|

Enabling communications with Dynamic Workload Console

|

After you installed the Dynamic Workload Console and the z/OS connector you must enable |the communication between them. The Dynamic Workload Console and the z/OS connector use |RMI/IIOP over SSL to communicate. The SSL security paradigm implemented |in the WebSphere® Application |Server requires two stores to be present on the clients and the server:

|
|
A keystore
|
It contains the private key. |
|
A trust store
|
It contains the certificates of the trusted counterparts. |
|
|

Figure 26 shows the keys that must be extracted |and distributed to enable SSL between the z/OS connector and the Dynamic Workload Console. |Each arrow in the diagram includes the following activities performed |using an appropriate key management tool on each keystore:

| |
Figure 26. Shows the keys to enable SSL between the z/OS connector and the Dynamic Workload Console |
|Diagram that shows the key that must be extracted and distributed to enable SSL between the z/OS connector and the Dynamic Workload Console.
|

To define SSL basic authentication security, you must first request |a signed certificate for your server and a certificate authority (CA) |certificate from the certificate authority that signed your server |certificate. After you have received both these certificates, you |must:

|

To perform these operations, complete the following steps:

|
    | |
  1. Export the WebSphere Application Server for z/OS certificate to a data set, as follows: |
      |
    1. Connect to RACF® and select |option DIGITAL CERTIFICATES, KEY RINGS, AND TOKENS.
    2. |
    3. Select option Digital certificates functions.
    4. |
    5. Select option Write a certificate to a data set.
    6. |
    7. Export the WebSphere Application Server certificate authority certificate to a data set |and transfer the file to the Dynamic Workload Console using the FTP protocol in binary |or ASCII mode.
  2. |
  3. Import the file into the trusted certificate authority repository |of the Dynamic Workload Console using the iKeyman utility. The iKeyman utility is located |in installation_directory/TDWC/_jvm/jre/bin.
  4. |
  5. From the Dynamic Workload Console, export the self-signed certificate to a file using |the iKeyman utility. For more information, see the section about interface |communication in Administration Guide.
  6. |
  7. Transfer the file to the z/OS environment and add it to the RACF database as follows: |
      |
    1. In RACF, select option |DIGITAL CERTIFICATES, KEY RINGS, AND TOKENS.
    2. |
    3. Select option Digital certificates functions.
    4. |
    5. Select option Add, alter, delete or list certificates.
    6. |
    7. Select option Add a digital certificate to the RACF database. Set the status to Trust |(T).
  8. |
  9. Associate the certificate to the trusted certificate authority |repository of WebSphere Application Server for z/OS, as follows: |
      |
    1. In RACF, select option |Key Ring functions.
    2. |
    3. Select option Connect a digital certificate to a key ring. In |field Ring Name, type the name of the WebSphere Application Server controller key ring.
  10. |
  11. |Define an EJBROLE profile and then permit a System Authorization |Facility (SAF) user to the profile as follows: |
      |
    1. On the WebSphere Application Server, the deployment descriptor of the zConnector defined |under the Enterprise Applications, displays the default role, TWSAdmin, |that needs to be defined in the RACF class |EBJROLE as follows: |
      rdefine EJBROLE <SAF_prefix>.TWSAdmin owner(SYS1)
      |audit(failures(READ)) uacc(NONE)
      where, <SAF_prefix> |is the prefix of the profile, and the value can be found on the WebSphere Application Server, Security > Global security > External authorization providers |> SAF authorization options, in the SAF profile prefix field.
    2. |
    3. Grant READ access to a specific user by issuing the following RACF command: |
      permit <SAF_prefix>.TWSAdmin class(EJBROLE) id(userid) access(READ)
    |
  12. |
  13. Restart WebSphere Application Server to make changes effective.
  14. |

Secure communications is now enabled between the Dynamic Workload Console and the z/OS connector.

|