CA (for example, CLM). - For BMC Server Automation secondary, follows steps 1 > 2 > 3 > 12 > 13 >14 >15 >16 >17 in order.
To configure SSL with BMC Server Automation and Platform Manager
- On the Platform Manager host, open the providers.json file (for example, /opt/bmc/BMCCloudLifeCycleManagement/Platform_Manager/configuration/providers.json).
Change the protocol and the SSL port in the providers.json file for the BBSA_SERVER_PORT attribute value.
For example:
"name" : "BBSA_SERVER_PORT"
},
"attributeValue" : "10843",
"description" : "BBSA Webservices Port",
"guid" : "1a0e98f9-905e-4117-99dd-759f7ad41b71",
"name" : "BBSA_SERVER_PORT"
}, {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttributeValue",
"accessAttribute" : {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttribute",
"datatype" : "STRING",
"description" : "BBSA Server Protocol",
"guid" : "3bf2db7a-af7e-4bc7-8674-63c6df997a75",
"isOptional" : false,
"isPassword" : false,
"modifiableWithoutRestart" : false,
"name" : "BBSA_SERVER_PROTOCOL"
},
"attributeValue" : "https",
"description" : "BBSA Server Protocol",- Save your changes and restart the Platform Manager.
To configure BMC Network Automation with SSL
- On the BMC Network Automation host, create Keys, Certificates, and CSR folders.
- Copy RootCA.key to /data1/Keys/.
- Copy RootCA.crt to /data1/Certificates/.
- Stop the BCA-Networks Web Server.
For example:
/etc/init.d/enatomcat stop
/etc/init.d/xinetd stop - Back up the .keystore file (by default, located at /var/bca-networks-data) and then delete the old file. This procedure creates a new .keystore file.
- On the primary BMC Network Automation host, open a command prompt and navigate to the BCA-Network JRE folder (for example, /usr/java/jdk1.7.0_75/jre/bin).
Create a new keystore using the keytool utility.
If BMC Network Automation is behind a load balancer, you can use CN as the load-balancer name. Use the following syntax so that keytool works properly:[root@clm-aus-005116 bca-networks-data]# /usr/java/jdk1.7.0_75/jre/bin/keytool
-genkey -alias clm-bna -keyalg RSA -keysize 1024 -keypass "changeit"
-storepass "changeit" -keystore /var/bca-networks-data/.keystore
What is your first and last name?
[Unknown]: John Stamps
What is the name of your organizational unit?
[Unknown]: IDD
What is the name of your organization?
[Unknown]: BMC
What is the name of your City or Locality?
[Unknown]: San Jose
What is the name of your State or Province?
[Unknown]: CA
What is the two-letter country code for this unit?
[Unknown]: US
Is CN=John Stamps, OU=IDD, O=BMC, L=San Jose,
ST=CA, C=US correct?
[no]: yes
[root@clm-aus-005116 bca-networks-data]#- At the prompts, enter the required information to create the keystore, and then press Enter.
Create the Certificate Signing Request (CSR) from BMC Network Automation primary to retrieve the certificate from CA (that is, CLM).
[root@clm-aus-005116 ~]# /usr/java/jdk1.7.0_75/jre/bin/keytool
-certreq -keyalg RSA -alias clm-bna -file /data1/CSR/clm-bna.csr
-keystore /var/bca-networks-data/.keystore
Enter keystore password:
[root@clm-aus-005116 ~]#At the prompt, enter changeit as the password.
Use the following openssl command (for example, /usr/bin/openssl)to generate the BBNA server certificate (clm-bna.crt):
[root@clm-aus-005116 ~]# /usr/bin/openssl x509 -req
-days 365 -in /data1/CSR/clm-bna.csr
-CA /data1/Certificates/RootCA.crt -CAkey /data1/Keys/RootCA.key
-set_serial 04 -out /data1/Certificates/clm-bna.cr
Signature ok
subject=/C=US/ST=CA/L=San Jose/O=BMC/OU=IDD/CN=John Stamps
Getting CA Private Key- After the certificate is generated (clm-bna.crt) in the Certificates folder, copy clm-bna.crt and RootCA.crt to the BMC Network Automation primary and secondary hosts into their Certificates folder.
On the BMC Network Automation primary and secondary computers, import the first Root CA certificate into the /var/bca-networks-data/.keystore file that was generated:
[root@clm-aus-005116 ~]# /usr/java/jdk1.7.0_75/jre/bin/keytool
-import -alias root -keystore /var/bca-networks-data/.keystore
-trustcacerts -file /data1/Certificates/RootCA.crt
Enter keystore password:
Owner: EMAILADDRESS=jstamps@bmc.com, CN=John Stamps, OU=IDD,
O=BMC, L=San Jose, ST=CA, C=US
...
Trust this certificate? [no]: yes
Certificate was added to keystore
[root@clm-aus-005116 ~]#- At the prompt, enter changeit as the password.
- When you see the Trust this certificate prompt, enter yes.
Your certificate is added to the keystore. - If you have a secondary BMC Network Automation computer, import only the RootCA certificate in the java/cacerts file.
Import Root CA into the /opt/bmc/bca-networks/java/lib/security/cacerts file:
[root@clm-aus-005116 /]# /usr/java/jdk1.7.0_75/jre/bin/keytool
-import -alias root
-keystore /opt/bmc/bca-networks/java/lib/security/cacerts
-trustcacerts -file /data1/Certificates/RootCA.crt
Enter keystore password:
Owner: EMAILADDRESS=jstamps@bmc.com, CN=John Stamps,
OU=IDD, O=BMC, L=San Jose, ST=CA, C=US
...
Trust this certificate? [no]: yes
Certificate was added to keystore
[root@clm-aus-005116 /]#Import the blm-bna.crt certificate:
[root@clm-aus-005116 /]# /usr/java/jdk1.7.0_75/jre/bin/keytool
-import -alias clm-bna -keystore /var/bca-networks-data/.keystore
-trustcacerts -file /data1/Certificates/clm-bna.crt
Enter keystore password:
Certificate reply was installed in keystore
[root@clm-aus-005116 /]#Your certificate reply is installed in the keystore.
- Generate the encryption string for changeit.
- Open the BNA maintenance utility (by default, installed in /opt/bmc/bca-networks/utility).
- Click the Encrypt tab.
- Enter and confirm the changeit password.
- Click Encrypt to generate the encryption string for changeit.
- Use the generated string for the keystorePassword parameter in the server.xml file (by default, located at /opt/bmc/bca-networks/tomcat/conf).
- Start the BCA-Networks Web Server.
For example:
/etc/init.d/enatomcat start
/etc/init.d/xinetd start - Verify the BNA link by accessing https://<BNA-LB>:11443/bca-networks where 11443 is SSL port.
The default login is sysadmin/sysadmin. - If you have a load balancer, failover the BNA service and verify that you can able to access the link with Cluster name and with the same certificate it displays.
- When you access the BMC Network Automation URL the first time, review the certificate details, and so on.
To configure Platform Manager from HTTPS to HTTP with a Self-Signed Certificate
Use the following steps to configure HTTPS to HTTP using a Self-Signed Certificate. If you are running HA, you only need to run the following commands on the primary host. SSL-level certification is not required on the secondary HA host.
- Make sure the CSM service is running on the primary Platform Manager host.
For example, enter the following command:
ps -ef | grep bmccsm - On the primary Platform Manager host, create Keys, Certificates, and CSR folders.
- Back up the keystore file (by default, located at /opt/bmc/BMCCloudLifeCycleManagement/Platform_Manager/security/keystore) and then delete the old file.
This procedure creates a new keystore file. - Open a command prompt and navigate to the jre/bin folder (for example, /usr/java/jdk1.7.0_75/jre/bin).
Create a new keystore using the keytool utility and store it at /opt/bmc/BMCCloudLifeCycleManagement/Platform_Manager/security.
[root@clm-aus-005121 bin]# ./keytool -genkey -alias PM
-keyalg RSA -keysize 1024 -keypass "changeit" -storepass "changeit"
-keystore
/opt/bmc/BMCCloudLifeCycleManagement/Platform_Manager/security/keystore
What is your first and last name?
[Unknown]: John Stamps
What is the name of your organizational unit?
[Unknown]: IDD
What is the name of your organization?
[Unknown]: BMC
What is the name of your City or Locality?
[Unknown]: San Jose
What is the name of your State or Province?
[Unknown]: CA
What is the two-letter country code for this unit?
[Unknown]: US
Is CN=John Stamps, OU=IDD, O=BMC, L=San Jose, ST=CA, C=US correct?
[no]: yes
[root@clm-aus-005121 bin]#At the prompts, enter the required information to create the keystore, and then press Enter.
Create the Certificate Signing Request (PM.csr) to retrieve the certificate from Root CA.
[root@clm-aus-005121 CSR]# /usr/java/jdk1.7.0_75/jre/bin/keytool
-certreq -keyalg RSA -alias PM -file /data1/CSR/PM.csr
-keystore
/opt/bmc/BMCCloudLifeCycleManagement/Platform_Manager/security/keystore
Enter keystore password:
[root@clm-aus-005121 CSR]#At the prompt, enter changeit as the password.
Use the following openssl command (for example, /usr/bin/openssl) to generate a Platform Manager certificate (PM.crt) on the Platform Manager primary host in the Certificates folder.:
[root@clm-aus-005121 Keys]# /usr/bin/openssl x509 -req
-days 365 -in /data1/CSR/PM.csr
-CA /data1/Certificates/RootCA.crt
-CAkey /data1/Keys/RootCA.key -set_serial 01
-out /data1/Certificates/PM.crt
Signature ok
subject=/C=US/ST=CA/L=San Jose/O=BMC/OU=IDD/CN=John Stamps
Getting CA Private Key
[root@clm-aus-005121 Keys]#On the Platform Manager primary host, import the Root CA certificate:
[root@clm-aus-005121 Certificates]# /usr/java/jdk1.7.0_75/jre/bin/keytool
-import -alias root
-keystore
/opt/bmc/BMCCloudLifeCycleManagement/Platform_Manager/security/keystore
-trustcacerts -file /data1/Certificates/RootCA.crt
Enter keystore password:
Owner: EMAILADDRESS=jstamps@bmc.com, CN=John Stamps,
OU=IDD, O=BMC, L=San Jose, ST=CA, C=US
...
Trust this certificate? [no]: yes
Certificate was added to keystore- At the prompt, enter changeit as the password.
- If you are prompted that the certificate already exists, enter yes. Your certificate is added to the keystore.
Import the Root CA certificate into the Platform Manager JVM cacerts file (for example,/opt/bmc/BMCCloudLifeCycleManagement/JVM_1.7.0_55/lib/security/cacerts).
[root@clm-aus-005121 security]# /usr/java/jdk1.7.0_75/jre/bin/keytool
-import -alias root
-keystore
/opt/bmc/BMCCloudLifeCycleManagement/JVM_1.7.0_55/lib/security/cacerts
-trustcacerts -file /data1/Certificates/RootCA.crt
Enter keystore password:
Owner: EMAILADDRESS=jstamps@bmc.com, CN=John Stamps,
OU=IDD, O=BMC, L=San Jose, ST=CA, C=US
...
Trust this certificate? [no]: yes
Certificate was added to keystore
[root@clm-aus-005121 security]#At the prompt, enter changeit as the password.
Import the PM.crt certificate:
[root@clm-aus-005121 security]# /usr/java/jdk1.7.0_75/jre/bin/keytool
-import -alias PM1
-keystore
/opt/bmc/BMCCloudLifeCycleManagement/Platform_Manager/security/keystore
-trustcacerts -file /data1/Certificates/PM.crt
Enter keystore password:
Certificate was added to keystore
[root@clm-aus-005121 security]#Verify or update the config.ini file (by default, located at /opt/bmc/BMCCloudLifeCycleManagement/Platform_Manager/configuration) with the following parameters:
org.osgi.service.http.port=7070
jetty.port=7070
jetty.ssl.password=changeit
jetty.ssl.keypassword=changeitMake sure to save the config.ini file.
Verify or update the the configuration in the ../Platform_Manager/csm-bootstrap.properties file with the following parameters:
PersistenceNodeProtocol=http
NodeProtocol=http
NodePort=7070
PersistenceNodePort=7070Make sure to save the csm-bootstrap.properties file.
- Verify or update the configuration in the ../Platform_Manager/configuration/cloudservices.json file with the following changes:
Set the secureJetty attributeValue to false and the description to Use HTTP.
{
"cloudClass" : "com.bmc.cloud.model.beans.CloudService",
"accessValues" : [ {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttributeValue",
"accessAttribute" : {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttribute",
"datatype" : "Boolean",
"description" : "Use HTTP",
"guid" : "b15fc770-4119-4cd6-bea6-1efdc5ecc768",
"isOptional" : false,
"isPassword" : false,
"length" : 255,
"modifiableWithoutRestart" : false,
"name" : "secureJetty"
},
"attributeValue" : "false",
"description" : "Use HTTP",
"guid" : "2aacb37d-0b0c-48f2-b85f-e010e3705f49",
"name" : "secureJetty"
}Set the attributeValue of Jetty port, CSM Local Port, and CSM Global Registry URL to 7070.
Make sure that you also set the localhost attribute value to "localhost:7070".{
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttributeValue",
"accessAttribute" : {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttribute",
"datatype" : "Integer",
"description" : "Jetty Port",
"guid" : "f1f036cc-7050-4a08-9e00-2a38cedaeef9",
"isOptional" : false,
"isPassword" : false,
"length" : 255,
"modifiableWithoutRestart" : false,
"name" : "jettyPort"
},
"attributeValue" : "7070",
"description" : "Jetty Port",
"guid" : "e2513a26-1c6c-4fd1-9267-d3ff3d00b94a",
"name" : "jettyPort"
}
{
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttributeValue",
"accessAttribute" : {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttribute",
"datatype" : "Integer",
"description" : "CSM Local Port",
"guid" : "9ceda25b-b408-4f38-bf78-26fc8a941ced",
"isOptional" : false,
"isPassword" : false,
"length" : 255,
"modifiableWithoutRestart" : false,
"name" : "csm.local.port"
},
"attributeValue" : "7070",
"description" : "CSM Local Port",
"guid" : "b86fb3c3-d5c8-46dc-8d7d-5be05a392aff",
"name" : "csm.local.port"
}
},{
"cloudClass" : "com.bmc.cloud.model.beans.CloudService",
"accessValues" : [ {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttributeValue",
"accessAttribute" : {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttribute",
"datatype" : "String",
"description" : "CSM Global Registry URL",
"guid" : "5f49c658-e3fb-4ace-95aa-d5c13636a82e",
"isOptional" : false,
"isPassword" : false,
"length" : 255,
"modifiableWithoutRestart" : false,
"name" : "csm.global.url"
},
"attributeValue" : "localhost:7070",
"description" : "CSM Global Registry URL",
"guid" : "45cb9fc3-ac7e-49de-88d4-4d1042c48061",
"name" : "csm.global.url"
}, {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttributeValue",
"accessAttribute" : {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttribute",
"datatype" : "Integer",
"description" : "CSM Local Port",
"guid" : "9ceda25b-b408-4f38-bf78-26fc8a941ced",
"isOptional" : false,
"isPassword" : false,
"length" : 255,
"modifiableWithoutRestart" : false,
"name" : "csm.local.port"
},
"attributeValue" : 7070,
"description" : "CSM Local Port",
"guid" : "80e5622d-4dbc-49de-9ca6-deef7627e7f5",
"name" : "csm.local.port"
} ],
"cloudServiceDefinition" :
"/cloudservicedefinition/4bc19dbb-22e5-4a3d-a294-c3749e2b2947",
"cloudServiceDefinitionObject" : {
"cloudClass" : "com.bmc.cloud.model.beans.CloudServiceDefinition",
"accessAttributes" : [ {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttribute",
"datatype" : "String",
"description" : "CSM Global Registry URL",
"guid" : "5f49c658-e3fb-4ace-95aa-d5c13636a82e",
"hasValueObject" : [ {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttributeValue",
"attributeValue" : "localhost:7070",
"guid" : "79c5b890-1b4e-4514-8e28-ddd216551b3c",
"name" : "csm.global.url"
} ],
"isOptional" : false,
"isPassword" : false,
"length" : 255,
"modifiableWithoutRestart" : false,
"name" : "csm.global.url"
}, {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttribute",
"datatype" : "Integer",
"description" : "CSM Local Port",
"guid" : "9ceda25b-b408-4f38-bf78-26fc8a941ced",
"hasValueObject" : [ {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttributeValue",
"attributeValue" : "7070",
"guid" : "de64d5ff-ff11-4e2d-b1e0-941072b4ae95",
"name" : "csm.local.port"Make sure to save the cloudservices.json file.
Set the value parameter in the ../Platform_Manager/configuration/PreferenceGroup.json file to http and 7070.
{
"cloudClass": "com.bmc.cloud.model.beans.PreferenceGroupNameValuePair",
"guid": "98d27d82-44fc-41c8-bde0-007f0fa8fc2f",
"name": "clmui base URL",
"value": "http://clm-aus-005121/clmui"
},{- Stop the CSM service and then perform the following actions:
- Back up the cache and data folders in ../Platform_Manager.
- Back up the org.eclipse.* folders in ../Platform_Manager\configuration.
- Delete the cache, data, and org.eclipse.* folders.
- Update the Platform Manager Root URL in the CMF:PluginConfiguration form on the Cloud Portal and Database AR System server to http and 7070.
- Start the CSM service.
- Restart the Cloud Portal and Database AR System service.
- Use RESTClient to verify the Platform Manager SSL connection by using the SSL link.
To configure Platform Manager from HTTP to HTTPS with a Self-Signed Certificate
Use the following steps to configure HTTP to HTTPS using a Self-Signed Certificate. If you are running HA, you only need to run the following commands on the primary host. SSL-level certification is not required on the secondary HA host.
- Make sure the CSM service is running on the primary Platform Manager host.
For example, enter the following command:
ps -ef | grep bmccsm - On the primary Platform Manager host, create Keys, Certificates, and CSR folders.
- Back up the keystore file (by default, located at /opt/bmc/BMCCloudLifeCycleManagement/Platform_Manager/security/keystore) and then delete the old file.
This procedure creates a new keystore file. - Open a command prompt and navigate to the jre/bin folder (for example, /usr/java/jdk1.7.0_75/jre/bin).
Create a new keystore using the keytool utility and store it at /opt/bmc/BMCCloudLifeCycleManagement/Platform_Manager/security.
[root@clm-aus-005121 bin]# ./keytool -genkey -alias pmsslauto
-keyalg RSA -keysize 1024
-keystore
/opt/bmc/BMCCloudLifeCycleManagement/Platform_Manager/security/keystore
-dname "cn=clm-aus-005121,ou=IDD,o=BMC,l=SAN JOSE,s=CA,c=US"
-keypass changeit -storepass changeit -validity 36500
What is your first and last name?
[Unknown]: John Stamps
What is the name of your organizational unit?
[Unknown]: IDD
What is the name of your organization?
[Unknown]: BMC
What is the name of your City or Locality?
[Unknown]: San Jose
What is the name of your State or Province?
[Unknown]: CA
What is the two-letter country code for this unit?
[Unknown]: US
Is CN=John Stamps, OU=IDD, O=BMC, L=San Jose, ST=CA, C=US correct?
[no]: yes
[root@clm-aus-005121 bin]#At the prompts, enter the required information to create the keystore, and then press Enter.
Create the Certificate Signing Request (PM.csr) to retrieve the certificate from Root CA.
[root@clm-aus-005121 CSR]# /usr/java/jdk1.7.0_75/jre/bin/keytool
-certreq -keyalg RSA -alias PM -file /data1/CSR/PM.csr
-keystore
/opt/bmc/BMCCloudLifeCycleManagement/Platform_Manager/security/keystore
Enter keystore password:
[root@clm-aus-005121 CSR]#At the prompt, enter changeit as the password.
Use the following openssl command (for example, /usr/bin/openssl) to generate a Platform Manager certificate (PM.crt) on the Platform Manager primary host in the Certificates folder.:
[root@clm-aus-005121 Keys]# /usr/bin/openssl x509 -req
-days 365 -in /data1/CSR/PM.csr
-CA /data1/Certificates/RootCA.crt
-CAkey /data1/Keys/RootCA.key -set_serial 01
-out /data1/Certificates/PM.crt
Signature ok
subject=/C=US/ST=CA/L=San Jose/O=BMC/OU=IDD/CN=John Stamps
Getting CA Private Key
[root@clm-aus-005121 Keys]#On the Platform Manager primary host, import the Root CA certificate:
[root@clm-aus-005121 Certificates]# /usr/java/jdk1.7.0_75/jre/bin/keytool
-import -alias root
-keystore
/opt/bmc/BMCCloudLifeCycleManagement/Platform_Manager/security/keystore
-trustcacerts -file /data1/Certificates/RootCA.crt
Enter keystore password:
Owner: EMAILADDRESS=jstamps@bmc.com, CN=John Stamps,
OU=IDD, O=BMC, L=San Jose, ST=CA, C=US
...
Trust this certificate? [no]: yes
Certificate was added to keystore- At the prompt, enter changeit as the password.
- If you are prompted that the certificate already exists, enter yes. Your certificate is added to the keystore.
Import the Root CA certificate into the Platform Manager JVM cacerts file (for example, /opt/bmc/BMCCloudLifeCycleManagement/JVM_1.7.0_55/lib/security/cacerts).
[root@clm-aus-005121 security]# /usr/java/jdk1.7.0_75/jre/bin/keytool
-import -alias root
-keystore
/opt/bmc/BMCCloudLifeCycleManagement/JVM_1.7.0_55/lib/security/cacerts
-trustcacerts -file /data1/Certificates/RootCA.crt
Enter keystore password:
Owner: EMAILADDRESS=jstamps@bmc.com, CN=John Stamps,
OU=IDD, O=BMC, L=San Jose, ST=CA, C=US
...
Trust this certificate? [no]: yes
Certificate was added to keystore
[root@clm-aus-005121 security]#At the prompt, enter changeit as the password.
Import the PM.crt certificate:
[root@clm-aus-005121 security]# /usr/java/jdk1.7.0_75/jre/bin/keytool
-import -alias PM1
-keystore
/opt/bmc/BMCCloudLifeCycleManagement/Platform_Manager/security/keystore
-trustcacerts -file /data1/Certificates/PM.crt
Enter keystore password:
Certificate was added to keystore
[root@clm-aus-005121 security]#Verify or update the config.ini file (by default, located at /opt/bmc/BMCCloudLifeCycleManagement/Platform_Manager/configuration) with the following parameters:
org.osgi.service.http.port=9443
jetty.secured.port=9443
jetty.ssl.password=changeit
jetty.ssl.keypassword=changeitMake sure to save the config.ini file.
Verify or update the the configuration in the ../Platform_Manager/csm-bootstrap.properties file with the following parameters:
PersistenceNodeProtocol=https
NodeProtocol=https
NodePort=9443
PersistenceNodePort=9443Make sure to save the csm-bootstrap.properties file.
- Verify or update the configuration in the ../Platform_Manager/configuration/cloudservices.json file with the following changes:
Set the secureJetty attribute value to true.
{
"cloudClass" : "com.bmc.cloud.model.beans.CloudService",
"accessValues" : [ {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttributeValue",
"accessAttribute" : {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttribute",
"datatype" : "Boolean",
"description" : "Use HTTPS",
"guid" : "b15fc770-4119-4cd6-bea6-1efdc5ecc768",
"isOptional" : false,
"isPassword" : false,
"length" : 255,
"modifiableWithoutRestart" : false,
"name" : "secureJetty"
},
"attributeValue" : "true",
"description" : "Use HTTPS",
"guid" : "2aacb37d-0b0c-48f2-b85f-e010e3705f49",
"name" : "secureJetty"
}Set the attribute value of Jetty port, CSM Local Port, and CSM Global Registry URL to 9443.
{
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttributeValue",
"accessAttribute" : {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttribute",
"datatype" : "Integer",
"description" : "Jetty Port",
"guid" : "f1f036cc-7050-4a08-9e00-2a38cedaeef9",
"isOptional" : false,
"isPassword" : false,
"length" : 255,
"modifiableWithoutRestart" : false,
"name" : "jettyPort"
},
"attributeValue" : "9443",
"description" : "Jetty Port",
"guid" : "e2513a26-1c6c-4fd1-9267-d3ff3d00b94a",
"name" : "jettyPort"
}
{
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttributeValue",
"accessAttribute" : {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttribute",
"datatype" : "Integer",
"description" : "CSM Local Port",
"guid" : "9ceda25b-b408-4f38-bf78-26fc8a941ced",
"isOptional" : false,
"isPassword" : false,
"length" : 255,
"modifiableWithoutRestart" : false,
"name" : "csm.local.port"
},
"attributeValue" : "9443",
"description" : "CSM Local Port",
"guid" : "b86fb3c3-d5c8-46dc-8d7d-5be05a392aff",
"name" : "csm.local.port"
}
},{
"cloudClass" : "com.bmc.cloud.model.beans.CloudService",
"accessValues" : [ {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttributeValue",
"accessAttribute" : {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttribute",
"datatype" : "String",
"description" : "CSM Global Registry URL",
"guid" : "5f49c658-e3fb-4ace-95aa-d5c13636a82e",
"isOptional" : false,
"isPassword" : false,
"length" : 255,
"modifiableWithoutRestart" : false,
"name" : "csm.global.url"
},
"attributeValue" : "localhost:9443",
"description" : "CSM Global Registry URL",
"guid" : "45cb9fc3-ac7e-49de-88d4-4d1042c48061",
"name" : "csm.global.url"
}, {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttributeValue",
"accessAttribute" : {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttribute",
"datatype" : "Integer",
"description" : "CSM Local Port",
"guid" : "9ceda25b-b408-4f38-bf78-26fc8a941ced",
"isOptional" : false,
"isPassword" : false,
"length" : 255,
"modifiableWithoutRestart" : false,
"name" : "csm.local.port"
},
"attributeValue" : 9443,
"description" : "CSM Local Port",
"guid" : "80e5622d-4dbc-49de-9ca6-deef7627e7f5",
"name" : "csm.local.port"
} ],
"cloudServiceDefinition" :
"/cloudservicedefinition/4bc19dbb-22e5-4a3d-a294-c3749e2b2947",
"cloudServiceDefinitionObject" : {
"cloudClass" : "com.bmc.cloud.model.beans.CloudServiceDefinition",
"accessAttributes" : [ {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttribute",
"datatype" : "String",
"description" : "CSM Global Registry URL",
"guid" : "5f49c658-e3fb-4ace-95aa-d5c13636a82e",
"hasValueObject" : [ {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttributeValue",
"attributeValue" : "localhost:9443",
"guid" : "79c5b890-1b4e-4514-8e28-ddd216551b3c",
"name" : "csm.global.url"
} ],
"isOptional" : false,
"isPassword" : false,
"length" : 255,
"modifiableWithoutRestart" : false,
"name" : "csm.global.url"
}, {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttribute",
"datatype" : "Integer",
"description" : "CSM Local Port",
"guid" : "9ceda25b-b408-4f38-bf78-26fc8a941ced",
"hasValueObject" : [ {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttributeValue",
"attributeValue" : "9443",
"guid" : "de64d5ff-ff11-4e2d-b1e0-941072b4ae95",
"name" : "csm.local.port"Make sure to save the cloudservices.json file.
- Stop the CSM service and then perform the following actions:
- Back up the cache and data folders in ../Platform_Manager.
- Back up the org.eclipse.* folders in ../Platform_Manager\configuration.
- Delete the cache, data, and org.eclipse.* folders.
- Update the Platform Manager Root URL in the CMF:PluginConfiguration form on the Cloud Portal and Database AR System server to https and 9443.
- Start the CSM service.
- Restart the Cloud Portal and Database AR System service.
- Use RESTClient to verify the Platform Manager SSL connection by using the SSL link.
To modify the Platform Manager integration with SSL
The following procedure applies if you are running multiple IT Service Management servers.
- In Cloud Portal and Database ITSM, open the CMF:PluginConfiguration form and change the Root URL from http to https and update the SSL port to 9443.
- In both ITSM hosts, import the RootCA certificate.
- Copy the RootCA.crt certificate to both hosts in its own folder (for example, /data1/Certificates).
Import the certificate by entering following command.
/usr/java/jdk1.7.0_75/jre/bin/keytool -import -alias root
-keystore
/opt/bmc/BMCCloudLifeCycleManagement/JVM_1.7.0_55/lib/security/cacerts
-trustcacerts -file /data1/Certificates/RootCA.crt
Enter keystore password:
Owner: EMAILADDRESS=jstamps@bmc.com, CN=bmc.com,
OU=IDD, O=BMC, L=San Jose, ST=CA, C=US
...
Trust this certificate? [no]: yes
Certificate was added to keystoreYou do not need to import RootCA into the /usr/java/jdk1.7.0_75/jre/bin path.
- Restart the Platform Manager and AR System servers.
- Verify your changes by putting the RESTClient on the ITSM host and connecting to the Platform Manager host with SSL URL and the trustcacerts path of Cloud Java (as above).
To configure BMC Capacity Optimization with SSL
This is a two-step process:
- Generating a certificate and key to use with Apache
- Enabling Apache to use HTTPS for BMC Capacity Optimization
To generate a certificate and key to use with Apache
- Install the following packages on the host if they are not already present.
- crypto-utils
- mod_ssl
- After installing these packages, generate a new key and a new SSL certificate using the genkey $hostname command.
Here $hostname is the fully qualified domain name of your BMC Capacity Optimization application server machine. - To create a certificate request, select the appropriate option.
Enter the certificate fields with your information (Name, Firm, Country, and so on). If you do not want to manually insert a password every time you restart the Apache Httpd server (for example, if you are in an automatic HA environment), clear the encrypt key option. During key generation, review the following output on the console:
[root@clm-bco ~]# genkey csm-bco
/usr/bin/keyutil -c genreq -g 1024
-s "CN=csm-bco, OU=IDD, O=BMC, L=SAN JOSE, ST=CA, C=US" -v 24 -a
-o /etc/pki/tls/certs/csm-bco.0.csr
-k /etc/pki/tls/private/csm-bco.key -z /etc/pki/tls/.rand.24660
cmdstr: genreq
cmd_CertReq
command: genreq
...
subject = CN=csm-bco, OU=IDD, O=BMC, L=PUN, ST=SAN JOSE, C=US
valid for 1 months
random seed from /etc/pki/tls/.rand.24660
output will be written to /etc/pki/tls/certs/csm-bco.crt
output key written to /etc/pki/tls/private/csm-bco.keyThe Certificate Signing Request (csm-bco.0.csr) file is generated at the /etc/pki/tls/certs location.
- Copy the csm-bco-0.csr file where you have CA or generate the CA certificate.
Or send this csr file to CA to get certificate. Generate the certifcate, using the csm-bco-0.csr file.
/usr/bin/openssl x509 -req -days 365 -in /data1/CSR/csm-bco.0.csr
-CA /data1/Certificates/RootCA.crt -CAkey /data1/Keys/RootCA.key
-set_serial 878 -out /data1/Certificates/csm-bco.crt
Loading 'screen' into random state - done
Signature ok
subject=/C=US/ST=CA/L=SAN JOSE/O=BMC/OU=IDD/CN=csm-bco
Getting CA Private Key- When you finish generating the key, you have the following results:
- $hostname.crt certificate file in /etc/pki/tls/certs/
- $hostname.key key file in /etc/pki/tls/private/
- Create /pki/tls/certs and /pki/tls/private folders at $CPITBASE/3rd_party/apache2/etc.
- Copy /etc/pki/tls/certs/$hostname.crt to $CPITBASE/3rd_party/apache2/etc/pki/tls/certs/<hostname>.cert.
- Copy /etc/pki/tls/private/$hostname.key to $CPITBASE/3rd_party/apache2/etc/pki/tls/ private/<hostname>.key.
- Change the owner of both the copied files and the created folders to the owner using BMC Capacity Optimization.
To enable HTTPS in Apache
To enable HTTPS in your BMC Capacity Optimization installation, perform the following steps:
Modify the caplan.conf configuration file located at $CPITBASE/3rd_party/apache2/etc/httpd/conf.d, by adding the following information:
SSLEngine on
SSLProxyEngine on
SSLProtocol all -SSLv2
SSLCipherSuite ALL:!ADH:!EXPORT:!SSLv2:RC4+RSA:+HIGH:+MEDIUM:+LOW
SSLCertificateFile
$CPITBASE/3rd_party/apache2/etc/pki/tls/certs/<hostname>.crt
SSLCertificateKeyFile $CPITBASE/3rd_party/apache2
/etc/pki/tls/private/<hostname>.keyCreate the ssl.conf file in $CPITBASE/3rd_party/apache2/etc/httpd/conf.d and add the following content.
LoadModule ssl_module modules/mod_ssl.so
Listen 8443
AddType application/x-x509-ca-cert .crt
AddType application/x-pkcs7-crl .crl
SSLPassPhraseDialog builtin
SSLSessionCache shmcb:/var/cache/mod_ssl/scache(512000)
SSLSessionCacheTimeout 300
SSLMutex default
SSLRandomSeed startup file:/dev/urandom 256
SSLRandomSeed connect builtin
SSLCryptoDevice builtinMake sure that you change the required SSL port.
- Restart Httpd using the $CPITBASE/cpit restart httpd command.
The new URL to connect to BCO will be https://$hostname:8443/console. Import the certificate into /gfs/cpit/jre/lib/security/cacerts for the trusted CA certificate.
[root@clm-bco bin]# ./keytool -import -alias root
-keystore /gfs/cpit/jre/lib/security/cacerts -trustcacerts
-file /etc/pki/tls/certs/RootCA.crt
Enter keystore password:
Owner: EMAILADDRESS=clm.bmc.com, CN=CLM, OU=IDD,
O=BMC, L=SAN JOSE, ST=CA, C=US
...
Trust this certificate? [no]: yes
Certificate was added to keystore- When you access the BCO URL, review the following certificate:
To integrate BMC Capacity Optimization and Platform Manager changes into SSL
To configure BMC Atrium Orchestrator with SSL
An HA environment typically has the following components installed.
- Host A Primary: AMREPO (Access Manager and Repository) and CDP installed
- Host B Secondary: AMREPO and HACDP installed
- Host C: SQL DB for AMREPO
In non-HA environments, BMC Atrium Orchestrator Access Manager and Repository are installed on a single server.For example, see To install Atrium Orchestrator AMREPO in Installing Small Deployment Linux for version 4.5.
- On the main AO hosts (for example, Host A and B), create Keys, Certificates, and CSR folders.
- Copy RootCA.key to /data1/Keys/.
- Copy RootCA.crt to /data1/Certificates/.
Stop the Access Manager, Configuration Distribution Peer (CDP), and Repository servers.
For example:/opt/bmc/ao-platform/amrepo/bin/bao.sh stop
/opt/bmc/ao-platform/cdp/bin/bao.sh stop- Open a command prompt and navigate to the JRE folder (for example, /opt/bmc/ao-platform/amrepo/jvm/bin).
On primary Host A, create a keypair using the keytool utility.
If Atrium Orchestrator is behind a load balancer, use CN as the load balancer name. At the prompts, enter the required information to create the keypair, and then press Enter.[root@clm-aus-005119 bin]# /opt/bmc/ao-platform/amrepo/jvm/bin/keytool
-genkey -alias AO -keyalg RSA -keysize 1024 -keypass "changeit"
-storepass "changeit" -keystore /data1/Keys/keystore.jks
What is your first and last name?
[Unknown]: John Stamps
What is the name of your organizational unit?
[Unknown]: IDD
What is the name of your organization?
[Unknown]: BMC
What is the name of your City or Locality?
[Unknown]: San Jose
What is the name of your State or Province?
[Unknown]: CA
What is the two-letter country code for this unit?
[Unknown]: US
Is CN=John Stamps, OU=IDD, O=BMC, L=San Jose,
ST=CA, C=US correct?
[no]: yes
[root@clm-aus-005119 bin]#Create the Certificate Signing Request (ao.csr) from AO primary to retrieve the certificate from CA (that is, CLM).
At the prompt, enter changeit as the password.[root@clm-aus-005119 bin]# /opt/bmc/ao-platform/amrepo/jvm/bin/keytool
-certreq -keyalg RSA -alias AO -file /data1/CSR/ao.csr
-keystore /data1/Keys/keystore.jks
Enter keystore password:
[root@clm-aus-005119 bin]#Use the following openssl command (for example, /usr/bin/openssl) to generate an Atrium Orchestrator certificate (ao.crt) in the Certificates folder.:
[root@clm-aus-005119 CSR]# /usr/bin/openssl x509 -req
-days 365 -in /data1/CSR/ao.csr -CA /data1/Certificates/RootCA.crt
-CAkey /data1/Keys/RootCA.key -set_serial 999
-out /data1/Certificates/ao.crt
Signature ok
subject=/C=US/ST=CA/L=San Jose/O=BMC/OU=IDD/CN=John Stamps
Getting CA Private Key
[root@clm-aus-005119 CSR]#- After the certificate is generated (ao.crt) in the Certificates folder, copy ao.crt and RootCA.crt to the AO primary, AO secondary, and AO Repo computers into their Certificates folder.
To configure AMREPO to work with SSL
On the AO primary and AO secondary hosts, import the Root CA certificate.
At the prompt, enter changeit as the password. When you see the Trust this certificate prompt, enter yes. Your certificate is added to the keystore.[root@clm-aus-005119 Certificates]# /opt/bmc/ao-platform/amrepo/jvm/bin/keytool
-import -alias root -keystore /data1/Keys/keystore.jks -trustcacerts
-file /data1/Certificates/RootCA.crt
Enter keystore password:
Owner: EMAILADDRESS=jstamps@bmc.com, CN=John Stamps, OU=IDD,
O=BMC, L=San Jose, ST=CA, C=US
...
Trust this certificate? [no]: yes
Certificate was added to keystore
[root@clm-aus-005119 Certificates]#Import the ao.crt certificate into the AO jvm security folder.
At the prompt, enter changeit as the password.
Your certificate reply is installed in the keystore.[root@clm-aus-005119 security]# /opt/bmc/ao-platform/amrepo/jvm/bin/keytool
-import -alias root
-keystore /opt/bmc/ao-platform/amrepo/jvm/lib/security/cacerts
-trustcacerts -file /data1/Certificates/RootCA.crt
Enter keystore password:
Owner: EMAILADDRESS=jstamps@bmc.com, CN=John Stamps, OU=IDD,
O=BMC, L=San Jose, ST=CA, C=US
...
Trust this certificate? [no]: yes
Certificate was added to keystore
[root@clm-aus-005119 security]#Import the ao.crt certificate into keystore.jks (for example, /data1/Keys/keystore.jks):
[root@clm-aus-005119 security]# /opt/bmc/ao-platform/amrepo/jvm/bin/keytool
-import -alias AO -keystore /data1/Keys/keystore.jks
-trustcacerts -file /data1/Certificates/ao.crt
Enter keystore password:
Certificate reply was installed in keystore
[root@clm-aus-005119 security]#- Open the Access Manager server.xml file (in Windows, for example, /opt/bmc/ao-platform/amrepo/tomcat/conf/server.xml) in a text editor and uncomment the SSL related sections.
Search for the following text and uncomment out the Connector port section:
<!-- Define a SSL HTTP/1.1 Connector on port 8443
This connector uses the JSSE configuration, when using APR, the
connector should be using the OpenSSL style configuration
described in the APR documentation -->
<!--
<Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true"
maxThreads="150" scheme="https" secure="true"
clientAuth="false" sslProtocol="TLS" />
-->Modify the Connector port information as follows.
Uncomment the following section and update the required port (for example, 8443) and add the keystoreFile path for keystore.
Make sure that you save the file.<Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true"
maxThreads="150" scheme="https" secure="true"
clientAuth="false" sslProtocol="TLS"
keystoreFile="/data1/Keys/keystore.jks"
/>
Update the Login page entry in the context.xml file (for example, /opt/bmc/ao-platform/amrepo/tomcat/conf/context.xml) as follows:
<Environment name="com.bmc.security.am.LOGIN_PAGE" override="true"
type="java.lang.String" value="https://clm-aus-995119:8443/baoam/login.jsf"/>Start the Access Manager server.
For example:/opt/bmc/ao-platform/amrepo/bin/bao.sh start
/opt/bmc/ao-platform/cdp/bin/bao.sh start- Verify the URL.
For example:
https://<AMPrimaryHost>:8443/baoam - Add and confirm any security restrictions in your browser.
The default login is admin/admin123.
The certificate should display who you issued to and who it is issued by. For example: - Make the same changes to the secondary Access Manager server.
- Copy the keystore file.
- Update the server.xml and context.xml files.
- Import the Root CA certificate.
- Start the secondary Access Manager server.
- Verify the URL.
To configure primary and secondary CDP to work with SSL
Modify the server.xml file (for example, /opt/bmc/ao-platform/cdp/tomcat/conf/server.xml) as follows.
Uncomment the following section and update the required port (for example, 9443) and add the keystoreFile path for keystore.
<Connector port="9443" protocol="HTTP/1.1" SSLEnabled="true"
maxThreads="150" scheme="https" secure="true"
clientAuth="false" sslProtocol="TLS"
keystoreFile="/data1/Keys/keystore.jks"/>Modify the context.xml file (for example, /opt/bmc/ao-platform/cdp/tomcat/context.xml) in a text editor.
Update the following entry with corrected port and https.<Parameter name="com.bmc.ao.REPOSITORY_URL" override="true"
value="https://clm-aus-005119:9443/baorepo/http"/>Import the ROOTCA.crt certificate into the primary CDP JVM security folder.
At the prompt, enter changeit as the password.
Your certificate reply is installed in the keystore./opt/bmc/ao-platform/amrepo/jvm/bin/keytool -import -alias root
-keystore /opt/bmc/ao-platform/cdp/jvm/lib/security/cacerts
-trustcacerts -file /data1/Certificates/RootCA.crt
Enter keystore password:
Owner: EMAILADDRESS=clm.bmc.com, CN=CLM, OU=IDD, O=BMC, L=SAN JOSE, ST=CA, C=US
...
Trust this certificate? [no]: yes
Certificate was added to keystore- Import the ROOTCA.crt certificate into the secondary CDP JVM security folder.
On the secondary CDP host, modify the context.xml file (for example, /opt/bmc/ao-platform/cdp/tomcat/conf/context.xml) in a text editor.
Update the following entries with corrected port and https.Parameter name="com.bmc.ao.HACDP_CONFIGURATION" override="true"
value="https://admin:admin123@vw-hou-sln-qa18:9443/baocdp/ws/install?
grid=GRID1&peer=HACDP"/>
<Environment name="grid-name" override="true" type="java.lang.String"
value="GRID1"/>
<Environment name="peer-endpoint-urls" override="true"
type="java.lang.String"
value="https://vw-hou-sln-qa18:9443/baocdp/ws/console"/>Start the CDP server on both nodes.
For example:/opt/bmc/ao-platform/cdp/bin/bao.sh start- Verify the URL and then add and confirm any security restrictions in your browser.
The certificate should display who you issued to and who it is issued by.
For example:
https://<CDPHost>:9443/baocdp
To configure BMC Server Automation and Atrium Orchestrator with SSL
You already generated the bladelogic.keystore file for BMC Server Automation, the keystore file in /data1/Keys/keystore.jks for Atrium Orchestrator, and the RootCA.crt files in /data1/Certificates on both hosts.
Import the RootCA.crt certificate into the Bladelogic java security file on the BMC Server Automation node:
clm-aus-005115# /usr/java/jdk1.7.0_75/jre/bin/keytool -import -alias root
-keystore /opt/bmc/bladelogic/NSH/jre/lib/security/cacerts -trustcacerts
-file /data1/Certificates/RootCA.crt
Enter keystore password:
Owner: EMAILADDRESS=jstamps@bmc.com, CN=John Stamps, OU=IDD,
O=BMC, L=San Jose, ST=CA, C=US
...
Trust this certificate? [no]: yes
Certificate was added to keystore
clm-aus-005115#Import the RootCA.crt certificate into the Bladelogic java security file on the Atrium Orchestrator node:
[root@clm-aus-005119 /]# /opt/bmc/ao-platform/amrepo/jvm/bin/keytool
-import -alias root -keystore /opt/bmc/bladelogic/NSH/jre/lib/security/cacerts
-trustcacerts -file /data1/Certificates/RootCA.crt
Enter keystore password:
Certificate already exists in system-wide CA keystore under alias <root>
Do you still want to add it to your own keystore? [no]: yes
Certificate was added to keystore
[root@clm-aus-005119 /]#- Log into the BMC Server Automation server from both hosts with defaultProfile and verify the certificate obtained.
To configure Atrium Orchestrator and Platform Manager with SSL
On the Platform Manager server, update the providers.json file for BAO details like https and port numbers wherever required.
For example:[{
"cloudClass" : "com.bmc.cloud.model.beans.Provider",
"accessValues" : [ {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttributeValue",
"accessAttribute" : {
"cloudClass" : "com.bmc.cloud.model.beans.AccessAttribute",
"datatype" : "STRING",
"guid" : "52461ff1-2ec4-11e0-91fa-0800200c9a66",
"isOptional" : false,
"isPassword" : false,
"modifiableWithoutRestart" : false,
"name" : "AO_SERVER_URL"
},
"attributeValue" : "https://clm-aus-005119:9443/baocdp/orca",
"guid" : "78274c00-9d52-4b7a-bd07-7e7bfa413855",
"name" : "AO_SERVER_URL"
}Stop and restart Platform Manager.
For example:/etc/init.d/bmccsm stop
/etc/init.d/bmccsm start
To configure Atrium Orchestrator and ITSM with SSL
- On the Cloud Portal and Database server, open the CMF:PluginConfiguration form and update Atrium Orchestrator details like FIELD_AO_PROTOCOL, the FIELD_AO_PORT, and so on.
Stop and restart the AR System server.
For example:/data1/bmc/ARSystem/bin/arsystem stop
/data1/bmc/ARSystem/bin/arsystem start
To configure Cloud Portal Web Application from HTTP to HTTPS with a Self-Signed Certificate
Use the following steps to configure HTTP to HTTPS using a Self-Signed Certificate on the Cloud Portal Web Application host.
Generate a certificate (if the certificate does not exist).
For example:[root@clm-aus-005289 data1]# /opt/bmc/CloudPortalWebApplication/jre/bin/keytool
-genkey -alias clmui
-keyalg RSA -keystore /data1/Certificates/clmuiSslCertificate.cert
-dname "cn=vw-sjc-sln-qa32,ou=CLM,o=BMC,l=SAN JOSE,s=CA,c=US"
-keypass "changeit" -storepass "changeit" -validity 36500
[root@clm-aus-005289 data1]#- Copy the certificate to the required location.
For example:
/opt/bmc/CloudPortalWebApplication/clmui/Certificates - Update /opt/bmc/CloudPortalWebApplication/tomcat/conf/server.xml.
Replace the Connector entry:
<Connector connectionTimeout="20000" port="9070" protocol="HTTP/1.1"
redirectPort="9443"/>With the following information:
<Connector SSLEnabled="true" clientAuth="false" connectionTimeout="20000"
keystoreFile="/opt/bmc/CloudPortalWebApplication/clmui/Certificates
/clmuiSslCertificate.cert"
keystorePass="changeit" maxThreads="150" port="8443" scheme="https"
secure="true" sslProtocol="TLS"/>
Stop and restart Cloud Portal Web Application service.
For example:/opt/bmc/CloudPortalWebApplication/tomcat/bin/shutdown.sh
/opt/bmc/CloudPortalWebApplication/tomcat/bin/startup.sh
To configure Cloud Portal Web Application from HTTPS to HTTP with a Self-Signed Certificate
Use the following steps to configure HTTPS to HTTP using a Self-Signed Certificate.
- Update /opt/bmc/CloudPortalWebApplication/tomcat/conf/server.xml.
Replace the Connector entry:
<Connector SSLEnabled="true" clientAuth="false" connectionTimeout="20000"
keystoreFile="/opt/bmc/CloudPortalWebApplication/clmui/Certificates
/clmuiSslCertificate.cert"
keystorePass="changeit" maxThreads="150" port="8443" scheme="https"
secure="true" sslProtocol="TLS"/>With the following information:
<Connector connectionTimeout="20000" port="9070"
protocol="HTTP/1.1"
redirectPort="9443"/>
Restart Cloud Portal Web Application service.
For example:/opt/bmc/CloudPortalWebApplication/tomcat/bin/shutdown.sh
/opt/bmc/CloudPortalWebApplication/tomcat/bin/startup.sh
To configure CLM Self-Checker from HTTP to HTTPS with a Self-Signed Certificate
Use the following steps to configure HTTP to HTTPS using a Self-Signed Certificate.
Generate a certificate (if the certificate does not exist).
For example:[root@clm-aus-005282 ~]# /opt/bmc/selfchecker/jre/bin/keytool
-genkey -alias clmselfchecker -keyalg RSA
-keystore /data1/Certificates/selfcheckerSslCertificate.cert
-dname "cn=clm-aus-005282,ou=IDD,o=BMC,l=San Jose,s=CA,c=US"
-keypass "changeit" -storepass "changeit" -validity 36500
[root@clm-aus-005282 ~]#- Copy the certificate to the required location.
For example:
/opt/bmc/selfchecker/selfchecker/Certificates/selfcheckerSslCertificate.cert - Update /opt/bmc/selfchecker/tomcat/conf/server.xml .
Replace the Connector entry:
<Connector connectionTimeout="20000" port="8090" protocol="HTTP/1.1"
redirectPort="8443"/>With the following information:
<Connector SSLEnabled="true" clientAuth="false" connectionTimeout="20000"
keystoreFile="/opt/bmc/selfchecker/selfchecker/Certificates
/selfcheckSslCertificate.cert"
keystorePass="changeit" maxThreads="150" port="8443" scheme="https"
secure="true" sslProtocol="TLS"/>
Stop and restart the Self Checker service.
For example:/opt/bmc/selfchecker/tomcat/bin/shutdown.sh
/opt/bmc/selfchecker/tomcat/bin/startup.sh
To configure CLM Self-Checker from HTTPS to HTTP with a Self-Signed Certificate
Use the following steps to configure HTTPS to HTTP using a Self-Signed Certificate.
- Update /opt/bmc/selfchecker/tomcat/conf/server.xml.
Replace the Connector entry:
<Connector SSLEnabled="true" clientAuth="false" connectionTimeout="20000"
keystoreFile="/opt/bmc/selfchecker/selfchecker/Certificates
/selfcheckSslCertificate.cert"
keystorePass="changeit" maxThreads="150" port="8443" scheme="https"
secure="true" sslProtocol="TLS"/>With the following information:
<Connector connectionTimeout="20000" port="8090" protocol="HTTP/1.1"
redirectPort="8443"/>
Restart the Self Checker service.
For example:
/opt/bmc/selfchecker/tomcat/bin/shutdown.sh
/opt/bmc/selfchecker/tomcat/bin/startup.sh
Related topic
Using-CLM-applications-with-third-party-Certification-Authority-certificates