In this scenario we have two nodes and deployment manager in our cell, we want to check out a few things about the configuration of SSL certificates in our keystores.
You may have a situation where node 01 profile was created using the GUI ie the PMT wizard where you would have been prompted for the certificate details and optionally given the choice to use default certificates and ability to edit the OU names used.
However for node 02 the node profile was created using a command line tool. For example: the manageprofiles.bat –create command was used and in this case there is no option to specify/override the default certificate naming conventions.
This can present a miss match in naming conventions, and we should be able to tidy this up to ensure that both nodes are using the same naming convention for the certificates in their key stores.
Let’s see the difference in the certificate naming as a result of this situation
- To view certificates issues navigate to Security | SSL certificate and key management
- The SSL certificate and key management screen will be presented. Locate the Related items section and click Key stores and certificates to get a list of node certificates.
- On the SSL certificate and key management | Key stores and certificates screen we get a list of each nodes SSL settings.
- To compare each certificate we need to drill down into each certificate for each node for both key and trust stores. This means we will repeat the following action 2 times for both nodes.
Click on the appropriate certificate, then
- Locate the Personal certificates link in the related item section as seen below
- The image below shows the personal certificate for node01.
- Repeat the exercise for node01. The image below shows the result for node02 personal certificates.
Node01
|
CN=node01, OU=Node01Cell, OU=node01, O=IBM, C=US CN=dmgr01, OU=Root Certificate, OU=cell01, OU=dmgr01, O=IBM, C=US 26634347123447 Valid from Oct 26, 2011 to Oct 25, 2012.
|
Node02 | CN=node02, OU=node02, OU=node02, O=IBM, C=US CN=dmgr01, OU=Root Certificate, OU=cell01, OU=dmgr01, O=IBM, C=US 9737447655777 Valid from Oct 27, 2011 to Oct 26, 2012. |
- You can see by the results that when we created Node01 using PMT we were able to specify/override the default SSL certificates OU hierarchy, however when we used the manageprofiles command line tool the OU’s were automatically given the same name as the node name.
This may not be a problem in normal runtime operation, but in a larger system of many WAS cells and nodes at a time a time where certificates may expire, if the names are not consistent, then problem finding the root cause of certificate errors in multi-cell or cross-cell communication, could be difficult.
It is recommended that you create both nodes the same method either using PMT or using the command line tool, this way you ensure the certificates naming convention is consistent.
Creating a new chained certificate using the Administrative console
- What we can do now is create a new personal certificate for our key store and delete the old one. This is a very powerful feature as oppsed to WAS 6.1 where this was all done using the IBM ikeyan tool.
- Select the Personal certificate screen for node 01 by navigating to:
SSL certificate and key management | Key stores and certificates | NodeDefaultKeyStore | Personal certificates - Click Create | Chained Certificate
- Fill out the fields as follows:
Field | Value |
Alias | default_node01
This is required as we cannot delete the default certificate and we cannot create one with the same name. We can delete the default alias and re-create a new one after this new certificate alias is created. |
Common name | node01 |
Validity period | 365 |
Organization | IBM |
Organization | node01 |
Locality | node01 |
Country | US |
An example screen shot is below:
- Click OK and then delete the default alias certificate that you want to re-create
- Delete the previous “default” alias, by selecting the alias and clicking the Delete action button as seen below.
- Save the changes. You will now see that the certificate alias has been removed.
- What we need to do now is re-create a new default alias. We do this by re-creating a new alias using the same details as the default_node1 alias and ten we can delete the default_node01 alias.
Why do we do this, well it is for neatness and stops confusion when dealing with certificate aliases.
- Click OK and save the change when prompted to do so.
Field | Value |
Alias | default |
Common name | node01 |
Validity period | 365 |
Organization | IBM |
Organization | node01 |
Locality | node01 |
Country | US |
- Select the default_node01 alias and click the Delete action button as seen below:
- Save the changes
- The result is not he following:
Node 1 Original | Node 01 New |
CN=node01, OU=Node01Cell, OU=node01, O=IBM, C=US CN=dmgr01, OU=Root Certificate, OU=cell01, OU=dmgr01, O=IBM, C=US 26634347123447 Valid from Oct 26, 2011 to Oct 25, 2012. |
CN=node01, OU=node01, O=IBM, L=node01, C=US CN=dmgr01, OU=Root Certificate, OU=cell01, OU=dmgr01, O=IBM, C=US 22462649943498 Valid from Oct 27, 2011 to Oct 26, 2012.
|
Node 02 | |
CN=node02, OU=node02, OU=node02, O=IBM, C=US CN=dmgr01, OU=Root Certificate, OU=cell01, OU=dmgr01, O=IBM, C=US 9737447655777 Valid from Oct 27, 2011 to Oct 26, 2012. |
Summary
It is recommended practice that you create all nodes using the same method. What we mean here, is that you should earth use the Profile Management Tool GUI to create all nodes, or use the manageprofiles command line tool to create all nodes for the cell. This way you will have a universal naming convention for node names and personal SSL certificates.
If you wanted to use an external CA or use an internal Root CS, then you could essentially tell WAS to use your specific certifiers after the profiles are created. The manage profiles command does not provide SSL management. Administration scripting using wsadmin and jython is how we can automate SSL certificate management after node profiles are created.
I will be posting a follow up article on how to fully automate SSL certificate along with node profile creation/federation.