Sun OpenSSO Enterprise 8.0 Installation and Configuration Guide

Running the Diagnostic Tool Tamper-Detection Tests

The Tamper-Detection test detects any changes made to the OpenSSO Enterprise server configuration settings or the deployed OpenSSO Enterprise server bits on the file system. To run the Tamper-Detection test, follow these general steps:

  1. Run the Create Checksum test to create checksum files for the following:

    • OpenSSO Enterprise server configuration files and the OpenSSO Configuration Data Store

      Note. The Tamper Detection test does not report configuration changes made if your configuration data store is remote in Sun Java System Directory Server.

    • Deployed OpenSSO Enterprise server bits on the file system

    As a general guideline, run the Create Checksum tests after your OpenSSO Enterprise deployment is properly configured and functional. You must run the test twice, once for the configuration files and then again for the server bits.

  2. Run the Detect Tamper test periodically to detect any changes made since the checksum files were created.

ProcedureTo Run the Diagnostic Tool to Create Checksum Files

Before You Begin

You must have unzipped the ssoDiagnosticTools.zip file and set your JAVA_HOME environment variable, as described in Getting Started With the OpenSSO Diagnostic Tool.

  1. Log in to the system where OpenSSO Enterprise is deployed and change to the directory where you unzipped the ssoDiagnosticTools.zip file.

  2. Invoke the Diagnostic Tool. For example, in GUI mode on Solaris Systems: ./ssodtool.sh

  3. Under Category, select Tamper-Detection.

  4. In Configuration Directory, specify one of the following paths:

    • OpenSSO Enterprise server configuration path. For example: /opensso

      or

    • Web container directory path where the OpenSSO Enterprise server bits are deployed. For example, for Sun Java System Application Server 9.1:

      /opt/SUNWappserver/domains/domain1/applications/j2ee-modules/opensso

  5. Under Select Test, specify Create Checksum.

  6. Click Run Selected.

    The Diagnostic Tool creates a checksum file named _configdir-pathname.checksum in the diagnostic-tool-zip-root/services/tamperdetection/backup directory.

    For example:

    • _opensso.checksum

    • _opt_SUNWappserver_domains_domain1_applications_j2ee-modules_opensso.checksum

    Caution. The Tamper Detection test relies on the operating system security permissions to protect the checksum files. Depending on the requirements of your deployment, you might need to copy these files to a more secure location.

  7. To save the results as an HTML file, click Save All Results.

  8. The Diagnostic Tool logs all test results in the diagnostic-tool-zip-root/ssodtool.log file. Optionally, as required by your deployment, check and save this log file.

Next Steps

Repeat this procedure to create a checksum file for the other path in Step 4.

ProcedureTo Run the Diagnostic Tool Detect Tamper Test

Before You Begin

You must have unzipped the ssoDiagnosticTools.zip file and set your JAVA_HOME environment variable, as described in Getting Started With the OpenSSO Diagnostic Tool.

Important: The Tamper Detection test expects the checksum files to be in the diagnostic-tool-zip-root/services/tamperdetection/backup directory, where they were generated when you ran the Create Checksum tests. Therefore, make sure that the checksum files are in this same directory before you run the Tamper Detection test.

  1. Log in to the system where OpenSSO Enterprise is deployed and change to the directory where you unzipped the ssoDiagnosticTools.zip file.

  2. Invoke the Diagnostic Tool. For example, in GUI mode on Solaris Systems: ./ssodtool.sh

  3. Under Category, select Tamper-Detection.

  4. In Configuration Directory, specify one of the following paths:

    • OpenSSO Enterprise server configuration path. For example: /opensso

      or

    • Web container directory path where the OpenSSO Enterprise server bits are deployed. For example, for Sun Java System Application Server 9.1:

      /opt/SUNWappserver/domains/domain1/applications/j2ee-modules/opensso

  5. Under Select Test, specify Create Detect Tamper.

  6. Click Run Selected.

    The Diagnostic Tool uses the checksum file in the diagnostic-tool-zip-root/services/tamperdetection/backup directory to determine if any files have changed since the checksum file was created. The tool determines if a file:

    • Existed and was changed

    • Existed and was deleted.

    • Did not exist and was added

  7. To save the results as an HTML file, click Save All Results.

  8. The Diagnostic Tool logs all test results in the diagnostic-tool-zip-root/ssodtool.log file. Optionally, as required by your deployment, check and save this log file.

Next Steps

Repeat this procedure to run the test for the other path in Step 4.

Examine the results to determine if your OpenSSO Enterprise deployment has been tampered with since you created the checksum files.