This section provides task descriptions for the following procedures:
As described in the following subsections, configure the DSAPI filter. Then, perform the procedure for verifying a successful installation. Next, determine if the remaining procedure described in this section applies to your site's deployment scenario and perform the procedure if necessary.
Configuring the DSAPI filter is a required task. When the DSAPI filter is not configured properly, users are unable to access resources. The DSAPI filter authenticates users and passes their information to the IBM Lotus Domino 6.5.4 server. The task description that follows explains how to configure the DSAPI filter.
In the Lotus Domino Administrator web console, select the Configuration tab.
In the left pane, under Server, click All Server Documents
A window appears, presenting a list of servers.
From the listed servers, select the IBM Lotus Domino 6.5.4 server instance that you want to configure.
Click Internet Protocols.
Select the HTTP tab.
In the DSAPI Filter File Names field, enter the following file name:
Click the Save and Close button to save the changes.
Open the IBM Lotus Domino 6.5.4 Quick Console and restart the server by entering the following commands:
tell http quit load http
After you have configured the DSAPI filter, verify that the installation was successful. For information about the verification process, see All Systems: Verifying a Successful Installation on Policy Agent 2.2.
During installation, if you choose the HTTPS protocol, Agent for IBM Lotus Domino 6.5.4 is automatically configured and ready to communicate over SSL. Before proceeding with the tasks in this section, ensure that the IBM Lotus Domino 6.5.4 instance is configured for SSL.
You should have a solid understanding of SSL concepts and the security certificates required to enable communication over the HTTPS protocol. See the documentation for the IBM Lotus Domino 6.5.4 server.
Add the IBM Lotus Domino 6.5.4 certificate’s root CA certificate to the Access Manager’s certificate database.
Mark the CA root certificate as trusted to enable Access Manager to successfully send notifications to Agent for IBM Lotus Domino 6.5.4.
This section only applies when Access Manager itself is running SSL. By default, Agent for IBM Lotus Domino 6.5.4 trusts any server certificate presented over SSL by the Access Manager host. The web agent does not check the root Certificate Authority (CA) certificate. If the Access Manager host is SSL-enabled and you want the agent to perform certificate checking, adhere to the guidelines as described in the following subsections:
The following property exists in the web agent AMAgent.properties configuration file, and by default it is set to true:
With this property set to true, the web agent does not perform certificate checking. On Windows systems, enabling the web agent to perform certificate checking is a one-step process that only involves setting this property to false as illustrated in the following task.
Set the following property in the web agent AMAgent.properties configuration file to false as follows:
com.sun.am.trust_server_certs = false
The root CA certificate that you install on the IBM Lotus Domino 6.5.4 instance that the agent protects must be the same certificate that is installed on the Access Manager host.
The following steps outline a method for installing Access Manager Root CA Certificate on the IBM Lotus Domino 6.5.4 server. However, see the documentation for the IBM Lotus Domino 6.5.4 server for more information about installing certificates.
(Conditional) If the certificate database has not yet been created, create it at a unique location using a command such as the following:
# PolicyAgent-base\bin\certutil -N -d .
Install the root CA certificate.
Remember that the root CA certificate that you install on the IBM Lotus Domino 6.5.4 server must be the same certificate that is installed on the Access Manager host.
The following example demonstrates a command you can issue that uses the certutil utility to install the certificate:
# PolicyAgent-base\bin\certutil -A -n cert-name -t "C,C,C" -d cert-dir -i cert-file
The name for this root CA certificate.
The directory where the certificate and key stores are located.
The base-64 encoded root CA certificate file.
For more information on the cetrutil utility enter cetrutil -H for Help.
To verify that the certificate is properly installed, in the command line, issue the following command:
PolicyAgent-base\bin\certutil -L -d cert-dir
The root CA certificate is then listed in the output of the certutil -L command as illustrated in the following code example:
Restart the IBM Lotus Domino 6.5.4 server.