1. Creating a queue manager and a queue
About this task
You can use WebSphere MQ Explorer
to create the queue manager QM_VERIFY_AMS and its local queue called TEST.Q by using all the default wizard settings, or you
can use the commands found in /bin . Remember that you must be a member of the mqm user
group to run the following administrative commands.
Procedure
Results
DISPLAY Q(TEST.Q)
2. Creating and authorizing users
About this task
Procedure
Results
What to do next
3. Creating key database and certificates
About this task
Note: In this guide, we suse sample applications written in C connecting
using local bindings. If you plan to use Java™ applications using client bindings, you must create a JKS
keystore and certificates using the keytool command,
which is part of the JRE (see Quick Start Guide for Java clients for
more details). For all other languages, and for Java applications using local bindings, the
steps in this guide are correct.
Procedure
Results
4. Creating keystore.conf
About this task
The content of keystore.conf must be of
the form:
cms.keystore = /keystore_file
cms.certificate = certificate_label
Example
cms.keystore = /home/alice/.mqs/alicekey
cms.certificate = Alice_Cert
Note:
- The path to the keystore file must be provided with no file extension.
- There are the following keystore formats: CMS (Cryptographic Message Syntax), JKS (Java Keystore) and JCEKS (Java Cryptographic Extension Keystore). For more information, refer to Structure of the configuration file.
- HOME/.mqs/keystore.conf is the default location where WebSphere MQ Advanced Message Security searches for the keystore.conf file. For information about how to use a non-default location for the keystore.conf, see Using keystores and certificates.
5. Sharing Certificates
About this task
Procedure
Results
What to do next
runmqakm -cert -details -db /home/bob/.mqs/bobkey.kdb -pw passw0rd -label Alice_Cert
runmqakm -cert -details -db /home/alice/.mqs/alicekey.kdb -pw passw0rd -label Bob_Cert
6. Defining queue policy
About this task
Example
setmqspl -m QM_VERIFY_AMS -p TEST.Q -s SHA1 -a "CN=alice,O=IBM,C=GB" -e AES256 -r "CN=bob,O=IBM,C=GB"
Note: The DNs match exactly those specified in the receptive user's
certificate from the key database.
What to do next
dspmqspl -m QM_VERIFY_AMS
To print
the policy details as a set of setmqspl commands,
the -export flag. This allows storing already defined
policies: dspmqspl -m QM_VERIFY_AMS -export >restore_my_policies.bat
Comments
Post a Comment