Milestone 4a: Configuring BMC AMI Common Enterprise Services after a fresh installation
After installing , there are a few additional configuration considerations required to allow full functionality of the application. Start and launch the application from a browser using the URL specified in the installation. For example:
Once in the application, navigate to the Administration page. To access this page, you are required to provide the default password. See Database Setup. Select each of the following configuration items:
- Database setup
- Host connections
- Update center
- Security
- Web server
- HTTPS and Client Server Certificate Authentication
- Smart Card authentication
- Additional product configuration
Database setup
Although installs out of the box with a fully functional Apache Derby database, you can either switch databases or migrate that database to one of the following supported databases:
- Apache Derby (default)
- Microsoft SQL Server
- Oracle
- IBM Db2 for LUW
- IBM Db2 for z/OS
Further database setup details are provided in both the online help for , as well as Appendix B: Database Configuration of this installation space.
Host connections
Host Connection settings are used to specify port connections to the Host Communications Interface (HCI). There must be at least one HCI port configured per LPAR.
For features requiring to manage leased-licensing, the Host Connection setting needs to point to the HCI connected to the BMC AMI License Management System (LMS) holding those license files. That HCI and LMS must be on the same LPAR. For more information on licensing, see Appendix A of the Installation space.
Optionally, autoconfiguration may be enabled in the CMSC. Information such as the accessible HCI host/port combinations are automatically sent and will automatically populate within . users may enter the URL in their preferences. This will synchronize the configured HCI connections to their own environment, eliminating the need for manual entry.
Further details for host connections setup are provided in the Help.
Update Center
The Update Center provides a means for centrally administering updates to BMC AMI Products for Web and . Updates are provided by obtaining an update repository, either online or manually.
Installed tab
Displays those BMC AMI Products for Web that are currently installed.
Updates tab
- Set Check for updates online to On -- On page load, a list of available updates is retrieved from a cloud-based BMC update server. Check with your network administrator to be sure you can issue HTTPS requests to update.bmc.com on port 443. A secure proxy may be required.
Set Check for updates online to Off -- This option allows you to manually upload and updates downloaded from the BMC Support or obtained from a BMC representative.
Security
(beginning with 18.2.1) provides the ability to secure access to administrative functions within the application.
If a default password was enabled in the prior release, the upgraded will automatically create the user ID “cesadmin” with the password “cesadministration”.
The “cesrecovery” user function allows an administrator to login when there is no connection to the database in order to reconfigure the database. The default password is “cesadministration”, or a previous administration password. This can be changed on the Users tab.
Change the default auto-fill user ID
To change the default auto-fill user ID, specify a user ID by using the following entry in the security.properties file:
If you don't want the default auto-fill user ID to be populated, use the following entry without specifying a user ID:
This parameter allows the user to control the default auto-fill user ID displayed in the login dialog. If the user has added one to their browser cache, the cache will override the default. So, the user would have to clear their browser cache of our URL to see the security.display.username property. If the parameter does not exist in the security.properties file the default cesadmin user name is displayed.
Default location of the security.properties file is:
Further details for security configuration are provided in the Help.
Web server
Web Server Settings allow you to configure and manage settings for the following:
- HTTPS - requires keystore information. The default port is: 48443
- Proxy - allows for HTTP Proxy and Secure Proxy.
Further details for Web Server settings are provided in the Help.
HTTPS and Client Server Certificate Authentication
Use the following steps to set up HTTPS and Client Server Certificate Authentication.
- Navigate to the Web Server page.
- On the tab that allows control of HTTP and HTTPS, toggle HTTP to the Off position, and toggle HTTPS to the On position.
Note: Turning HTTP off is an essential step in the process. - With the toggle for HTTPS turned on, you must also do the following:
- In the Location section, enter the full file path of the .jks keystore you created.
- In the password section, enter the password tied to the .jks keystore file.
- In the certificate alias section, enter the alias of the certificate you intend to use. Normally this is your machine name.
- Change Client Certificate Authentication from None to Keystore.
- Change the toggle for Require Client Certification Auth to On.
- Click Apply.
Note: When doing this for the first time, it may be a good idea to first turn on HTTPS without turning off HTTP, check that HTTPS works, and then turn off HTTP. If HTTP is off and HTTPS is set incorrectly, you will be locked out of your , completing the process in two steps rather than one is slower but safer.
If you are locked out of CES:
If, during Step 3 above, you turned off HTTP and your HTTPS was not properly set, you must follow these steps to get up and running again:
- Shut down .
- Go into the properties files (normally contained within data/ces/config) and find ces.properties. Open it.
- Find the line "jetty.port.enabled=" and change false to *true*.
- Find the line "jetty.secure.port.enabled=" and change true to *false*.
- Find the line "jetty.port=" and change "0" to whatever port no. you want HTTP to use.
- Find the line "jetty.secure.port=" and change the port no. there to 0.
- Save and close the file.
- Start up .
After following these steps, you'll be back in your previous state, with HTTP enabled and HTTPS disabled. Troubleshoot your certificates, then try turning on HTTPS once more. Then, continue with Step 4 below.
4. Once has restarted, enter the new URL in the address bar and navigate to the secure .
5. Navigate to the "Security" page on .
6. Go into the Security tab.
7. Choose the Security option labeled Client Certificate. Here, you should see two input fields.
8. Change the client certificate mask field as you wish using Regex.
Note: However, make sure before you hit Apply that your choice will not lock out any users you wish to have access. If you are unsure, the default client certificate mask is a safe choice to start with.
9. Add the name you defined your certificate with when creating your client cert to the Administrator(s) field. Most commonly, this will be either your company-defined ID or your Firstname + Lastname, with a space in between the two names--check with the person or organization who created your client certificate if you are unsure what value to use.
10. Click Apply, and restart .
If you are getting an unauthorized user error:
If you are not able to access after turning on Client Certificate Security and need to remove and reapply security, follow these steps:
- Shut down .
- Go into the properties files (normally contained within data/ces/config) and find security.properties. Open it.
- Find the line "auth.mode=" and change X509 to NONE. (the all-caps is important!)
- Save and close the file.
- Start .
Having performed these steps, should now be in a state in which HTTPS is on, but without Client Certificate security, allowing you to change your settings and retry.
11. Once you've restarted, you should see a prompt from the browser itself asking you to choose a certificate. Choose the browser certificate you created.
You should now have access to X509/Client Certificate security.
Smart Card authentication
Smart Card authentication can be set up on . With Smart Card authentication, users are able to log on to by inserting a physical card into their machine, without having to manually enter credentials.
Complete the following steps on the Web Server Settings page to establish Smart Card authentication:
- Disable the HTTP port and enable the HTTPS port.
- Within the KeyStore settings:
- Be sure the KeyStore chosen to enable HTTPS matches the authentication established on users' Smart Cards.
- Set the Client certificate authentication to an option other than 'None'. Click Apply. will restart.
- Navigate to the Security tab on the Security page, and switch the Authentication Mode to On. Navigate to the Client certificate tab.
- Enter the appropriate client certificate mask, and the administrator IDs for the associated admin users. Click Apply.
- will restart with x509 enabled. Authentication by Smart Card is now possible for those users whose certificate within the KeyStore established in the Web Server Settings page matches the certificate established on their Smart Card.
Additional product configuration
(
only) To configure web application (manager), see the Installation and Configuration space.
(
only) To configure , see the Configuration space.
(
only) At least one
Agent per LPAR is required to be installed on z/OS UNIX in order initiate measurements. See Installing the Topaz for Java Performance Agent.
(
Web only) To configure Web, see the Web online help accessed within .
( Web only) To configure Web, an HCI should be configured in that has access to a installation on the desired LPAR.