SSM Installation and Configuration Guide

     Previous  Next    Open TOC in new window    View as PDF - New Window  Get Adobe Reader - New Window
Content starts here

Installing SSMs

This sections provides step-by-step instructions for installing and enrolling SSMs and performing additional post-installation tasks.

The following topics are described:

 


Installation Requirements

SSMs require certain software components to operate properly.

System Requirements

For system requirements on machines where which SSMs are installed, see the release notes.

Other Requirements

 


Installation Topologies

SSMs can be installed using a distributed or centralized deployment model:

 


SSM Upgrades

The SSM installer detects earlier versions and upgrades an existing SSMs using its configuration information. To perform an upgrade, follow this procedure:

  1. Upgrade the Administration Server before upgrading any SSMs. SSMs can continue to run while the Administration Server is being upgraded.
  2. Make sure you have read and delete permission for the SSMs files. You must be logged in as a member of the group used when the earlier version was installed.
  3. If using an SCM on the SSM machine, shut it down.
  4. Run the installation program, as described in Installation Steps.
  5. When the SSM installer runs, it detects the earlier versions and uses its configuration information.

  6. Respond to the prompts as required.

 


Installation Steps

To install an SSM:

  1. Shut down any running programs.
  2. Unzip the installation ZIP file.
  3. The file name is OES10gR3_ssm_win32.zip (Windows), OES10gR3_ssm_solaris32.zip (UNIX), or OES10gR3_ssm_linux.zip (Linux).

  4. Launch the installation program as described in Table 3-1.
  5. Table 3-1 SSM Installation Programs
    Windows
    Launch OES10gR3_ssm_win.exe
    Note: To generate a verbose installation log, add the following to the launch command:
    -log=<logfile> -log_priority=debug
    Example:
    OES10gR3_ssm_win32.exe -log=D:\logs\oes_install.log -log_priority=debug
    Solaris
    1. Change the protection on the install file by entering: chmod u+x OES10gR3_ssm_solaris32.bin.
    2. Enter: OES10gR3_ssm_solaris32.bin
    Note: To generate a verbose installation log, add the following to the launch command:
    -log=<logfile> -log_priority=debug
    Example:
    oes320ssm_solaris32.bin -log=/opt/logs/oes_install.log -log_priority=debug
    Linux
    1. Change the protection on the install file by entering chmod u+x OES10gR3_ssm_rhas_IA32.bin.
    2. Enter: OES10gR3_ssm_rhas_IA32.bin
    Note: To generate a verbose installation log, use same command string as described above for Solaris.

  6. Complete the prompts using Table 3-2.

Table 3-2 SSM Installation Prompts
Window
Action
Welcome
Click Next.
Choose Home Directory
Accept the default location (recommended) or select a different one and click Next.
Choose Products and Components
Select the SSMs to install and click Next.
Only installable components are listed. For example, if installing on WebLogic Server 9.2/10.0, the SSM for WebLogic 8.1 is not listed.
Choose Product Installation Directories
Accept the default or specify a different directory and click Next.
If the directory you specify does not exist, the installation program will create it.
If you have installed other SSMs, you will see Installation Complete. Otherwise, continue.
Centralized Configuration of Security Providers
Accept the default checkbox selection to use an SCM for distributing configuration data to the SSM or clear the checkbox to not use an SCM.
For more information about this, see Running an SSM Without an SCM for more information.
Note: This window does not appear when installing only the WLS SSM.
Choose Network Interface
Select the IP address the SCM will use to listen for requests to provision configuration data and click Next.
Configure SCM
SCM Logical Name — (Applicable only if using an SCM) Enter a name to assign the SCM. This name must be used later as described in Define an SCM in the Database.
SCM Port — (Applicable only if using an SCM) Accept the default or specify a different port used by the SCM to receive data from the Administration Server. The port cannot be used by any other server.
Primary Server URL — Enter the Administration Server address in the format: https://servername:7010.
Backup Server URL — Leave blank unless you have a second Administration Server installed, in which case enter its address using the same URL format.
Choose JDK
Accept the default selection or specify a different JDK and click Next.

  1. On the Installation Complete window, click Close.

 


Enrollment

Note: This section does not apply to the Web Server SSM, which uses a different enrollment tool, as described in Configuring the Web Server SSM.

Enrollment is the process by which an OES component on a remote machine registers with the Administration Server. As part of this process, the SSM system exchanges security certificates with the Administration Server.

All components located under a BEA_HOME directory use the same set of keys located in BEA_HOME/ales32-shared/keys. Therefore, the enrollment process must be run once for any given BEA_HOME.

There are two enrollment modes:

Certificates

Some certificates issued by CA authorities do not strictly comply with Certicom’s Internet X.509 Public Key Infrastructure standard. To use these certificates, you must disable constraints extension checking by adding the following lines to enroll.bat|sh and unenroll.bat|sh located in the BEA_HOME/ales32-shared/bin directory.

if [ -f $JAVA_HOME/lib/security/cacerts ]; then

JAVA_OPTIONS="-Dbea.home=$BEA_HOME -Dwles.ssl.enforceConstraints=false -Dwles.ssl.verifyHostnames=yes -Dwles.ssl.trustedCAKeyStore=$JAVA_HOME/lib/security/cacerts -Dlog4j.configuration=file:./log4j.properties"

else

JAVA_OPTIONS="-Dbea.home=$BEA_HOME -Dwles.ssl.enforceConstraints=false -Dwles.ssl.verifyHostnames=yes -Dwles.ssl.trustedCAKeyStore=$JAVA_HOME/jre/lib/security/cacerts -Dlog4j.configuration=file:./log4j.properties"

fileif [ "$1" = "demo" ]; then

JAVA_OPTIONS="-Dbea.home=$BEA_HOME -Dwles.ssl.enforceConstraints=false -Dwles.ssl.verifyHostnames=no -Dwles.ssl.trustedCAKeyStore=$ALES_SHARED_HOME/keys/DemoTrust.jks -Dlog4j.configuration=file:./log4j.properties"

else

Enrollment Steps

To run the enroll tool, perform the following steps:

  1. Make sure the Administration Server is running and configured for 1-way SSL. For further details, see Securing OES Production Environments.
  2. If the SSM is using an SCM, make sure the SCM is running.
  3. In the BEA_HOME/ales32-shared/bin directory, set the environment:
  4. set-env
  5. Run the following script:
  6. enroll demo
  7. When the Enrollment prompt appears, enter the Administration Server administrator username and password. (The defaults are admin and password respectively).
  8. Enter and confirm the following passwords. You choose the passwords; they do not need to match the key passwords used when the Administration Server was installed.
  9. Private key password — Protects the identity of the components being enrolled.
    identity.jceks password — Protects the identity.jceks keystore.
    peer.jks password — Protects the peer.jks keystore.
    trust.jks password — Protects the trust.jks keystore.

For more information on enroll utility options, see Administrative Utilities in the Administration Reference.

Example of Running Enroll

D:\bea\ales32-shared\bin>set-env
D:\bea\ales32-shared\bin>enroll secure
=========================================================================
Enrollment/Unenrollment Utility
=========================================================================
Enter admin username :> admin
Enter admin password :>
Enter SSM private key password :>
Confirm SSM private key password :>
Enter password for identity.jceks :>
Confirm password for identity.jceks :>
Enter password for peer.jks :>
Confirm password for peer.jks :>
Enter password for trust.jks :>
Confirm password for trust.jks :>
Submitting enrollment request
Processing enrollment response
Updating trusted CA keystore
Updating peer keystore

 


Define an SCM in the Database

Use the Administration Console to define an SCM. When the ConfigTool sets up the initial security providers that will be used by the SSM to secure the application, this information will be maintained under this SCM.

Note: For step-by-step instructions on creating an SCM, see "Configuring a Service Control Manager" in the Administration Console’s help system.

If the SSM will run using an SCM, the name of the SCM must match the SCM Logical Name entered when the SSM was installed. For details, see Table 3-2, SSM Installation Prompts, on page 3-4.

You must define the SCM even if the SSM does not use it to obtain configuration data from the Administration Server. When this is the case, SCM will be the collection point for exporting configuration data to an XML file. For more information, see Running an SSM Without an SCM.

 


Run asipassword

Before configuring the SSM, use the asipassword utility to set the Administration Server's admin user password on the SSM machine. This password is required for secure communications between the SSM and the Administration Server.

To run the tool:

  1. Change to the BEA_HOME\ales32-shared\bin directory and enter the following:
  2. asipassword admin <BEA_HOME>\ales32-shared\keys\password.xml <BEA_HOME>\ales32-shared\keys\password.key

    Example:

    asipassword admin c:\bea\ales32-shared\keys\password.xml c:\bea\ales32-shared\keys\password.key

  3. When prompted for the ’alias’ password, enter the Administration Server user’s password. (The default password is password.)
Notes:

 


What’s Next?

After installation, create and configure SSM instances as described in the following chapters:


  Back to Top       Previous  Next