MainView Middleware Administrator
MainView Middleware Administrator architecture
This section illustrates the MainView Middleware Administrator architecture, showing the product running on a Linux or Windows server and communicating with queue managers on a Windows, UNIX, or iSeries server. The underlying protocol communicates with MainView Middleware Administrator by using a secured connection, which requires installing a MainView Middleware Administrator certificate. MainView Middleware Administrator becomes an MQ client that communicates administration requests to the distributed queue managers.
Installing the MainView Middleware Administrator certificate
Communication between BMC AMI Ops Monitor for MQ and MainView Middleware Administrator uses an SSL connection and requires a valid certificate. You must install the certificate to a key store on the mainframe and on the MainView Middleware Administrator server.
MVMA distributes a default certificate, but you can use a user-generated certificate if you prefer. The MVMA certificate is in the key store named keystore.jks in the security folder of the MainView Middleware Administrator installation directory.
You can use the gskkyman keytool utility to create a key store to host your certificates on the mainframe. For more information about gskkyman, see the cryptographic services documentation from IBM.
To install the MainView Middleware Administrator certificate
Use the keytool command to export the proper certificate alias from keystore.jks.
keytool -export -keystore keystore.jks -file bmmadminhttps.crt - alias bmmadminhttps -storepass bmcsoftware- Use FTP to send the certificate in bin format to a USS file on the mainframe.
- Use the mainframe gskkyman CLIST to host the certificate.
- To create a new key database, select option 1.
- Enter a password of your choice.
- For the remaining prompts, accept the defaults.
- From the Key Management Menu use option 7 to import the certificate bmcadminhttps.crt
From the Key Management Menu, select option 10 to store the database password. This step creates the password stash file, key.sth.
For example, use /shrd/etc/bmm/bmcadminhttps.crt for the import file name, and use bmmadmin for the label.
- The Key Management Menu is displayed, use option 10 to store the database password. Creates the password stash file (key.sth).