Use this scenario if you have multiple sites and do not want to distribute private key ring files between sites. Suppose you have site A and site B, and you define your internal Web-based System Manager Certificate Authority (CA) on a machine in site A. See step 1 of "Ready-to-Go Key Ring Files" for directions on configuring a CA.
Note: For all clients and for site A servers, you can follow the instructions in usingUsing Ready-to-Go Key Ring Files.
For servers in site B, follow these steps:
Provide the full TCP/IP names of all Web-based System Manager servers in site B. You can enter them in the dialog one at a time, or you can provide a file containing a list of your servers, one per line.
On a server in site B, log in locally as root user and start Web-based System Manager. The security configuration applications of Web-based System Manager are not accessible if you are not logged in as root user or if you are running the Web-based System Manager in remote application or applet mode.
Select Management Environment --> hostname --> System Manager Security --> Server Security.
On the task list for Server Security, select Generate Servers' Private Keys and Certificate Requests. Fill in the following information:
When you click OK, a private key ring file and a certificate request is created for each server that you specified.
You can also generate private keys and certificate requests from the command line with the /usr/websm/bin/smgenkeycr command.
Transfer the certificate request files to the CA in site A. The certificate requests do not contain secret data. However, the integrity and authenticity during transfer must be ensured.
Transfer a copy of the certificate request files from the server in site B to a directory on the CA machine in site A.
Log in to the CA machine in site A locally as root user and start the Web-based System Manager. The security configuration applications of the Web-based System Manager are not accessible if you are not logged in as root user or if you are running the Web-based System Manager in remote application or applet mode.
Select Management Environment --> hostname --> System Manager Security --> Certificate Authority.
On the task list for Certificate Authority, select Sign Certificate Requests. Fill in the following information:
When you click OK, a certificate file is created for each server that you selected. The certificates are written to the directory containing the certificate requests.
You can also get the certificates signed by the CA by running the following command from the command line: /usr/websm/bin/smsigncert.
In this step, transfer the certificates from the CA in site A back to the server in site B. Copy them to the directory containing the certificate requests and server private key files that you created in step 1.
Then, on the server in site B from the Server Security task list, select Import Signed Certificates.
Fill in the following information:
When you click OK, if the server private key files were encrypted in step 1, you are prompted for the password. Then, for each server that you selected, the certificate is imported into the private key file and the private key ring file is created.
You can import signed certificates from the command line with the /usr/websm/bin/smimpservercert command.
Each server's private key ring file must be installed on the server.
You can move the files to their targets in any secure way. Shared directory and diskette TAR methods are described here:
Note: For this method, you should have chosen to encrypt the server private key ring files on the Generate private keys and certificate requests for this server or other servers dialog, because the files are transferred in the clear, that is, the files are transferred without encryption. It is also recommended that you restrict the access rights to the shared directory to the administrator.
Next, install the server private key rings on each server. Log in to each server as root user and start Web-based System Manager. Select Management Environment --> hostname --> System Manager Security --> Server Security. Then select Install the private key ring files for this server. Select the source for the server private key ring files. If using a diskette TAR, insert the diskette before clicking OK. If the key ring files are encrypted, you are asked for the password. The server's private key is installed in /var/websm/security/SM.privkr. Repeat this procedure on each server.
You can also distribute the private key ring files from the command line with the /usr/websm/bin/sminstkey command.
A copy of CA public key ring file from the directory you specified in step 1 must be placed in the /usr/websm/codebase directory of your Web-based System Manager servers and clients.
Note: The content of this file is not secret. However, placing it on a client machine specifies which CA the client trusts. Thus, make sure that you limit access to this file on the client machine. In applet mode, the client can trust the server to send over this file along with the applet itself, provided the HTTPS protocol is used.