Sun Java System Access Manager Policy Agent 2.2 Guide for Microsoft Internet Information Services 6.0

Setting Up SSL With Agent for Microsoft IIS 6.0

Perform the tasks described in this chapter if you want to configure SSL with Agent for Microsoft IIS 6.0.

During installation, if you choose the HTTPS protocol, the agent for Microsoft IIS 6.0 is automatically configured and ready to communicate over SSL. Before proceeding with the tasks in this section, ensure that the Microsoft IIS 6.0 instance is configured for SSL.


Caution – Caution –

You should have a solid understanding of SSL concepts and the security certificates required to enable communication over the HTTPS protocol. See the documentation that comes with Microsoft IIS 6.0.


ProcedureTo Configure Notification on Agent for Microsoft IIS 6.0 for SSL

If Microsoft IIS 6.0 is running in SSL mode and is receiving notifications, first perform the following broadly defined steps:

  1. Add the Microsoft IIS 6.0 certificate’s root CA certificate to the Access Manager’s certificate database.

  2. Mark the CA root certificate as trusted to enable Access Manager to successfully send notifications to the agent for Microsoft IIS 6.0.

Default Trust Behavior of Agent for Microsoft IIS 6.0

This section only applies when Access Manager itself is running SSL. By default, Agent for Microsoft IIS 6.0 trusts any server certificate presented over SSL by the Access Manager host. The web agent does not check the root Certificate Authority (CA) certificate. If the Access Manager host is SSL-enabled and you want the agent to perform certificate checking, adhere to the guidelines as described in the following subsections:

Disabling the Default Trust Behavior of Agent for Microsoft IIS 6.0

The following property exists in the web agent AMAgent.properties configuration file, and by default it is set to true:

com.sun.am.trust_server_certs

With this property set to true, the web agent does not perform certificate checking. Enabling the web agent to perform certificate checking is a one-step process that only involves setting this property to false as illustrated in the following task.

ProcedureTo Disable the Default Trust Behavior of Agent for Microsoft IIS 6.0

  1. Set the following property in the web agent AMAgent.properties configuration file to false as follows:

    com.sun.am.trust_server_certs = false

Installing the Access Manager Root CA Certificate on Microsoft IIS 6.0

The root CA certificate that you install on the Microsoft IIS 6.0 instance that the agent protects must be the same one that is installed on the Access Manager host.

ProcedureTo Install the Access Manager Root CA Certificate on Microsoft IIS 6.0

  1. (Conditional) If the certificate database has not yet been created, create it at a unique location using a command such as the following:


    PolicyAgent-base\bin\certutil -N -d .
  2. Install the root CA certificate.

    Remember that the root CA certificate that you install on the Microsoft IIS 6.0 server must be the same certificate that is installed on the Access Manager host.

    The following example demonstrates a command you can issue that uses the certutil utility to install the certificate:


    PolicyAgent-base\bin\certutil -A -n cert-name -t 
    "C,C,C" -d cert-dir -i cert-file
    
    cert-name

    represents the name of this root CA certificate

    cert-dir

    represents the directory where the certificate and key stores are located.

    cert-file

    represents the base-64 encoded root CA certificate file.

    For more information on the certutil utility, see the online help by issuing the following command:


    certutil -H
  3. To verify that the certificate is properly installed, in the command line, issue the following command:


    PolicyAgent-base\bin\certutil -L -d cert-dir
    

    The root CA certificate is then listed in the output of the certutil -L command as illustrated in the following code example:


    Certificate Name                             Trust Attrubutes
    
    
          cert-name                                      C,C,C
    
    p    Valid peer
    P    Trusted peer (implies c)
    c    Valid CA
    T    Trusted CA to issue client certs (implies c)
    C    Trusted CA to certs(only server certs for ssl) (implies c)
    u    User cert
    w    Send warning
    
    
                                     

  4. Restart the Microsoft IIS 6.0 server.