This document describes how to implement Secure Sockets Layer (SSL) on WebCenter using the z/OS OMVS tools.
Important! This implementation creates a self-signed certificate; it does not explain how to obtain a signed digital certificate.
To implement SSL, you must perform the following tasks:
Note: We recommend that the following steps are performed by a user with superuser authority.
To create the self-signed certificate, you must create a keydatabase first.
To create the self-signed certificate
This step transfers the certificate that you created in OMVS to your PC and places it in the PC's Java certificate store.
To export the self-signed certificate
c:\PC's java path\bin\keytool -import -alias test -keystore c:\PC's javapath\lib\security\cacerts -file c:\certs\test.cerwhere the file FTP'd from the 3270 is called test.cer and exists in c:\certs.
Now that you have created your self-signed certificate and saved it to the Java store, you must configure your CA NetMaster region using Customizer.
To configure your CA NetMaster region
<Please see attached file for image>
<Please see attached file for image>
To log on to WebCenter:
<Please see attached file for image>
Sometimes when you log on to WebCenter, a dialog appears regarding a hostname mismatch. This appears if the Common Name you entered when you generated the certificate does not match your Host ID or if you did not specify an Alternate Name. Click Yes to continue.
Also, sometimes the hostname mismatch dialog does not appear and your session may appear hung. Press <Alt> + <Tab> to cycle through your PC sessions and you will find a java session. Click Yes to continue.
If you still cannot log on to WebCenter, check the CA NetMaster log. Each error message should contain an SSL code. Click the following link for information about these errors and how to solve them:
The following are common problems:
You can generate a certificate using your security product, for example, CA-ACF2, CA-Top Secret, and RACF. Facilities exist in these products to generate, store, and attach them to specific user IDs using keyrings.
The following sections show the commands needed to set up certificates and keyrings using these security products.
Note: These are examples and apply to self-signed certificates only. For more information, see the relevant product documentation.
Generate a Certificate
To generate a certificate, issue the following command:
TSS GENCERT(acid) + DIGICERT(8 byte name) + DCDSN(hqual.qual.CER) + KEYUSAGE('HANDSHAKE DATAENCRYPT') + LABLCERT(Up to 32 char name) + KEYSIZE(512)Define a Keyring
To define a keyring, issue the following command:
TSS ADD(acid) KEYRING(8 byte keyring name)
Connect the Certificate to the Keyring
To connect the certificate to the keyring, issue the following command:
TSS ADD(acid) KEYRING(8 byte keyring name) + RINGDATA(acid,dgicert name) + USAGE(PERSONAL)Allow User of CA NetMaster Region to Read Certificate
To allow a user of a CA NetMaster region to read the certificate, issue the following command:
TSS PER(acid) IBMFAC(IRR.) ACCESS(UPDATE) TSS PER(acid) IBMFAC(IRR.DIGTCERT.) ACCESS(UPDATE)
Generate a Certificate
To generate a certificate, issue the following command:
SET PROFILE(USER) DIV(CERTDATA) GENCERT user.CERT1 SUBJSDN(CN='common name') LABEL(Certificate Label) - ALTNAME(IP=Ip address of Host) - KEYUSAGE(HANDSHAKE DATAENCRYPT) SIZE(1024)Define a Keyring
To define a keyring, issue the following command:
SET PROFILE(USER) DIV(KEYRING) INSERT user.RING1 RINGNAME(keyring name)Connect the Certificate to the Keyring
To connect the certificate to the keyring, issue the following command:
SET PROFILE(USER) DIV(KEYRING) CONNECT CERTDATA(user.CERT1) KEYRING(user.RING1) - RINGNAME(keyring name) - USAGE(PERSONAL) - DEFAULTAllow User of CA NetMaster Region to Read Certificate
To allow a user of a CA NetMaster region to read the certificate, issue the following command:
SET R(FAC) COMPILE $KEY(IRR) TYPE(FAC) DIGTCERT.LISTRING UID(userid) SERVICE(READ) ALLOW DIGTCERT.LISTRING UID(*) SERVICE(READ) PREVENT
Generate a Certificate
To generate a certificate, issue the following command
RACDCERT ID(user) GENCERT SUBJECT(CN('common Name')) + ALTNAME(IP(IP address of Host)) + KEYUSAGE(HANDSHAKE DATAENCRYPT) + WITHLABEL('Certificate Label') SIZE(1024)Define a Keyring
To define a keyring, issue the following command:
RACDCERT ID(user) ADDRING(keyring name)Connect the Certificate to the Keyring
To connect the certificate to the keyring, issue the following command:
RACDCERT ID(username of keyring owner) + CONNECT(ID(username of certificate owner) + LABEL('Certificate Label') RING(keyring name) + USAGE(PERSONAL))Allow User of CA NetMaster Region to Read Certificate
To allow a user of a CA NetMaster region to read the certificate, issue the following command:
RDEFINE FACILITY IRR.DIGTCERT.LISTRING UACC(NONE) PERMIT IRR.DIGTCERT.LISTRING CLASS(FACILITY) ID(user) ACCESS(READ)