Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.

Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |

Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
Configure Identity Management component
If you are using the Identity Management component, to configure the Identity Management component for FIPS 140-2 compliance, do the following:
- Update the
applicationContext.xml
file. - Re-encrypt passwords.
- Update the
idm-security.properties
file.
Note
The examples in this section explain how to configure the Identity Management component that
is installed on the same instance as HP Codar,
where HP Codar is configured in a
standalone environment. If your environment is different, files may be located in a different directory.
In the following instructions,
CSA_HOME
is the directory in which
Codar is installed (for example,
C:\Program Files\Hewlett-Packard\Codar/usr/local/hp/csa
)
and CSA_JRE_HOME
is the directory in which the JRE
used by HP Codar has been installed.
Update the applicationContext.xml File
The applicationContext.xml
file for the Codar Console
must be updated to be FIPS 140-2 compliant.
Do the following:
-
Open the
CSA_HOME\jboss-as\standalone\deployments\
idm-service.war\WEB-INF\spring\applicationContext.xmlCSA_HOME/jboss-as/standalone/deployments/
file in a text editor.
idm-service.war/WEB-INF/spring/applicationContext.xml -
Locate the
START Standard Mode Configuration
comment and comment out the following content that appears between theSTART Standard Mode Configuration
andEND Standard Mode Configuration
comments:<bean id="simpleEncryptionConfiguration" class="com.hp.csa.security.CSASimplePBEConfig" init-method="init">
</bean>
<bean id="configurationEncryptor" class="org.jasypt.encryption.pbe.StandardPBEStringEncryptor">
<property name="config" ref="simpleEncryptionConfiguration" />
</bean>
<bean id="propertyConfigurer" class="org.jasypt.spring.properties.
EncryptablePropertyPlaceholderConfigurer">
<constructor-arg ref="configurationEncryptor" />
<property name="locations">
<list>
<value>classpath:csa.properties</value>
<value>classpath:swagger.properties</value>
</list>
</property>
</bean> -
Locate the
START FIPS Mode Configuration
comment that appears immediately after theStandard Mode Configuration
section and uncomment the following content that appears between theSTART FIPS Mode Configuration
andEND FIPS Mode Configuration
comments:<bean id="configurationEncryptor" class="com.hp.csa.security.util.CSASecurityHelper" />
<bean id="propertyConfigurer" class=
"com.hp.csa.security.CSAEncryptablePropertyPlaceholderConfigurer">
<constructor-arg ref="configurationEncryptor" />
<property name="locations">
<list>
<value>/WEB-INF/spring/applicationContext.properties</value>
</list>
</property>
</bean> -
Locate the
START FIPS Mode Configuration
comment for thecsaTemplateFactory
bean and uncomment the following content that appears between theSTART FIPS Mode Configuration
andEND FIPS Mode Configuration
comments:<property name="fipsEnabled" value="true" />
-
Locate the
START FIPS Mode Configuration
comment for thekeystoneTemplateFactory
bean and uncomment the following content that appears between theSTART FIPS Mode Configuration
andEND FIPS Mode Configuration
comments:<property name="fipsEnabled" value="true" />
- Save and close the file.
Re-Encrypt Passwords
This section describes how to generate and replace the passwords used by the Identity Management component. You will be generating new passwords using FIPS 140-2 compliant utilities.
Generate and replace the passwords for the following Identity Management component properties:
- idm.csa.password
- idm.encryptedSigningKey
- idm.keystone.transportPassword
- consumer
- idmTransportUser
Note The default password values for these properties are provided in the steps below (they will appear in parentheses after the property name).
To generate and replace existing passwords used by the Identity Management component, do the following:
-
Open a command prompt and change to the
CSA_HOME\Tools\PasswordUtil
directory. For example:Windows:
C:\Program Files\Hewlett-Packard\Codar\Tools\PasswordUtil
Linux:
/usr/local/hp/codar/Tools/PasswordUtil
-
Generate a password by running the following command (this example uses the same example names from Create HP Codar encryption keystore):
"CSA_JRE_HOME\bin\java" -jar passwordUtil-standalone.jar encrypt <password> JsafeJCE ../../jboss-as/standalone/configuration/codar_encryption_keystore.p12 < Codar encryption keystore password> codar_encryption_key
../../jboss-as/standalone/configuration/key.dat
Note The path separators used in the
passwordUtil-standalone.jar
script options are forward slashes (/). You can also use double backward slashes (\\) as your path separators.The encrypted value of the password is displayed.
If you used different names for the keystore, alias, or encrypted symmetric key file, here is an example of the command without using the example names:
"CSA_JRE_HOME\bin\java" -jar "CSA_HOME\Tools\PasswordUtil\passwordUtil-standalone.jar" encrypt <password> JsafeJCE < Codar encryption keystore>
< Codar encryption keystore password>
< Codar encryption keystore alias>
<location and name of the encrypted symmetric key>Note If you use path separators in the
passwordUtil-standalone.jar
script options, use either a single forward slash (/) or double backward slashes (\\) as your path separator. -
Open the
CSA_HOME\jboss-as\standalone\deployments\
idm-service.war\WEB-INF\spring\applicationContext.propertiesCSA_HOME/jboss-as/standalone/deployments/
file in a text editor and do the following:
idm-service.war/WEB-INF/spring/applicationContext.properties-
Update the
idm.csa.password
(csaTransportUser) property.idm.csa.password
must be the same password you configured for thesecurityTransportPassword
property (which is configured in thecsa.properties
file). See Encrypt HP Codar passwords again for more information about encrypting thesecurityTransportPassword
password property. -
Update the
idm.encryptedSigningKey
(cloud) property.idm.encryptedSigningKey
must be the same password you configured for thesecurityEncryptedSigningKey
property (which is configured in thecsa.properties
file). See Encrypt HP Codar passwords again for more information about encrypting thesecurityEncryptedSigningKey
password property. -
If you are using Keystone, update the
idm.keystone.transportPassword
property.idm.keystone.transportPassword
must be the password you configured for the user defined by theidm.keystone.transportUsername
property and is located above theidm.keystone.transportPassword
property. - Save and close the file.
-
-
Open the
CSA_HOME\jboss-as\standalone\deployments\
idm-service.war\WEB-INF\classes\csa-consumer-users.propertiesCSA_HOME/jboss-as/standalone/deployments/
file in a text editor and do the following:
idm-service.war/WEB-INF/classes/csa-consumer-users.properties-
Update the
consumer
(cloud,SERVICE_CONSUMER,ROLE_REST,enabled) andconsumerAdmin
(cloud,SERVICE_CONSUMER,ROLE_REST,ROLE_ADMIN,enabled) properties.Note This property not only contains the password, but also the roles that control access to Codar and if the account is enabled.
This entire value must be encrypted. - Save and close the file.
-
-
Open the
CSA_HOME\jboss-as\standalone\deployments\
idm-service.war\WEB-INF\classes\csa-provider-users.propertiesCSA_HOME/jboss-as/standalone/deployments/
file in a text editor and do the following:
idm-service.war/WEB-INF/classes/csa-provider-users.properties-
Update the
admin
(cloud,ROLE_REST,enabled),csaReportingUser
(cloud,ROLE_REST,ROLE_DYNAMIC,enabled),cdaInboundUser
(CDA2CSAIntegration!,ROLE_REST,enabled), andooInboundUser
(cloud,,ROLE_REST,enabled) properties.Note This property not only contains the password, but also the roles that control access to Codar and if the account is enabled.
This entire value must be encrypted. - Save and close the file.
-
-
Open the
CSA_HOME\jboss-as\standalone\deployments\
idm-service.war\WEB-INF\classes\integrationusers.propertiesCSA_HOME/jboss-as/standalone/deployments/
file in a text editor and do the following:
idm-service.war/WEB-INF/classes/integrationusers.properties-
Update the
idmTransportUser
(idmTransportUser,ROLE_ADMIN,PERM_IMPERSONATE,enabled) property.Note This property not only contains the password, but also the roles that control access to Codar and if the account is enabled.
This entire value must be encrypted.The password in the
idmTransportUser
value must be the same password you configured for both thesecurityIdmTransportUserPassword
property (configured in thecsa.properties
file) and thepassword
attribute (configured in the idmProvider section of thempp.json
file). See Encrypt HP Codar passwords again for more information about encrypting thesecurityIdmTransportUserPassword
password property. See for more information about encrypting thepassword
attribute. - Save and close the file.
-
Update the idm-security.properties File
Enable the FIPS 140-2 security settings in the idm-security.properties
file. Do the following:
-
Open the
CSA_HOME\jboss-as\standalone\deployments\
idm-service.war\WEB-INF\classes\idm-service.propertiesCSA_HOME/jboss-as/standalone/deployments/
file in a text editor.
idm-service.war/WEB-INF/classes/idm-service.properties - Verify that the FIPS 140-2 property values in this file are the same values that are configured in the
CSA_HOME\jboss-as\standalone\deployments\csa.war\
WEB-INF\classes\csa.propertiesCSA_HOME/jboss-as/standalone/deployments/csa.war/
file. You should have already copied these values (see Configure HP Codar properties for more information about these properties).
WEB-INF/classes/csa.properties - Save and close the file.
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to clouddocs@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: