IBM Security Guardium Key Lifecycle Manager: Books
IBM Security Guardium Key Lifecycle Manager: Books
IBM Security Guardium Key Lifecycle Manager: Books
Rinkesh Bansal
Aditi Prasad
Shiv Jha
Saandiip Koturwwar
Alka Acharya
Redbooks
Draft Document for Review June 11, 2021 12:08 pm 8472edno.fm
IBM Redbooks
June 2021
SG24-8472-01
8472edno.fm Draft Document for Review June 11, 2021 12:08 pm
Note: Before using this information and the product it supports, read the information in “Notices” on page v.
This edition applies to version 4.1.0.1 of IBM Security Guardium Key Lifecycle Manager (product number
5724-T60).
Contents
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .v
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Now you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Stay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation
27
3.1 Pre-requisite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.2 Installing IBM Security Guardium Key Lifecycle Manager on Red Hat OpenShift . . . . 29
3.2.1 Installing IBM Security Guardium Key Lifecycle Manager Container Edition on Red
Hat OpenShift with PostgreSQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.2.2 Activate the license and login to IBM Security Guardium Key Lifecycle Manager 33
3.2.3 Installing IBM Security Guardium Key Lifecycle Manager Container Edition on Red
Hat OpenShift with Db2U . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
3.2.4 Exposing non-HTTP Port in Red Hat OpenShift Installation . . . . . . . . . . . . . . . . . 36
3.2.5 Installing IBM Security Guardium Key Lifecycle Manager Container Edition as Fix
Pack on Red Hat OpenShift . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
3.2.6 Troubleshooting in Red Hat OpenShift . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
3.3 Installing IBM Security Guardium Key Lifecycle Manager Container Edition on Kubernetes
40
3.3.1 Installing IBM Security Guardium Key Lifecycle Manager on Kubernetes . . . . . . 40
3.3.2 Installing IBM Security Guardium Key Lifecycle Manager Container Edition as Fix
Pack on Kubernetes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
3.3.3 Troubleshooting in Kubernetes environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
3.4 Installing IBM Security Guardium Key Lifecycle Manager Container Edition on IBM Z/OS
Container Extensions (zCX) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.4.1 Installing IBM Security Guardium Key Lifecycle Manager on zCX with PostgreSQL
43
3.4.2 Installing IBM Security Guardium Key Lifecycle Manager with Db2 for z/OS . . . . 44
3.4.3 Installing IBM Security Guardium Key Lifecycle Manager Container Edition as Fix
Pack in z/CX Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Notices
This information was developed for products and services offered in the US. This material might be available
from IBM in other languages. However, you may be required to own a copy of the product or product version in
that language in order to access it.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not grant you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any
manner serve as an endorsement of those websites. The materials at those websites are not part of the
materials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you provide in any way it believes appropriate without
incurring any obligation to you.
The performance data and client examples cited are presented for illustrative purposes only. Actual
performance results may vary depending on specific configurations and operating conditions.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
Statements regarding IBM’s future direction or intent are subject to change or withdrawal without notice, and
represent goals and objectives only.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to actual people or business enterprises is entirely
coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are
provided “AS IS”, without warranty of any kind. IBM shall not be liable for any damages arising out of your use
of the sample programs.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines
Corporation, registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright
and trademark information” at http://www.ibm.com/legal/copytrade.shtml
The following terms are trademarks or registered trademarks of International Business Machines Corporation,
and might also be trademarks or registered trademarks in other countries.
AIX® IBM® Tivoli®
Db2® IBM Security™ WebSphere®
DS8000® Redbooks® z/OS®
Guardium® Redbooks (logo) ®
The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive
licensee of Linus Torvalds, owner of the mark on a worldwide basis.
LTO, the LTO Logo and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and other
countries.
Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States,
other countries, or both.
Java, and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its
affiliates.
OpenShift, Red Hat, are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the United
States and other countries.
VMware, and the VMware logo are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in
the United States and/or other jurisdictions.
Other company, product, or service names may be trademarks or service marks of others.
Preface
This IBM® Redbooks® publication describes the installation, integration, and configuration
of IBM Security™ Guardium® Key Lifecycle Manager .
Authors
This book was produced by a team of IBM specialists from around the world:.
Rinkesh Bansal is a Senior Development and Release Manager for Encryption and Key
Management products in IBM. He is expert of Key Management domain and has more than
18 years of experience. He joined IBM in 2009, working with IBM Security Guardium Key
Lifecycle (GKLM) team since 2012. His experience includes roles as an Install package
developer, test engineer, test lead, automation lead, Project Manager, Release Manager and
he currently manages the GKLM development team. He is a passionate innovator with 10
patents and an enthusiastic speaker at various conferences, colleges, schools.
Aditi Prasad is an Advisory Software Engineer at IBM. She joined IBM in 2008 and is
working with the IBM Security Guardium Key Lifecycle (GKLM) team since 2012. She is the
Level 3 support lead for GKLM. She has about 13 years of experience with more than 7 years
in Security Domain. She holds a Masters degree in Computer Science from Pune University,
India.
Shiv Jha is a Test Lead and Project Manager for IBM Security Guardium Key Lifecycle
Manager (GKLM) product in IBM. He joined IBM in 2013 and has a total of 17 years of
experience. He is working with GKLM team for last 7 years. Shiv holds a Masters degree in
Computer Science from BITS Pilani, India.
Alka Acharya has been working in the IBM Software Labs as an Information Developer since
November 2018. She is responsible for authoring and delivering the customer-facing
documentation for IBM Security Guardium Key Lifecycle Manager. She has about 15 years of
experience in delivering product and training documentation. She holds a Bachelor's degree
in Engineering (Computer Science) from the University of Pune, India.
An Chen
Client Technical Specialist, IBM Australia
Bert Dufrasne
Project Leader, IBM Redbooks, San Jose Center
Find out more about the residency program, browse the residency index, and apply online at:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
We want our books to be as helpful as possible. Send us your comments about this book or
other IBM Redbooks publications in one of the following ways:
Use the online Contact us review Redbooks form found at:
ibm.com/redbooks
Send your comments in an email to:
[email protected]
Mail your comments to:
IBM Corporation, IBM Redbooks
Dept. Security Mail Station P099
2455 South Road
Poughkeepsie, NY 12601-5400
1.1 Overview
IBM Security Guardium Key Lifecycle Manager provides key storage, key serving, and key
lifecycle management for storage devices, tape drives, databases, and applications from IBM
and other vendors. For more information, see IBM Documentation (formerly IBM Knowledge
Center).
IBM Security Guardium Key Lifecycle Manager supports the following methods for
communicating with client devices and applications to manage and serve cryptographic keys:
Key Management Interoperability Protocol (KMIP): You can use KMIP operations for
secure communication between the IBM Security Guardium Key Lifecycle Manager server
and the self-encrypting devices that are KMIP compatible. For Example: Spectrum Scale,
VMware, and so on.
IPP: Some self-encrypting devices uses IBM proprietary Protocol (IPP) to communicate
with IBM Security Guardium Key Lifecycle Manager server for Cryptographic keys. For
example, LTO tape drives, DS8000® data at rest, and so on.
REST APIs: You can use IBM Security Guardium Key Lifecycle Manager REST key
serving interface to manage and serve Cryptographic keys for applications that support
REST APIs. For example, Cloud Apps.
Before installing the IBM Security Guardium Key Lifecycle Manager Traditional Edition,
complete the following prerequisite tasks:
Ensure that the hardware and operating system meet the prerequisites that are provided
in the IBM Security Guardium Key Lifecycle Manager Support Matrix document.
Ensure that you follow the guidelines that are listed in the Installation guidelines topic
in the IBM Documentation (formerly IBM Knowledge Center).
Run the prerequisite check script to ensure that the system requirements are met. For
more information, see Checking prerequistes.
Download the following installation files from the IBM Passport Advantage website:
– SGKLM_4.1_FOR_WINDOWS_SERVER_1OF2.zip
– SGKLM_4.1_FOR_WINDOWS_SERVER_2OF2.zip
Extract the files to a temporary directory on your system such that disk1 and disk2 are in
same folder, as shown in Figure 2-1.
After files are extracted, go to the disk1 folder and ensure that the launchpad.bat script is
extracted to the disk1 directory, as shown in Figure 2-2.
2. Pre-requisite checker checks required availability for CPU and RAM, as shown in
Figure 2-4.
3. The installation GUI is displayed if there are no issues from the pre-requisite checker.
Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 7
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm
4. All components are required for an installation, as shown in Figure 2-5. Click Next.
5. Review and accept the terms in the license agreement, as shown in Figure 2-6. Click
Next.
6. Specify the installation path for the Shared Resources Directory and IBM Installation
Manager, as shown in Figure 2-7 on page 9. Click Next.
Figure 2-7 Shared Resources Directory and Installation Manager installation path
7. Specify the installation path or keep default path for the IBM Db2, IBM WebSphere®
Application Server and IBM Security Guardium Key Lifecycle Manager as shown in
Figure 2-8. Click Next.
Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 9
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm
10.Specify the credentials and home directory for the Db2 instance owner account and the
Db2 port, as shown in Figure 2-11. If the Db2 Administrator ID specified does not exist, a
new user will be created. Ensure to record credentials, Db2 port and other information for
future use. Click Next.
11.Specify the credentials for the WebSphere Application Server (WAS) administrator
wasadmin account, WAS Port, IBM Security Guardium Key Lifecycle Manager
administrator SKLMAdmin account and the IBM Security Guardium Key Lifecycle
Manager Ports, as shown in Figure 2-12. Ensure to record credentials and port
information for future use. Click Next.
Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 11
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm
12.Do not select the Migrate Encryption Key Manager (EKM) option unless the installation
is intended for a migration from EKM, as shown in Figure 2-13. Click Next.
13.Review the installation summary and click Install to start installation of IBM Security
Guardium Key Lifecycle Manager, as shown in Figure 2-14 on page 12.
14.After a successful installation, select the None option and click Finish to exit the
installation wizard, as shown in Figure 2-15.
Important: IBM Security Guardium Key Lifecycle Manager V4.1.0.1 by default uses port
9443 for GUI and REST API’s.
Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 13
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm
3. After login to IBM Security Guardium Key Lifecycle Manager GUI, Welcome page is
displayed, as shown in Figure 2-17
Figure 2-17 IBM Security Guardium Key Lifecycle Manager Welcome page
4. Click the question mark in the upper right corner and select About option from the menu,
as shown in Figure 2-18.
5. Verify the installed version of IBM Security Guardium Key Lifecycle Manager and its
components, as shown in Figure 2-19.
Figure 2-19 IBM Security Guardium Key Lifecycle Manager Version Information
2. After you extract the files, the installation script silent_install.sh is extracted to the disk1
directory, as shown in Example 2-2.
Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 15
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm
3. To perform a fresh installation, edit and update all the user inputs such as repository
location where install binaries are present, installation directory, user credentials , and so
on, in the input response file SKLM_Silent_Linux_Resp.xml.
Note: Installation binaries bundle sample response files for performing a fresh
installation as well as for performing data migration from existing installed version of
IBM Security Guardium Key Lifecycle Manager. For a fresh installation, the sample
response filename is SKLM_Silent_Linux_Resp.xml
b. Using any editor e.g. vi, open the response file SKLM_Silent_Linux_Resp.xml for
editing, as shown in Example 2-4.
c. Update the repository location to point to the local directory where the installation
package has been extracted in Step 1, as shown in Example 2-5.
d. Update the IBM Installation Manager installLocation to install IBM Installation Manager
at specified location, as shown in Example 2-6.
e. Update the IBM Db2 location to install IBM Db2 database at specified location, as
shown in Example 2-7.
Important: The plain-text password for Db2 Administrator user must meet the operating
system password complexity requirements. In case this requirement is not met the
installation for IBM Security Guardium Key Lifecycle Manager will fail.
h. To convert password from plain-text to encrypted format acceptable for IBM Installation
manger use the imcl utility provided under the im/tools folder, as shown in
Example 2-10.
i. Update the home directory of the IBM Db2 user specified above in Step f, as shown in
Example 2-11.
l. Update the value for DB2_LOCATION to the installation location for Db2 database, as
shown in Example 2-14. Ensure this value is same as value for parameter IBM Db2
location specified above in Step e.
Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 17
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm
m. Update the value for DB2_DB_LHOME to the home location for Db2 database user, as
shown in Example 2-15. Ensure this value is same as value for parameter
DB2_DB_HOME location specified above in Step i.
n. Update the value of the user group under which the Db2 user will be created. The
group name should not be longer than 8 characters, as shown in Example 2-16.
o. Update the installation location for IBM WebSphere Application Server to install IBM
WebSphere Application Server at specified location, as shown in Example 2-17.
p. Update the installation location for IBM Security Guardium Key Lifecycle Manager to
install GKLM at a specified location, as shown in Example 2-18.
Example 2-20 Update password for WAS Administrator user in encrypted format
<data key='user.WAS_ADMIN_PASSWORD,com.ibm.sklm41.linux'
value='e9PjN93MeQxwnSs9VXJFMw=='/>
<data key='user.WAS_ADMIN_CONF_PWD,com.ibm.sklm41.linux'
value='e9PjN93MeQxwnSs9VXJFMw=='/>
Example 2-22 Update password for WAS Administrator user in encrypted format
<data key='user.SKLM_ADMIN_PASSWORD,com.ibm.sklm41.linux'
value='9YTRJMRIydDSdfhaHPs1ag=='/>
<data key='user.SKLM_ADMIN_CONF_PWD,com.ibm.sklm41.linux'
value='9YTRJMRIydDSdfhaHPs1ag=='/>
u. Update the value of the GKLM Application port on which GKLM will listen for requests
on a secure channel, as shown in Example 2-23.
v. Update the value of the WAS Administrator port on which WAS will listen for requests
on a secure channel. Users can access the WAS GUI console by connecting to this
port, as shown in Example 2-24.
w. Update the value of the GKLM Application port on which GKLM will listen for requests
on a non-secure channel, as shown in Example 2-25.
x. Save all the changes made so far and close the file.
4. On the command prompt run the following command to perform silent installation, as
shown in Example 2-26.
Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 19
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm
5. GKLM installer will start performing installation beginning with running pre-requisite
checker. If all the necessary pre-requisites are met then it continues with the installation of
GKLM. See Example 2-27.
The Installation process may display on console a warning message before showing final
success message. This warning message is related to 64-bit version of Installation
Manger not being supported. This is a known issue and can be safely ignored.
In case any pre-requisite is not met but is not a mandatory pre-requiste(e.g. Db2 kernel
settings) it will display a warning and ask user input before continuing with further
installation, as shown in Example 2-28
Explanation: The 64-bit version of Installation Manager checks each package for
64-bit support. If a package does not support the 64-bit version, you receive a
warning.
User Action: Use a 32-bit version of Installation Manager to install the package.
Installation process is complete. Please look into Installation Manager logs for
details.
[root@sklm41ga1 disk1]#
2.5 Installing fix pack for IBM Security Guardium Key Lifecycle
Manager Traditional Edition
The IBM Fix Central website provides fixes and updates for the software, hardware, and
operating system. IBM Security Guardium Key Lifecycle Manager fix packs are published at
the IBM Fix Central.
The following section covers steps to install fix pack FP0001 over IBM Security Guardium Key
Lifecycle Manager V4.1.0.0. Back up the current WebSphere Application Server and IBM
Security Guardium Key Lifecycle Manager configuration before installing the fix pack. The
backup and restore operation for the IBM Security Guardium Key Lifecycle Manager
configuration is covered in Chapter 5.2, “Backing up and restoring IBM Security Guardium
Key Lifecycle Manager” on page 68.
To install the fix pack for IBM Security Guardium Key Lifecycle Manager, complete the
following steps:
1. Back up the WebSphere Application Server files as shown in Example 2-29.
Files\IBM\WebSphere\AppServer\profiles\KLMProfile\logs\server1\stopServer.log
ADMU7702I: Because server1 is registered to run as a Windows Service, the
request to stop this server will be completed by stopping the
associated Windows Service.
ADMU0116I: Tool information is being logged in file C:\Program
Files\IBM\WebSphere\AppServer\profiles\KLMProfile\logs\server1\stopServer.log
ADMU0128I: Starting tool with the KLMProfile profile
Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 21
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm
NOTE: It will take sometime to create compressed file using above command.
Files\IBM\WebSphere\AppServer\profiles\KLMProfile\logs\server1\startServer.log
ADMU7701I: Because server1 is registered to run as a Windows Service, the
request to start this server will be completed by starting the
associated Windows Service.
ADMU0116I: Tool information is being logged in file C:\Program
Files\IBM\WebSphere\AppServer\profiles\KLMProfile\logs\server1\startServer.log
ADMU0128I: Starting tool with the KLMProfile profile
ADMU3100I: Reading configuration for server: server1
ADMU3200I: Server launched. Waiting for initialization status.
ADMU3000I: Server server1 open for e-business; process id is 4572
2. Create the C:\sklminstall_fp directory, transfer the fix pack package downloaded from
IBM Fix Central to the folder. Extract the fix pack package and run the updateSKLM.bat
script to start the update wizard (the script requires executable permission), as shown in
Example 2-30.
Directory of C:\sklminstall_fp
Files\IBM\WebSphere\AppServer\profiles\KLMProfile\logs\server1\stopServer.log
ADMU0128I: Starting tool with the KLMProfile profile
ADMU3100I: Reading configuration for server: server1
ADMU3201I: Server stop request issued. Waiting for stop status.
ADMU4000I: Server server1 stop completed.
Launching InstallManager...
"C:\Program Files\IBM\Installation Manager"\eclipse\IBMIM.exe -input
C:\sklminstall_fp/updateSKLM.xml
3. The wizard identifies the current installed version and fix pack level. Select IBM Security
Guardium Key Lifecycle Manager V4.1.0 and click Next to continue, as shown in
Figure 2-20 on page 23.
4. Select the fix pack to be installed and click Next to continue, as shown in Figure 2-21.
Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 23
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm
5. Review and accept the terms in the license agreement and click Next to continue, as
shown in Figure 2-22.
6. Select the features to be installed and click Next to continue, as shown in Figure 2-23.
7. Provide the passwords for the wasadmin, SKLMadmin, and sklmdb41 accounts, click
Validate Credentials, as shown in Figure 2-24.
8. When provided passwords are validated successfully, Next button will become active.
Click Next to continue, as shown in Figure 2-25.
.
Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 25
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm
9. Confirm the installation details and click Update to install the fix pack, as shown in
Figure 2-26.
10.After a successful installation, review the installation summary and click Finish to exit the
wizard, as shown in Figure 2-27.
11.Login to the IBM Security Guardium Key Lifecycle Manager GUI and click the question
mark in the upper right corner, then select About to verify the installed software details, as
shown in Figure 2-28.
Figure 2-28 IBM Security Guardium Key Lifecycle Manager version info
3.1 Pre-requisite
Before you begin the deployment of IBM Security Guardium Key Lifecycle Manager in a
Red Hat OpenShift Container platform you need to complete below given steps.
1. Obtain the container installation files (eImages) and license activation file.
a. Obtain the container installation files (eImages) and license activation file for IBM
Security Guardium Key Lifecycle Manager container from IBM Passport Advantage.
User should download following files:
License File - SGKLM_4.1_CONTAINER_LICENSE_MP.zip
Container image for x86-64 platform - SGKLM_4.1_CONTAINER_LIC_LN64_BIT.tar
Tip: You can avoid downloading the container installation files if you plan to pull the
container image directly from the Docker Hub repository.
Kubernetes commands
# kubectl get pods --namespace ibm-common-services
# kubectl get service --namespace ibm-common-services
# kubectl get secret ibm-licensing-token -o jsonpath={.data.token} -n
ibm-common-services | base64 -d
c. Update the following parameters in the values.yaml bundled with sample Helm charts
(openShift-helm.zip / k8s-helm.zip), as shown in Example 3-2.
Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 29
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm
d. Copy the Login command that is displayed under Log in with this token section as
shown in Figure 3-4.
e. Use the copied command to login to the OCP server by using the command line tool
(oc), as shown in Example 3-3.
Example 3-3 Login to OpenShift Container Platform cluster with OC command line tool
oc login --token=sha256~za6Se4Lpj5YI7-lIkt2n_APVHqH7sE_i2NoQV4nQXhY
--server=https://api.xgklmocp.cp.fyre.ibm.com:6443
Logged into "https://api.xgklmocp.cp.fyre.ibm.com:6443" as "kube:admin" using the
token provided.
You have access to 60 projects, the list has been suppressed. You can list all
projects with 'oc projects'
2. Navigate to the openshift-helm directory and apply the Security Context Constraint (SCC)
with the following command, as shown in Example 3-4.
3. Create the WebSphere service account and bind the ibm-websphere-scc to the
namespace (project) sklm, as shown in Example 3-5.
4. Update the values.yaml file and modify the parameter values in the file as per your
requirement.
5. Run the helm install command, as shown in Example 3-6.
Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 31
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm
b. Provide the appropriate values for route Name e.g. sklm-route, as shown in Figure 3-7.
d. Specify the Insecure Traffic as Redirect and click Create, as shown in Figure 3-9.
3.2.2 Activate the license and login to IBM Security Guardium Key Lifecycle
Manager
1. Launch Web Browser.
2. Log in to IBM Security Guardium Key Lifecycle Manager by going to the following URL and
using SKLMAdmin user and password set during the installation.
https://<ip address/hostname>:<port>/ibm/SKLM/login.jsp
Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 33
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm
Note: Use the port number in above URL which is mapped in Route details, as shown
in Figure 3-8 on page 33.
3. On the Configuration page that appears, select the I accept the terms in the License
Agreements, as shown in Figure 3-10.
4. Click Activate License, upload the IBM Security Guardium Key Lifecycle Manager license
activation file from the local file-system, as shown in Figure 3-11.
Note: You must download the license activation file from IBM Passport Advantage Site as
described in Step 4a under Chapter 3.2, “Installing IBM Security Guardium Key Lifecycle
Manager on Red Hat OpenShift” on page 29.
5. Once you upload the license file it will show the success message, as shown in
Figure 3-12.
6. Click Close. This will re-direct the user back to Login page as shown in Figure 3-13.
7. Login to the IBM Security Guardium Key Lifecycle Manager graphical user interface with
SKLMAdmin user and verify that license is activated. Once license is activated, user will see
the GKLM welcome page, as shown in Figure 3-14 on page 35.
Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 35
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm
Once you are done with the Db2U installation, run the following command to get port details,
as shown in Example 3-7.
Note: The infrastructure node has public IP and the details of which are provided with
the OpenShift cluster creation
3. Open the haproxy.cfg file with vi or similar editor, as shown in Example 3-9.
4. Update the file with entries for each route defined for IPP and KMIP ports, as shown in
Example 3-10 and save the changes.
Note: Depending on the OpenShift cluster configuration, the number of Master and
Worker nodes varies. You need to replace all Master and Worker nodes private ip for
backend entry in the given example.
backend IPP-route
balance source
mode tcp
server worker0 10.17.91.228:33801 check
server worker1 10.17.94.243:33801 check
server worker2 10.17.95.61:33801 check
Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 37
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm
frontend IPP-secure-route
bind *:31441
default_backend IPP-secure-route
mode tcp
option tcplog
backend IPP-secure-route
balance source
mode tcp
server worker0 10.17.91.228:31441 check
server worker1 10.17.94.243:31441 check
server worker2 10.17.95.61:31441 check
frontend KMIP-route
bind *:35696
default_backend IKMIP-route
mode tcp
option tcplog
backend KMIP-route
balance source
mode tcp
server worker0 10.17.91.228:35696 check
server worker1 10.17.94.243:35696 check
server worker2 10.17.95.61:35696 check
3. Verify the upgrade of deployment with helm list command, as shown in Example 3-13, the
REVISION show updated value ( 2, in our example).
Describe Pod
This command helps to get the details of a particular pod, (mentioned the pod-id obtained
by above command oc get pod). This command gives the complete details of the pod
right from the pod creation as shown in Example 3-15.
Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 39
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm
Pod Logs
This command helps viewing the pod logs during deployment of GKLM, so that you can
identify the root cause of deployment as shown in Example 3-17.
3. Open the values.yaml file and modify the parameter values in the file as per your
requirement. The file has information about the mandatory parameters to be updated and
description of all the parameters.
4. Navigate to k8s-helm directory and run the command as shown in Example 3-18 with
name and chartname as sklm and sklm respectively.
5. Run the command as shown in Example 3-19 to know the available node port assigned to
service.
6. Launch the IBM Security Guardium Key Lifecycle Manager graphical user interface with
following url:
https://master_server_IP_address:port/ibm/SKLM/login.jsp
Where,
master_server_IP_address is the IP address of the master server on the Kubernetes
cluster.
port is the node port of sklmapp service, 30443 in this case.
7. To activate the license and verify the login. See “Activate the license and login to IBM
Security Guardium Key Lifecycle Manager” on page 33.
Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 41
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm
3. Verify the upgrade with helm list command, the revision column shows the updated value,
as can be seen in Example 3-21.
Describe Pod
This command helps to get the details of the pod from the time the pod is being created as
shown in Example 3-23.
Pod Logs
This command helps to get the logs for GKLM pod during deployment. The pod id is
obtained from the kubectl get pods command as shown in Example 3-24.
3.4.1 Installing IBM Security Guardium Key Lifecycle Manager on zCX with
PostgreSQL
To install the IBM Security Guardium Key Lifecycle Manager on zCX environment with
PostgreSQL, perform the following tasks.
1. Install the PostgreSQL database with a docker command as shown in Example 3-26.
2. Create an environment variable list file (gklmenvz.txt) with the parameters, as shown in
Example 3-27 for the IBM Security Guardium Key Lifecycle Manager container.
Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 43
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm
3. Install the IBM Security Guardium Key Lifecycle Manager container as shown in
Example 3-28.
4. Launch the IBM Security Guardium Key Lifecycle Manager graphical user interface with
following URL.
https://IP_address/Hostname:port/ibm/SKLM/login.jsp
Where,
IP_address/Hostname is the IP address or FQDN of the IBM Security Guardium Key
Lifecycle Manager server.
port is the port number that IBM Security Guardium Key Lifecycle Manager server listens
on for requests.
5. To activate the license and verify the login, see “Activate the license and login to IBM
Security Guardium Key Lifecycle Manager” on page 33.
3.4.2 Installing IBM Security Guardium Key Lifecycle Manager with Db2 for
z/OS
To install the IBM Security Guardium Key Lifecycle Manager on zCX environment with Db2 for
z/OS, perform the following tasks.
1. Install Db2 for z/OS. For more information, see Installing or migrating to Db2.
2. Create a database, using the parameter values, as shown in Example 3-29.
Note: Make sure the Db2 user has appropriate permission to create tablespace, tables
3. Obtain the container installation files (eImages) and license activation file for IBM Security
Guardium Key Lifecycle Manager and for Db2 for z/OS (db2jcc_license_cisuz.jar).
4. Create a file (Dockerfile) with the content and save the file in the same directory where
you saved the license file for Db2 for z/OS (db2jcc_license_cisuz.jar) on the host
system, as shown in Example 3-30.
5. Log in to the host system and navigate to the directory where you saved the eImage,
license, and Docker files, as shown in Example 3-31.
6. Extract the Docker image of the Guardium Key Lifecycle Manager application from the
image file, as shown in Example 3-32 on page 45.
7. Verify the docker image is listed in local repository, as shown in Example 3-33.
8. Build the Docker image of the Guardium Key Lifecycle Manager application by using the
Docker file to include the Db2 license file, as shown in Example 3-34.
Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 45
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm
9. Create an environment variable list file (gklmenvz.txt) with the parameters, as shown in
Example 3-35 for the IBM Security Guardium Key Lifecycle Manager container.
10.Run the IBM Security Guardium Key Lifecycle Manager Docker container, as shown in
Example 3-36.
11.Launch the IBM Security Guardium Key Lifecycle Manager graphical user interface with
below URL.
https://IP_address/hostname:port/ibm/SKLM/login.jsp
Where,
IP_address/hostname is the IP address or FQDN of the IBM Security Guardium Key
Lifecycle Manager server.
Port is the port number that IBM Security Guardium Key Lifecycle Manager server listens
on for requests.
12.To activate the license and verify the login, see “Activate the license and login to IBM
Security Guardium Key Lifecycle Manager” on page 33.
2. Kill the GKLM Container without deleting the volume, as shown in Example 3-38.
3. Start the IBM Security Guardium Key Lifecycle Manager container pointing to same
volume with docker command, as shown in Example 3-39.
4. Once the IBM Security Guardium Key Lifecycle Manager container deployment is
successful, login to graphical user interface and verify the version.
Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 47
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm
Supported migration paths and migration methods are shown in Figure 4-1.
Note: Migration from IBM Tivoli® Key Lifecycle Manager and Encryption Key Manager
(EKM) is not covered in this section. For more information, see the following resources:
Migrating from Encryption Key Manager
Migrating from IBM Tivoli Key Lifecycle Manager
2. Review the installation summary and click Install to install the product, as shown in
Figure 4-3 on page 52.
3. After a successful installation, select the None option and click Finish to exit the
installation wizard, as shown in Figure 4-4.
4. Log on to the IBM Security Guardium Key Lifecycle Manager portal to confirm the version
and that the previous data is migrated, as shown in Figure 4-5.
5. You can now install fix pack, as shown in Chapter 2.5, “Installing fix pack for IBM Security
Guardium Key Lifecycle Manager Traditional Edition” on page 21.
2. Transfer the corresponding version of the utility directory to the server where IBM Security
Key Lifecycle Manager V3.0.0.0 is installed (in this case, it is the sklmv30 directory), as
shown in Figure 4-7 on page 54.
3. Modify the backup.properties file to include the actual WAS_HOME, JAVA_HOME paths and
correct credentials for the sklmdb30(Db2 user for source system) and wasadmin accounts.
as shown in Example 4-1.
4. Run the backupV30.sh script to generate the cross-platform migration file. The migration
file is in the backup directory within the utility directory, as shown in Example 4-2.
5. Transfer the migration file to the destination server where IBM Security Key Lifecycle
Manager V4.1.0.1 is installed, as shown in Figure 4-8.
6. In the IBM Security Guardium Key Lifecycle Manager V4.1.0.1 modify the
restore.properties file to include the actual WAS_HOME, JAVA_HOME and RESTORE_FILE
paths and correct password for the Backup, Db2 user, and wasadmin accounts as shown
in Figure 4-9.
To be able to restore the user accounts along with their passwords from source GKLM
version to GKLM V4.1.0.1 set RESTORE_USER_ROLES=y. If the destination GKLM
system is configured with HSM, uncomment the line for parameter pkcs11.cfg and set its
value to point to the actual path of HSM configuration file.
Credentials for same user accounts that exist on both source and target servers
are not migrated.
Restore completed, Please refer to restore.log for more details.
For the changes to take effect, restart the IBM Security Guardium Key Lifecycle
Manager server.
c:\Program Files\IBM\SKLMV41\migration\utilities\sklmv30>
Note: In IBM Security Guardium Key Lifecycle Manager V4.1.0.1, user credentials for
the user accounts that exist on both source and target servers are not migrated. In that
case if user SKLMAdmin exist on IBM Security Key LifeCycle Manager V3.0.0.0 then its
user credentials will not be migrated to IBM Security Guardium Key Lifecycle Manager
V4.1.0.1. User SKLMAdmin will be able to login using the same password that was set
before the data migration operation was initiated.
8. Check restore.log for presence of any error or exception during the restore operation.
9. Restart the WebSphere Application Server from the Windows services console as
described in Figure 4-10
10.Log in to the IBM Security Guardium Key Lifecycle Manager GUI and verify the data has
been migrated successfully.
Important: IBM Security Guardium Key Lifecycle Manager v4.1.0.1 by default uses port
9443 for GUI and REST API’s.
After login to IBM Security Guardium Key Lifecycle Manager GUI, you can create Server
certificate for TLS communication. Server certificate can be of two types:
Type-1: Self-Signed Certificate. See “Creating a self-signed server certificate” on page 61
for more details.
Type-2: Third-party CA Signed Certificate. See “Creating a Third-party CA signed server
certificate” on page 63 for more details.
2. Select Create a self-signed certificate option and fill the details as shown in Figure 5-3.
The validity period determines how long the certificate is valid. By default, IBM Security
Guardium Key Lifecycle Manager creates 2048-bit RSA public-private key pair for Server
certificates.
6. Validate the status from Welcome page as well, as shown in Figure 5-6.
7. Restart the IBM Security Guardium Key Lifecycle Manager by select sklmadmin user in
the upper right corner, click Restart Server as shown in Figure 5-7 on page 62.
Note: The most recently created server certificate from the IBM Security Guardium Key
Lifecycle Manager GUI becomes the active certificate for the server, which might break
the communication between the configured devices and the server. Plan carefully when
you need a new server certificate.
The server certificate with Pending status is shown with a question mark. The certificate
signing request file is automatically created in the GKLM data directory as shown in
Figure 5-10, which is as follows:
Linux: /opt/IBM/WebSphere/AppServer/products/sklm/data
Windows: C:\Program Files\IBM\WebSphere\AppServer\products\sklm\data
5. The CSR file can be download from IBM Security Guardium Key Lifecycle Manager GUI
by clicking on the download link, as shown in Figure 5-9 or directly from the data directory
using file copy tools like scp, sftp.
6. Get the certificate signing request file signed from the trusted CA.
7. Upload the signed certificate in GKLM data directory again, as shown in Figure 5-11.
8. Go to Welcome page in the IBM Security Guardium Key Lifecycle Manager GUI and
check the Action Items.
9. Click on link for Third-party certificates pending import, as shown in Figure 5-12.
10.On the Import page, select the Pending certificate, and click Import as shown in
Figure 5-13.
14.After importing the signed certificate, status of the server certificate is changed to Valid, as
shown in Figure 5-17.
15.Restart the IBM Security Guardium Key Lifecycle Manager Server, as shown in Figure 5-7
on page 62.
Complete the following steps to export and download the TLS/KMIP Server certificate.
1. Login to IBM Security Guardium Key Lifecycle Manager GUI and navigate to Advanced
Configuration → Server certificates page.
2. Select the server certificate which is marked in Use.
3. Click on download icon as shown in Figure 5-18.
3. Click Browse to specify the backup repository location. the default location is GKLM data
directory. Click Create button, as shown in Figure 5-21.
4. In the Create Backup window as shown in Figure 5-22 on page 69, enter the password for
the backup, provide appropriate description and, click Create Backup button. This
password is required to restore this backup.
7. Backup file is shown in the table. Click on download icon to download this backup. as
shown in Figure 5-24. This backup file should be protected and can be used for recovery
during disaster situation.
6. Read instruction carefully which is shown in confirmation window and Click OK, as shown
in Figure 5-27. The restore process might take some time to complete depending on the
size of the data.
Note: All the data previously present in the IBM Security Guardium Key Lifecycle
Manager server will be erased when backup is restored. IBM Security Guardium Key
Lifecycle Manager Server will be restarted after successful restore and server will
remain unavailable for key serving during restart process.
The data replication enables cloning of IBM Security Guardium Key Lifecycle Manager
environments to multiple servers in a manner that is independent of operating systems and
directory structures of the servers.
The master server is the primary system that is replicated, and the replication process is
triggered only when new keys or devices are added or modified on the master server. Each
clone server is identified by an IP address or host name, and a port number. The server uses
the properties in the ReplicationSKLMConfig.properties file to control the replication
process.
IBM Security Guardium Key Lifecycle Manager Replication can be configured in three modes:
1. Master-Clone Full Replication: In this mode, full data backup of master server will be
replicated on the clone server. Default replication schedule is 1 day and minimum
schedule can be 1 hour.
2. Master-Clone Incremental Replication: In this mode, data created on master server will
be replicated on the clone server since last backup instead of full data replication. Default
replication schedule is 1 minute which is minimum as well. Incremental replication is near
real-time synchronization.
Incremental Replication can only be configured along with Full Replication.
3. Master only for scheduled backup: This mode is also called scheduled backup. In this
mode, only a master server is configured with no clone. This mode will take full automated
backup at the scheduled time only if new keys or certificates are created.
Here are the actions performed by IBM Security Guardium Key Lifecycle Manager replication
server during Full Replication:
1. Check if backup is required at the scheduled time.
2. If no backup is required (means no keys are created), then replication will be skipped.
3. If backup is required (means new keys are created), then IBM Security Guardium Key
Lifecycle Manager replication master server will trigger replication process.
4. Replication master server will start a secure TLS 1.2 communication with clone servers.
5. Replication master server will transmit backup file created above.
6. Replication clone server will restore the backup.
7. Replication clone server will send the status to Replication master.
8. Replication clone server will be restarted at the end of the process.
2. Select the Master role, and click OK, as shown in Figure 5-30.
3. From the list, select any certificate to be used for the replication, provide Passphrase for
protecting backup files, Click Add Clone to add the clone servers, save the replication
configuration, and then click Start Replication Server, as shown in Figure 5-31 on
page 74.
Notes:
Any available certificates, regardless of whether they are being used or not, can be
used for replication. However, the chosen certificate must exist on the clone servers.
The host name of the clone server must be resolvable either by using the
/etc/hosts file or DNS.
Make sure that the firewall is configured to allow communication between Master
and Clones on configured ports.
Make sure to use mapped ports of Clone if using IBM Security Guardium Key
Lifecycle Manager Container edition.
4. Click OK to save the master server configuration. Click Ok in the confirmation dialog box.
5. Click Start Replication Server, as shown in Figure 5-32 on page 75.
6. A confirmation window will be shown when the Replication server is started, as shown in
Figure 5-33.
7. Navigate to Welcome page and check the status of replication server, as shown in
Figure 5-34 on page 76.
This step completes the configuration of master server for full replication.
4. Select checkbox for Incremental replication frequency (in seconds): option and click
OK, as shown in Figure 5-36.
To configure the clone server for replication, complete the following steps:
1. Login to the master server and take a backup. For more information, see “Backing up IBM
Security Guardium Key Lifecycle Manager” on page 68.
2. Copy the backup file created in step-1 above to clone server.
3. Login to the clone server and restore backup file. For more information, see “Restoring
IBM Security Guardium Key Lifecycle Manager” on page 70.
4. The clone server will restart automatically after successful restore.
Note: It is very important that same server certificate is available on all masters and
clones in a replication cluster. If a certificate which is configured on Replication master
configuration page is not available on clones then replication will not work. If a server
certificate on the master is replaced due to expiration or any other reason then make
sure that the same server certificate is copied to clone servers with private key. This
action can be done in one of the following ways:
Backup from the master and restore on the clone. This is preferable option.
Use Key Export REST API to export public-private key pair on the master server and
and use Key Import REST API to import public-private key pair on the clone servers.
8. A success message is displayed when the Replication clone server is started successfully,
as shown in Figure 5-40.
9. Navigate to the Welcome page to see the Replication clone status, as shown in
Figure 5-41.
You can use the IBM Security Guardium Key Lifecycle Manager Multi-Master configuration for
data transmission to achieve the following objectives:
Ensure consistent and continuous data availability of IBM Security Guardium Key Lifecycle
Manager across the organization.
Avoid a single point of failure by using the HA solution.
Place master servers at several physical sites, that is, distributed across the network.
To set up HADR, you must configure the necessary Db2 parameters in the IBM Security
Guardium Key Lifecycle Manager master servers with a primary database and a standby
database. Figure 5-42 shows a simple deployment of IBM Security Guardium Key Lifecycle
Manager and Db2 HADR for a Multi-Master environment where four instances (master
servers) of Db2 HADR and N instances of IBM Security Guardium Key Lifecycle Manager are
configured.
Note: The Multi-Cluster setup is more suitable in a dynamic environment, which requires
frequent key or certificate creation or modification. For a relatively static environment, the
backup/restore and replication approach is recommended.
Primary
The server where the database is currently up and applications are able to connect and
update data. All servers in HADR cluster point to this database. There can be only one
primary server in the cluster at a time.
Principal Standby
The standby server of the HADR cluster that is target for the defined SYNCMODE from the
primary server. Only one standby may be the principal standby at a time.
Auxiliary Standby
Any standby server of the HADR, which is not the principal standby. The only syncmode
supported for Auxiliary standby is SUPERASYNC. Any server in the HADR cluster beyond
the first two is an Auxiliary standby. This server is for disaster recovery (DR) purpose, and as
such is generally placed in a geographically dispersed data center.
Db2 user names and passwords must be same on all masters servers of IBM Security
Guardium Key Lifecycle Manager Multi-Master cluster.
For more information about requirements for Multi-Master configuration, see IBM
Documentation (formerly IBM Knowledge Center).
You must ensure that your computer host name is configured correctly before you set up
IBM Security Guardium Key Lifecycle Manager master servers for a Multi-Master
configuration. You can resolve an IP address to a host name by editing the /etc/hosts file.
For Db2 HADR configuration, you must update the /etc/hosts file in the primary and standby
master servers of the cluster to enable host name to IP address mapping, as shown in
Example 5-1.
Example 5-1 The /etc/hosts file on the primary master and standby master servers
Primary Master
[root@manumits1 ~]$ cat /etc/hosts
127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
10.41.4.87 manumits1.fyre.ibm.com manumits1
10.41.5.152 abjectly1.fyre.ibm.com abjectly1
Standy Master
[root@abjectly1 ~]# cat /etc/hosts
127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
10.41.5.152 abjectly1.fyre.ibm.com abjectly1
10.41.4.87 manumits1.fyre.ibm.com manumits1
For more information about setting up kernel parameters, see IBM Documentation
(formerly IBM Knowledge Center).
2. Log on to the IBM Security Guardium Key Lifecycle Manager portal on the primary master
server, and add a server certificate on the primary master server. For more information,
see 5.1, “Configuring an TLS/KMIP certificate for IBM Security Guardium Key Lifecycle
Manager” on page 60.
4. Click Add Master to add the standby master server, and specify the details in the Basic
Properties tab, as shown in Figure 5-45.
5. Select Advanced Properties and then select Yes to make the server that is added a
standby master. Keep the defaults for HADR port and Standby priority index, as shown
in Figure 5-46.
6. Click Check Prerequisites to verify whether the standby master server meets the
requirement, as shown in Figure 5-47.
7. Click Add to add the standby master server. The process might take some time to
complete. A confirmation message is shown when the standby server is successfully
added, as shown in Figure 5-48.
8. Verify the HADR status on the master and standby servers, as shown in Example 5-3.
HADR_ROLE = PRIMARY
REPLAY_TYPE = PHYSICAL
HADR_SYNCMODE = SYNC
STANDBY_ID = 1
LOG_STREAM_ID = 0
HADR_STATE = PEER
HADR_FLAGS = TCP_PROTOCOL
PRIMARY_MEMBER_HOST = manumits1.fyre.ibm.com
PRIMARY_INSTANCE = sklmdb41
PRIMARY_MEMBER = 0
STANDBY_MEMBER_HOST = abjectly1.fyre.ibm.com
STANDBY_INSTANCE = sklmdb41
STANDBY_MEMBER = 0
HADR_CONNECT_STATUS = CONNECTED
output omitted......
HADR_ROLE = STANDBY
REPLAY_TYPE = PHYSICAL
HADR_SYNCMODE = SYNC
STANDBY_ID = 0
LOG_STREAM_ID = 0
HADR_STATE = PEER
HADR_FLAGS = TCP_PROTOCOL
PRIMARY_MEMBER_HOST = manumits1.fyre.ibm.com
PRIMARY_INSTANCE = sklmdb41
PRIMARY_MEMBER = 0
STANDBY_MEMBER_HOST = abjectly1.fyre.ibm.com
STANDBY_INSTANCE = sklmdb41
STANDBY_MEMBER = 0
HADR_CONNECT_STATUS = CONNECTED
output omitted......
9. The IBM Security Guardium Key Lifecycle Manager portal for both primary and standby
server would also reflect the Multi-Master status on the welcome page, as shown in
Figure 5-49 and Figure 5-50.
Agent service status is disabled by default when you install IBM Security Guardium Key
Lifecycle Manager.
The notification area on the Welcome page also indicates if the Agent certificate has
expired or will expire soon, as shown in Figure 5-52.
Click on the Expiring or expired certificates link to see which certificate has expired or
will expire soon.
For more information on how to recover a cluster from a read-only state see, Recovering
Multi-Master cluster from read-only state.
If you see a scenario where primary database is down, complete the following steps:
1. When the primary database is unreachable, the cluster goes in read-only state. The
read-only state ensures that key serving is not impacted. You can confirm that the standby
database is connected in read-only state from the Welcome → Multi-Master section on
the IBM Security Guardium Key Lifecycle Manager graphical user interface, as shown in
Figure 5-55.
2. In this state, the whole cluster will remain in read-only mode and no new crypto objects
can be created. Already created crypto objects can continue to be served.
3. Do not perform any takeover operations, until it is known that you cannot recover the
original primary server.
4. As long as any takeover operations are not performed the cluster remains operating in
read-only mode. and your key serving is not affected. You can wait for the database of the
primary master server to be reachable again, so that the cluster restores its healthy state.
1. If the primary server will be unreachable or completely down, cluster will operate in
read-only state. Auto Takeover is not applicable starting GKLM V4.1.0.1.
2. Once the network between the primary server and principal standby is restored or the
primary server is brought up. The cluster will become healthy and recover from read-only
state.
3. If the primary server is unavailable or unreachable for a longer duration, and you need to
perform write operations on the cluster, you will have to promote the principal standby
server as primary. Run the following command to promote the current principle standby
server to become new primary using the sklmTakeoverHADR.sh/.bat script, as shown in
Example 5-4.
Note: The HADR state shows disconnected as the primary master server in the cluster
is still unreachable.
4. Once the connectivity is restored and the original primary server is reachable again, and
you have promoted the principal standby server as primary, you need to recover the
Multi-Master cluster from possible split-cluster scenario, see, Recover from Split
Cluster.
You might need to restore the following data to the state it was before the LDAP configuration
steps were run:
WebSphere Application Server configuration data for IBM Security Guardium Key
Lifecycle Manager
IBM Security Guardium Key Lifecycle Manager application data
Note: Make sure to change the value for property in backupPassword. This is the
password used while creating the IBM Security Guardium Key Lifecycle Manager
application backup.
5.5.2 LDAP configuration database and updating the data source for WIM
To create the database for the LDAP configuration and update the data source for
WebSphere Identity Manager (WIM), complete the following steps:
1. Create the database for the LDAP configuration (example: USERDB41) and connect to
USERDB41 to verify successful creation, as shown in Example 5-6.
3. Update the database name from SKLMDB41 to USERDB41, as shown in Figure 5-58.
5. Select the WIM Data Source and click on Test Connection to ensure the connection is
working, as shown in Figure 5-59.
6. Copy the Db2 driver and license to the WAS_HOME/lib folder, as shown in Example 5-7.
Note: Make sure the db2jcc* jars under the WAS_HOME/lib directory have Db2 admin
(sklmdb41) as the owner of the files.
Example 5-8
[root@manumits1 LDAPIntegration]# cat
/opt/IBM/WebSphere/AppServer/profiles/KLMProfile/properties/soap.client.props |
grep com.ibm.SOAP.requestTimeout
com.ibm.SOAP.requestTimeout=0
/opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/stopServer.log
ADMU0128I: Starting tool with the KLMProfile profile
ADMU3100I: Reading configuration for server: server1
ADMU3201I: Server stop request issued. Waiting for stop status.
ADMU4000I: Server server1 stop completed.
/opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/startServer.log
ADMU0128I: Starting tool with the KLMProfile profile
ADMU3100I: Reading configuration for server: server1
ADMU3200I: Server launched. Waiting for initialization status.
ADMU3000I: Server server1 open for e-business; process id is 52786
CWWIM5046W Each configured repository must contain at least one base entry. Add a
base entry before saving the configuration. For LDAP repository, add the LDAP
server before adding the base entry.
Created DB Repository - SKLMDBRepos...CWWIM5046W Each configured repository must
contain at least one base entry. Add a base entry before saving the configuration.
For LDAP repository, add the LDAP server before adding the base entry.
Adding DB Repository base entry...
CWWIM5028I The configuration is saved in a temporary workspace. You must use the
"$AdminConfig save" command to save it in the master repository.
Added DB Repository base entry - o=sklmrepdb.ibm...CWWIM5028I The configuration
is saved in a temporary workspace. You must use the "$AdminConfig save" command to
save it in the master repository.
Adding base entry to realm...
CWWIM5028I The configuration is saved in a temporary workspace. You must use the
"$AdminConfig save" command to save it in the master repository.
Added base entry to realm - o=sklmrepdb.ibm...CWWIM5028I The configuration is
saved in a temporary workspace. You must use the "$AdminConfig save" command to
save it in the master repository.
Saving Config...
4. Verify that the database-based repository was created and listed in the realm, as shown in
Figure 5-60.
5. Run the sklmLDAPConfigure.sh script to configure the IBM Security Guardium Key
Lifecycle Manager (GKLM) with the LDAP server, shown in Example 5-11. This script also
removes the GKLM application groups from file based repository and adds them to
database-based repository. It also updates WebSphere federated repository with LDAP
based repository and maps the administrator role to klmGUICLIAccessGroup for
integrating IBM Security Guardium Key Lifecycle Manager with LDAP user repositories.
Example 5-12 WebSphere and IBM Security Guardium Key Lifecycle Manager backups
WebSphere profile backup:
[root@manumits1 /]# ls -al
/opt/IBM/WebSphere/AppServer/products/sklm/data/WASProfile*
-rw-r--r-- 1 root root 133068355 May 13 16:46
/opt/IBM/WebSphere/AppServer/products/sklm/data/WASProfile_Backup
7. Verify that the IBM Security Guardium Key Lifecycle Manager is configured with the LDAP
server from the WebSphere Integrated Console, as shown in Figure 5-61 on page 98.
8. For any LDAP users and groups that need IBM Security Key Lifecycle Manager admin
access, the user must be made a member of klmSecurityOfficerGroup too, as shown in
Example 5-13.
9. Log on to the IBM Security Guardium Key Lifecycle Manager portal with the above
configured LDAP account to verify the configuration, as shown in Figure 5-62 on page 99.
Figure 5-62 Logging on to the IBM Security Guardium Key Lifecycle Manager portal with an LDAP
account
Figure 5-63 IBM Security Guardium Key Lifecycle Manager Containerized Edition portal
2. On the User Management panel, click on Configuration and then click on Update
button, as shown in Figure 5-64.
4. Once all the details have been updated, you will be logged out of the graphical user
interface.
5. Log in to the portal as SKLMAdmin, go to User Management panel, Users tab. and click
on Add, search for the user that needs to added as the administrator. Select that user and
click on Select. as shown in Figure 5-66.
6. Assign the correct roles and groups to the LDAP user by selecting on Assign Roles and
Assign Groups tabs.
7. Click on Assign Roles and assign the klmSecurityOfficer role to the LDAP user, as
shown in Figure 5-67 on page 102.
9. You can verify your configuration by logging in to the IBM Security Guardium Key Lifecycle
Manager portal with the LDAP account configured as the administrator, as shown in
Figure 5-69.
Figure 5-69 Logging on to the Container Edition IBM Security Guardium Key Lifecycle Manager portal
with LDAP account
10.In the Containerized edition of IBM Security Guardium Key Lifecycle Manager you can still
continue to login using the SKLMAdmin account (file based repository) until you have the
Enable File-based Authentication, checked under the Configure User Authentication
on User Management Panel, as shown in Figure 5-70.
11.Once you disable the File-based Authentication, only LDAP account will be active to login
to the IBM Security Guardium Key Lifecycle Manager.
Note: Unlike in traditional edition, you can continue to use your SKLMAdmin account to
login to the IBM Security Guardium Key Lifecycle Manager along with the LDAP user
account.
5. Send the request to a signing authority, upload the signed certificate and the root
certificate of the signing authority to the <WAS HOME>/profiles/KLMProfile/etc directory,
and click on NodeDefaultKeyStore → Personal certificates → Receive from a
certificate authority. to import the signed certificate, as shown in Figure 5-76 on
page 106.
6. Specify the file name of the signed certificate to import, click OK, and save the
configuration, as shown in Figure 5-77.
7. Select the NodeDefaultKeyStore > Signer certificates to import the root certificate and
intermediate certificates, as shown in Figure 5-78.
8. Select Add and specify the details of the root certificate, click OK, and save the
configuration, as shown in Figure 5-79.
9. Select NodeDefaultKeyStore > Personal certificates to verify that the certificates are
imported correctly, as shown in Figure 5-80 on page 108.
10.Select the default certificate and click Replace to replace the default with the signed
certificate, as shown in Figure 5-81.
11.Select the certificate from the drop-down menu, click OK, and save the configuration, as
shown in Figure 5-82.
12.Restart the WebSphere Application Server and add the signer to the truststores, as shown
in Example 5-14.
/opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/stopServer.log
ADMU0128I: Starting tool with the KLMProfile profile
ADMU3100I: Reading configuration for server: server1
ADMU3201I: Server stop request issued. Waiting for stop status.
ADMU4000I: Server server1 stop completed.
/opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/startServer.log
ADMU0128I: Starting tool with the KLMProfile profile
ADMU3100I: Reading configuration for server: server1
ADMU3200I: Server launched. Waiting for initialization status.
ADMU3000I: Server server1 open for e-business; process id is 19702
[root@sklm ~]# /opt/IBM/WebSphere/AppServer/bin/stopServer.sh server1 -username
wasadmin -password Change@Password123
ADMU0116I: Tool information is being logged in file
/opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/stopServer.log
ADMU0128I: Starting tool with the KLMProfile profile
ADMU3100I: Reading configuration for server: server1
Here is the signer information (verify the digest value matches what is displayed
at the server):
redisplayed if (y) is entered, which indicates the signer has already been added
to the truststore.
ADMU3201I: Server stop request issued. Waiting for stop status.
ADMU4000I: Server server1 stop completed.
/opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/startServer.log
ADMU0128I: Starting tool with the KLMProfile profile
ADMU3100I: Reading configuration for server: server1
ADMU3200I: Server launched. Waiting for initialization status.
ADMU3000I: Server server1 open for e-business; process id is 20182
13.Open the browser to verify that the connection is secured, as shown in Figure 5-83.
Related publications
The publications that are listed in this section are considered suitable for a more detailed
description of the topics that are covered in this book.
IBM Redbooks
The following IBM Redbooks publication provides more information about the topics in this
book:
IBM DS8000 Encryption for data at rest, Transparent Cloud Tiering, and Endpoint Security
(DS8000 Release 9.1), REDP-4500
You can search for, view, download, or order this document and other Redbooks, Redpapers,
web docs, drafts, and additional materials, at the following website:
ibm.com/redbooks
Online resources
These websites are also relevant as further information sources:
IBM Security Key Lifecycle Manager:
https://www.ibm.com/docs/en/sgklm/4.1?topic=quick-start-guide
IBM Security Key Lifecycle Manager Dashboard:
https://www.ibm.com/support/pages/node/876126
IBM Security Key Lifecycle Manager Support Matrix:
https://www.ibm.com/support/pages/node/296957
SG24-8472-01
ISBN DocISBN
Printed in U.S.A.
®
ibm.com/redbooks