Part 3. Manage the API Gateway


Start and stop the API Gateway
Set passphrases
Start the Node Manager
Start the API Gateway instance
Connect to the API Gateway in Policy Studio
Stop the API Gateway instance
Stop the Node Manager
Start the API Gateway tools
Before you begin
Launch API Gateway Manager
Start Policy Studio
Configure an API Gateway encryption passphrase
Configure the passphrase in Policy Studio
Enter the passphrase when you connect in Policy Studio
Enter the passphrase in a file or on startup
Promotion between environments
Run API Gateway as non-root on UNIX/Linux
Linux capabilities
Before you begin
Modify API Gateway file ownership
Set the CAP_NET_BIND capability on vshell
API Gateway appliance version 7.1.0 or later
Add API Gateway library locations
Modify the init.d script to use sudo
Modify the jvm.xml file
Restart the API Gateway
Run API Gateway as non-root on Solaris
Configure API Gateway high availability
HA in production environments
Load Balancing
Java Message System
File Transfer Protocol
Remote Hosts
Distributed caching
External Connections
Embedded Apache ActiveMQ
Embedded Apache Cassandra database
Manage certificates and keys
View certificates and private keys
Configure an X.509 certificate
Configure a private key
Global options
Manage certificates and keystores
Configure key pairs
Configure PGP key pairs
Manage API Gateway settings
General settings
Logging settings
Messaging settings
Monitoring settings
Security settings