Perform the tasks described in this chapter if you want to configure SSL with Agent for Microsoft IIS 6.0.
During installation, if you choose the HTTPS protocol, the agent for Microsoft IIS 6.0 is automatically configured and ready to communicate over SSL. Before proceeding with the tasks in this section, ensure that the Microsoft IIS 6.0 instance is configured for SSL.
You should have a solid understanding of SSL concepts and the security certificates required to enable communication over the HTTPS protocol. See the documentation that comes with Microsoft IIS 6.0.
Add the Microsoft IIS 6.0 certificate’s root CA certificate to the Access Manager’s certificate database.
Mark the CA root certificate as trusted to enable Access Manager to successfully send notifications to the agent for Microsoft IIS 6.0.
This section only applies when Access Manager itself is running SSL. By default, Agent for Microsoft IIS 6.0 trusts any server certificate presented over SSL by the Access Manager host. The web agent does not check the root Certificate Authority (CA) certificate. If the Access Manager host is SSL-enabled and you want the agent to perform certificate checking, adhere to the guidelines as described in the following subsections:
The following property exists in the web agent AMAgent.properties configuration file, and by default it is set to true:
With this property set to true, the web agent does not perform certificate checking. Enabling the web agent to perform certificate checking is a one-step process that only involves setting this property to false as illustrated in the following task.
Set the following property in the web agent AMAgent.properties configuration file to false as follows:
com.sun.am.trust_server_certs = false
The root CA certificate that you install on the Microsoft IIS 6.0 instance that the agent protects must be the same one that is installed on the Access Manager host.
(Conditional) If the certificate database has not yet been created, create it at a unique location using a command such as the following:
PolicyAgent-base\bin\certutil -N -d .
Install the root CA certificate.
Remember that the root CA certificate that you install on the Microsoft IIS 6.0 server must be the same certificate that is installed on the Access Manager host.
The following example demonstrates a command you can issue that uses the certutil utility to install the certificate:
PolicyAgent-base\bin\certutil -A -n cert-name -t "C,C,C" -d cert-dir -i cert-file
represents the name of this root CA certificate
represents the directory where the certificate and key stores are located.
represents the base-64 encoded root CA certificate file.
For more information on the certutil utility, see the online help by issuing the following command:
To verify that the certificate is properly installed, in the command line, issue the following command:
PolicyAgent-base\bin\certutil -L -d cert-dir
The root CA certificate is then listed in the output of the certutil -L command as illustrated in the following code example:
Restart the Microsoft IIS 6.0 server.