Deployment Example 1: Access Manager 7.0 Load Balancing, Distributed Authentication UI, and Session Failover

Chapter 5 Installing and Configuring the Access Manager Servers

This chapter contains detailed instructions for the following tasks:

5.1 Installing Two Access Manager Servers

Use the following as your checklist for installing the Access Manager servers:

  1. Install Access Manager 1.

  2. Install Access Manager 2.

  3. Configure the Access Manager infrastructure to work with multiple instances.

  4. Back up the Access Manager configuration in Directory Server.

Figure 5–1 Two Access Manager Servers and Load Balancer

Load Balancer 3 handles all requests for Access
Manager. Access Manager 1 and Access Manager 2 access the Directory
Server load balancers.

You must have a CD image of the Sun Java Enterprise System product mounted on the host computer system where you are installing Access Manger. For information on obtaining and mounting the Sun Java Enterprise System, see 3.2 Downloading and Mounting the Java Enterprise System 2005Q4 Installer in this document.

ProcedureTo Install Access Manager 1

  1. As a root user, log into host AccessManager-1.

  2. Unzip the two zip files that comprise the Java Enterprise System installer binaries.

  3. Start the installer with the -nodisplay option.


    # cd /mnt/Solaris_sparc 
    # ./installer -nodisplay
  4. When prompted, provide the following information:


    Welcome to the Sun Java(TM) Enterprise System; 
    serious software made simple... 
    <Press ENTER to Continue>

    Press Enter. 


    <Press ENTER to display the Software 
    License Agreement>

    Press Enter. 


    <--[40%]--[ENTER To Continue]-- 
    [n To Finish]-->n

    Enter n.


    Have you read, and do you accept, all 
    of the terms of the preceding Software 
    License Agreement[No] ?

    Enter y.


    Please enter a comma separated list 
    of languages you would like supported with 
    this installation [8]

    Enter 8 for “English only.”


    The following component products are 
    detected on this system. They will appear 
    disabled, "* *", in the following 
    Component Selection Main Menu...

    Press ENTER to continue. 


    Enter a comma separated list of products 
    to install, or press R to refresh 
    the list[]:

    Enter 3,9,12 to select Web Server, Access Manager, and Message Queue.

    The Message Queue packages you install now will be used when you implement session failover later in the deployment. 


     "Enter" to Continue or Enter a 
    comma separated list of products 
    to deselect... [1] 

    Enter -20 to deselect Directory Server.


    Based on product dependencies for your 
    selections, the installer will install: 
    [X] 3. Sun Java(TM) System Web Server 6.1 
    SP5 2005Q4 (64.61 MB)
    [X] 9. Sun Java(TM) System Access Manager 7 
    2005Q4 (27.80 MB)
    Press "Enter" to Continue...[1]  

    Press Enter. 


    [X] 1. Identity Management and 
    Policy Services Core
    [X] 2. Access Manager Admiistration Console 
    [X] 3. Common Domain Services for 
    Federation Management
    [X] 4. Access Manager SDK
    
    Enter a comma separated list of components to 
    install (or D to install all )[D] 

    Enter D.


    [X] 1. Identity Management and Policy Services Core
    [X] 2. Access Manager Admiistration Console
    [X] 3. Common Domain Services for Federation Management
    [X] 4. Access Manager SDK
    
    Press "Enter" to Continue or Enter a comma 
    separated list of products to deselect... [1]  

    Press Enter. 


    Warnings - Product Dependency Checks 
    
    1. Install Sun Java(TM) System Directory 
    Server 5 2005Q4 locally
    2. Use Sun Java(TM) System Directory Server 
    5 2005Q4 installed on a remote machine 
    
    These products can be installed locally 
    or remotely, please choose your option [1]:

    Enter 2.


    J2SE(TM) Software Development Kit Upgrade Required
    
    1. Automatically update with version on 
    installer disk (recommended)
    
    2. Manually upgrade with downloaded version 
    from Sun web site: http://java.sun. 
    comAfter installation, the link 
    /usr/jdk/entsys-j2se refers to the version 
    of J2SE SDK that is compatible with 
    Java Enterprise System.
    
    Enter 1 or 2 [1]:

    Enter 1.


    The shared components listed below are 
    currently installed. They will be upgraded 
    for compatibility with the products you 
    chose to install...
    
    Enter 1 to upgrade these shared components 
    and 2 to cancel  [1] 

    Enter 1.


    Enter the name of the target 
    installation directory for each product: 
    Access Manager [/opt] : 
       

    Accept the default value. 


    Web Server[/opt/SUNWwbsvr]: 

    Accept the default value. 


    System ready for installation 
    Enter 1 to continue [1]  

    Accept the default value. 


    1. Configure Now - Selectively override 
    defaults or express through 
    2. Configure Later - Manually configure following 
    installation 
    Select Type of Configuration[1]  

    Enter 1 to configure now.


    The following settings apply to 
    all installed component products. 
    Enter Host Name [AccessManager-1] 

    Accept the default value. 


    Enter DNS Domain Name [example.com]

    Accept the default value. 


    Enter IP Address [10.5.82.208] 

    Accept the default value. 


    Enter Server admin User ID [admin]  

    Accept the default value. 


    Enter Admin User's Password
    (Password cannot be less than 8characters) 

    For this example, enter web4dmin.


    Confirm Admin User's Password []  

    Enter the same password again. 


    Enter System User [root] 

    Accept the default value. 


    Enter System Group [root]

    Accept the default value. 


    Web Server: Administration
    Enter  Server Admin User ID [admin] 

    Accept the default value. 


    Enter Admin User's Password []

    For this example, enter web4dmin.


    Retype Password []

    Enter the same password again. 


    Enter Host Name [AccessManager-1.example.com]

    Accept the default value. 


    Enter Administration Port [8888] 

    Accept the default value. 


    Enter Administration Server User ID [root]  

    Accept the default value. 


    Enter System User ID [webservd]

    Enter root.


    Enter System Group [webservd]

    Enter root.


    Enter HTTP Port [80]

    Enter 1080.


    Enter content Root [/opt/SUNWwbsvr/docs] 

    Accept the default value. 


    Do you want to automatically start Web 
    Server when system re-starts.(Y/N)[N]  

    Accept the default value. 


    Access Manager: Administration
    Administrator User ID: amAdmin

    Accept the default value. 


     Administrator Password [] :  

    For this example, enter 4m4dmin1.


    Retype Password [] : 

    Enter the same password again. 


     LDAP User ID: amldapuser

    Accept the default value. 


    LDAP Password [] :

    For this example, enter 4mld4puser.

    Much later in the deployment, in a subsequent task, you use this password as the Web Policy Agent “shared secret.” 


    Retype Password [] : 

    Enter the same password again. 


    Password Encryption Key 
    [EWDwdXCHs3CZkYs1CfqxTkQfKtORCFCS]: 

    Accept the default value and make note of this key string. You will need it when you install Access Manager 2. 


    Install type (Realm/Legacy) Mode 
    [Legacy] : realm

    Enter Realm.


    Access Manager: Web Container 
    1. Sun Java System Application Server 
    2. Sun Java System Web Server
    
    Select the container to deploy the component 
    and hit enter key [2]  

    Enter 2.


    Access Manager: Sun Java System 
    Web Server Host Name 
    [AccessManager-1.example.com] : 

    Accept the default value. 


    Web Server Instance Directory
    [/opt/SUNWwbsvr/https-AccessManager-1.example.com]: 
     

    Accept the default value. 


    Web Server Port [1080] : 

    Accept the default value. 


    Document Root Directory 
    [/opt/SUNWwbsvr/docs] : 

    Accept the default value. 


     Secure Server Instance Port [No] :

    Accept the default value. 


    Host Name [AccessManager-1.example.com] : 

    Accept the default value. 


    Services Deployment URI [amserver] :

    Accept the default value. 


    Common Domain Deployment URI [amcommon] : 

    Accept the default value. 


    Cookie Domain (Assure it is not a top 
    level domain) [.example.com] : 

    Accept the default value. 


    Password Deployment URI [ampassword] : 

    Accept the default value. 


    Access Manager: Directory Server Information 
    
     Directory Server Host [] : 

    Enter DirectoryServer-1.example.com.


     Directory Server Port [] : 

    Enter 1389.

    This is the port number you entered for the data instance of Directory Server. 


    Directory Root Suffix 
    [dc=example,dc=com] : 

    Enter o=example.com


    Directory Manager DN 
    [cn=Directory Manager]: <

    Accept the default value. 


    Directory Manager Password [] : 

    For this example, enter d1rm4n4ger.


    Is Directory Server provisioned with 
    user data [No] : 

    Accept the default value No.


    1. Install
    2. Start Over
    3. Exit Installation
       What would you like to do [1] ?

    First, see the next numbered (Optional) step. 

    When you're ready to install, enter 1 to start the installation.

  5. (Optional) During installation, you can monitor the log to watch for installation errors. Example:

    # cd /var/sadm/install/logs

    # tail —f Java_Enterprise_System_install.B xxxxxx

  6. Upon successful installation, enter ! to exit.

  7. Start the Access Manager Web Server.

    # cd /opt/SUNWwbsvr/https-AccessManager-1.example.com

    # ./stop; # ./start

  8. Verify that Access Manager has been installed successfully.

    1. Go to the Access Manager login URL:

      http://AccessManager-1.example.com:1080/amserver/console

    2. Log in to the Access Manager console using the following information:

      Username

      amadmin

      Password

      4m4dmin1

      You should be able to log in successfully and to navigate to various areas of the console with no error messages.

Troubleshooting

If you have configured everything so far according to these instructions, and the following error message is displayed “No such Organization found,” it is probably due to the mixed— case Access Manager host names used in this deployment example. For example, the host name AccessManager-1.example.com includes both upper and lower case letters. For more detailed information, see Appendix H, Known Issues and Limitations.

ProcedureTo Install Access Manager 2

Before You Begin

You must have a CD image of the Sun Java Enterprise System product mounted on the host computer system where you are installing Access Manger. For information on obtaining and mounting the Sun Java Enterprise System, see 3.2 Downloading and Mounting the Java Enterprise System 2005Q4 Installer in this document.

  1. As a root user, log in to host AccessManager-2.

  2. Unzip the two zip files that comprise the Java Enterprise System installer binaries.

  3. Start the installer with the -nodisplay option.


    # cd /mnt/Solaris_sparc 
    # ./installer -nodisplay
  4. When prompted, provide the following information:


    Welcome to the Sun Java(TM) Enterprise System; 
    serious software made simple... 
    <Press ENTER to Continue>

    Press Enter. 


    <Press ENTER to display the Software 
    License Agreement>

    Press Enter. 


    <-[40%]-[ENTER To Continue]--
    [n To Finish]-->n

    Enter n.


    Have you read, and do you accept, all 
    of the terms of the preceding Software 
    License Agreement[No] ?

    Enter yes.


    Please enter a comma separated list 
    of languages you would like supported 
    with this installation [8]

    Enter 8 for “English only.”


    The following component products 
    are detected on this system. They will 
    appear disabled, "* *", in the following 
    Component Selection Main Menu...

    Press ENTER to continue. 


    Enter a comma separated list of products 
    to install, or press R to 
    refresh the list[]:

    Enter 3,9, 12 to select Web Server, and Access Manager, and Message Queue.

    The Message Queue packages you install now will be used when you implement session failover later in the deployment. 


    Press"Enter" to Continue or Enter a 
    comma separated list of products 
    to deselect... [1] 

    Enter -20 to deselect Directory Server.


    Based on product dependencies for your
    selections, the installer will install:
    [X] 3. Sun Java(TM) System Web Server 6.1 
    SP5 2005Q4 (64.61 MB)
    [X] 9. Sun Java(TM) System Access Manager 7 
    2005Q4 (27.80 MB)
    Press "Enter" to Continue...[1]  

    Press Enter. 


    [X] 1. Identity Management and 
    Policy Services Core
    [X] 2. Access Manager Admiistration Console 
    [X] 3. Common Domain Services for 
    Federation Management
    [X] 4. Access Manager SDK
    
    Enter a comma separated list of components to 
    install (or D to install all )[D] 

    Enter D.


    [X] 1. Identity Management and Policy Services Core
    [X] 2. Access Manager Admiistration Console
    [X] 3. Common Domain Services for Federation Management
    [X] 4. Access Manager SDK
    
    Press "Enter" to Continue or Enter a comma 
    separated list of products to deselect... [1]  

    Press Enter. 


    Warnings - Product Dependency Checks 
    
    1. Install Sun Java(TM) System Directory 
    Server 5 2005Q4 locally
    2. Use Sun Java(TM) System Directory Server 
    5 2005Q4 installed on a remote machine 
    
    These products can be installed locally 
    or remotely, please choose your option [1]:

    Enter 2.


    J2SE(TM) Software Development Kit Upgrade Required
    
    1. Automatically update with version on 
    installer disk (recommended)
    
    2. Manually upgrade with downloaded version 
    from Sun web site: http://java.sun. 
    comAfter installation, the link 
    /usr/jdk/entsys-j2se refers to the version 
    of J2SE SDK that is compatible with 
    Java Enterprise System.
    
    Enter 1 or 2 [1]:

    Enter 1.


    The shared components listed below are 
    currently installed. They will be upgraded 
    for compatibility with the products you 
    chose to install...
    
    Enter 1 to upgrade these shared components 
    and 2 to cancel  [1] 

    Enter 1.


    Enter the name of the target 
    installation directory for each product: 
    Access Manager [/opt] : 
       

    Accept the default value. 


    Web Server[/opt/SUNWwbsvr]: 

    Accept the default value. 


    System ready for installation 
    Enter 1 to continue [1]  

    Accept the default value. 


    1. Configure Now - Selectively override 
    defaults or express through 
    2. Configure Later - Manually configure following 
    installation 
    Select Type of Configuration[1]  

    Enter 1 to configure now.


    The following settings apply to all 
    installed component products. 
    Enter Host Name [AccessManager-2] 

    Accept the default value. 


    Enter DNS Domain Name [example.com]

    Accept the default value. 


    Enter IP Address [10.5.82.208] 

    Accept the default value. 


    Enter Server admin User ID [admin]  

    Accept the default value. 


    Enter Admin User's Password
    (Password cannot be less than 
    8 characters)

    For this example, enter web4dmin.


    Confirm Admin User's Password []  

    Enter the same password again. 


    Enter System User [root] 

    Accept the default value. 


    Enter System Group [root]

    Accept the default value. 


    Web Server: Administration
    Enter  Server Admin User ID [admin] 

    Accept the default value. 


    Enter Admin User's Password []

    For this example, enter web4dmin.


    Retype Password []

    Enter the same password again. 


    Enter Host Name [AccessManager-2.example.com]

    Accept the default value. 


    Enter Administration Port [8888] 

    Accept the default value. 


    Enter Administration Server User ID [root]  

    Accept the default value. 


    Enter System User ID [webservd]

    Enter root.


    Enter System Group [webservd]

    Enter root.


    Enter HTTP Port [80]

    Enter 1080.


    Enter content Root [/opt/SUNWwbsvr/docs] 

    Accept the default value. 


    Do you want to automatically start Web 
    Server when system re-starts.(Y/N)[N]  

    Accept the default value. 


    Access Manager: Administration
    Administrator User ID: amAdmin

    Accept the default value. 


     Administrator Password [] :  

    For this example, enter 4m4dmin1.


    Retype Password [] : 

    Enter the same password again. 


     LDAP User ID: amldapuser

    Accept the default value. 


    LDAP Password [] :

    For this example, enter 4mld4puser.

    Much later in the deployment, in a subsequent task, you use this password as the Web Policy Agent “shared secret.” 


    Retype Password [] : 

    Enter the same password again. 


    Password Encryption Key
    [JSIodCIOSxks3CHISjs4CHYpw0ejfk]: 

    This password encryption key must be identical to the key that was generated and entered when you installed Access Manager 1. In this deployment example, the string is  


    EWDwdXCHs3CZkYs1CfqxTkQfKtORCFCS

    Install type (Realm/Legacy) Mode 
    [Legacy] : realm

    Enter Realm.


    Access Manager: Web Container 
    1. Sun Java System Application Server 
    2. Sun Java System Web Server
    
    Select the container to deploy the component 
    and hit enter key [2]  

    Enter 2.


    Access Manager: Sun Java System 
    Web Server Host Name 
    [AccessManager-2.example.com] : 

    Accept the default value. 


    Web Server Instance Directory
    [/opt/SUNWwbsvr/https-AccessManager-2.example.com]: 
     

    Accept the default value. 


    Web Server Port [1080] : 

    Accept the default value. 


    Document Root Directory 
    [/opt/SUNWwbsvr/docs] : 

    Accept the default value. 


     Secure Server Instance Port [No] :

    Accept the default value. 


    Host Name [AccessManager-2.example.com] : 

    Accept the default value. 


    Services Deployment URI [amserver] :

    Accept the default value. 


    Common Domain Deployment URI [amcommon] : 

    Accept the default value. 


    Cookie Domain (Assure it is not a top 
    level domain) [.example.com] : 

    Accept the default value. 


    Password Deployment URI [ampassword] : 

    Accept the default value. 


    Access Manager: Directory Server 
    Information 
    
    Directory Server Host [] : 

    Enter DirectoryServer-2.example.com.


     Directory Server Port [] :

    Enter 1389.

    This is the port number you entered for the data instance of Directory Server. 


    Directory Root Suffix 
    [dc=example,dc=com] : 

    Enter o=example.com


    Directory Manager DN 
    [cn=Directory Manager]: <

    Accept the default value. 


    Directory Manager Password [] : 

    For this example, enter d1rm4n4ger.


    Is Directory Server provisioned with 
    user data [No] : 

    Accept the default value No.


    1. Install
    2. Start Over
    3. Exit Installation
       What would you like to do [1] ?

    First, see the next numbered (Optional) step. 

    When you're ready to install, enter 1 to start the installation.

  5. (Optional) During installation, you can monitor the log to watch for installation errors. Example:

    # cd /var/sadm/install/logs

    # tail —f Java_Enterprise_System_install.Bxxxxxx

  6. Upon successful installation, enter ! to exit.

  7. Start the Access Manager Web Server.

    # cd /opt/SUNWwbsvr/https-AccessManager-2.example.com

    # ./stop

    # ./start

  8. Add the lowercase host name accessmanager-2.example.com to the Realm alias list.

    This eliminates the need to enter the full path to the user's organization each time you want to log in to Access Manager.

    1. Go to the following URL:

      http://AccessManager-1.example.com:1080/amserver/UI/Login?org=example.com

    2. Log in to the Access Manager console using the following information:

      Username

      amadmin

      Password

      4m4dmin1

    3. On the Access Control tab, under Realms, click the example.com realm name.

    4. On the General tab, under Realm Attributes, in the Add field enter the name accessmanager-2.example.com (all lowercase).

    5. Click Add, and then click Save.

    6. Click “Log Out.”

  9. Verify that Access Manager has been installed successfully.

    1. Go to the Access Manager login URL:

      http://AccessManager-2.example.com:1080/amserver/console

    2. Log in to the Access Manager console using the following information:

      Username

      amadmin

      Password

      4m4dmin1

      You should be able to log in successfully and to navigate to various areas of the console with no error messages.

Next Steps

Caution – Caution –

Do not try to log in to the second Access Manager server because the instance is not fully configured to be used yet. Access Manager 2 is enabled in the following procedure.


ProcedureTo Configure the Access Manager Infrastructure to Work with Multiple Instances

In this procedure, you configure both Access Manager 1 and Access Manager 2 to operate as two instances of a single server. All configuration takes place on the Access Manager 1 host. There is no need to repeat the steps on the Access Manager 2 host.

  1. On AccessManager-1, start a new browser, and go to the URL for the Access Manager console.

    Example: http://AccessManager-1.example.com:1080/amserver/console

  2. Log in to the Access Manager console using the following information:

    User Name

    amadmin

    Password

    4m4dmin1

  3. On the Access Control tab, under Realm Name, click the top-level realm.

    In this example, the top-level realm is example.

  4. On the General tab, under Realm Attributes, add AccessManager—2.example.com to the Realms/DNS Aliases list.

    1. In the Add text field, provide a fully qualified domain name for Access Manager 2.

      Example: AccessManager-2.example.com

    2. Click Add.

    3. In the Add text field, provide the Access Manager 2 host name using all lowercase.

      Example: accessmanager-2.example.com

    4. Click Add.

    5. Click Save.

  5. Go to Realms > Configuration.

  6. On the Configuration tab, click System Properties > Platform.

  7. On the Platform page, add a new instance name.

    1. Under Instance Name, click New.

    2. In the New Server Instance page, provide the following information:

      Server

      http://AccessManager-2.example.com:1080 .

      Instance Name

      02.

    3. Click OK.

      On the Platform page, you see a new instance created in the Instance Name list.

    4. Click Save.

  8. Click the Log Out button to log out of the console.

  9. Verify that both Access Manager servers are configured properly.

    1. As a root user, log in to host AccessManager-1.

    2. Restart the Access Manager server by restarting the Web Server.


      # cd /opt/SUNWwbsvr/https-AccessManager-1.example.com
      # ./stop; ./start

      Check for errors on the start-up screen and in the Web Server error log as the server restarts.

    3. As a root user, log in to host AccessManager-2.

    4. Restart the Access Manager server by restarting the Web Server.


      # cd /opt/SUNWwbsvr/https-AccessManager-2.example.com
      # ./stop; ./start

      Check for errors on the start-up screen and in the Web Server error log as the server restarts.

    5. Start a new browser and to go the URL for the other Access Manager server.

      Example: http://AccessManager-2.example.com:1080/amserver/console

    6. Log in as to the Access Manager console using the following information:

      Username

      amadmin

      Password

      4m4dmin1

    7. If you can log in successfully, close the browser.

      If you cannot log in successfully, restart Access Manager 2. Be sure that the Access Manager 2 host can access the Directory Server 1 host.

    8. Log out of the Access Manager console.

Troubleshooting

When you cannot log in successfully, one way to troubleshoot is to log in using the fully qualified name for the user amadmin . If you can authenticate using the fully qualified name, you can focus on issues other than authentication and log in. In the file /etc/opt/SUNWam/config/AMConfig.properties, look for the following entry:

com.sun.identity.authentication.super.user=uid=amAdmin,ou=People,o=example.com

Use the fully qualified User Name uid=amAdmin,ou=People,o=example.com to log in.

ProcedureTo Back Up the Access Manager Configuration in Directory Server

Backing up your Access Manager configuration ensures that if you run into problems later in the deployment, you can revert to this configuration without having to re-install Access Manager.

  1. On Directory Server 1, in the slapd-am-config directory, run the db2ldif script.


    # cd /var/opt/mps/serverroot/slapd-am-config/
    # ./stop  
    # ./db2ldif -n userroot  
    ldiffile: /var/opt/mps/serverroot/slapd-am-config/ldif/2006_03_14_111537.ldif  
    [14/Mar/2006:11:15:40 -0800] - export userRoot: Processed 112 entries (31%).  
    [14/Mar/2006:11:15:41 -0800] - export userRoot: Processed 224 entries (62%).  
    [14/Mar/2006:11:15:42 -0800] - export userRoot: Processed 338 entries (94%).  
    [14/Mar/2006:11:15:42 -0800] - export userRoot: Processed 360 entries (100%).  
  2. (Optional) You can create a readme file that describes the contents of the new ldif file.


    # cd /var/opt/mps/serverroot/slapd-am-config/ldif 
    # ls  
    2006_03_14_111537.ldif	Example-Plugin.ldif	Example.ldif  
    European.ldif	Example-roles.ldif  
    # cat > README
    2006_03_14_111537.ldif: backup after post-am install, 
    pre-patch application
    ^D 
    # ls -l 
    2006_03_14_111537.ldif  Example-Plugin.ldif     
    Example.ldif  European.ldif    Example-roles.ldif  README

5.2 Applying Service Patch 5

The Access Manager 7 2005Q4 SP5 patch must be copied to the Access Manager host computer system. Patches are available for systems that use the SolarisTM Operating System (Solaris OS) or Linux operation system. You can download the following patches for from SunSolve Online (http://sunsolve.sun.com/).

Solaris OS on SPARC® based systems 

http://sunsolve.sun.com/search/document.do?assetkey=1-21-120954-03

Solaris OS on x86 platforms 

http://sunsolve.sun.com/search/document.do?assetkey=1-21-120955-03

Linux systems 

http://sunsolve.sun.com/search/document.do?assetkey=1-21-120956-03


Note –

No Linux systems were used in this deployment. For Linux detailed patch instructions, see the Readme file that comes with the patch.


Use the following as your checklist for applying Service Patch 5:

  1. Apply Service Patch 5 to Access Manager Server 1.

  2. Apply Service Patch 5 to Access Manager Server 2.

ProcedureTo Apply Service Patch 5 to Access Manager Server 1

  1. As a root user, log in to host AccessManager-1.

  2. Unzip the patch file. Example:


    # cd /temp
    # ls 
    120954-05.zip 
    # unzip 120954-03.zip
  3. Run the patchadd command.

    (On Solaris 10) # patchadd -G /temp/120954-05

    For other platforms, see the Readme file that comes with the patch.

    After successful installation ,a draft amsilent file is created in /opt/SUNWamdirectory. This amsilent is based on /opt/SUNWam/bin/amsamplesilent , but with some required parameters set according to the AM config files on this system.

  4. Redeploy the Access Manager applications.

    For detailed information about the following substeps, see the Release Notes (120954-05/rel_notes.html) that come with the patch.

    1. In the amsilent file, use a text editor to uncomment and modify the value of each password parameter, and verify the accuracy of other parameters in this file.

      In the following example, the entries in bold have been uncommented and modified.

      # cd opt/SUNWam

      # vi amsilent

      ...
      # The following entries contain sample values!
      # These should be modified for your specific installation
      # and then uncommented (remove the # from the line)
      #
      SERVER_NAME=AccessManager-1
      SEVER_HOST=AccessManager-1.example.com
      SERVER_PORT=1080
      
      ADMIN_PORT=8888
      DS_HOST=DirectoryServer-1.example.com
      
      DS_DIRMGRPASSWD=d1rm4n4ger
      ROOT_SUFFIX="o=example.com"
      
      ADMINPASSWD=4m4dmin1
      AMLDAPUSERPASSWD=4mld4puser
      COOKIE_DOMAIN=example.com
      AM_ENC_PWD=13MRBS4UH1fXNnfp3i/44elABip5CTnk
      NEW_OWNER=rootNEW_GROUP=otherPAM_SERVICE_NAME=other
      WEB_CONTAINER=WS6
      ...
      DIRECTORY_MODE=5
      DS_PORT=1389
      ...
    2. Run the following amconfig command:

      # cd /opt/SUNWam/bin

      # ./amconfig -s /opt/SUNWam/amsilent

  5. Update the Access Manager schema.

    1. In the directory where you unzipped the patch files, run the updateschema.sh command.

      Provide information when prompted. See the following example:


      # cd /tmp/120954-05
      # ./udpateschema.sh
      Executing updateschema.sh, the lof file is 
      /var/opt/SUNWam/logs/AM70Patch.upgrade.schema.03080833
      Directory Server fully-qualified hostname (LoadBalancer-1.example.com): 
      DirectoryServer-1.example.com
      Directory manager dn (cn=Directory Manager):
      Directory manager password: 
      Top-Level Administrator DN (uid=amAdmin,ou=People,o=example.com):
      Top-Level Adminsitrator password:
      loading /etc/opt/SUNWam/accountLockout.ldif.....
      modifying entry cn=schema
      
      updateschema.sh done!
    2. Restart Directory Server 1.


      # cd /var/opt/mps/serverroot/slapd-am-config
      # ./stop; start

      Check the error log to be sure there are no startup errors.

    3. Restart Directory Server 2.


      # cd /var/opt/mps/serverroot/slapd-am-config
      # ./stop; start

      Check the error log to be sure there are no startup errors.

  6. Change the Server Name to Load Balancer 1 in the serverconfig.xml file.

    This step is necessary because a load balancer is used between the two Access Manager servers.


    # cd /etc/opt/SUNWam/config
    # vi serverconfig.xml
    <iPlanetDataAccessLayer>
            <ServerGroup name="default" minConnPool="1" maxConnPool="10">
                <Server name="Server1" host="LoadBalancer-1.example.com" 
                  port="389" type="SIMPLE" />
                <User name="User1" type="proxy">
                        <DirDN>
                                cn=puser,ou=DSAME Users,o=example.com
                        </DirDN>
                        <DirPassword>
                                AQICMvvJ0xQN1lpFwZ9IjTPISL2TOx1yX2N8
                        </DirPassword>
                </User>
                <User name="User2" type="admin">
                        <DirDN>
                                cn=dsameuser,ou=DSAME Users,o=example.com
                        </DirDN>
                        <DirPassword>
                                AQICMvvJ0xQN1lpFwZ9IjTPISL2TOx1yX2N8
                        </DirPassword>
                </User>
                <BaseDN>
                        o=example.com
                </BaseDN>
       </ServerGroup>
    </iPlanetDataAccessLayer>

    Save the file.

  7. Verify that the patch was successfully installed.

    1. Restart the Access Manager 1 Web Server.

      # cd /opt/SUNWwbsvr/https-AccessManager-1.example.com
      # ./stop; ./start 
      
    2. Use the version command to display installed patches.


      # cd /opt/SUNWam/bin
      # ./amadmin --version
      Sun Java System Access Manager 7 2005Q4 patch 120954-05
    3. On AccessManager-1, start a new browser and go to the URL of Access Manager 1.

      http://AccessManager-1:1080/amserver/console

    4. Log in to the Access Manager console using the following information:

      Username

      amadmin

      Password

      4m4dmin1

      If you can log in successfully, close the browser.

ProcedureTo Apply Service Patch 5 to Access Manager Server 2

  1. As a root user, log in to host AccessManager-2.

  2. Unzip the patch file. Example:


    # cd /temp
    # ls 
    120954-05.zip 
    # unzip 120954-03.zip
  3. Run the patchadd command.

    (On Solaris 10) # patchadd -G /temp/120954-05

    For other platforms, see the Readme file that comes with the patch.

    After successful installation ,a draft amsilent file is created in /opt/SUNWamdirectory. This amsilent is based on /opt/SUNWam/bin/amsamplesilent , but with some required parameters set according to the AM config files on this system.

  4. Redploy the Access Manager applications.

    For detailed information about the following substeps, see the Release Notes (120954-05/rel_notes.html) that come with the patch.

    1. In the amsilent file, use a text editor to uncomment and modify the value of each password parameter, and verify the accuracy of other parameters in this file.

      In the following example, the entries in bold have been uncommented and modified.

      # cd opt/SUNWam

      # vi amsilent

      ...
      # The following entries contain sample values!
      # These should be modified for your specific installation
      # and then uncommented (remove the # from the line)
      #
      SERVER_NAME=AccessManager-2
      SEVER_HOST=AccessManager-2.example.com
      SERVER_PORT=1080
      
      ADMIN_PORT=8888
      DS_HOST=DirectoryServer-2.example.com
      
      DS_DIRMGRPASSWD=d1rm4n4ger
      ROOT_SUFFIX="o=example.com"
      
      ADMINPASSWD=4m4dmin1
      AMLDAPUSERPASSWD=4mld4puser
      COOKIE_DOMAIN=example.com
      AM_ENC_PWD=13MRBS4UH1fXNnfp3i/44elABip5CTnk
      NEW_OWNER=rootNEW_GROUP=otherPAM_SERVICE_NAME=other
      WEB_CONTAINER=WS6
      ...
      DIRECTORY_MODE=5
      DS_PORT=1389
      ...
    2. Run the amconfig command:

      # cd /opt/SUNWam/bin

      # ./amconfig -s /opt/SUNWam/amsilent

  5. Update the Access Manager schema.

    1. In the directory where you unzipped the patch files, run the updateschema.sh command.

      Provide information when prompted. See the following example:


      # cd /tmp/120954-05
      # ./udpateschema.sh
      Executing updateschema.sh, the lof file is 
      /var/opt/SUNWam/logs/AM70Patch.upgrade.schema.03080833
      Directory Server fully-qualified hostname (LoadBalancer-1.example.com): 
      DirectoryServer-2.example.com
      Directory manager dn (cn=Directory Manager):
      Directory manager password: 
      Top-Level Administrator DN (uid=amAdmin,ou=People,o=example.com):
      Top-Level Adminsitrator password:
      loading /etc/opt/SUNWam/accountLockout.ldif.....
      modifying entry cn=schema
      
      updateschema.sh done!
    2. Restart Directory Server 1.


      # cd /var/opt/mps/serverroot/slapd-am-config
      # ./stop; start

      Check the error log to be sure there are no startup errors.

    3. Restart Directory Server 2.


      # cd /var/opt/mps/serverroot/slapd-am-config
      # ./stop; start

      Check the error log to be sure there are no startup errors.

  6. Change the Server Name to Load Balancer 1 in the serverconfig.xml file.

    This step is necessary because a load balancer is used between the two Access Manager servers.


    # cd /etc/opt/SUNWam/config
    # vi serverconfig.xml
    <iPlanetDataAccessLayer>
            <ServerGroup name="default" minConnPool="1" maxConnPool="10">
                <Server name="Server1" host="LoadBalancer-1.example.com" 
                  port="389" type="SIMPLE" />
                <User name="User1" type="proxy">
                        <DirDN>
                                cn=puser,ou=DSAME Users,o=example.com
                        </DirDN>
                        <DirPassword>
                                AQICMvvJ0xQN1lpFwZ9IjTPISL2TOx1yX2N8
                        </DirPassword>
                </User>
                <User name="User2" type="admin">
                        <DirDN>
                                cn=dsameuser,ou=DSAME Users,o=example.com
                        </DirDN>
                        <DirPassword>
                                AQICMvvJ0xQN1lpFwZ9IjTPISL2TOx1yX2N8
                        </DirPassword>
                </User>
                <BaseDN>
                        o=example.com
                </BaseDN>
       </ServerGroup>
    </iPlanetDataAccessLayer>

    Save the file.

  7. Verify that the patch was successfully installed.

    1. Restart the Access Manager 2 Web Server.

      # cd /opt/SUNWwbsvr/https-AccessManager-2.example.com
      # ./stop; ./start 
      
    2. Use the version command to display installed patches.


      # cd /opt/SUNWam/bin
      # ./amadmin --version
      Sun Java System Access Manager 7 2005Q4 patch 120954-05
    3. On AccessManager-2, start a new browser and go to the URL of Access Manager 2.

      http://AccessManager-1:1080/amserver/console

    4. Log in to the Access Manager console using the following information:

      Username

      amadmin

      Password

      4m4dmin1

      If you can log in successfully, close the browser.

5.3 Configuring the Access Manager Servers to Run as Non-Root Users

During the Access Manager installation, the installer requires that Access Manager run as a root user. If you want administrators who don't have root permissions to perform any administration tasks on Access Manager, you must reconfigure Access Manager to run as a non-root user.

  1. Reconfigure Access Manager 1 to run as a non-root user.

  2. Reconfigure Access Manager 2 to run as a non-root user.

  3. Reconfigure the Web Server Administration Servers to run as non-root users.


Caution – Caution –

You must use a port number higher than 1024. If the Web Server port is below 1024, then even after configuring the Access Manager server to run as a non-root user, you still must start Access Manager Web Server in a root shell.


ProcedureTo Reconfigure Access Manager 1 to Run as a Non-Root User

  1. As a root user, log into host AccessManager-1.

  2. Stop Access Manager 1.


    # cd /opt/SUNWwbsvr/https-AccessManager-1.example.com/
    # ./stop
  3. Stop the Web Server administration server.


    # cd /opt/SUNWwbsvr/https-admserv/ 
    # ./stop 
  4. Change the “runs as” user ID from root to nobody.


    # cd /opt/SUNWwbsvr/ 
    # chown -R nobody:nobody https-AccessManager-1.example.com/* httpacl alias \
    /var/opt/SUNWam /etc/opt/SUNWam 
    # rm  -rf /tmp/https-* 
  5. Edit the magnus.conf file.

    It is a good practice to make a backup of this or any other configuration file before making changes to the file.


    # vi https-AccessManager-1.example.com/config/magnus.conf

    Change the User property value from root to nobody.

  6. Verify that Access Manager successfully runs as a non-root user.

    1. Log in as a root user to the Access Manager host.

    2. Start the Access Manager server.


      # cd /opt/SUNWwbsvr/https-AccessManager-1.example.com/ 
      # ./start
    3. Confirm that the Web Server start process actually runs as nobody.


      # ps -ef | grep SUNWwbsvr
    4. Start a new browser and go to the Access Manager URL.

      Example: http://AccessManager-1.example.com:1080/amserver/console

      Close the browser if successful.

    5. Log in to the Access Manager console using the following information:

      Username

      amadmin

      Password

      4m4dmin1

      If you can log in successfully, close the browser.

ProcedureTo Reconfigure Access Manager 2 to Run as a Non-Root User

  1. As a root user, log into host AccessManager-2.

  2. Stop Access Manager 2.


    # cd /opt/SUNWwbsvr/https-AccessManager-2.example.com/
    # ./stop
  3. Stop the Web Server administration server.


    # cd /opt/SUNWwbsvr/https-admserv/ 
    # ./stop 
  4. Change the “runs as” user ID from root to nobody.


    # cd /opt/SUNWwbsvr/ 
    # chown -R nobody:nobody https-AccessManager-2.example.cm/* httpacl alias 
    /var/opt/SUNWam /etc/opt/SUNWam 
    # rm  -rf /tmp/https-* 
  5. Edit the magnus.conf file.


    # vi https-AccessManager-2.example.com/config/magnus.conf

    Change the User property value from root to nobody.

  6. Verify that Access Manager 2 successfully runs as a non-root user.

    1. As a root user, log into host AccessManager-2.

    2. Start the Access Manager server.


      # cd /opt/SUNWwbsvr/https-AccessManager-2.example.com/ 
      # ./start
    3. Confirm that the Web Server start process actually runs as nobody.


      ps -ef | grep SUNWwbsvr
    4. Start a new browser and go to the Access Manager URL.

      Example: http://AccessManager-2.example.com:1080/amserver/console Close the browser if successful.

    5. Log in to the Access Manager console using the following information:

      Username

      amadmin

      Password

      4m4dmin1

      If you can log in successfully, close the browser.

ProcedureTo Reconfigure the Web Server Administration Servers to Run as Non-Root Users

In this procedure, you reconfigure the administration server for each of the Web Servers that contain Access Manager. Although this is not required, it's a good practice to run the Access Manager Web Servers and their administration servers as the same non-root user ID. This eliminates permissions problems. For example, if the Access Manager Web Server runs as a non-root user, and its administration server runs as a root user, then files created by the administration server may not be readable by the Access Manager Web Server.

  1. As a root user, log into host AccessManager-1.

  2. Stop the Web Server administration server by issuing the commands:


    # cd /opt/SUNWwbsvr/https-admserv 
    # ./stop 
  3. Change the “runs as” user ID from root to nobody.


    # cd /opt/SUNWwbsvr/
    # chown -R nobody:nobody https-admserv/* httpacl/ alias 
    # rm -rf /tmp/https-admserv 
  4. Edit the magnus.conf file.

    Make a backup of this file before making changes to the file.


    # vi https-admserv/config/magnus.conf

    Change the User property value from root to nobody.

  5. Verify that the Web Server administration server successfully runs as a non–root user.

    1. As a root user, log into host AccessManager-1.

    2. Start the Access Manager server:

      # cd /opt/SUNWwbsvr/https-admserv/

      # ./start

    3. Use ps command to confirm the started Web Server process indeed runs as nobody.

      # ps -ef | grep admserv

  6. As a root user, log into host AccessManager-2.

  7. Stop the Web Server administration server by issuing the commands:


    # cd /opt/SUNWwbsvr/https-admserv 
    # ./stop 
  8. Change the “runs as” user ID from root to nobody.


    # cd /opt/SUNWwbsvr/
    # chown -R nobody:nobody https-admserv/* httpacl/ alias 
    # rm -rf /tmp/https-admserv 
  9. Edit the magnus.conf file.


    # vi https-admserv/config/magnus.conf

    Change the User property value from root to nobody.

  10. Verify that the Web Server administration server successfully runs as a non–root user.

    1. As a root user, log into host AccessManager-2.

    2. Start the Access Manager server:

      # cd /opt/SUNWwbsvr/https-admserv/

      # ./start

    3. Use ps command to confirm the started Web Server process indeed runs as nobody.

      # ps -ef | grep admserv

5.4 Configuring the Access Manager Load Balancer

In this procedure, you configure the Access Manager servers to access the Directory Server through the load balancer. All configuration changes you implement through the Access Manager 1 console will be replicated to Access Manager 2, so there is no need to repeat these steps on the Access Manager 2 console. However, you must also edit XML files in this task. You must manually edit the XML files on Access Manager 1 and on Access Manager 2.


Note –

The load balancer hardware and software used in the lab facility for this deployment is BIG-IP® manufactured by F5 Networks. If you are using different load balancer software, see the documentation that comes with that product for detailed settings information.


Use the following as your checklist for configuring the Access Manager load balancer:

  1. Configure the Access Manager servers to access the Directory Server load balancer.

  2. Verify successful Directory Server load balancing and system failover.

  3. Configure the Access Manager load balancer.

  4. Verify that the Access Manager load balancer is configured properly.

  5. Request an SSL certificate for the Access Manager load balancer.

  6. Install a root CA certificate on the Access Manager load balancer.

  7. Install an SSL certificate on the Access Manager load balancer.

  8. Configure SSL termination on the Access Manager load balancer.

ProcedureTo Configure the Access Manager Servers to Access the Directory Server Load Balancer

  1. Go to the Access Manager URL.

    http://AccessManager-1.example.com:1080/amserver/console

  2. Log in to the Access Manager console using the following information:

    Username

    amadmin

    Password

    4m4dmin1

  3. Click the Configuration tab.

  4. Under Authentication, edit the following service configurations. Edit the service configurations to reflect the LDAP server name and port number LoadBalancer-1.example.com:1389

    Under Authentication, for the following services, change the Primary LDAP server name and port to the load-balancer name and port. In this example, the new name is LoadBalancer-1.example.com:389 .

    1. Under Authentication, click LDAP.

      In the Primary LDAP Server list, Add LoadBalancer-1.example.com:389 and delete the default server from the list. Click Save, and the return to the Configuration tab.

    2. Under Authentication, click Membership.

      In the Primary LDAP Server list, Add LoadBalancer-1.example.com:389 and delete the default server from the list. Click Save, and the return to the Configuration tab.

    3. Under Authentication, click MSISDN.

      In the Primary LDAP Server list, Add LoadBalancer-1.example.com:389 and delete the default server from the list. Click Save, and the return to the Configuration tab.

    4. Under Global Properties, click Policy Configuration.

      In the Primary LDAP Server, add LoadBalancer-1.example.com:389 and delete the default server from the list. Click Save, and the return to the Configuration tab.

  5. Edit the following property files on AccessManager–1.

    1. Still logged in to the Access Manager server as a root user, use an editor to modify the file /etc/opt/SUNWam/config/serverconfig.xml.

      Change LDAP serer host name and port number to the fully-qualified name and port number for Load Balancer 1 Example:


      <iPlanetDataAccessLayer>
      				<ServerGroup name="default" miConnPool="1" maxConnPool="10">
      						<Server name="Server1" 
      								host="LoadBalancer-1.example.com" port="389" 
       type="SIMPLE"/>
      ...

    2. Use an editor to modify the file /etc/opt/SUNWam/config/AMConfig.properties.

      Set the following properties:

      • com.iplanet.am.directory.port=389

      • com.iplanet.am.directory.host=LoadBalancer-1.example.com

      • com.sun.am.event.connection.idle.timeout=3

    The connection idle time out value is set to 3 minutes. This value is less than the value for the Firewall 3–to-Load Balancer 1 connection timeout which is 5 minutes in this example. By setting this value to be 3 minutes, the Access Manager server will assume its persistent search connections may be silently dropped by Firewall 3–to-Load Balancer 1. The Access Manager server will re-establish the persistent search connections every 3 minutes. Otherwise, the Access Manager server may forever block on the persistent search because it is not made aware that the TCP connection is dropped silently.

  6. Edit the following property files on AccessManager–2.

    1. Still logged in to the Access Manager server as a root user, use an editor to modify the file /etc/opt/SUNWam/config/serverconfig.xml.

      Change LDAP serer host name and port number to the fully-qualified name and port number for Load Balancer 1. Example:


      <iPlanetDataAccessLayer>
      				<ServerGroup name="default" miConnPool="1" maxConnPool="10">
      						<Server name="Server1" 
      								host="LoadBalancer-1.example.com" port="389" 
       type="SIMPLE"/>
      ...

    2. Use an editor to modify the file /etc/opt/SUNWam/config/AMConfig.properties.

      Set the following properties:

      • com.iplanet.am.directory.port=389

      • com.iplanet.am.directory.host=LoadBalancer-1.example.com

      • com.sun.am.event.connection.idle.timeout=3

  7. Restart both Access Manager servers in order for the changes to take place.

ProcedureTo Verify Successful Directory Server Load Balancing and System Failover

For each of the Access Manager servers, perform the following steps to confirm its directory accesses are all directed to one and only one Directory Server instance, and that system failover and recover work properly. The following section describes how to perform the sanity check for the first Access Manager instance. Substitute the console URL with that of the second Access Manager instance when you perform the task for the second Access Manager instance.

  1. Confirm that the load balancer is properly configured for simple persistence.

    1. As a root user, log into host DirectoryServer-1 and host DirectoryServer-2.

    2. For each server, use the tail command to watch the Directory Server access log.

      # tail-f logs/access

    3. Start a new browser and go to the Access Manager 1 URL.

      Example: http://AccessManager-1.example.com:1080/amserver/console

    4. Log in to the Access Manager console using the following information:

      Username

      amadmin

      Password

      4m4dmin1

    5. Navigate inside the Access Manager console while paying attention to the Directory Server access log.

      In the access log, you should see all directory accesses are directed to one Directory Server instance only, excluding the health check probing from the load balancer device. The navigation should not have any errors. Logout and close the browser if successful.

  2. Confirm that Directory Server failover works properly.

    1. Shut down Directory Server 1.

    2. Start a new browser and go to the Access Manager URL.

      Example: http://AccessManager-1.example.com:1080/amserver/console

    3. Log in to the Access Manager console using the following information:

      Username

      amadmin

      Password

      4m4dmin1

    4. Navigate inside the Access Manager console while paying attention to the Directory Server access logs.

      # cd /var/opt/mps/serverroot/slapd-data/logs

      In the access logs, you should see all directory accesses are directed only to Directory Server 2. The navigation should not have any errors. Log out and close the browser if successful.

    5. Restart Directory Server 1, and stop Directory Server 2.

    6. Start a new browser go to the Access Manager URL.

      Example: http://AccessManager-1.example.com:1080/amserver/console

    7. Log in to the Access Manager console using the following information:

      Username

      amadmin

      Password

      4m4dmin1

    8. Navigate inside the Access Manager console,

      Watch the access logs of both Directory Server instances. You should see all directory accesses (excluding health checks by load balancer) are directed to only Directory Server 1. The navigation should not have any errors.

    9. Log out and close the browser if successful.

  3. Restart Directory Server 2.

    Confirm that both Directory Servers are restarted and running.

ProcedureTo Configure the Access Manager Load Balancer

Users internal to your company will access the Access Manager servers through the internal-facing load balancer. The internal-facing load balancer is optional, and enables you to customize an internal-facing login page that is different from the external-facing login page. Users external to your company will first access the Distributed Authentication UI servers, which in turn route requests to the external-facing load balancer. Internal users will access port 90 while External users will access port 9443.

Load Balancer 3 sends the user and agent requests to the server where the session originated. SSL is terminated at Load Balancer 3 before a request is forwarded to the Access Manager Servers. Otherwise the load balancer cannot inspect the traffic for proper routing.

Load Balancer 3 is capable of the following types of load balancing:

Cookie-based 

The load balancer makes decisions based on client's cookies. The load balancer looks at the request and detects the presence of a cookie by a specific name. If the cookie is detected in the request, the load balancer routes the request to the specific server to which the cookie has been assigned. If the cookie is not detected in the request, the load balancer balances client requests among the available servers. 

IP-based 

This is similar to cookie-based load balancing, but the decision is based on the IP address of the client. The load balancer sends requests from a specific client to the same server. So a request from the client will always be processed by the server that last processed the request from that client. 

TCP 

The load balancer mainstreams session affinity. This means that all requests related to a TCP session, are forwarded to the same server. In this deployment example, Load Balancer 3 forwards all requests from a single client to exactly the same server. When the session is started and maintained by one client, session affinity is guaranteed. This type of load-balancing is applicable to the TCP-based protocols. 

Before You Begin

Contact your network administrator to obtain two available virtual IP addresses.


Note –

The load balancer hardware and software used in the lab facility for this deployment is BIG-IP® manufactured by F5 Networks. If you are using different load balancer software, see the documentation that comes with that product for detailed settings information.


  1. Create a Pool.

    A pool contains all the backend server instances.

    1. Go to URL for the Big IP load balancer log in.

    2. Open the Configuration Utility.

      Click “Configure your BIG-IP (R) using the Configuration Utility.”

    3. In the left pane, click Pools.

    4. On the Pools tab, click the Add button.

    5. In the Add Pool dialog, provide the following information:

      Pool Name

      Example: AccessManager-Pool

      Load Balancing Method

      Round Robin

      Resources

      Add all the Access Manager servers IP addresses. In this example, add the IP address and port number for AccessManager-1:1080 and for AccessManager-2:1080.

    6. Click the Done button.

  2. Configure the load balancer for persistence.

    1. In the left pane click Pools.

    2. Click the name of the pool you want to configure.

    3. Click the Persistence tab.

    4. On the Persistence tab, under Persistence Type, select Cookie Hash and set the following Hash Values:

      Cookie Name:

      amlbcookie

      Offset:

      1

      Length:

      1

    5. Click Apply.

  3. Add a Virtual Server.

    If you encounter Javascript errors or otherwise cannot proceed to create a virtual server, try using Microsoft Internet Explorer for this step.

    1. In the left frame, Click Virtual Servers.

    2. On the Virtual Servers tab, click the Add button.

    3. In the Add a Virtual Server dialog box, provide the following information:

      Address

      xxx.xx.69.13 (for LoadBalancer-3.example.com )

      Service

      90

      Pool

      AccessManager-Pool

    4. Continue to click Next until you reach the Pool Selection dialog box.

    5. In the Pool Selection dialog box, assign the Pool (AccessManager-Pool) that you have just created.

    6. Click the Done button.

  4. Add Monitors.

    The load balancer has a built-in HTTP monitor that probes the Access Manager TCP port periodically. Successive probing failure indicates the server is down. However, this probing does not address the case where the Access Manager server responds to a TCP connection request, but fails to process any further Access Manager requests because of internal errors such as deadlocks. Access Manager comes with a JSP file /amserver/isAlive.jsp to address this challenge. In the following steps, you create a custom monitor that periodically accesses the JSP. If a success response can be obtained, it means not only that Access Manager is responding to TCP connection request, but also that free threads exist to process the request.

    1. Click the Monitors tab, and then the click Add button.

      In the Add Monitor dialog, provide the following information:

      Name:

      AccessManager-http

      Inherits From:

      Choose http.

    2. Click Next.

      In the Configure Basic Properties page, click Next.

    3. In the “Configure ECV HTTP Monitor” dialog, in the Send String field, enter the following:

      GET /amserver/isAlive.jsp

    4. In the Destination Address and Service (Alias) page, click Done.

      On the Monitors tab, the monitor you just added is now contained in the list of monitors.

    5. Click the Basic Associations tab.

      Look for the IP address for AccessManager-1:1080 and AccessManager-2:1080.

    6. Mark the Add checkbox for AccessManager-1 and AccessManager-2.

    7. At the top of the Node column, choose the monitor that you just added, AccessManager-http.

    8. Click Apply.

ProcedureTo Verify that the Access Manager Load Balancer is Configured Properly

  1. Log in as root to the host AccessManager–1.

  2. Run the tail command to view the access log.


    # cd /opt/SUNWwbsvr/https-AccessManager-1.example.com/logs
    # tail -f access

    If you see frequent entries similar to this one:


    xxx.xx.69.18--[12/Oct/2006:13:10:20-0700]
    "GET/amserver/isAlive.jsp" 200 118

    then the custom monitor is configured properly. If you do not see “GET /amserver/isAlive.jsp” then you must troubleshoot the load balancer configuration.

  3. Log in as root to the host AccessManager-2.

  4. Run the tail command to view the access log.


    # cd /opt/SUNWwbsvr/https-AccessManager-2.example.com/logs
    # tail -f access

    If you see frequent entries similar to this one:


    xxx.xx.69.18--[12/Oct/2006:13:10:20-0700]
    "GET /amserver/isAlive.jsp" 200 118

    then the custom monitor is configured properly. If you do not see “GET /amserver/isAlive.jsp” then you must troubleshoot the load balancer configuration.

  5. Start a new browser and go to the internal-facing load balancer URL.

    Example: http://LoadBalancer-2.example.com:90/ . Do not supply the amserver prefix.

    If the browser successfully renders the default Sun Web Server default document root page, close the browser.

ProcedureTo Request an SSL Certificate for the Access Manager Load Balancer

  1. Open a browser, go to the BIG-IP URL:

    https://is-F5.example.com

  2. Log in to the BIG-IP console using the following information:

    Username

    username

    Password

    password

  3. Click “Configure your BIG-IP (R) using the Configuration Utility.”

  4. In the left pane, click Proxies.

  5. Click the Cert-Admin tab.

  6. On the SSL Certificate Administration page, click the button named “Generate New Key Pair/Certificate Request.”

  7. In the Create Certificate Request page, provide the following information:

    Key Identifier:

    LoadBalancer-3.example.com

    Organizational Unit Name:

    Deployment

    Domain Name:

    LoadBalancer-3.example.com

    Challenge Password:

    password

    Retype Password:

    password

  8. Click the button “Generate Key Pair/Certificate Request.”

    On the SSL Certificate Request page, the request is generated in the Certificate Request field.

  9. Copy all the text contained in the Certificate Request field.

    Save the text in a text file to keep it handy for later use.

  10. Send the text of the certificate request to a Certificate Authority of your choice.

    A Certificate Authority is an entity that issues certified digital certificates. VersiSign, Thawte , Entrust, and GoDaddy are just a few examples of Certificate Authority companies. In this deployment example, CA certificates were obtained from OpenSSL. Follow the instructions provided by the Certificate Authority for submitting a certificate request.

ProcedureTo Install a Root CA Certificate on the Access Manager Load Balancer

The root Certificate Authority certificate proves that a Certificate Authority such as VeriSign or Entrus actually issued the digital server certificate you received. You install the root certificate on Load Balancer 3 to ensure that the link between the Load Balancer 3 SSL certificate can be maintained with the issuing company.

  1. In the BIG-IP load balancer console, click Proxies.

  2. Click the Cert-Admin tab.

  3. Click the Import link.

  4. In the Import Type field, choose Certificate, and then click Continue.

  5. In the Install SSL Certificate page, in the Certificate File field, click Browse.

  6. In the Choose File dialog, choose Browser.

    Navigate to the file that includes the root CA Certificate, and click Open.

  7. In the Certificate Identifier field, enter OpenSSL_CA_cert.

  8. Click Install Certificate.

  9. In the Certificate OpenSSL_CA_Cert page, click Return to Certificate Administration.

    The new certificate OpenSSL_CA_Cert is now included in the Certificate ID list.

ProcedureTo Install an SSL Certificate on the Access Manager Load Balancer

  1. Once you've received the SSL certificate from a Certificate Authority, in the BIG-IP load balancer console, click Proxies.

  2. Click the Cert-Admin tab.

    The key LoadBalancer-3.example.com is in the Key List. This was generated in a previous step when you generated a key pair and a certificate request.

  3. In the Certificate ID column, click the Install button for LoadBalancer-3.example.com.

  4. In the Certificate File field, click Browse.

    In the Choose File dialog, navigate to the text file in which you saved the certificate text sent to you by the certificate issuer, and then click Open.

  5. Click Install Certificate.

  6. In the Certificate LoadBalancer-3.example.com page, click Return to Certificate Administration Information link.

    In the SSL Certificate Administration page, verify that the Certificate ID indicates LoadBalancer-3.example.com.

ProcedureTo Configure SSL Termination on the Access Manager Load Balancer

In this deployment example, Secure Socket Layer (SSL) termination at Load Balancer 3 increases the performance at the server level, and simplifies SSL certificate management. Clients will access Load Balancer 3 using SSL-encrypted data. Load Balancer 3 decrypts the data and then sends the unencrypted data on to the Access Manager server. The Access Manager server or Authentication UI server does not have to perform decryption, and the burden on its processor is relieved. Load Balancer 3 then load-balances the decrypted traffic to the appropriate Access Manager server. Finally, Load Balancer 3 encrypts the responses from server, and sends encrypted responses to the client.

Load Balancer 3 sends the user and agent requests to the server where the session originated. SSL is terminated at Load Balancer 3 before a request is forwarded to the Access Manager Servers. Otherwise the load balancer cannot inspect the traffic for proper routing.

In this deployment example, you set up a proxy server using BIG-IPTM hardware and software.

  1. Configure the new proxy service.

    1. Log in to the BIG-IP load balancer using the following information:

      Username

      username

      Password

      password

    2. Click the link “Configure your BIG-IP using the Configuration Utility.”

    3. In the load balancer console, in the left pane, click Proxies.

    4. On the Proxies tab, click Add.

    5. In the Add Proxy dialog, provide the following information:

      Proxy Type:

      Check the SSL checkbox.

      Proxy Address:

      xxx.xx.69.14 (The IP address of Load Balancer 3, the Access Manager server load balancer.)

      Proxy Service:

      9443 (The port number of the new proxy you are setting up.)

      Destination Address:

      xxx.xx.69.14

      Destination Service:

      90

      Destination Target:

      Choose Local Virtual Server.

      SSL Certificate:

      Choose LoadBalancer-3.example.com.

      SSL Key:

      Choose LoadBalancer-3.example.com.

      Enable ARP:

      Check this checkbox.

    6. Click Next.

    7. In the Rewrite Redirects field, choose Matching.

    8. Click Done.

      The new proxy server is now added to the Proxy Server list.

  2. Verify that you can access the Access Manager server using the new proxy server port number.

    1. Open a browser, and go to the following URL:

      https://LoadBalancer-3.example.com:9443/index.html
      

      Tip –

      A message may be displayed indicating that the Access Manager server doesn't recognize the certificate issuer. When this happens, install the root Certificate Authority certificate in the browser so that the browser recognizes the certificate issuer. See your browser's online help system for information on installing a root CA certificate.


      1. Log in to the Access Manager console using the following information:

        Username

        amadmin

        Password

        4m4dmin1

        If you can successfully log in to Access Manager 1, then the SSL certificate is installed properly and proxy service is configured properly.

    2. Log out of Access Manager, and close the browser.

5.5 Importing the Root CA Certificate into the Access Manager Web Servers

Use the following as your checklist for importing the root CA certificate into the Access Manager Web Servers:

  1. Import the root CA certificate into the Access Manager 1 Web Server.

  2. Modify the AMConfig.properties file.

  3. Import the root CA certificate into the Access Manager 2 Web Server.

  4. Modify the AMConfig.properties file.

ProcedureTo Import the Root CA Certificate into the Access Manager 1 Web Server

  1. To to the Web Server administration URL:


    http://AccessManager-1.example.com:8888/https-admserv/bin/index
  2. Log in to the Web Server console using the following information:

    User name:

    admin

    Password:

    web4d4min

  3. On the Servers tab, select the server AccessManager-1.example.com, and then click Manage.

  4. Click on the Security tab, and then initialize the Trust Database by providing the following information:

    Database Password:

    password

    Password (again):

    password

    Click OK.

  5. In the left frame, click Install Certificate. In the Install a Server Certificate page, provide the following information:

    Certificate for:

    Choose Trusted Certificate Authority (CA)

    Message text (with headers):

    Choose this option, and then paste into the text box the root certificate you received from the CA. To Request an SSL Certificate for the Distributed Authentication UI Load Balancer. The root certificate will look similar to this:


    -----BEGIN CERTIFICATE-----
    UbM77e50M63v1Z2A/5O5MA0GCSqGSIb3DQEOBAU
    AMF8xCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0
    EgRGF0YSBTZWN1cml0eSwgSW5jLjEuMCwGA1UEC
    xMlU2VjdXJlIFNlcnZlciBDZXJ0aWZpY2F0aW9u
    IEF1dGhvcml0eTAeFw0wMTA4MDIwMDAwMDBaFw0
    wMzA4MDIyMzU5NTlaMIGQMQswCQYDVQQGEwJVUz
    ERMA8GA1UECBMIVmlyZ2luaWExETAPBgNVBAcUC
    FJpY2htb25kMSAwHgYDVQQKFBdDYXZhbGllciBU
    ZWxlcGhvYm9uZGluZy5jYXZ0ZWwuY29tMIGfMA0
    GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC8x/1dxo
    2YnblilQLmpiEziOqb7ArVfI1ymXo/MKcbKjnY2
    -----END CERTIFICATE REQUEST-----

    Click OK.

  6. On the “Add Trusted CA Certificate page,” click “Add Server Certificate.”

  7. In the left frame, click Manage Certificates.

    In the list of certificates, you will see the certificate you just added. In this deployment example, the certificate name OpenSSLTestCA-Sun is displayed in the list.

    Close the browser.

  8. As a root user, log into the Access Manager 1 host.

  9. To verify that the certificate was imported properly, go to the following directory:


    /opt/SUNWwbsvr/alias

    In a directory listing, notice that certificate filename is formed by joining the prefix https-AccessManager-1.example.com and database file name cert8.db.


    #ls
    https-AccessManager-1.example.com-AccessManager-1-cert8.db
    https-AccessManager-1.example.com-AccessManager-1-key3.db
    https-AccessManager-1.example.com-cert8.db
    https-AccessManager-1.example.com-key3.db
    secmod.db
  10. Run the certutil list command, specifying the prefix from certificate filename:


    # cd /opt/SUNWwbsvr/bin/https/admin/bin
    # ./certutil -L -d /opt/SUNWwbsvr/alias/ -P "https-AccessManager-1.example.com-"
    OpenSSLTestCA - Sun

    The OpenSSLTestCA — Sun certificate you imported is displayed.

ProcedureTo Modify the AMConfig.properties File

  1. As a root user, log in to the Access Manager 1 host.

  2. Go to the following directory:


    /etc/opt/SUNWam/config

    Make a backup of the AMConfig.properties file before making any changes to the file.

  3. In the AMConfig.properties file, verify that the certificate database directory is specified correctly as in this example:


    com.iplanet.am.admin.cli.certdb.dir=/opt/SUNWWwbsvr/alias
  4. For the value of the following property, add the prefix from the certificate filename as in this example:


    com.iplanet.am.admin.cli.certdb.prefix=https-AccessManager-1.example.com-
  5. Notice that the following property points to a file wtpass which doesn't exist yet:


    com.iplanet.am.admin.cli.certdb.

    You will create this file in the next step.

    Save the file.

  6. Create the wtpass file.

    In the file, enter the name of the password you used to create the certificate database. Example:


    # cd /etc/opt/SUNWam/config
    # vi .wtpass
    password

    Save the file.

  7. Verify that the file was created properly.


    # cat .wtpass
    password
  8. Restart the Web Server.


    # cd /opt/SUNWwbsvr/https-AccessManager-1.example.com
    # ./stop; ./start

ProcedureTo Import the Root CA Certificate into the Access Manager 2 Web Server

  1. To to the Web Server administration URL:


    http://AccessManager-2.example.com:8888/https-admserv/bin/index
  2. Log in to the Web Server console using the following information:

    User name:

    admin

    Password:

    web4d4min

  3. On the Servers tab, select the server AccessManager-2.example.com, and then click Manage.

  4. Click on the Security tab, and then initialize the Trust Database by providing the following information:

    Database Password:

    password

    Password (again):

    password

    Click OK.

  5. In the left frame, click Install Certificate. In the Install a Server Certificate page, provide the following information:

    Certificate for:

    Choose Trusted Certificate Authority (CA)

    Message text (with headers):

    Choose this option, and then paste into the text box the root certificate you received from the CA. To Request an SSL Certificate for the Distributed Authentication UI Load Balancer. The root certificate will look similar to this:


    -----BEGIN CERTIFICATE-----
    UbM77e50M63v1Z2A/5O5MA0GCSqGSIb3DQEOBAU
    AMF8xCzAJBgNVBAYTAlVTMSAwHgYDVQQKExdSU0
    EgRGF0YSBTZWN1cml0eSwgSW5jLjEuMCwGA1UEC
    xMlU2VjdXJlIFNlcnZlciBDZXJ0aWZpY2F0aW9u
    IEF1dGhvcml0eTAeFw0wMTA4MDIwMDAwMDBaFw0
    wMzA4MDIyMzU5NTlaMIGQMQswCQYDVQQGEwJVUz
    ERMA8GA1UECBMIVmlyZ2luaWExETAPBgNVBAcUC
    FJpY2htb25kMSAwHgYDVQQKFBdDYXZhbGllciBU
    ZWxlcGhvYm9uZGluZy5jYXZ0ZWwuY29tMIGfMA0
    GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC8x/1dxo
    2YnblilQLmpiEziOqb7ArVfI1ymXo/MKcbKjnY2
    -----END CERTIFICATE REQUEST-----

    Click OK.

  6. On the “Add Trusted CA Certificate page,” click “Add Server Certificate.”

  7. In the left frame, click Manage Certificates.

    In the list of certificates, you will see the certificate you just added. In this deployment example, the certificate name OpenSSLTestCA-Sun is displayed in the list.

    Close the browser.

  8. As a root user, log into the Access Manager 2 host.

  9. To verify that the certificate was imported properly, go to the following directory:


    /opt/SUNWwbsvr/alias

    In a directory listing, notice that certificate filename is formed by joining the prefix https-AccessManager-1.example.com and database file name cert8.db.


    #ls
    https-AccessManager-1.example.com-AccessManager-2-cert8.db
    https-AccessManager-1.example.com-AccessManager-2-key3.db
    https-AccessManager-2.example.com-cert8.db
    https-AccessManager-1.example.com-key3.db
    secmod.db
  10. Run the certutil list command, specifying the prefix from certificate filename:


    # cd /opt/SUNWwbsvr/bin/https/admin/bin
    # ./certutil -L -d /opt/SUNWwbsvr/alias/ -P "https-AccessManager-2.example.com-"
    OpenSSLTestCA - Sun

    The OpenSSLTestCA — Sun certificate you imported is displayed.

ProcedureTo Modify the AMConfig.properties File

  1. As a root user, log in to the Access Manager 2 host.

  2. Go to the following directory:


    /etc/opt/SUNWam/config

    Make a backup of the AMConfig.properties file before making any changes to the file.

  3. In the AMConfig.properties file, verify that the certificate database directory is specified correctly as in this example:


    com.iplanet.am.admin.cli.certdb.dir=/opt/SUNWWwbsvr/alias
  4. For the value of the following property, add the prefix from the certificate filename as in this example:


    com.iplanet.am.admin.cli.certdb.prefix=https-AccessManager-2.example.com-
  5. Notice that the following property points to a file wtpass which doesn't exist yet:


    com.iplanet.am.admin.cli.certdb.

    You will create this file in the next step.

    Save the file.

  6. Create the wtpass file.

    In the file, enter the name of the password you used to create the certificate database. Example:


    # cd /etc/opt/SUNWam/config
    # vi .wtpass
    password

    Save the file.

  7. Verify that the file was created properly.


    # cat .wtpass
    password
  8. Restart the Web Server.


    # cd /opt/SUNWwbsvr/https-AccessManager-2.example.com
    # ./stop; ./start

5.6 Creating an Access Manager Site

Access Manager 7 2005Q4 introduces the site concept which provides centralized configuration management for an Access Manager deployment. In this example, you configure two Access Manager servers to work as a single site. Once configured as a site, all client requests always go through a load balancer. In this example, requests go through either the internal or external load balancer. This flow simplifies the deployment by resolving firewall issues between the client and the back-end Access Manager servers.

Use the following as your checklist for creating an Access Manager site:

  1. Create an Access Manager site.

  2. Verify that the site was configured properly.

ProcedureTo Create an Access Manager Site

Complete the following steps on the Access Manager 1 host. It is not necessary to repeat the steps on the Access Manager 2 host.

  1. Start a browser, and access the Access Manager 1 server.

    http://AccessManager-1:1080/amserver/console

  2. Log in to the Access Manager console using the following information:

    Username

    amadmin

    Password

    4m4dmin1

  3. In the Access Manager console, click the Access Control tab, and then click the top-level Realm Name example.

  4. In the Realm/DNS Aliases field, add the name of the internal load balancer.

    For this example, enter LoadBalancer-3.example.com:90, and then click Add.


    Note –

    Do not remove the host names AccessManager-1 and AccessManager-2 from the alias list. These allow administrators to log in to the console directly in the event of a load balancer failure.


  5. For this deployment example, add an entry for the same host name using all lowercase.

    Example: loadbalancer-3.example.com:90

  6. Click Save.

  7. In the Access Manager console, click the Realms link, and then navigate through the following:

    Configuration > System Properties > Platform >

  8. Under Site Name, click New, and enter the following values for the external load balancer:

    Server:

    https://loadbalancer-3.example.com:9443

    Site Name:

    11

  9. Click OK, and then click Save.

  10. Under Site Name, click New. Enter the following values for the internal load balancer:

    Server:

    http://loadbalanacer-3.example.com:90

    Site Name:

    12

  11. Click OK, and then click Save.

  12. On the same Platform page, under Instance Name, click AccessManager-1.

    Change the site ID from 01 to 01|11|12.

    http://AccessManager-1.example.com:1080:01|11|12

  13. Click OK, and then click Save.

  14. On the Platform page, under Instance Name, click AccessManager-2.

    Change the site ID from 02 to 02|11|12.

    http://AccessManager-2.example.com:1080:02|11|12

  15. Click OK, and then click Save.

  16. Restart AccessManager-1 and AccessManager-2 for the changes to take effect.

    1. Log in as a root user to the Access Manager 1 host.


      #cd /opt/SUNWwbsvr/https-AccessManager-1
      # ./stop; ./start
    2. Log in as a root user to the Access Manager 2 host.


      #cd /opt/SUNWwbsvr/https-AccessManager-2
      # ./stop; ./start

ProcedureTo Verify that the Site was Configured Properly

  1. Go to the Access Manager Site URL:


    http://LoadBalancer-3.example.com:90/amserver/UI/Login

    If an error message is displayed indicating that the browser cannot connect to either AccessManager- 1.example.com or AccessManager-2.example.com, then the site configuration is not correct. If the site configuration is correct, all browser interactions will always occur with the Site URL.

  2. If the Access Manager login page is displayed, verify that the browser URL still contains the Site URL.

    If it does not contain the Site URL, then the site configuration is incorrect. If the site configuration is correct, all browser interactions will always occur with the Site URL

  3. If the Access Manager login page is displayed, and the browser URL contains the Site URL, log in to the Access Manager console using the following information:

    User Name:

    amadmin

    Password:

    4m4dmin1

  4. Verify that you can successfully login to the Access Manager console.

  5. Log out of the Access Manager console.