Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Table C-1 Configuring password encryption type elements on the Precise FocalPoint server 

Element

...

Description
-i3-

...

userSee Authenticate to CLI

...

Utility in the Precise CLI Utility Reference Guide.
-i3-encrypted-

...

passwordSee Authenticate to CLI

...

Utility in the Precise CLI Utility Reference Guide.
-

...

action

Always: encrypt-update

Mandatory: Yes

-

...

type

Always: aes-key

Mandatory: Yes

AES-based encryption that uses a random symmetric key. It is recommended to update this key once a year.

Security level: high

For example:

./infra/bin/psin_cli.sh
-i3-user user-name
{-i3-password encrypted-password
| -i3-clear-password clear-password}
-action encrypt-update
-type aes-key

Distributing the new password encryption settings to all servers

For the new password encryption settings to take effect, you must distribute them to all servers by using the Precise CLI installation utility. This procedure depends on the Precise Listener being up and running on all servers; otherwise, the agents on the servers will not be able to function.

To distribute the new encryption settings to all servers1.    In

  1. In AdminPoint, verify that the Precise Listener is up and running on all servers.

...

  1. Run the following command from the

...

  1. <Precise_

...

  1. root> folder on the Precise FocalPoint server:
    • Windows

...

    • infra\bin\psin_cli.bat
      -i3-user user-name
      {-i3-password encrypted-password
      | -i3-clear-password clear-password}
      -action encrypt-distribute
    • UNIX

...

    • ./infra/bin/psin_cli.sh
      -i3-user user-name
      {-i3-password encrypted-password
      | -i3-clear-password clear-password}
      -action encrypt-distribute

Table C-2    Distributing 2 Distributing new password encryption element settings to all servers

Element

...

Description
-i3-

...

userSee Authenticate to CLI

...

Utility in the Precise CLI Utility Reference Guide.
-i3-encrypted-

...

passwordSee Authenticate to CLI

...

Utility in the Precise CLI Utility Reference Guide.
-

...

action

Always: encrypt-distribute

Mandatory: Yes

Configuring the Precise Apache Tomcat to work in HTTPS mode (SSL)

The Precise user interface is based on an Apache Tomcat server. You can configure it to work in HTTPS mode. This mode uses the Secure Socket Layer (SSL) protocol to encrypt the data that is sent from the Web browser to the Tomcat server.

To configure Precise Apache Tomcat to work in HTTPS mode1.    Create

  1. Create a certificate keystore on the Apache Tomcat server. This file is saved in the folder

...

  1. <Precise_root>\products\gui\website as a certificate .keystore file.

      ...

        1. Before you create the .keystore file, delete the alias Tomcat if it already exists. To delete the alias Tomcat, run the following command from

      ...

        1. the <Precise_root> folder on the Precise FocalPoint

      ...

        1. :

      ...

          • Windows

      ...


          • java\JRE\bin\keytool -delete -alias tomcat -keystore products\gui\website\.keystore

            Info

      ...

          • For the password, use "

      ...

          • changeit." For the question

      ...

          • "What is your first and last

      ...

          • name," provide the server name used in the URL for the Precise GUI as the answer.

      ...

          • UNIX
            java/JRE/bin/keytool -delete -alias tomcat -keystore products/gui/website/.keystore
        1. To create your own certificate, run the following command from

      ...

        1. the <Precise_root> folder on the Precise

      ...

        1. FocalPoint:

      ...


          • Windows
            java

      ...

          • \JRE

      ...

          • \bin

      ...

          • \keytool -genkey -alias tomcat -keyalg RSA -keystore products

      ...

          • \gui

      ...

          • \website

      ...

          • \.keystore -validity 3000

      ...

          • UNIX
            java

      ...

          • /JRE

      ...

          • /bin

      ...

          • /keytool -genkey -alias tomcat -keyalg RSA -keystore products

      ...

          • /gui

      ...

          • /website

      ...

          • /.keystore -validity 3000

            Info

      ...

          • For the password, use "

      ...

          • changeit." Also, use the host as displayed in the url for the name.

      ...

      1. In the file

      ...

      1. <Precise_

      ...

      1. root>\products\gui\website\conf\server.xml

          ...

            1. Add comment tags around the non-SSL <Connector> tag, where the preliminary remark is

          ...

            1. "<!-- Define a non-SSL HTTP/1.1

          ...

            1. ...->."
            2. Remove the comment tags around

          ...

            1. the SSL <Connector> tag, where the preliminary remark is

          ...

            1. "<!-- Define a SSL Coyote HTTP/1.1

          ...

            1. ...->."
          1. Restart the Precise FocalPoint process on the UNIX server. Restart the Precise FocalPoint service and the Precise user interface service on the Windows server.

          ...

          1. Open the Precise application using HTTPS.
            For example:
            https://<host>:<port>

            Info

          ...

          1. After restarting the Precise FocalPoint, the SSL port changes to the default port added by the user during installation. If you want to use a different port, you can change the port as described in the

          ...

          1. Change GUI server

          ...

          1. port section in the Precise CLI Utility.


            When first launching Precise in a client, a security alert is displayed with the certificate details. You should sign your certificate with a trusted root authority (such as VeriSign). Alternatively you can install the certificate on each client server that uses the Precise GUI.

          ...

          1. In AdminPoint, click the Setup tab and click on Nodes in the drop-down menu

          ...

          1. In the Nodes tab, click Edit to update the

          ...

          1. URL of the node for which you configured the SSL, according to step 4. In addition, if you are working with the Precise Custom Portal, the following configuration must be performed.

          To configure Precise Apache Tomcat to work in HTTPS mode with the Precise Custom Portal1.    Export

          1. Export the certificate:
            <i3>java\jre\bin\keytool -export -alias tomcat -file <file

          ...

          1. _

          ...

          1. name>.crt
            -keystore <i3>products\gui\website\.keystore

          ...

          1. Import the certificate:
            <i3>java\jre\bin\keytool -import -file <file

          ...

          1. _

          ...

          1. name>.crt -alias tomcat
            -storepass <changeit> -keystore <i3>\java\JRE\lib\security\cacerts

            Info

          ...

          1. Verify that the

          ...

          1. same <file_name>.crt is used for exporting and importing the certificate.

            Info

          ...

          1. For the password, use "

          ...

          1. changeit."

          To install a certificate1.    When

          1. When you get the certificate warning, click View certificate.

          ...

          1. Click Install certificate.

          ...

          1. Click Next.

          ...

          1. Select Place all certificates in the following store.

          ...

          1. Click Browse.

          ...

          1. Check Show physical store.

          ...

          1. Select Local Computer under Trusted root certification Authorities.

          ...

          1. Click OK, Next, and then Finish.

          ...

          1. Close and restart the Precise GUI, and verify that the warning for the certificate does not re-appear.

          For general information regarding configuring HTTPS mode see Apache Tomcat server instructions found at this site: http://tomcat.apache.org/tomcat-4.1-doc/ssl-howto.html

          For information regarding configuring J2EE to work in HTTPS mode, see About Security Options in the Precise for J2EE User 's Guide.

          For information on installing your own certificate for J2EE, see the Creating and installing certificates for SSL in the Precise Administration Guide.

          Changing the session timeout for an Apache Tomcat server

          For an Apache Tomcat server, you can configure the Tomcat session timeout.

          To change the session timeout for an Apache Tomcat server1.    Open

          1. Open the following file in a text editor:

          ...

          1. <Precise_

          ...

          1. root>\products\gui\website\webapps\i3\web.xml

          ...

          1. Change the default session timeout (180) to the required minutes. For example:
            <session-config>

          ...

          1.      <session-timeout>180</session-timeout>
            </session-config>

          ...

          1. Restart the Precise FocalPoint server.

          Anchor
          VerifyingPreciselogincredentialsusinganexternalpasswordrepository
          VerifyingPreciselogincredentialsusinganexternalpasswordrepository
          Verifying Precise login credentials using an external password repository

          Info

          ...

          Configuring the Precise login mechanism is not required to secure a Precise system.

          Precise FocalPoint confirms the Precise authentication credentials by using the Java Authentication and Authorization Service (JAAS). The JAAS runs a login module that authenticates the password according to an internal Precise roles’ roles' table.

          Because the JAAS is a common Application Programming Interface (API), you can also configure it to run a custom login module that authenticates a role’s password against an external, centralized password repository. To do so, you must first define the respective role in AdminPoint. For more information on managing roles in AdminPoint, see the Precise Administration Guide.

          The login module is a Java class that implements the login module interface of the JAAS API. This API exists for the Java Runtime Application (JRE) version 1.4.2 and later. It is part of the javax.security.auth.* package.

          When your own login module is ready for use, configuring the external password authentication involves the following tasks:•    Updating

          • Updating the Precise configuration to work with the new login module

          ...

          • Adding the class of the new login module to the Precise CLASSPATH

          To update the Precise configuration1.    Log

          1. Log in to the Precise FocalPoint.

          ...

          1. Back up the following file:

          ...

          1. <Precise_

          ...

          1. root>/products/i3fp/login/jaas.config

          ...

          1. In the original file, do the following:
            1. Change the

          ...

            1. line. StartPoint{com.precise.infra.login.InfraDbLdapSupportLoginModule required;};

          ...

            1. To. To StartPoint{new login module class required;};
            where new login module class is the class name of your custom login module.

          ...

          1. Save and close the file.

          To add the new login module class to the Precise classpath1.    Log

          1. Log in to the Precise FocalPoint.

          ...

          1. Back up the following file:

          ...

          1. <Precise_

          ...

          1. root>/products/i3fp/bin/psin_i3fp_init.xml

          ...

          1. In the original file, append the path of the class of the new login module to the classpath section.

          ...

          1. Save and close the file.

          ...

          1. Restart Precise FocalPoint.

          Anchor
          RunningPreciseservicesonWindowswithanonAdministrativeuser
          RunningPreciseservicesonWindowswithanonAdministrativeuser
          Running Precise services on Windows with a non-Administrative user

          ...