1. Creating a queue manager and a queue
About this task
You can use WebSphere MQ Explorer to create
the queue manager QM_VERIFY_AMS and its local queue called TEST.Q by
using all the default wizard settings, or you can use the commands
found in \WebSphere MQ\bin. Remember that you must
be a member of the mqm user group to run the following
administrative commands.
Procedure
Results
DISPLAY Q(TEST.Q)
2. Creating and authorizing users
About this task
Procedure
Results
What to do next
3. Creating key database and certificates
About this task
Note: In this guide, we
use sample applications written in C connecting using local bindings.
If you plan to use Java™ applications
using client bindings, you must create a JKS keystore and certificates
using the keytool command, which is part of the
JRE (see Quick Start Guide for Java clients for more details). For
all other languages, and for Java applications
using local bindings, the steps in this guide are correct.
Procedure
Results
4. Creating keystore.conf
About this task
The
content of keystore.conf should be of the form:
cms.keystore = /keystore_file
cms.certificate = certificate_label
Example
cms.keystore = C:/Documents and Settings/alice/AMS/alicekey
cms.certificate = Alice_Cert
Note:
- The path to the keystore file must be provided with no file extension.
- The certificate label can include spaces, thus "Alice_Cert" and "Alice_Cert " for example, are recognized as labels of two different certificates. However, to avoid confusion, it is better not to use spaces in label's name.
- There are the following keystore formats: CMS (Cryptographic Message Syntax), JKS (Java Keystore) and JCEKS (Java Cryptographic Extension Keystore). For more information, refer to Structure of the configuration file.
- %HOMEDRIVE%\%HOMEPATH%\.mqs\keystore.conf (eg. C:\Documents and Settings\alice\.mqs\keystore.conf) is the default location where WebSphere MQ Advanced Message Security searches for the keystore.conf file. For information about how to use a non-default location for the keystore.conf, see Using keystores and certificates.
- To create .mqs directory, you must use the command prompt.
5. Sharing Certificates
About this task
Procedure
Results
What to do next
runmqakm -cert -details -db "C:/Documents and Settings/bob/AMS/bobkey.kdb"
-pw passw0rd -label Alice_Cert
runmqakm -cert -details -db "C:/Documents and Settings/alice/AMS/alicekey.kdb"
-pw passw0rd -label Bob_Cert
6. Defining queue policy
About this task
Example
setmqspl -m QM_VERIFY_AMS -p TEST.Q -s SHA1 -a "CN=alice,O=IBM,C=GB" -e AES256 -r "CN=bob,O=IBM,C=GB"
Note: The
DNs match exactly those specified in the receptive user's certificate
from the key database.
What to do next
dspmqspl -m QM_VERIFY_AMS
To print
the policy details as a set of setmqspl commands,
the -export flag. This allows storing already defined
policies: dspmqspl -m QM_VERIFY_AMS -export >restore_my_policies.bat
Comments
Post a Comment