ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzahx_5.4.0.1/rzahxagentsecurepref.htm

157 lines
9.1 KiB
HTML
Raw Permalink Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="task" />
<meta name="DC.Title" content="Configure platform security" />
<meta name="abstract" content="Before you begin, ensure that you have configured your Kerberos key distribution center (KDC)." />
<meta name="description" content="Before you begin, ensure that you have configured your Kerberos key distribution center (KDC)." />
<meta name="DC.Relation" scheme="URI" content="rzahxagentsecure.htm" />
<meta name="DC.Relation" scheme="URI" content="rzahxagentkerberos.htm" />
<meta name="DC.Relation" scheme="URI" content="rzahxagentkerberos.htm" />
<meta name="DC.Relation" scheme="URI" content="rzahxagentstartplatform.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 1998, 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 1998, 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="rzahxagentsecurepref" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Configure platform security</title>
</head>
<body id="rzahxagentsecurepref"><a name="rzahxagentsecurepref"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Configure platform security</h1>
<div><p>Before you begin, ensure that you have configured your Kerberos
key distribution center (KDC).</p>
<div class="section">When security is turned on, <span class="uicontrol">ableplatform.preferences</span> acts
as a policy file for the security of the platform it defines. The following
steps provide examples for how principals, trust levels, and permissions could
be configured:</div>
<ol><li class="stepexpand"><span><strong>Define User and Service principals</strong></span> <div class="p">After you
acquire user and service principals, and register them with your KDC, you
need to add these principals to <span class="uicontrol">ableplatform.preferences</span> .
When security is turned on, a user must be defined with a valid Kerberos user
principal to gain access to the platform, and all agent services and agent
pools must have a valid Kerberos service principal assigned to them. Add the
user or service principals you have registered with your KDC, and specify
an alias for each principal (the alias can be any unique name you want to
use): <div class="note"><span class="notetitle">Note:</span> By using the code examples, you agree to the terms of the <a href="codedisclaimer.htm">Code license and disclaimer information</a>.</div>
</div>
<pre>#----------------------------------------------------------------------
# Principals
#----------------------------------------------------------------------
Principal.1.Alias = servicePrincipal1
Principal.1.Principal = name1/systemName@REALM
Principal.2.Alias = servicePrincipal2
Principal.2.Principal = name2/systemName@REALM
Principal.3.Alias = userPrincipal1
Principal.3.Principal = name1@REALM
Principal.4.Alias = userPrincipal2
Principal.4.Principal = name2@REALM</pre>
</li>
<li class="stepexpand"><span><strong>Define trust levels</strong></span> <p>After you add user and
service principals, you need to define the trust level associated with each
principal. A trust level is associated with a principal to help define the
capabilities of a user or service on the platform. Associating a trust level
with a principal is also a way to group principals. The same trust level can
be associate with multiple user and service principals. Add the principal
alias you assigned to your service and user principals in step 1, (comma delineated),
to the trust level you want to associate it with, and provide a unique name
for trust level alias:</p>
<pre>#----------------------------------------------------------------------
# Trust Levels
#----------------------------------------------------------------------
TrustLevel.1.Alias = HighlyTrusted
TrustLevel.1.Principals = servicePrincipal1,userPrincipal1
TrustLevel.2.Alias = SomewhatTrusted
TrustLevel.2.Principals = servicePrincipal2,userPrincipal2</pre>
</li>
<li class="stepexpand"><span><strong>Associate service principals with Agent Pools</strong></span> <p>A
distributed platform can span multiple ports on multiple systems. Each agent
pool defines where one part (JVM) or the platform will run. Each agent pool
entry contains an alias, an IP Address, a port, and a service principal alias.
The principal alias specifies what service principal this pool will be associated
with. Add the service principal alias you defined above that you want to associate
with your agent pool:</p>
<pre>#----------------------------------------------------------------------
# Agent Pools (Java Virtual Machines)
#----------------------------------------------------------------------
AgentPool.1.Alias = Pool1
AgentPool.1.IpAddress = systemname.ibm.com
AgentPool.1.Port = 55551
<strong>AgentPool.1.Principal = servicePrincipal1</strong>
AgentPool.2.Alias = Pool2
AgentPool.2.IpAddress = systemname.ibm.com
AgentPool.2.Port = 55552
<strong>AgentPool.2.Principal = servicePrincipal1</strong>
AgentPool.3.Alias = Pool3
AgentPool.3.IpAddress = systemname.ibm.com
AgentPool.3.Port = 55553
<strong>AgentPool.3.Principal = servicePrincipal2</strong></pre>
</li>
<li class="stepexpand"><span><strong>Define agent start-up authority</strong></span> <p>Define which
users have the capability to start each of the agents defined on your secure
platform. Add one or more user principal aliases to the EligiblePrincipal
parameter:</p>
<pre>#----------------------------------------------------------------------
# Permitted Agents
#----------------------------------------------------------------------
Agent.1.Alias=Agent1
Agent.1.AutonomyLevel=Medium
Agent.1.ClassName=com.ibm.able.platform.examples.EServerTemplateAgent
Agent.1.ConstructorArgs=String:AgentName1
<span class="uicontrol">Agent.1.EligiblePrincipals=userPrincipal1,userPrincipal2</span>
Agent.1.EligibleAgentPools=Pool2,Pool3
Agent.1.InitArgs=
Agent.1.LastChangedDate=January 11, 2003 11:11am
Agent.1.Type=Tester1
Agent.1.Vendor=IBM1
Agent.1.Version=1.1</pre>
</li>
<li class="stepexpand"><span><strong>Define the algorithm and provider</strong></span> <p>You need
to define the algorithm and provider of the KeyPairs the platform will use.
By default, the preferences file will contain the following setting:</p>
<pre>#----------------------------------------------------------------------
# Cryptography parameters
#----------------------------------------------------------------------
CryptographyAlgorithm = DSA
CryptographyProvider = IBMJCE</pre>
</li>
</ol>
<div class="section"><p>After you add the necessary security data to <span class="uicontrol">ableplatform.preferences</span>,
save your changes. Turning on security for the platform once it is correctly
configured is as simple as opening <span class="uicontrol">able.preferences</span> that
defines your platform, and changing the Security property to <span class="uicontrol">Security=on</span>.
If you are running an unsecured platform, you will need to end and restart
the agent platform for security changes to take effect.</p>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzahxagentsecure.htm" title="It is strongly recommended that you use Kerberos user and service principals to authenticate users, agent pools, and agent services to one another on or across a secure platform or distributed platform.">Secure your agent environment</a></div>
</div>
<div class="relconcepts"><strong>Related concepts</strong><br />
<div><a href="rzahxagentstartplatform.htm" title="After you define the agent platform and optionally secure your platform, you will need to start all the Java Virtual Machines associated with your agent services using iSeries CL commands.">Start the agent platform</a></div>
</div>
<div class="reltasks"><strong>Related tasks</strong><br />
<div><a href="rzahxagentkerberos.htm" title="The intelligent agent platform uses Kerberos principals to authenticate users and services throughout the agent platform. Kerberos protocol, developed by Massachusetts Institute of Technology, allows a principal (a user or service) to prove its identity to another service within an insecure network.">Configure your platform to use Kerberos</a></div>
</div>
</div>
</body>
</html>