Previous     Contents     DocHome     Index     Next     
iPlanet Trustbase Transaction Manager 3.0 Configuration and Installation



Contents


List of Figures

Introduction

Overall Layout
Related Documents


Chapter 1 Installation Worksheet
Installation Outline
SW pre-requisites
Pre-requisites
Packages included
Packages not included
Certificate Prerequisites
System Resources
Solaris Installation
IPlanet Web Server v6.0 Installation
Starting iPlanet Web Server 6.0
Verifying iPlanet Web Server 6.0
iWS Checklist
iPlanet Application Server v6.0 Installation
Post iPlanet Web Server and iPlanet Application Server Installation Steps
iAS Checklist
iPlanet Trustbase Transaction Manager Installation Process
Installation Structure
iTTM Checklist
Post Installation Steps
Cryptographic Services Configuration
Cryptographic Installation Scenarios
Cryptographic Providers
PKCs11 provider with software token
PKCs11 provider with generic hardware token
PKCs11 provider with nCipher token
nCipher native provider upgrade: ittm2.2.1 to 3.0
Oracle Database Configuration
Running the iPlanet Trustbase Transaction Manager SQL Scripts
Oracle Example Checklist
Identrus Configuration
Start iPlanet Trustbase Transaction Manager
iTTM Scripts
ShutDown procedure
Restart procedure
Upgrades
Reinstallation
Identrus Authorisation
TokenKeyTool Checklist


Chapter 2 Architectural Configuration
iPlanet Application Server configuration
Using a DMZ
Machine Installations
Configuring the SSLproxy Separately
Configuring the SMTP Proxy Separately


Chapter 3 Logging on
Configuration Management overview
Logon Screen
Configuration Options


Chapter 4 Authorisation
Introduction
Authorising users to access a service
Defining a role
Adding users to roles
Adding a Certificate
Mapping roles to Services


Chapter 5 Logs
Introduction
Audit log
Trustbase Audits:
Identrus Transaction Co-ordinator Audits:
Audit Configuration
Audit viewing
Raw Logging
Errors
Viewing
Configuring Error Event Types
Error Messages


Chapter 6 SMTP Proxy Configuration
S/MIME Settings


Chapter 7 Service Deployment
Overview of Deploying a Service
Deploying
Authorisation Services
Services not requiring Authorisation
Registered Services


Chapter 8 Backup
What data needs backup?
What data is Read-Only?
What Tables are used for frequently written data?
Archiving for Raw Data and Init Table
What happens when certificates expire?
How to do Disaster Recovery?


Chapter 9 Templates and Message Parsers
Parser
Glossary and References

Software Platform
Transport Protocols
Security Related Protocols
Trading Protocols
Message Protocols
Glossary
Index



Appendix A Using TokenKeyTool
Starting TokenKeyTool
Commands for dealing with TokenKeyStoreManagers
Commands for dealing with TokenKeyStores
Utility commands
Miscellaneous commands

Previous     Contents     DocHome     Index     Next     
Copyright © 2001 Sun Microsystems, Inc. Some preexisting portions Copyright © 2001 Netscape Communications Corp. All rights reserved.

Last Updated November 21, 2001