<rt id="bn8ez"></rt>
<label id="bn8ez"></label>

  • <span id="bn8ez"></span>

    <label id="bn8ez"><meter id="bn8ez"></meter></label>

    ゞ沉默是金ゞ

    魚離不開水,但是沒有說不離開哪滴水.
    posts - 98,comments - 104,trackbacks - 0

    The following step explains how you can enable a security layer for communication between your environment's endpoints.

    Before you begin

    Be sure you have completed Java SE security tutorial - Step 3 prior to proceeding with this task.

    About this task

    The eXtreme Scale topology supports both Transport Layer Security/Secure Sockets Layer (TLS/SSL) for secure communication between ObjectGrid endpoints (client, container servers, and catalog servers). This step of the tutorial builds upon the previous steps to enable transport security.

    Procedure

    1. Create TLS/SSL keys and key stores
      In order to enable transport security, you must create a key store and trust store. This exercise only creates one key and trust-store pair. These stores are used for ObjectGrid clients, container servers, and catalog servers, and are created with the JDK keytool.
      • Create a private key in the key store

        keytool -genkey -alias ogsample -keystore key.jks -storetype JKS -keyalg rsa -dname "CN=ogsample, OU=Your Organizational Unit, O=Your Organization, L=Your City, S=Your State, C=Your Country" -storepass ogpass -keypass ogpass -validity 3650

        Using this command, a key store key.jks is created with a key "ogsample" stored in it. This key store key.jks will be used as the SSL key store.

      • Export the public certificate

        keytool -export -alias ogsample -keystore key.jks -file temp.key -storepass ogpass

        Using this command, the public certificate of key "ogsample" is extracted and stored in the file temp.key.

      • Import the client's public certificate to the trust store

        keytool -import -noprompt -alias ogsamplepublic -keystore trust.jks -file temp.key -storepass ogpass

        Using this command, the public certificate was added to key store trust.jks. This trust.jks is used as the SSL trust store.

    2. Configuring ObjectGrid property files

      In this step, you must configure the ObjectGrid property files to enable transport security.

      First, copy the key.jks and trust.jks files into the objectgridRoot/security directory.

      We set the following properties in the client.properties and server.properties file.

      transportType=SSL-Required  alias=ogsample contextProvider=IBMJSSE2 protocol=SSL keyStoreType=JKS keyStore=../security/key.jks keyStorePassword=ogpass trustStoreType=JKS trustStore=../security/trust.jks trustStorePassword=ogpass

      transportType: The value of transportType is set to "SSL-Required", which means the transport requires SSL. So all the ObjectGrid endpoints (clients, catalog servers, and container servers) should have SSL configuration set and all transport communication will be encrypted.

      The other properties are used to set the SSL configurations. See Transport layer security and secure sockets layer for a detailed explanation. Make sure you follow the instructions in this topic to update your orb.properties file.

      Make sure you follow this page to update your orb.properties file.

      In the server.properties file, you must add an additional property clientAuthentication and set it to false. On the server side, you do not need to trust the client.

      clientAuthentication=false

    3. Run the application

      The commands are the same as the commands in the Java SE security tutorial - Step 3 topic.

      Use the following commands to start a catalog server.
      1. Navigate to the bin directory: cd objectgridRoot/bin
      2. Start the catalog server:
        • [Linux][Unix]
          startOgServer.sh catalogServer -clusterSecurityFile ../security/security.xml  -serverProps ../security/server.properties -JMXServicePort 11001  -jvmArgs -Djava.security.auth.login.config="../security/og_jaas.config"
        • [Windows]
          startOgServer.bat catalogServer -clusterSecurityFile ../security/security.xml  -serverProps ../security/server.properties -JMXServicePort 11001 -jvmArgs  -Djava.security.auth.login.config="../security/og_jaas.config"

        The security.xml and server.properties files were created in the Java SE security tutorial - Step 2 page.

        Use the -JMXServicePort option to explicitly specify the JMX port for the server. This option is required to use the xsadmin command.

        Run a secure ObjectGrid container server:

      3. Navigate to the bin directory again: cd objectgridRoot/bin
        • [Linux][Unix]
          startOgServer.sh c0 -objectGridFile ../xml/SecureSimpleApp.xml  -deploymentPolicyFile ../xml/SimpleDP.xml -catalogServiceEndPoints  localhost:2809 -serverProps ../security/server.properties  -JMXServicePort 11002 -jvmArgs  -Djava.security.auth.login.config="../security/og_jaas.config"  -Djava.security.auth.policy="../security/og_auth.policy"
        • [Windows]
          startOgServer.bat c0 -objectGridFile ../xml/SecureSimpleApp.xml  -deploymentPolicyFile ../xml/SimpleDP.xml -catalogServiceEndPoints localhost:2809  -serverProps ../security/server.properties -JMXServicePort 11002  -jvmArgs -Djava.security.auth.login.config="../security/og_jaas.config"  -Djava.security.auth.policy="../security/og_auth.policy"
      Notice the following differences from the previous container server start command:
      • Use SecureSimpleApp.xml instead of SimpleApp.xml
      • Add another -Djava.security.auth.policy to set the JAAS authorization policy file to the container server process.

      Run the following command for client authentication:

      1. cd objectgridRoot/bin
      2. javaHome/java -classpath ../lib/objectgrid.jar;../applib/secsample.jar  com.ibm.websphere.objectgrid.security.sample.guide.SecureSimpleApp  ../security/client.properties manager manager1

        Because user "manager" has permission to all the maps in the accounting ObjectGrid, the application runs successfully.

      You may also use xsadmin to show the mapsizes of the "accounting" grid.
      • Navigate to the directory objectgridRoot/bin.
      • Use the xsadmin command with option -mapSizes as follows.
        • [Unix][Linux]
          xsadmin.sh -g accounting -m mapSet1 -mapsizes -p 11001 -ssl  -trustpath ..\security\trust.jks -trustpass ogpass -trusttype jks  -username manager -password manager1
        • [Windows]
          xsadmin.bat -g accounting -m mapSet1 -mapsizes -p 11001 -ssl  -trustpath ..\security\trust.jks -trustpass ogpass -trusttype jks  -username manager -password manager1

        Notice we specify the JMX port of the catalog service using -p 11001 here.

        You see the following output.

        This administrative utility is provided as a sample only and is not to  be considered a fully supported component of the WebSphere eXtreme Scale product. Connecting to Catalog service at localhost:1099 *********** Displaying Results for Grid - accounting, MapSet - mapSet1 *********** *** Listing Maps for c0 *** Map Name: customer Partition #: 0 Map Size: 1 Shard Type: Primary Server Total: 1 Total Domain Count: 1

      Running the application with an incorrect key store

      If your trust store does not contain the public certificate of the private key in the key store, you will get an exception complaining that the key cannot be trusted.

      In order to show this, create another key store key2.jks.

      keytool -genkey -alias ogsample -keystore key2.jks -storetype JKS -keyalg rsa -dname "CN=ogsample, OU=Your Organizational Unit, O=Your Organization, L=Your City, S=Your State, C=Your Country" -storepass ogpass -keypass ogpass -validity 3650

      Then modify the server.properties to make the keyStore point to this new key store key2.jks:

      keyStore=../security/key2.jks

      Run the following command to start the catalog server:

      1. Navigate to bin: cd objectgridRoot/bin
      2. Start the catalog server:
        [Linux][Unix]
        startOgServer.sh c0 -objectGridFile ../xml/SecureSimpleApp.xml  -deploymentPolicyFile ../xml/SimpleDP.xml -catalogServiceEndPoints localhost:2809  -serverProps ../security/server.properties -jvmArgs  -Djava.security.auth.login.config="../security/og_jaas.config"  -Djava.security.auth.policy="../security/og_auth.policy"
        [Windows]
        startOgServer.bat c0 -objectGridFile ../xml/SecureSimpleApp.xml  -deploymentPolicyFile ../xml/SimpleDP.xml -catalogServiceEndPoints localhost:2809  -serverProps ../security/server.properties -jvmArgs  -Djava.security.auth.login.config="../security/og_jaas.config"  -Djava.security.auth.policy="../security/og_auth.policy"

        You see the following exception:

        Caused by: com.ibm.websphere.objectgrid.ObjectGridRPCException:     com.ibm.websphere.objectgrid.ObjectGridRuntimeException:         SSL connection fails and plain socket cannot be used.

        Finally, change the server.properties file back to use the key.jks file.

    posted on 2012-06-26 19:33 ゞ沉默是金ゞ 閱讀(835) 評論(0)  編輯  收藏 所屬分類: eXtreme
    主站蜘蛛池模板: 91av免费在线视频| 亚洲视频在线观看2018| 黄色毛片视频免费| 免费看又爽又黄禁片视频1000 | 亚洲高清偷拍一区二区三区 | 亚洲第一网站免费视频| 伊人久久免费视频| 亚洲AV无码一区二区三区DV| 三级网站免费观看| 亚洲AV无码国产精品麻豆天美 | 亚洲天堂2016| 成人超污免费网站在线看| 亚洲乱码在线观看| 女人18毛片免费观看| 日日摸日日碰夜夜爽亚洲| 四虎永久在线精品免费影视 | 在线人成免费视频69国产| 久久精品国产96精品亚洲| 久久午夜羞羞影院免费观看| 亚洲男人天堂影院| 成人免费无码大片A毛片抽搐色欲| 综合偷自拍亚洲乱中文字幕| 亚洲AV成人精品日韩一区18p| 深夜免费在线视频| 久久精品亚洲日本佐佐木明希| 亚洲成年人免费网站| 亚洲熟妇无码av另类vr影视| 四虎永久在线精品免费影视| a在线免费观看视频| 亚洲影视一区二区| 国产成人免费全部网站| 中文成人久久久久影院免费观看| 亚洲最新永久在线观看| 成年女人18级毛片毛片免费| 成人a毛片免费视频观看| 亚洲激情视频在线观看| 天天天欲色欲色WWW免费| 久久久免费观成人影院| 亚洲日韩乱码中文无码蜜桃| 免费人成在线观看网站品爱网日本| 97在线视频免费公开视频|