Enabling trust between the agent and the object storage
Prerequisites
Before enabling trust between the agent and the object storage, make sure that the object storage CA is trusted by RACF.
If you are working with cloud object storage such as Amazon S3, Google, or Microsoft Azure, you might have already configured RACF to trust your public CA.
If you are working with an on-premises storage device, we assume that the device’s certificate was already signed with the organizational root CA that was imported into RACF as a CA certificate. For more information about importing certificates into RACF, see the RACDCERT IMPORT (Import certificate) topic in the IBM documentation.
If the storage CA is not in RACF, perform the following steps:
- Transfer the certificate in pkcs12 format to z/OS in binary mode and store it as a data set (for example, SYS2.AMICLOUD.OBJSTORE.P12).
Import the CA certificate into RACF by using the following TSO command:
RACDCERT ADD('SYS2.AMICLOUD.OBJSTORE.P12') CERTAUTH TRUST WITHLABEL('ObjectStorage') PASSWORD('pkcs12-password')
To enable trust between the BMC AMI Cloud agent and the object storage
- Depending on whether you can use RACF virtual keyrings, perform one of the following steps:
If you can use RACF virtual keyrings:Under the agent's $MODEL9_HOME/conf directory, create a file named stdenv-overrides.sh and add the following statements to it:
IJO=" $IJO -Djavax.net.ssl.trustStore=safkeyring://*AUTH*/*"
IJO=" $IJO -Djavax.net.ssl.trustStoreType=JCERACFKS"
IJO=" $IJO -Djava.protocol.handler.pkgs=com.ibm.crypto.provider"- If you can’t use RACF virtual keyrings:
Create a keyring to be used by the BMC AMI Cloud agent user with the certificate:
RACDCERT ADDRING(AMICLOUD)
ID(M9USER) SETROPTS RACLIST(DIGTRING) REFRESH
RACDCERT CONNECT(CERTAUTH LABEL('ObjectStorage') RING(AMICLOUD))
SETROPTS RACLIST(DIGTCERT, DIGTRING) REFRESHUnder the agent's $MODEL9_HOME/conf directory, create a file named stdenv-overrides.sh and add the following statements to it:
IJO=" $IJO -Djavax.net.ssl.trustStore=safkeyring://M9USER/AMICLOUD"
IJO=" $IJO -Djavax.net.ssl.trustStoreType=JCERACFKS"
IJO=" $IJO -Djava.protocol.handler.pkgs=com.ibm.crypto.provider"
To enable object storage certificate verification, in the agent.yml file, specify false in the following parameter:
objstore.endpoint.no.verify.ssl: false- Restart the agent STC.
If no errors are visible in the log after startup, you are done. You can also list the connections under SDSF to make sure they are reused.