Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
- Requirements for required SSL encryption and trusted clients
- Example: Enabling required SSL encryption and trusted clients
- Example: Generating a client certificate with OpenSSL
- Example: Generating a server certificate with OpenSSL
- Example: Viewing the contents of a cacerts file
- Add a client certificate to the Web tier
- Update the cacerts keystore file
- Use keytool to create a certificate request
- Use keytool to create a private key
Example: Enabling required SSL encryption and trusted clients
The following example describes the following SSL configuration.
- Requiring SSL encryption using the Service Manager server's signed certificate
- Requiring client authentication using the Service Manager client's signed certificate
- Requiring trusted client authentication using a list of trusted client certificates
Note This example builds on information presented in the generating a server certificate and generating a client certificate examples.
- Generate a signed server certificate for the Service Manager server. See Example: Generating a server certificate with OpenSSL.
-
Generate a signed client certificate for each Service Manager client. See Example: Generating a client certificate with OpenSSL.
Note This step involves importing each Service Manager client's signed certificate into a trusted clients keystore (trustedclients.keystore) by using the keytool import command. To enable trusted sign-on, you must do so for each client certificate you want to be part of the list of trusted clients.
- Install the signed certificates and supporting keys on the Service Manager server. To do so, copy the following keystore files into the
RUN
folder of the Service Manager server.- servercert.keystore – This keystore file contains the Service Manager server's signed certificate and private key
- cacerts – This keystore file contains the certificate and private key of the certificate authority that signed the server's certificate
- trustedclients.keystore – This keystore contains the signed certificates of your Service Manager server's trusted clients
- Stop the Service Manager server.
- Open the Service Manager initialization file (
sm.ini
) with a text editor. - Add the following parameters to require SSL encryption using the Service Manager server's signed certificate.
- keystoreFile:servercert.keystore – identifies the keystore file containing the Service Manager server's certificate and private key
- keystorePass:changeit – identifies the password to the keystore file containing the Service Manager server's certificate and private key
- ssl:1 – Requires SSL encryption using the server's signed certificate.
- ssl_reqClientAuth:2 – Requires Service Manager clients to present signed certificates to connect to the server and also be on the list of trusted clients.
- ssl_trustedClientsJKS: trustedclients.keystore – identifies the keystore containing the signed certificates of trusted Service Manager clients
- ssl_trustedClientsPwd:ClientKeyPassword – identifies the password to the keystore file containing the signed certificates of trusted Service Manager clients
- sslConnector:1 – requires Service Manager clients to use an HTTPS port when communicating with the server.
- truststoreFile:cacerts – identifies the keystore file containing the certificate authority's certificate
- truststorePass:changeit – identifies the password to the keystore file containing the certificate authority's certificate
- Save the Service Manager initialization file.
- Restart the Service Manager server.
- Copy the following keystore files to the web tier's
WEB-INF
folder:- cacerts – This keystore file contains the certificate and private key of the certificate authority that signed the server's certificate
- <clientcerts>.keystore – This keystore contains the signed certificate of your Service Manager web tier client
- Copy the following keystore files to each Windows client's
<Windows client installation path>\plugins\com.hp.ov.sm.client.common_x.xx
folder.- cacerts – This keystore file contains the certificate and private key of the certificate authority that signed the server's certificate
<clientcerts>.keystore – This keystore contains the signed certificate of each Windows client
Note You should have created a separate <clientcerts>.keystore for each Windows client.
- Configure Service Manager web clients to validate the Service Manager server's signed certificate and present signed client certificates.
- Stop the web application server running the web tier, open the web configuration file (
web.xml
) in a text editor. - Set
cacerts
to the keystore containing your server's certificate authority, for example/WEB-INF/cacerts
. You copied this keystore from the JRE\lib\security folder of your Java Run Time Environment (RTE) or Java Development Kit (JDK) to the web tier'sWEB-INF
folder. - Set
keystore
to the keystore containing your web tier's signed certificate, for example/WEB-INF/<clientcerts>.keystore
. You created this keystore when you created the client certificate request. - Set customize-folder to a folder on the web tier host in which your webtier.properties file is located. You created a webtier.properties file in the <Customize-Folder>/config directory when you set the keystore password.
Set
keystorePassword
to the password required to access your web tier client keystore, for exampleClientKeyPassword
. You created this keystore password when you created the web tier client certificate request.Note The keystorePassword parameter has been removed from the web tier configuration file
web.xml
) since Service Manager 9.34p2, and you should enter your web client keystore password in a webtier.properties file. For more information about how to set the keystorePassword parameter, see Encryption of client keystore passwords.- Set
ssl
totrue
. - Set
serverHost
to the fully-qualified domain name of the Service Manager server. For example:myserver.mydomain.com
.
- Stop the web application server running the web tier, open the web configuration file (
- Configure Service Manager Windows clients to validate the Service Manager server's signed certificate and present signed client certificates. Do the following on each Windows client.
- Click Window > Preferences > Service Manager > Security.
- Set CA Certificates File to the
cacerts
keystore you copied to the<Windows client installation path>\plugins\com.hp.ov.sm.client.common_x.xx
folder. - Set Keystore File to the keystore containing your Windows client's signed certificate, for example
<clientcerts>.keystore
. You created this keystore when you created the Windows client certificate request. Set Keystore password to the password required to access the Windows client keystore. For example, ClientKeyPassword. You created this keystore password when you created the Windows client certificate request.
- Update your Windows client connections by selecting Use SSL Encryption on their Advanced tab.
Related topics
Example: Generating a server certificate with OpenSSL
Secure Sockets Layer (SSL) configuration options
Requirements for required SSL encryption