1. Creating a queue manager and a queue
About this task
Procedure
Results
DISPLAY Q(TEST.Q)
2. Creating and authorizing users
About this task
Procedure
Results
What to do next
3. Creating key database and certificates
About this task
Note: In this guide, we
use sample applications written in Java connecting
using client bindings. If you plan to use Java applications using
local bindings or C applications, you must create a CMS keystore and
certificates using the runmqakm command. This is
shown in the Quick Start Guide (Windows or UNIX).
Procedure
Results
4. Creating keystore.conf
About this task
Example
JKS.keystore = keystore-dir/keystore
JKS.certificate = Alice_Java_Cert
JKS.encrypted = no
JKS.keystore_pass = passw0rd
JKS.key_pass = passw0rd
JKS.provider = IBMJCE
Note:
- The path to the keystore file must be provided with no file extension.
- If you already have a keystore.conf because you have followed Quick Start Guide (Windows or UNIX), you can edit the existing one to add in the above lines.
5. Sharing Certificates
About this task
Procedure
Results
What to do next
keytool -list -keystore bob-keystore-dir/keystore.jks -storepass passw0rd -alias Alice_Java_Cert
keytool -list -keystore alice-keystore-dir/keystore.jks -storepass passw0rd -alias Bob_Java_Cert
6. Defining queue policy
About this task
Example
setmqspl -m QM_VERIFY_AMS -p TEST.Q -s SHA1 -a "CN=alice,O=IBM,C=GB" -e AES256 -r "CN=bob,O=IBM,C=GB"
Note: The
DNs match exactly those specified in the receptive user's certificate
from the key database.
What to do next
dspmqspl -m QM_VERIFY_AMS
To print
the policy details as a set of setmqspl commands,
the -export flag. This allows storing already defined
policies: dspmqspl -m QM_VERIFY_AMS -export >restore_my_policies.bat
Comments
Post a Comment