wlmcert man page on HP-UX

Man page or keyword search:  
man Server   10987 pages
apropos Keyword Search (all sections)
Output format
HP-UX logo
[printable version]

wlmcert(1M)							   wlmcert(1M)

NAME
       wlmcert - manage security certificates for HP-UX Workload Manager

SYNOPSIS
       [cmd]
       certificate
       certificate
       directory]

DESCRIPTION
       allows you to manage your WLM security certificates.

OPTIONS
       -h [cmd]
	   Displays  usage  information	 and  exits. This option overrides all
	   other options.

	   To get usage information for the command  or	 specify  the  command
	   after For example:

	   # wlmcert -h reset

       Displays version information and exits.	This option overrides all
	   options other than

       Creates the certificates for the system on which the command is
	   executed.

	   Only root can execute this operation.

	   This	 operation  is	performed  automatically when you install WLM.
	   After running this operation:

	    · The system trusts itself

	    You can use the
	      command to make a copy of the system's  certificate,  which  you
	      can  then	 add  to  other	 systems' WLM certificate repositories
	      (truststores) to enable secure communications between  the  cur‐
	      rent system and those systems

	   The	name of each newly created certificate is based on the name of
	   the host where it is generated. Thus, on host1, the certificate  is
	   named  host1.pem.  This makes it easier for you to identify trusted
	   systems. If you have not yet assigned a host	 name  to  the	system
	   where  WLM is being installed, the certificate is given the default
	   name loopback.pem. When you assign a name  to  the  host,  security
	   will	 continue  to work even if the host name differs from the cer‐
	   tificate name. To achieve a match between the host and  certificate
	   names,  you	can  use the command to remove the current certificate
	   and then to reset the certificates so that the host and certificate
	   names match.

       Adds the named
	   certificate to the WLM truststore on the current system.

	   Only root can execute this operation.

	   The	current	 system	 can  communicate securely with any system for
	   which it has a certificate in its truststore. When using WLM's man‐
	   agement  of	virtual partitions or nPartitions, each partition must
	   have in its truststore the certificate for  every  other  partition
	   with which it is being managed.

       Removes the named
	   certificate from the WLM truststore on the current system.

	   Only root can execute this operation.

       Lists the certificates in the WLM truststore on the current system.

	   The	current	 system	 can  communicate securely with any system for
	   which it has a certificate in its truststore. When using WLM's man‐
	   agement  of	virtual partitions or nPartitions, each partition must
	   have in its truststore the certificate for  every  other  partition
	   with which it is being managed.

       extract [-d directory]
	   Extracts  the WLM certificate for the current system, placing it in
	   the named directory.	 If a directory is not specified, the certifi‐
	   cate is placed in the current directory.

	   The	certificate  is	 named host.pem, where host is the name of the
	   current system.

HOW TO SECURE COMMUNICATIONS
       To secure WLM communications:

       1. Log in as root on every system where you have installed WLM
	  and want to secure communications

       2. Ensure a random number generator is available

	  Use either /dev/random or as the random number generator.

	      · Using /dev/random

		For  HP-UX  11i	 v1  (B.11.11),	  install   /dev/random	  from
		http://www.hp.com/go/softwaredepot (search for "KRNG11i"). For
		HP-UX 11i v2 (B.11.23) and HP-UX 11i v3 (B.11.31), /dev/random
		is included.

		To  use	 /dev/random  on HP-UX 11i v2 or HP-UX 11i v3, run the
		following command as root:

		# /usr/sbin/kcmodule rng=loaded

		No commands are needed to use /dev/random on HP-UX 11i v1.

	      · Using prngd

		To start on either HP-UX 11i v1 or HP-UX 11i v2:

		1. Set the variable PRNGD_START

		   In  the  file  /etc/rc.config.d/prngd,  set	the   variable
		   PRNGD_START to 1.

		2. Run the following command as root:

		   # /sbin/init.d/prngd.rc start

		For more information, see the prngd manpage.

		When  using the PRNG devices, you may want to place the daemon
		in a workload group by itself--and limit its  CPU  allocation.
		The    path    to    use   in	an   application   record   is
		/opt/openssl/prngd/prngd.

       3. Extract the certificates

	  When you install WLM on a system, WLM automatically creates  a  cer‐
	  tificate  for	 that system. If a certificate was somehow not created
	  on a system, execute the following operation on the system to create
	  the certificate:

	      # /opt/wlm/bin/wlmcert reset

	  On each system where you are going to run WLM (either in the form of
	  or run to place a copy of that system's certificate in your  current
	  directory:

	      system1# /opt/wlm/bin/wlmcert extract

	      system2# /opt/wlm/bin/wlmcert extract

	      system3# /opt/wlm/bin/wlmcert extract

	  Each certificate is named based on the system where it is generated.
	  Thus, on system1, the certificate is named system1.pem.  If  a  host
	  name	had  not  yet  been  assigned to the system where WLM is being
	  installed, then the certificate is given the default name  of	 loop‐
	  back.pem.  When you subsequently assign a name to the host, security
	  continues to work even though the host name differs  from  the  cer‐
	  tificate  name.  If  you  want the host name and certificate name to
	  match	 (this	facilitates  identifying  trusted  systems),  see  the
	  instructions in the section that discusses the command.

       4. Exchange the certificates among all the systems

	  Distribute  each  system's  certificate to every other system--where
	  you will run or the secure command,

	      system1# scp system1.pem system2:

	      system1# scp system1.pem system3:

	      system2# scp system2.pem system1:

	      system2# scp system2.pem system3:

	      system3# scp system3.pem system1:

	      system3# scp system3.pem system2:

       5. Install all the certificates on your WLM systems

	  On each system where you will run or install the  certificates  from
	  every other system:

	      system1# /opt/wlm/bin/wlmcert install -c system2.pem

	      system1# /opt/wlm/bin/wlmcert install -c system3.pem

	      system2# /opt/wlm/bin/wlmcert install -c system1.pem

	      system2# /opt/wlm/bin/wlmcert install -c system3.pem

	      system3# /opt/wlm/bin/wlmcert install -c system1.pem

	      system3# /opt/wlm/bin/wlmcert install -c system2.pem

	  If you use Serviceguard on the system running be sure to install the
	  certificates from the systems managed by  that  on  any  systems  to
	  which	 may  fail  over.  Also,  install  the	certificates  from all
	  failover systems to the systems being managed by that

       6. Install all the certificates on systems controlling WLM

	  Using the WLM GUI, you can control WLM from systems that do not have
	  the full WLM product installed. These systems need the WLM GUI prod‐
	  uct and the proper  JRE  version.  For  more	information,  see  the
	  wlmgui(1M) manpage.

	  The  WLM  GUI must have all the certificates from all the systems it
	  is controlling, even if the WLM GUI is running on the same host that
	  it  is  controlling.	(However, if you are using the WLM GUI to con‐
	  trol remote systems, the remote systems do not  need	a  certificate
	  from your local system.)

	  For  HP-UX  systems  or  Microsoft Windows systems where you want to
	  securely control WLM operations, use the Java command	 to  create  a
	  local	 truststore  and  to  add a certificate to that truststore, as
	  explained in the steps that follow.

	  The WLM GUI only uses the truststore in the  user's  default	trust‐
	  store (keystore) location.

	  To  create a truststore and secure communications between and on the
	  local host, follow these steps (the communications  daemon  services
	  requests from allowing local and remote access to the system):

	      1. Kill any running instance of

		 # /opt/wlm/bin/wlmcomd -k

	      2. Generate a truststore (keystore) for the user root

		 # keytool -genkey

	      3. Extract the WLM certificate

		 # wlmcert extract

	      4. Import the WLM certificate to the local truststore of
		 root (file $HOME/.keystore)

		 # keytool -import -alias wlm -file /host-name.pem

		 where host-name is your local host's name.

	      For  more information on the command and its options, and on the
	      default truststore (keystore) location, refer to	the  following
	      web site:
	      http://java.sun.com/j2se/1.5/docs/tooldocs/windows/keytool.html

       7. Start or restart the WLM daemons using the option

	  Start	 the WLM daemons with the option . If a daemon is already run‐
	  ning, you can start it again with the	 option	 without  stopping  it
	  first:

	      system1# /opt/wlm/bin/wlmd -s
	      Alternatively,  all daemons will start in secure mode if you use
	      the sbin/init.d/wlm script to start WLM.	However,  ensure  that
	      the following variables are enabled in /etc/rc.config.d/wlm. You
	      can change the default by editing the  values  for  these	 vari‐
	      ables.

	  If  you are using WLM's partition management or its Instant Capacity
	  management:

	      system1# /opt/wlm/bin/wlmpard -s

	  If you are using WLM's command, you must complete the following  two
	  steps.

	      1. Start with its option:

		     system1# /opt/wlm/bin/wlmcomd -s

	      2. Select the "Use secure connections" checkbox in the GUI

		     Select:

		     Settings
			-> Preferences item
			   -> Connections tab
			      -> "Use secure connections" checkbox

		     Then  select either the [OK] button or the [Apply] button
		     followed by the [OK] button.

	  Start the WLM daemons with on system2 and system3.

	  You can have these daemons  run  automatically  in  secure  mode  by
	  starting WLM using the /sbin/init.d/wlm script. However, ensure that
	  the secure mode variables are enabled in /etc/rc.config.d/wlm.

AUTHOR
       was developed by HP.

FEEDBACK
       If you would like to comment on the current HP-UX WLM functionality  or
       make suggestions for future releases, please send email to:

       wlmfeedback@rsn.hp.com

FILES
       Directory containing various files related to certificates

SEE ALSO
       wlmd(1M), wlmgui(1M), wlm(5)

       HP-UX Workload Manager User's Guide (/opt/wlm/share/doc/WLMug.pdf)

       HP-UX Workload Manager homepage (http://www.hp.com/go/wlm)

								   wlmcert(1M)
[top]

List of man pages available for HP-UX

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net