Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
| Search for | Example | Results |
|---|---|---|
| A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
|
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
| Search for | Operator | Example |
|---|---|---|
|
Two or more words in the same topic |
|
|
| Either word in a topic |
|
|
| Topics that do not contain a specific word or phrase |
|
|
| Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
| A combination of search types | ( ) parentheses |
|
Configure Identity Management component
If you are using the Identity Management component, to configure the Identity Management component for FIPS 140-2 compliance, do the following:
- Update the
applicationContext.xmlfile. - Re-encrypt passwords.
- Update the
idm-security.propertiesfile.
Note
The examples in this section explain how to configure the Identity Management component that
is installed on the same instance as HP Codar,
where HP Codar is configured in a
standalone environment. If your environment is different, files may be located in a different directory.
In the following instructions,
CSA_HOME is the directory in which
Codar is installed (for example,
C:\Program Files\Hewlett-Packard\Codar/usr/local/hp/csa)
and CSA_JRE_HOME is the directory in which the JRE
used by HP Codar has been installed.
Update the applicationContext.xml File
The applicationContext.xml file for the Codar Console
must be updated to be FIPS 140-2 compliant.
Do the following:
-
Open the
CSA_HOME\jboss-as\standalone\deployments\
idm-service.war\WEB-INF\spring\applicationContext.xmlCSA_HOME/jboss-as/standalone/deployments/file in a text editor.
idm-service.war/WEB-INF/spring/applicationContext.xml -
Locate the
START Standard Mode Configurationcomment and comment out the following content that appears between theSTART Standard Mode ConfigurationandEND Standard Mode Configurationcomments:<bean id="simpleEncryptionConfiguration" class="com.hp.csa.security.CSASimplePBEConfig" init-method="init">
</bean>
<bean id="configurationEncryptor" class="org.jasypt.encryption.pbe.StandardPBEStringEncryptor">
<property name="config" ref="simpleEncryptionConfiguration" />
</bean>
<bean id="propertyConfigurer" class="org.jasypt.spring.properties.
EncryptablePropertyPlaceholderConfigurer">
<constructor-arg ref="configurationEncryptor" />
<property name="locations">
<list>
<value>classpath:csa.properties</value>
<value>classpath:swagger.properties</value>
</list>
</property>
</bean> -
Locate the
START FIPS Mode Configurationcomment that appears immediately after theStandard Mode Configurationsection and uncomment the following content that appears between theSTART FIPS Mode ConfigurationandEND FIPS Mode Configurationcomments:<bean id="configurationEncryptor" class="com.hp.csa.security.util.CSASecurityHelper" />
<bean id="propertyConfigurer" class=
"com.hp.csa.security.CSAEncryptablePropertyPlaceholderConfigurer">
<constructor-arg ref="configurationEncryptor" />
<property name="locations">
<list>
<value>/WEB-INF/spring/applicationContext.properties</value>
</list>
</property>
</bean> -
Locate the
START FIPS Mode Configurationcomment for thecsaTemplateFactorybean and uncomment the following content that appears between theSTART FIPS Mode ConfigurationandEND FIPS Mode Configurationcomments:<property name="fipsEnabled" value="true" /> -
Locate the
START FIPS Mode Configurationcomment for thekeystoneTemplateFactorybean and uncomment the following content that appears between theSTART FIPS Mode ConfigurationandEND FIPS Mode Configurationcomments:<property name="fipsEnabled" value="true" /> - Save and close the file.
Re-Encrypt Passwords
This section describes how to generate and replace the passwords used by the Identity Management component. You will be generating new passwords using FIPS 140-2 compliant utilities.
Generate and replace the passwords for the following Identity Management component properties:
- idm.csa.password
- idm.encryptedSigningKey
- idm.keystone.transportPassword
- consumer
- idmTransportUser
Note The default password values for these properties are provided in the steps below (they will appear in parentheses after the property name).
To generate and replace existing passwords used by the Identity Management component, do the following:
-
Open a command prompt and change to the
CSA_HOME\Tools\PasswordUtildirectory. For example:Windows:
C:\Program Files\Hewlett-Packard\Codar\Tools\PasswordUtilLinux:
/usr/local/hp/codar/Tools/PasswordUtil -
Generate a password by running the following command (this example uses the same example names from Create HP Codar encryption keystore):
"CSA_JRE_HOME\bin\java" -jar passwordUtil-standalone.jar encrypt <password> JsafeJCE ../../jboss-as/standalone/configuration/codar_encryption_keystore.p12 < Codar encryption keystore password> codar_encryption_key
../../jboss-as/standalone/configuration/key.dat
Note The path separators used in the
passwordUtil-standalone.jarscript options are forward slashes (/). You can also use double backward slashes (\\) as your path separators.The encrypted value of the password is displayed.
If you used different names for the keystore, alias, or encrypted symmetric key file, here is an example of the command without using the example names:
"CSA_JRE_HOME\bin\java" -jar "CSA_HOME\Tools\PasswordUtil\passwordUtil-standalone.jar" encrypt <password> JsafeJCE < Codar encryption keystore>
< Codar encryption keystore password>
< Codar encryption keystore alias>
<location and name of the encrypted symmetric key>Note If you use path separators in the
passwordUtil-standalone.jarscript options, use either a single forward slash (/) or double backward slashes (\\) as your path separator. -
Open the
CSA_HOME\jboss-as\standalone\deployments\
idm-service.war\WEB-INF\spring\applicationContext.propertiesCSA_HOME/jboss-as/standalone/deployments/file in a text editor and do the following:
idm-service.war/WEB-INF/spring/applicationContext.properties-
Update the
idm.csa.password(csaTransportUser) property.idm.csa.passwordmust be the same password you configured for thesecurityTransportPasswordproperty (which is configured in thecsa.propertiesfile). See Encrypt HP Codar passwords again for more information about encrypting thesecurityTransportPasswordpassword property. -
Update the
idm.encryptedSigningKey(cloud) property.idm.encryptedSigningKeymust be the same password you configured for thesecurityEncryptedSigningKeyproperty (which is configured in thecsa.propertiesfile). See Encrypt HP Codar passwords again for more information about encrypting thesecurityEncryptedSigningKeypassword property. -
If you are using Keystone, update the
idm.keystone.transportPasswordproperty.idm.keystone.transportPasswordmust be the password you configured for the user defined by theidm.keystone.transportUsernameproperty and is located above theidm.keystone.transportPasswordproperty. - Save and close the file.
-
-
Open the
CSA_HOME\jboss-as\standalone\deployments\
idm-service.war\WEB-INF\classes\csa-consumer-users.propertiesCSA_HOME/jboss-as/standalone/deployments/file in a text editor and do the following:
idm-service.war/WEB-INF/classes/csa-consumer-users.properties-
Update the
consumer(cloud,SERVICE_CONSUMER,ROLE_REST,enabled) andconsumerAdmin(cloud,SERVICE_CONSUMER,ROLE_REST,ROLE_ADMIN,enabled) properties.Note This property not only contains the password, but also the roles that control access to Codar and if the account is enabled.
This entire value must be encrypted. - Save and close the file.
-
-
Open the
CSA_HOME\jboss-as\standalone\deployments\
idm-service.war\WEB-INF\classes\csa-provider-users.propertiesCSA_HOME/jboss-as/standalone/deployments/file in a text editor and do the following:
idm-service.war/WEB-INF/classes/csa-provider-users.properties-
Update the
admin(cloud,ROLE_REST,enabled),csaReportingUser(cloud,ROLE_REST,ROLE_DYNAMIC,enabled),cdaInboundUser(CDA2CSAIntegration!,ROLE_REST,enabled), andooInboundUser(cloud,,ROLE_REST,enabled) properties.Note This property not only contains the password, but also the roles that control access to Codar and if the account is enabled.
This entire value must be encrypted. - Save and close the file.
-
-
Open the
CSA_HOME\jboss-as\standalone\deployments\
idm-service.war\WEB-INF\classes\integrationusers.propertiesCSA_HOME/jboss-as/standalone/deployments/file in a text editor and do the following:
idm-service.war/WEB-INF/classes/integrationusers.properties-
Update the
idmTransportUser(idmTransportUser,ROLE_ADMIN,PERM_IMPERSONATE,enabled) property.Note This property not only contains the password, but also the roles that control access to Codar and if the account is enabled.
This entire value must be encrypted.The password in the
idmTransportUservalue must be the same password you configured for both thesecurityIdmTransportUserPasswordproperty (configured in thecsa.propertiesfile) and thepasswordattribute (configured in the idmProvider section of thempp.jsonfile). See Encrypt HP Codar passwords again for more information about encrypting thesecurityIdmTransportUserPasswordpassword property. See for more information about encrypting thepasswordattribute. - Save and close the file.
-
Update the idm-security.properties File
Enable the FIPS 140-2 security settings in the idm-security.properties file. Do the following:
-
Open the
CSA_HOME\jboss-as\standalone\deployments\
idm-service.war\WEB-INF\classes\idm-service.propertiesCSA_HOME/jboss-as/standalone/deployments/file in a text editor.
idm-service.war/WEB-INF/classes/idm-service.properties - Verify that the FIPS 140-2 property values in this file are the same values that are configured in the
CSA_HOME\jboss-as\standalone\deployments\csa.war\
WEB-INF\classes\csa.propertiesCSA_HOME/jboss-as/standalone/deployments/csa.war/file. You should have already copied these values (see Configure HP Codar properties for more information about these properties).
WEB-INF/classes/csa.properties - Save and close the file.
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to clouddocs@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback:

