I can see that there are multiple keystores in ISAM. Not sure though how they are used.
In ivmgrd.conf (I don't know how to view this file in GUI), they reference a keystore named ivmgr.kdb. This keystore is used for what?
In pd.conf (I don't know how to view this file in GUI), they reference a keystore named pd.kdb. This keystore is used for what?
I also can find other keystores in Manage System Setting -> SSL Certificates.
Here I can find:
Fortunately they have a brief description of where they are used, but still not clear.
- If I want to create a connection the a Federated Registry, which .kdb does LDAP use?
- If I want to use an external LDAP server, with mutual certification, where should I add and configure the certificates?
- If I want to connect a reverse proxy to a policy server or (policy servers) where should I place the certificates? (where should I add the certificates in the policy server, and similarly where should I add the certificates on the WebSeal)?
- I understand the pdsrv is used for the WebSeal clients to connect to the embedded HTTP server, but I need to establish a secure connection between WebSeal and Policy Server too.
If I want to configure FELB for customers to connect to ISAM, where should I add the certificates? Do I need to have SSL also between the FELB and the clustered Reverse Proxies? Since the IP virtual address can move between ISAM, I guess the FELB certificates must be on both ISAM.
Similarly, if FELB connects to a clustered Reverse Proxy, the cetificates of the members of the Reverse Proxy should also be replicated, but this is managed automatically when we configure the Reverse Proxy cluster!
But if we want to use mutual authentication, where should I put the private an public keys of both FELB and Reverse Proxies?
If I have several reverse proxies, can I have a keystore per reverse proxy?
------------------------------
Joao Goncalves
Pyxis, Lda.
Sintra
+351 91 721 4994
------------------------------