IBM Security Guardium Key Lifecycle Manager: Books

Download as pdf or txt
Download as pdf or txt
You are on page 1of 128

Front cover

Draft Document for Review June 15, 2021 8:04 pm SG24-8472-01

IBM Security Guardium Key


Lifecycle Manager

Rinkesh Bansal
Aditi Prasad
Shiv Jha
Saandiip Koturwwar
Alka Acharya

Redbooks
Draft Document for Review June 11, 2021 12:08 pm 8472edno.fm

IBM Redbooks

IBM Security Guardium Key Lifecycle Manager

June 2021

SG24-8472-01
8472edno.fm Draft Document for Review June 11, 2021 12:08 pm

Note: Before using this information and the product it supports, read the information in “Notices” on page v.

Second Edition (June 2021)

This edition applies to version 4.1.0.1 of IBM Security Guardium Key Lifecycle Manager (product number
5724-T60).

This document was created or updated on June 11, 2021.

© Copyright International Business Machines Corporation 2021. All rights reserved.


Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule
Contract with IBM Corp.
Draft Document for Review June 11, 2021 12:08 pm 8472TOC.fm

Contents

Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .v
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Now you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Stay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii

Chapter 1. IBM Security Guardium Key Lifecycle Manager Introduction . . . . . . . . . . . 1


1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 What’s new in IBM Security Guardium Key Lifecycle Manager v4.1.0.1. . . . . . . . . . . . . 3
1.3 Comparison between IBM Security Guardium Key Lifecycle Manager Traditional Edition
and Container Edition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition


installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1 Pre-installation tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2 Installing IBM Security Guardium Key Lifecycle Manager Traditional Edition in a graphical
user interface mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.3 Verifying successful installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.4 Installing IBM Security Guardium Key Lifecycle Manager Traditional Edition in silent mode
15
2.5 Installing fix pack for IBM Security Guardium Key Lifecycle Manager Traditional Edition
21

Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation
27
3.1 Pre-requisite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.2 Installing IBM Security Guardium Key Lifecycle Manager on Red Hat OpenShift . . . . 29
3.2.1 Installing IBM Security Guardium Key Lifecycle Manager Container Edition on Red
Hat OpenShift with PostgreSQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.2.2 Activate the license and login to IBM Security Guardium Key Lifecycle Manager 33
3.2.3 Installing IBM Security Guardium Key Lifecycle Manager Container Edition on Red
Hat OpenShift with Db2U . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
3.2.4 Exposing non-HTTP Port in Red Hat OpenShift Installation . . . . . . . . . . . . . . . . . 36
3.2.5 Installing IBM Security Guardium Key Lifecycle Manager Container Edition as Fix
Pack on Red Hat OpenShift . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
3.2.6 Troubleshooting in Red Hat OpenShift . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
3.3 Installing IBM Security Guardium Key Lifecycle Manager Container Edition on Kubernetes
40
3.3.1 Installing IBM Security Guardium Key Lifecycle Manager on Kubernetes . . . . . . 40
3.3.2 Installing IBM Security Guardium Key Lifecycle Manager Container Edition as Fix
Pack on Kubernetes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
3.3.3 Troubleshooting in Kubernetes environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
3.4 Installing IBM Security Guardium Key Lifecycle Manager Container Edition on IBM Z/OS
Container Extensions (zCX) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.4.1 Installing IBM Security Guardium Key Lifecycle Manager on zCX with PostgreSQL
43

© Copyright IBM Corp. 2021. iii


8472TOC.fm Draft Document for Review June 11, 2021 12:08 pm

3.4.2 Installing IBM Security Guardium Key Lifecycle Manager with Db2 for z/OS . . . . 44
3.4.3 Installing IBM Security Guardium Key Lifecycle Manager Container Edition as Fix
Pack in z/CX Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

Chapter 4. IBM Security Guardium Key Lifecycle Manager Migration . . . . . . . . . . . . . 49


4.1 Migrating from an earlier version of IBM Security Key Lifecycle Manager . . . . . . . . . . 50
4.2 Inline migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
4.3 Cross migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
4.3.1 Cross migration using backup and restore utility . . . . . . . . . . . . . . . . . . . . . . . . . 53
4.3.2 Cross migration using backup and restore from GUI . . . . . . . . . . . . . . . . . . . . . . 57

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration . . . . . . . . . 59


5.1 Configuring an TLS/KMIP certificate for IBM Security Guardium Key Lifecycle Manager
60
5.1.1 Login to IBM Security Guardium Key Lifecycle Manager GUI . . . . . . . . . . . . . . . 60
5.1.2 Creating a self-signed server certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
5.1.3 Creating a Third-party CA signed server certificate . . . . . . . . . . . . . . . . . . . . . . . 63
5.1.4 Exporting and downloading Server certificate. . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
5.2 Backing up and restoring IBM Security Guardium Key Lifecycle Manager . . . . . . . . . . 68
5.2.1 Backing up IBM Security Guardium Key Lifecycle Manager. . . . . . . . . . . . . . . . . 68
5.2.2 Restoring IBM Security Guardium Key Lifecycle Manager . . . . . . . . . . . . . . . . . . 70
5.3 Configuring replication for IBM Security Guardium Key Lifecycle Manager . . . . . . . . . 72
5.3.1 Configuring the master server for replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
5.3.2 Configuring the master server for Incremental Replication . . . . . . . . . . . . . . . . . . 76
5.3.3 Configuring the clone server for replication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
5.4 Configuring a Multi-Master cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
5.4.1 Types of servers in a Multi-Master cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
5.4.2 Setting up minimal deployment of a Multi-Master cluster . . . . . . . . . . . . . . . . . . . 81
5.4.3 Agent Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
5.4.4 HADR takeover scenarios. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
5.5 Integrating LDAP with IBM Security Guardium Key Lifecycle Manager Traditional Edition
using configuration scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
5.5.1 Preparing for the configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
5.5.2 LDAP configuration database and updating the data source for WIM . . . . . . . . . 92
5.5.3 Creating a database-based repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.6 Integrating LDAP with IBM Security Guardium Key Lifecycle Manager Container Edition
100
5.7 Configuring signed CA certificates for IBM Security Guardium Key Lifecycle Manager
portal and WebSphere console access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113


IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

iv IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472spec.fm

Notices

This information was developed for products and services offered in the US. This material might be available
from IBM in other languages. However, you may be required to own a copy of the product or product version in
that language in order to access it.

IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not grant you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US

INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION “AS IS”


WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer of express or implied warranties in
certain transactions, therefore, this statement may not apply to you.

This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.

Any references in this information to non-IBM websites are provided for convenience only and do not in any
manner serve as an endorsement of those websites. The materials at those websites are not part of the
materials for this IBM product and use of those websites is at your own risk.

IBM may use or distribute any of the information you provide in any way it believes appropriate without
incurring any obligation to you.

The performance data and client examples cited are presented for illustrative purposes only. Actual
performance results may vary depending on specific configurations and operating conditions.

Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.

Statements regarding IBM’s future direction or intent are subject to change or withdrawal without notice, and
represent goals and objectives only.

This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to actual people or business enterprises is entirely
coincidental.

COPYRIGHT LICENSE:

This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are
provided “AS IS”, without warranty of any kind. IBM shall not be liable for any damages arising out of your use
of the sample programs.

© Copyright IBM Corp. 2021. v


8472spec.fm Draft Document for Review June 11, 2021 12:08 pm

Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines
Corporation, registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright
and trademark information” at http://www.ibm.com/legal/copytrade.shtml

The following terms are trademarks or registered trademarks of International Business Machines Corporation,
and might also be trademarks or registered trademarks in other countries.
AIX® IBM® Tivoli®
Db2® IBM Security™ WebSphere®
DS8000® Redbooks® z/OS®
Guardium® Redbooks (logo) ®

The following terms are trademarks of other companies:

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive
licensee of Linus Torvalds, owner of the mark on a worldwide basis.

LTO, the LTO Logo and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and other
countries.

Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States,
other countries, or both.

Java, and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its
affiliates.

OpenShift, Red Hat, are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the United
States and other countries.

VMware, and the VMware logo are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in
the United States and/or other jurisdictions.

Other company, product, or service names may be trademarks or service marks of others.

vi IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472pref.fm

Preface

This IBM® Redbooks® publication describes the installation, integration, and configuration
of IBM Security™ Guardium® Key Lifecycle Manager .

Authors
This book was produced by a team of IBM specialists from around the world:.

Rinkesh Bansal is a Senior Development and Release Manager for Encryption and Key
Management products in IBM. He is expert of Key Management domain and has more than
18 years of experience. He joined IBM in 2009, working with IBM Security Guardium Key
Lifecycle (GKLM) team since 2012. His experience includes roles as an Install package
developer, test engineer, test lead, automation lead, Project Manager, Release Manager and
he currently manages the GKLM development team. He is a passionate innovator with 10
patents and an enthusiastic speaker at various conferences, colleges, schools.

Aditi Prasad is an Advisory Software Engineer at IBM. She joined IBM in 2008 and is
working with the IBM Security Guardium Key Lifecycle (GKLM) team since 2012. She is the
Level 3 support lead for GKLM. She has about 13 years of experience with more than 7 years
in Security Domain. She holds a Masters degree in Computer Science from Pune University,
India.

Shiv Jha is a Test Lead and Project Manager for IBM Security Guardium Key Lifecycle
Manager (GKLM) product in IBM. He joined IBM in 2013 and has a total of 17 years of
experience. He is working with GKLM team for last 7 years. Shiv holds a Masters degree in
Computer Science from BITS Pilani, India.

Saandiip Koturwwar is a Senior QA specialist in IBM, India. He has 15 years of experience


in QA domain. He joined IBM in 2007 and has been working with IBM Security Guardium Key
Lifecycle Manager team since 2015. His experience includes roles as test engineer,
automation engineer. He holds a Master's degree in Computer Science and Engineering from
Aurangabad University, India.

Alka Acharya has been working in the IBM Software Labs as an Information Developer since
November 2018. She is responsible for authoring and delivering the customer-facing
documentation for IBM Security Guardium Key Lifecycle Manager. She has about 15 years of
experience in delivering product and training documentation. She holds a Bachelor's degree
in Engineering (Computer Science) from the University of Pune, India.

Thanks to the author of the previous edition:

An Chen
Client Technical Specialist, IBM Australia

Thanks to the following people for their contributions to this project:

Bert Dufrasne
Project Leader, IBM Redbooks, San Jose Center

© Copyright IBM Corp. 2021. vii


8472pref.fm Draft Document for Review June 11, 2021 12:08 pm

Now you can become a published author, too!


Here’s an opportunity to spotlight your skills, grow your career, and become a published
author—all at the same time! Join an IBM Redbooks residency project and help write a book
in your area of expertise, while honing your experience using leading-edge technologies. Your
efforts will help to increase product acceptance and customer satisfaction, as you expand
your network of technical contacts and relationships. Residencies run from two to six weeks
in length, and you can participate either in person or as a remote resident working from your
home base.

Find out more about the residency program, browse the residency index, and apply online at:
ibm.com/redbooks/residencies.html

Comments welcome
Your comments are important to us!

We want our books to be as helpful as possible. Send us your comments about this book or
other IBM Redbooks publications in one of the following ways:
򐂰 Use the online Contact us review Redbooks form found at:
ibm.com/redbooks
򐂰 Send your comments in an email to:
[email protected]
򐂰 Mail your comments to:
IBM Corporation, IBM Redbooks
Dept. Security Mail Station P099
2455 South Road
Poughkeepsie, NY 12601-5400

Stay connected to IBM Redbooks


򐂰 Find us on LinkedIn:
http://www.linkedin.com/groups?home=&gid=2130806
򐂰 Explore new Redbooks publications, residencies, and workshops with the IBM Redbooks
weekly newsletter:
https://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenForm
򐂰 Stay current on recent Redbooks publications with RSS Feeds:
http://www.redbooks.ibm.com/rss.html

viii IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Introduction.fm

Chapter 1. IBM Security Guardium Key


Lifecycle Manager Introduction
This chapter provides a general overview of IBM Security Guardium Key Lifecycle Manager,
new features of IBM Security Guardium Key Lifecycle Manager v4.1.0.1, comparison between
IBM Security Guardium Key Lifecycle Manager Container Edition and IBM Security Guardium
Key Lifecycle Manager Traditional Edition and other important links.

This chapter covers the following topics:


򐂰 Overview
򐂰 What’s new in IBM Security Guardium Key Lifecycle Manager v4.1.0.1
򐂰 Comparison between IBM Security Guardium Key Lifecycle Manager Traditional Edition
and Container Edition

© Copyright IBM Corp. 2021. All rights reserved. 1


8472_ch_Introduction.fm Draft Document for Review June 11, 2021 12:08 pm

1.1 Overview
IBM Security Guardium Key Lifecycle Manager provides key storage, key serving, and key
lifecycle management for storage devices, tape drives, databases, and applications from IBM
and other vendors. For more information, see IBM Documentation (formerly IBM Knowledge
Center).

IBM Security Guardium Key Lifecycle Manager supports the following methods for
communicating with client devices and applications to manage and serve cryptographic keys:
򐂰 Key Management Interoperability Protocol (KMIP): You can use KMIP operations for
secure communication between the IBM Security Guardium Key Lifecycle Manager server
and the self-encrypting devices that are KMIP compatible. For Example: Spectrum Scale,
VMware, and so on.
򐂰 IPP: Some self-encrypting devices uses IBM proprietary Protocol (IPP) to communicate
with IBM Security Guardium Key Lifecycle Manager server for Cryptographic keys. For
example, LTO tape drives, DS8000® data at rest, and so on.
򐂰 REST APIs: You can use IBM Security Guardium Key Lifecycle Manager REST key
serving interface to manage and serve Cryptographic keys for applications that support
REST APIs. For example, Cloud Apps.

For more information, see the following resources:


򐂰 Support Dashboard (bookmark this link)
򐂰 Hardware, Operating System and other requirements
򐂰 Supported Storage and Non-storage devices

2 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Introduction.fm

1.2 What’s new in IBM Security Guardium Key Lifecycle


Manager v4.1.0.1
Here are some of the key features of IBM Security Guardium Key Lifecycle Manager v4.1.0.1.
򐂰 IBM Security Key Lifecycle Manager was rebranded as IBM Security Guardium Key
Lifecycle Manager.
򐂰 IBM Security Guardium Key Lifecycle Manager is now available in Container edition
supporting following container platforms:
– Red Hat OpenShift
– Kubernetes
– IBM Z/OS Container Extensions (zCX)
򐂰 Capability to create group of clients and use the new workflow to manage clients to enable
seamless sharing and serving of cryptographic objects among them
򐂰 Support for Log Event Extended Format (LEEF) format for audit logs
򐂰 Support for IBM Java JCEPlus and JCEPlusFIPS provider for cryptographic operations
򐂰 Important features in IBM Security Guardium Key Lifecycle Manager Container Edition
– User Management through IBM Security Guardium Key Lifecycle Manager Graphical
User Interface
– LDAP configuration through IBM Security Guardium Key Lifecycle Manager Graphical
User Interface
– Support for PostgreSQL database for storing cryptographic keys and metadata
򐂰 Important features in IBM Security Guardium Key Lifecycle Manager Traditional Edition
– New pre-requisite utility for accurate pre-requisite checking before installation
– Installation of IBM Security Guardium Key Lifecycle Manager as a domain (Microsoft
Active Directory) user on a domain-managed Windows system.
– Multi-Master Agent status on IBM Security Guardium Key Lifecycle Manager Graphic
User Interface for easy monitoring
– New utility to convert master in Multi-Master cluster to Standalone
– Password-less authentication with the database (Db2®) by using Kerberos

Chapter 1. IBM Security Guardium Key Lifecycle Manager Introduction 3


8472_ch_Introduction.fm Draft Document for Review June 11, 2021 12:08 pm

1.3 Comparison between IBM Security Guardium Key Lifecycle


Manager Traditional Edition and Container Edition
IBM Security Guardium Key Lifecycle Manager 4.1 supports Traditional Edition and Container
Edition. For comparison between Traditional and Container Edition, see Table 1-1.

Table 1-1 Comparison between GKLM Traditional and Container Editions


Features Traditional Edition Container Edition

Deployment Platform Windows Red Hat OpenShift


AIX® Kubernetes
Linux (x86-64, PPC, Linux on z) IBM zCX

Deployment time ~1 hour ~2 minutes

Backup & Restore support Yes Yes

Replication Support Yes Yes

Multi-Master Support Yes No

Administration through GUI Yes Yes

Administration through REST Yes Yes

Administration through CLI Yes No

Key serving through KMIP Yes Yes

Key serving through IPP Yes Yes

Key serving through REST Yes Yes

User Management through WAS through GKLM GUI

LDAP configuration through WAS UI or scripts through GKLM GUI

Kerberos support Yes No

Bundled products WAS traditional WAS Liberty


Db2 Standard Edition IBM Java
IBM Java

Supported database Db2 Standard Edition PostgreSQL


Db2U (only on Red Hat
OpenShift)
Db2 on Z/OS (only on IBM zCX)

4 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Installation_te.fm

Chapter 2. IBM Security Guardium Key


Lifecycle Manager Traditional
Edition installation
This chapter describes the tasks that are associated with the installation of IBM Security
Guardium Key Lifecycle Manager V4.1.0.1 for Traditional Edition (TE) and installing fix packs.

This chapter covers the following topics:


򐂰 Pre-installation tasks
򐂰 Installing IBM Security Guardium Key Lifecycle Manager Traditional Edition in a graphical
user interface mode
򐂰 Verifying successful installation
򐂰 Installing IBM Security Guardium Key Lifecycle Manager Traditional Edition in silent mode
򐂰 Installing fix pack for IBM Security Guardium Key Lifecycle Manager Traditional Edition

© Copyright IBM Corp. 2021. All rights reserved. 5


8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm

2.1 Pre-installation tasks


You can install IBM Security Guardium Key Lifecycle Manager Traditional Edition on
distributed platforms.

Before installing the IBM Security Guardium Key Lifecycle Manager Traditional Edition,
complete the following prerequisite tasks:
򐂰 Ensure that the hardware and operating system meet the prerequisites that are provided
in the IBM Security Guardium Key Lifecycle Manager Support Matrix document.
򐂰 Ensure that you follow the guidelines that are listed in the Installation guidelines topic
in the IBM Documentation (formerly IBM Knowledge Center).
򐂰 Run the prerequisite check script to ensure that the system requirements are met. For
more information, see Checking prerequistes.
Download the following installation files from the IBM Passport Advantage website:
– SGKLM_4.1_FOR_WINDOWS_SERVER_1OF2.zip
– SGKLM_4.1_FOR_WINDOWS_SERVER_2OF2.zip
򐂰 Extract the files to a temporary directory on your system such that disk1 and disk2 are in
same folder, as shown in Figure 2-1.

Figure 2-1 Extracted folders from installation files

򐂰 After files are extracted, go to the disk1 folder and ensure that the launchpad.bat script is
extracted to the disk1 directory, as shown in Figure 2-2.

Figure 2-2 Extracted installation files in disk1 directory

6 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Installation_te.fm

2.2 Installing IBM Security Guardium Key Lifecycle Manager


Traditional Edition in a graphical user interface mode
Follow the below steps to install IBM Security Guardium Key Lifecycle Manager v4.1.0.0
Traditional Edition.
1. Double-click the launchpad.bat script available in disk1 folder to start the installation
wizard. Enter 1 to select English as the locale, and press Enter to proceed with installation
process as shown in Figure 2-3.

Figure 2-3 Select Locale

2. Pre-requisite checker checks required availability for CPU and RAM, as shown in
Figure 2-4.

Figure 2-4 Pre-requisite checker

3. The installation GUI is displayed if there are no issues from the pre-requisite checker.

Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 7
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm

4. All components are required for an installation, as shown in Figure 2-5. Click Next.

Figure 2-5 Components to be installed

5. Review and accept the terms in the license agreement, as shown in Figure 2-6. Click
Next.

Figure 2-6 Accepting the terms in the license agreement

8 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Installation_te.fm

6. Specify the installation path for the Shared Resources Directory and IBM Installation
Manager, as shown in Figure 2-7 on page 9. Click Next.

Figure 2-7 Shared Resources Directory and Installation Manager installation path

7. Specify the installation path or keep default path for the IBM Db2, IBM WebSphere®
Application Server and IBM Security Guardium Key Lifecycle Manager as shown in
Figure 2-8. Click Next.

Figure 2-8 Db2 and WebSphere applications installation path

Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 9
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm

8. Click Next on the Translation selection page, as shown in Figure 2-9.

Figure 2-9 Translation packages

9. Confirm the packages to be installed, as shown in Figure 2-10. Click Next.

Figure 2-10 Confirm packages to be installed

10 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Installation_te.fm

10.Specify the credentials and home directory for the Db2 instance owner account and the
Db2 port, as shown in Figure 2-11. If the Db2 Administrator ID specified does not exist, a
new user will be created. Ensure to record credentials, Db2 port and other information for
future use. Click Next.

Figure 2-11 Db2 instance owner account details

11.Specify the credentials for the WebSphere Application Server (WAS) administrator
wasadmin account, WAS Port, IBM Security Guardium Key Lifecycle Manager
administrator SKLMAdmin account and the IBM Security Guardium Key Lifecycle
Manager Ports, as shown in Figure 2-12. Ensure to record credentials and port
information for future use. Click Next.

Figure 2-12 WAS & GKLM users and ports

Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 11
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm

12.Do not select the Migrate Encryption Key Manager (EKM) option unless the installation
is intended for a migration from EKM, as shown in Figure 2-13. Click Next.

Figure 2-13 Clear the Migration Encryption Key Manager option

13.Review the installation summary and click Install to start installation of IBM Security
Guardium Key Lifecycle Manager, as shown in Figure 2-14 on page 12.

Figure 2-14 Installation summary information

12 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Installation_te.fm

14.After a successful installation, select the None option and click Finish to exit the
installation wizard, as shown in Figure 2-15.

Figure 2-15 Installation Successful

2.3 Verifying successful installation


To check for a successful installation:
1. Launch a web browser.
2. Log in to IBM Security Guardium Key Lifecycle Manager (see Figure 2-16) by going to the
following URL and using SKLMAdmin user and password set during the installation:
https://<ip address/hostname>:<port>/ibm/SKLM/login.jsp

Important: IBM Security Guardium Key Lifecycle Manager V4.1.0.1 by default uses port
9443 for GUI and REST API’s.

Figure 2-16 Login page

Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 13
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm

3. After login to IBM Security Guardium Key Lifecycle Manager GUI, Welcome page is
displayed, as shown in Figure 2-17

Figure 2-17 IBM Security Guardium Key Lifecycle Manager Welcome page

4. Click the question mark in the upper right corner and select About option from the menu,
as shown in Figure 2-18.

Figure 2-18 About menu

5. Verify the installed version of IBM Security Guardium Key Lifecycle Manager and its
components, as shown in Figure 2-19.

Figure 2-19 IBM Security Guardium Key Lifecycle Manager Version Information

14 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Installation_te.fm

2.4 Installing IBM Security Guardium Key Lifecycle Manager


Traditional Edition in silent mode
You can install IBM Security Guardium Key Lifecycle Manager Traditional Edition on
distributed platforms in silent mode using the steps outlined in this section. These steps are
documented for Linux. However, similar steps can be used for AIX, Linux on zLinux as well as
Windows operating system after making changes in installation directories.
1. Keep all the files of the installation package in a temporary directory on your system.
Extract the files to same location so that post extraction both disk1 and disk2 are in same
folder, as shown in Example 2-1.

Example 2-1 Extracted folders from installation package


[root@testGKLM411 GKLM41GA]# tar -xzvf SGKLM_4.1_FOR_LINUX_SERVER_1OF2.tar.gz
[root@testGKLM411 GKLM41GA]# tar -xzvf SGKLM_4.1_FOR_LINUX_SERVER_2OF2.tar.gz
[root@testGKLM411 GKLM41GA]# ls -l
total 6739236
drwxr-xr-x 9 root root 4096 Nov 20 12:26 disk1
drwxr-xr-x 3 root root 35 Nov 20 12:23 disk2
-rw-r--r-- 1 root root 4245576797 May 8 08:21
SGKLM_4.1_FOR_LINUX_SERVER_1OF2.tar.gz
-rw-r--r-- 1 root root 2655395262 May 8 08:23
SGKLM_4.1_FOR_LINUX_SERVER_2OF2.tar.gz

2. After you extract the files, the installation script silent_install.sh is extracted to the disk1
directory, as shown in Example 2-2.

Example 2-2 Extracted installation files in disk1 directory


[root@testGKLM411 GKLM41GA]# ls -l disk1
total 104
drwxr-xr-x 6 root root 85 Nov 20 12:23 ad
-rwxr-xr-x 1 root root 170 Nov 20 12:17 diskTag.inf
drwxr-xr-x 2 root root 68 Nov 20 12:26 documentation
drwxr-xr-x 10 root root 4096 Nov 20 12:26 im
-rwxr-xr-x 1 root root 3026 Nov 20 12:25 install.sh
-rwxr-xr-x 1 root root 1995 Nov 20 12:25 launchpad.sh
drwxr-xr-x 4 root root 82 Nov 20 12:25 md
drwxr-xr-x 3 root root 180 Nov 20 12:26 precheckscripts
drwxr-xr-x 12 root root 4096 Nov 20 12:26 PRS
-rwxr-xr-x 1 root root 4286 Nov 20 12:25 silent_install.sh
-rwxr-xr-x 1 root root 1167 Nov 20 12:25 silent_install_withoutIM.sh
-rwxr-xr-x 1 root root 3604 Nov 20 12:25 silent_uninstallSKLM_linux.sh
-rwxr-xr-x 1 root root 6175 Nov 20 12:25 SKLM_Silent_Linux_Mig_25_Resp.xml
-rwxr-xr-x 1 root root 6175 Nov 20 12:25 SKLM_Silent_Linux_Mig_26_Resp.xml
-rwxr-xr-x 1 root root 6181 Nov 20 12:25 SKLM_Silent_Linux_Mig_27_Resp.xml
-rwxr-xr-x 1 root root 6257 Nov 20 12:25 SKLM_Silent_Linux_Mig_301_Resp.xml
-rwxr-xr-x 1 root root 6253 Nov 20 12:25 SKLM_Silent_Linux_Mig_30_Resp.xml
-rwxr-xr-x 1 root root 6254 Nov 20 12:25 SKLM_Silent_Linux_Mig_40_Resp.xml
-rwxr-xr-x 1 root root 5978 Nov 20 12:25 SKLM_Silent_Linux_Resp.xml
-rwxr-xr-x 1 root root 847 Nov 20 12:25 SKLM_Uninstall_Linux_Resp.xml
-rwxr-xr-x 1 root root 624 Nov 20 12:26 TKLMPasswordPolicy.xml
drwxr-xr-x 2 root root 23 Nov 20 12:25 toc
-rwxr-xr-x 1 root root 3514 Nov 20 12:25 uninstallSKLM_linux.sh

Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 15
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm

3. To perform a fresh installation, edit and update all the user inputs such as repository
location where install binaries are present, installation directory, user credentials , and so
on, in the input response file SKLM_Silent_Linux_Resp.xml.

Note: Installation binaries bundle sample response files for performing a fresh
installation as well as for performing data migration from existing installed version of
IBM Security Guardium Key Lifecycle Manager. For a fresh installation, the sample
response filename is SKLM_Silent_Linux_Resp.xml

a. Create a backup copy of the sample response file SKLM_Silent_Linux_Resp.xml, as


shown in Example 2-3.

Example 2-3 Backup Sample Response File


[root@testGKLM411 disk1]# cp SKLM_Silent_Linux_Resp.xml
SKLM_Silent_Linux_Resp.xml_backup

b. Using any editor e.g. vi, open the response file SKLM_Silent_Linux_Resp.xml for
editing, as shown in Example 2-4.

Example 2-4 Edit Sample Response File


[root@testGKLM411 disk1]# vi SKLM_Silent_Linux_Resp.xml

c. Update the repository location to point to the local directory where the installation
package has been extracted in Step 1, as shown in Example 2-5.

Example 2-5 Update Repository Location


<server>
<repository location='/Setups/GKLM41GA/disk1/im'/>
<repository location='/Setups/GKLM41GA/disk1/'/>
</server>

d. Update the IBM Installation Manager installLocation to install IBM Installation Manager
at specified location, as shown in Example 2-6.

Example 2-6 Update IM Installation Location


<profile id='IBM Installation Manager'
installLocation='/opt/IBM/InstallationManager/eclipse' kind='self'>
<data key='eclipseLocation' value='/opt/IBM/InstallationManager/eclipse'/>

e. Update the IBM Db2 location to install IBM Db2 database at specified location, as
shown in Example 2-7.

Example 2-7 Update Db2 Installation Location


<profile id='IBM Db2 SKLM41' installLocation='/opt/IBM/DB2SKLMV41'>
<data key='eclipseLocation' value='/opt/IBM/DB2SKLMV41'/>

f. Update user.DB2_ADMIN_ID to specify username of the Db2 user which will


administer the Db2 database, as shown in Example 2-8. This user is an operating
system level user.

Example 2-8 Update Db2 Administrator ID


<data key='user.DB2_ADMIN_ID,com.ibm.sklm41.db2.lin.ofng' value='sklmdb41'/>

16 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Installation_te.fm

g. Update user.DB2_ADMIN_PWD and user.CONFIRM_PASSWORD to specify the


password for the operating system level Db2 user specified in user.DB2_ADMIN_ID.
The values are specified in encrypted format and values for both
user.DB2_ADMIN_PWD and user.CONFIRM_PASSWORD must match, as shown in
Example 2-9.

Example 2-9 Update password for Db2 user in encrypted format


<data key='user.DB2_ADMIN_PWD,com.ibm.sklm41.db2.lin.ofng'
value='QTh/0AiFvrljhs9gnOYkGA=='/>
<data key='user.CONFIRM_PASSWORD,com.ibm.sklm41.db2.lin.ofng'
value='QTh/0AiFvrljhs9gnOYkGA=='/>

Important: The plain-text password for Db2 Administrator user must meet the operating
system password complexity requirements. In case this requirement is not met the
installation for IBM Security Guardium Key Lifecycle Manager will fail.

h. To convert password from plain-text to encrypted format acceptable for IBM Installation
manger use the imcl utility provided under the im/tools folder, as shown in
Example 2-10.

Example 2-10 Using imcl utility to get encrypted password


[root@testGKLM411 tools]# ./imcl encryptString SKLM@db2
QTh/0AiFvrljhs9gnOYkGA==
[root@testGKLM411 tools]#

i. Update the home directory of the IBM Db2 user specified above in Step f, as shown in
Example 2-11.

Example 2-11 Update home directory of Db2 user


<data key='user.DB2_DB_HOME,com.ibm.sklm41.db2.lin.ofng'
value='/home/sklmdb41'/>

j. Update the value of the database name, as shown in Example 2-12.

Example 2-12 Update Db2 database name


<data key='user.DB2_DB_NAME,com.ibm.sklm41.db2.lin.ofng' value='SKLMDB41'/>

k. Update the value of the database port, as shown in Example 2-13.

Example 2-13 Update Db2 database port


<data key='user.DB2_DB_PORT,com.ibm.sklm41.db2.lin.ofng' value='50070'/>

l. Update the value for DB2_LOCATION to the installation location for Db2 database, as
shown in Example 2-14. Ensure this value is same as value for parameter IBM Db2
location specified above in Step e.

Example 2-14 Update Db2 Install Location


<data key='user.DB2_LOCATION,com.ibm.sklm41.db2.lin.ofng'
value='/opt/IBM/DB2SKLMV41'/>

Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 17
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm

m. Update the value for DB2_DB_LHOME to the home location for Db2 database user, as
shown in Example 2-15. Ensure this value is same as value for parameter
DB2_DB_HOME location specified above in Step i.

Example 2-15 Update DB2_DB_LHOME


<data key='user.DB2_DB_LHOME,com.ibm.sklm41.db2.lin.ofng' value='/home/sklmdb41'/>

n. Update the value of the user group under which the Db2 user will be created. The
group name should not be longer than 8 characters, as shown in Example 2-16.

Example 2-16 Update Db2 admin user group


<data key='user.DB2_ADMIN_GRP,com.ibm.sklm41.db2.lin.ofng' value='sklmdb41'/>

Tip: Parameter user.DB2_ADMIN_GRP is not applicable for Windows operating system.

o. Update the installation location for IBM WebSphere Application Server to install IBM
WebSphere Application Server at specified location, as shown in Example 2-17.

Example 2-17 Update IM Installation Location


<profile id='IBM WebSphere Application Server V9.0'
installLocation='/opt/IBM/WebSphere/AppServer'>
<data key='eclipseLocation' value='/opt/IBM/WebSphere/AppServer'/>

p. Update the installation location for IBM Security Guardium Key Lifecycle Manager to
install GKLM at a specified location, as shown in Example 2-18.

Example 2-18 Update GKLM Installation Location


<profile id='IBM Security Guardium Key Lifecycle Manager v4.1.0'
installLocation='/opt/IBM/SKLMV41'>
<data key='eclipseLocation' value='/opt/IBM/SKLMV41'/>

q. Update user.WAS_ADMIN_ID to specify username of the WebSphere Application


Server(WAS) Administrator user which will administer the WAS, as shown in
Example 2-19.

Example 2-19 Update WAS Administrator ID


<data key='user.WAS_ADMIN_ID,com.ibm.sklm41.linux' value='wasadmin'/>

r. Update user.WAS_ADMIN_PASSWORD and user.WAS_ADMIN_CONF_PWD to


specify the password of the WAS user specified in user.WAS_ADMIN_ID. The values
are specified in encrypted format and values for both user.WAS_ADMIN_PASSWORD
and user.WAS_ADMIN_CONF_PWD must match, as shown in Example 2-20.

Example 2-20 Update password for WAS Administrator user in encrypted format
<data key='user.WAS_ADMIN_PASSWORD,com.ibm.sklm41.linux'
value='e9PjN93MeQxwnSs9VXJFMw=='/>
<data key='user.WAS_ADMIN_CONF_PWD,com.ibm.sklm41.linux'
value='e9PjN93MeQxwnSs9VXJFMw=='/>

18 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Installation_te.fm

s. Update user.SKLM_ADMIN_USER to specify username of the IBM Security


Guardium Key Lifecycle Manager Administrator user which will administer the GKLM,
as shown in Example 2-21.

Example 2-21 Update GKLM Administrator User


<data key='user.SKLM_ADMIN_USER,com.ibm.sklm41.linux' value='SKLMAdmin'/>

t. Update user.SKLM_ADMIN_PASSWORD and user.SKLM_ADMIN_CONF_PWD to


specify password of the GKLM user specified in user.SKLM_ADMIN_USER. The
values are specified in encrypted format and values for both
user.SKLM_ADMIN_PASSWORD and user.SKLM_ADMIN_CONF_PWD must
match, as shown in Example 2-22.

Example 2-22 Update password for WAS Administrator user in encrypted format
<data key='user.SKLM_ADMIN_PASSWORD,com.ibm.sklm41.linux'
value='9YTRJMRIydDSdfhaHPs1ag=='/>
<data key='user.SKLM_ADMIN_CONF_PWD,com.ibm.sklm41.linux'
value='9YTRJMRIydDSdfhaHPs1ag=='/>

u. Update the value of the GKLM Application port on which GKLM will listen for requests
on a secure channel, as shown in Example 2-23.

Example 2-23 Update GKLM Application secure listening port


<data key='user.SKLM_APP_PORT,com.ibm.sklm41.linux' value='9443'/>

v. Update the value of the WAS Administrator port on which WAS will listen for requests
on a secure channel. Users can access the WAS GUI console by connecting to this
port, as shown in Example 2-24.

Example 2-24 Update WAS Administrator secure listening port


<data key='user.WAS_ADMIN_PORT,com.ibm.sklm41.linux' value='9083'/>

w. Update the value of the GKLM Application port on which GKLM will listen for requests
on a non-secure channel, as shown in Example 2-25.

Example 2-25 Update GKLM Application non-secure listening port


<data key='user.SKLM_APP_NS_PORT,com.ibm.sklm41.linux' value='9080'/>

x. Save all the changes made so far and close the file.
4. On the command prompt run the following command to perform silent installation, as
shown in Example 2-26.

Example 2-26 Perform Silent installation


[root@testGKLM411 disk1]# ./silent_install.sh SKLM_Silent_Linux_Resp.xml
-acceptLicense

Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 19
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm

5. GKLM installer will start performing installation beginning with running pre-requisite
checker. If all the necessary pre-requisites are met then it continues with the installation of
GKLM. See Example 2-27.
The Installation process may display on console a warning message before showing final
success message. This warning message is related to 64-bit version of Installation
Manger not being supported. This is a known issue and can be safely ignored.
In case any pre-requisite is not met but is not a mandatory pre-requiste(e.g. Db2 kernel
settings) it will display a warning and ask user input before continuing with further
installation, as shown in Example 2-28

Example 2-27 Installation Console Output - All pre-requisites are met


[root@sklm41ga1 disk1]# ./silent_install.sh SKLM_Silent_Linux_Resp.xml
-acceptLicense
No preinstalled IBM Installation Manager found on the system.
Installing IBM Security Guardium Key Lifecycle Manager v4.1.0
Sun May 16 09:06:15 PDT 2021 - SKLM Prerequisite check started.
Db2 pre-requisite check - PASSED.
Checking required shell - PASSED
Checking required memory - PASSED
Checking executable permissions - PASSED
Checking kernel parameters - PASSED
Checking SELinux - PASSED
Checking CPU speed - PASSED
Sun May 16 09:06:15 PDT 2021 - SKLM Prerequisite check - PASSED .
check /tmp/SKLMPrereqCheck.log for more details.
Installed com.ibm.cic.agent_1.9.1003.20200730_2125 to the
/opt/IBM/InstallationManager/eclipse directory.
Installed com.ibm.sklm41.db2.lin.ofng_11.5.4.0 to the /opt/IBM/DB2SKLMV41
directory.
Installed com.ibm.websphere.BASE.v90_9.0.5005.20200807_2041 to the
/opt/IBM/WebSphere/AppServer directory.
Installed com.ibm.java.jdk.v8_8.0.6015.20200725_0800 to the
/opt/IBM/WebSphere/AppServer directory.
Installed com.ibm.sklm41.linux_4.1.0.00 to the /opt/IBM/SKLMV41 directory.
CRIMA1137W WARNING: The following packages do not support the 64-bit version of
Installation Manager that you are using: IBM Db2 SKLM41 version 11.5.4.0, IBM
Security Guardium Key Lifecycle Manager version 4.1.0.0. If you continue, you
might have issues with installation and deployment. For information about 64-bit
mode support for a package, see the package documentation.

Explanation: The 64-bit version of Installation Manager checks each package for
64-bit support. If a package does not support the 64-bit version, you receive a
warning.

User Action: Use a 32-bit version of Installation Manager to install the package.
Installation process is complete. Please look into Installation Manager logs for
details.
[root@sklm41ga1 disk1]#

20 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Installation_te.fm

Example 2-28 Installation Console Output - Pre-request not met


[root@testGKLM411 disk1]# ./silent_install.sh SKLM_Silent_Linux_Resp.xml
-acceptLicense
No preinstalled IBM Installation Manager found on the system.
Installing IBM Security Guardium Key Lifecycle Manager v4.1.0
Fri May 14 02:44:36 PDT 2021 - SKLM Prerequisite check started.
Db2 pre-requisite check - PASSED.
Checking required shell - PASSED
Checking required memory - PASSED
Checking executable permissions - PASSED
Checking kernel parameters - WARNING
Checking SELinux - PASSED
Checking CPU speed - PASSED
Fri May 14 02:44:37 PDT 2021 - SKLM Prerequisite check - PASSED with WARNING.
The Prerequisite check passed with one or more warnings. Review the warning
details in /tmp/SKLMPrereqCheck.log. Press any key to continue.

6. For verification of a successful installation, refer to “Verifying successful installation” on


page 13.

2.5 Installing fix pack for IBM Security Guardium Key Lifecycle
Manager Traditional Edition
The IBM Fix Central website provides fixes and updates for the software, hardware, and
operating system. IBM Security Guardium Key Lifecycle Manager fix packs are published at
the IBM Fix Central.

The following section covers steps to install fix pack FP0001 over IBM Security Guardium Key
Lifecycle Manager V4.1.0.0. Back up the current WebSphere Application Server and IBM
Security Guardium Key Lifecycle Manager configuration before installing the fix pack. The
backup and restore operation for the IBM Security Guardium Key Lifecycle Manager
configuration is covered in Chapter 5.2, “Backing up and restoring IBM Security Guardium
Key Lifecycle Manager” on page 68.

To install the fix pack for IBM Security Guardium Key Lifecycle Manager, complete the
following steps:
1. Back up the WebSphere Application Server files as shown in Example 2-29.

Example 2-29 Backing up the WebSphere Application Server files


C:\>cd "\Program Files\IBM\WebSphere\"
C:\Program Files\IBM\WebSphere>AppServer\bin\stopServer.bat server1
ADMU0116I: Tool information is being logged in file C:\Program

Files\IBM\WebSphere\AppServer\profiles\KLMProfile\logs\server1\stopServer.log
ADMU7702I: Because server1 is registered to run as a Windows Service, the
request to stop this server will be completed by stopping the
associated Windows Service.
ADMU0116I: Tool information is being logged in file C:\Program

Files\IBM\WebSphere\AppServer\profiles\KLMProfile\logs\server1\stopServer.log
ADMU0128I: Starting tool with the KLMProfile profile

Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 21
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm

ADMU3100I: Reading configuration for server: server1


ADMU3201I: Server stop request issued. Waiting for stop status.
ADMU4000I: Server server1 stop completed.

C:\Program Files\IBM\WebSphere>AppServer\java\8.0\bin\jar -cvfM AppServer.zip


AppServer

NOTE: It will take sometime to create compressed file using above command.

C:\Program Files\IBM\WebSphere>AppServer\bin\startServer.bat server1


ADMU0116I: Tool information is being logged in file C:\Program

Files\IBM\WebSphere\AppServer\profiles\KLMProfile\logs\server1\startServer.log
ADMU7701I: Because server1 is registered to run as a Windows Service, the
request to start this server will be completed by starting the
associated Windows Service.
ADMU0116I: Tool information is being logged in file C:\Program

Files\IBM\WebSphere\AppServer\profiles\KLMProfile\logs\server1\startServer.log
ADMU0128I: Starting tool with the KLMProfile profile
ADMU3100I: Reading configuration for server: server1
ADMU3200I: Server launched. Waiting for initialization status.
ADMU3000I: Server server1 open for e-business; process id is 4572

2. Create the C:\sklminstall_fp directory, transfer the fix pack package downloaded from
IBM Fix Central to the folder. Extract the fix pack package and run the updateSKLM.bat
script to start the update wizard (the script requires executable permission), as shown in
Example 2-30.

Example 2-30 Preparing for the fix pack installation


C:\sklminstall_fp>dir
Volume in drive C has no label.
Volume Serial Number is 62B7-12D0

Directory of C:\sklminstall_fp

05/10/2021 07:20 AM <DIR> .


05/10/2021 07:20 AM <DIR> ..
03/26/2021 08:52 AM 4,760 silent_updateSKLM.bat
03/26/2021 08:52 AM <DIR> sklm
03/26/2021 08:52 AM 842 SKLM_Uninstall_Win_Resp.xml
03/26/2021 08:52 AM 4,719 updateSKLM.bat
03/26/2021 08:52 AM 382 updateSKLM.xml
4 File(s) 10,703 bytes
3 Dir(s) 210,361,110,528 bytes free

C:\sklminstall_fp>updateSKLM.bat "C:\Program Files\IBM\Installation Manager"


"C:\Program Files\IBM\WebSphere\AppServer" wasadmin wasadmin_password
Adding service
About to install FixPack...
Stopping SKLM Server...
"C:\Program Files\IBM\WebSphere\AppServer"\bin\stopServer.bat server1 -profileName
KLMProfile -username wasadmin -password *****
ADMU0116I: Tool information is being logged in file C:\Program

22 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Installation_te.fm

Files\IBM\WebSphere\AppServer\profiles\KLMProfile\logs\server1\stopServer.log
ADMU0128I: Starting tool with the KLMProfile profile
ADMU3100I: Reading configuration for server: server1
ADMU3201I: Server stop request issued. Waiting for stop status.
ADMU4000I: Server server1 stop completed.

Launching InstallManager...
"C:\Program Files\IBM\Installation Manager"\eclipse\IBMIM.exe -input
C:\sklminstall_fp/updateSKLM.xml

3. The wizard identifies the current installed version and fix pack level. Select IBM Security
Guardium Key Lifecycle Manager V4.1.0 and click Next to continue, as shown in
Figure 2-20 on page 23.

Figure 2-20 Package group to be updated

4. Select the fix pack to be installed and click Next to continue, as shown in Figure 2-21.

Figure 2-21 Fix pack to be installed

Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 23
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm

5. Review and accept the terms in the license agreement and click Next to continue, as
shown in Figure 2-22.

Figure 2-22 License agreements

24 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Installation_te.fm

6. Select the features to be installed and click Next to continue, as shown in Figure 2-23.

Figure 2-23 Features to be installed

7. Provide the passwords for the wasadmin, SKLMadmin, and sklmdb41 accounts, click
Validate Credentials, as shown in Figure 2-24.

Figure 2-24 Validate Credentials window

8. When provided passwords are validated successfully, Next button will become active.
Click Next to continue, as shown in Figure 2-25.
.

Figure 2-25 Validate Credentials window

Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation 25
8472_ch_Installation_te.fm Draft Document for Review June 11, 2021 12:08 pm

9. Confirm the installation details and click Update to install the fix pack, as shown in
Figure 2-26.

Figure 2-26 Pre-Installation details

10.After a successful installation, review the installation summary and click Finish to exit the
wizard, as shown in Figure 2-27.

Figure 2-27 Fixpack installation successful

11.Login to the IBM Security Guardium Key Lifecycle Manager GUI and click the question
mark in the upper right corner, then select About to verify the installed software details, as
shown in Figure 2-28.

Figure 2-28 IBM Security Guardium Key Lifecycle Manager version info

26 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 14, 2021 5:30 pm 8472_ch_Installation_ce.fm

Chapter 3. IBM Security Guardium Key


Lifecycle Manager Container
Edition installation
This chapter describes the tasks that are associated with the initial installation of IBM Security
Guardium Key Lifecycle Manager v4.1.0.1 for Container Edition (CE) and installing fix packs.

This chapter covers the following topics:


򐂰 Pre-requisite
򐂰 Installing IBM Security Guardium Key Lifecycle Manager on Red Hat OpenShift
򐂰 Installing IBM Security Guardium Key Lifecycle Manager Container Edition on Kubernetes
򐂰 Installing IBM Security Guardium Key Lifecycle Manager Container Edition on IBM Z/OS
Container Extensions (zCX)

© Copyright IBM Corp. 2021. All rights reserved. 27


8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm

3.1 Pre-requisite
Before you begin the deployment of IBM Security Guardium Key Lifecycle Manager in a
Red Hat OpenShift Container platform you need to complete below given steps.
1. Obtain the container installation files (eImages) and license activation file.
a. Obtain the container installation files (eImages) and license activation file for IBM
Security Guardium Key Lifecycle Manager container from IBM Passport Advantage.
User should download following files:
License File - SGKLM_4.1_CONTAINER_LICENSE_MP.zip
Container image for x86-64 platform - SGKLM_4.1_CONTAINER_LIC_LN64_BIT.tar

Tip: You can avoid downloading the container installation files if you plan to pull the
container image directly from the Docker Hub repository.

b. Extract the container installation files and openshift-helm.zip / k8s-helm.zip file to a


local repository directory. You need to provide the location of this directory in the
values.yaml file in the chart.
2. Install IBM License Service.
a. Install the IBM License Service. For instructions, see the relevant section in
https://ibm.biz/license_service4containers.
b. Verify the installation by running the commands, as shown in Example 3-1. Note down
the host, port, and service token values from the command output to be updated in the
Helm charts file.

Example 3-1 Commands to verify license server


Red Hat OpenShift commands
# oc get pods --namespace ibm-common-services
# oc get service --namespace ibm-common-services
# oc get secret ibm-licensing-token -o jsonpath={.data.token} -n
ibm-common-services | base64 -d

Kubernetes commands
# kubectl get pods --namespace ibm-common-services
# kubectl get service --namespace ibm-common-services
# kubectl get secret ibm-licensing-token -o jsonpath={.data.token} -n
ibm-common-services | base64 -d

c. Update the following parameters in the values.yaml bundled with sample Helm charts
(openShift-helm.zip / k8s-helm.zip), as shown in Example 3-2.

Example 3-2 Parameter to be updated in values.yaml


config:
sklmapp_license:
license_service_host
license_service_port
secret:
license_service_token

28 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 14, 2021 5:30 pm 8472_ch_Installation_ce.fm

3.2 Installing IBM Security Guardium Key Lifecycle Manager on


Red Hat OpenShift
To install IBM Security Guardium Key Lifecycle Manager on Red Hat OpenShift, complete the
following steps.
1. Install a Red Hat OpenShift Container Platform cluster.
a. Obtain Red Hat OpenShift Container Platform Version 4.2 or later.
b. Review the minimum system requirements. For more information, see the Support
Matrix.
c. Install an OpenShift Container Platform cluster, and ensure that it is up and running.
For more details see Red Hat Openshift Documentation.
d. Configure the Persistent Volume Storage.
2. Obtain the Red Hat OpenShift Command line (CLI) tool.
Obtain the oc command line tool as per the version of Red Hat OpenShift container
platform and your operating system. For instructions, see Getting started CLI.
3. Obtain the Helm charts.
Install Helm Version 2.17.0 on the system from which you will access the cluster. For more
information, see Helm Install.

3.2.1 Installing IBM Security Guardium Key Lifecycle Manager Container


Edition on Red Hat OpenShift with PostgreSQL
IBM Security Guardium Key Lifecycle Manager container installation on Red Hat OpenShift
with PostgreSQL is done with following steps. Make sure the PostgreSQL database is
deployed and postgreSQL pods are running.
1. Obtain the login token.
a. Log in to the Red Hat OpenShift Container Platform with kubeadmin credentials, as
shown in Figure 3-1 on page 29.

Figure 3-1 Login to OCP cluster

Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 29
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm

b. Click Copy Login Command option, as shown in Figure 3-2.

Figure 3-2 Copy Login Command

c. Click Display Token link as shown in Figure 3-3.

Figure 3-3 Display Token link

d. Copy the Login command that is displayed under Log in with this token section as
shown in Figure 3-4.

Figure 3-4 Login command

e. Use the copied command to login to the OCP server by using the command line tool
(oc), as shown in Example 3-3.

Example 3-3 Login to OpenShift Container Platform cluster with OC command line tool
oc login --token=sha256~za6Se4Lpj5YI7-lIkt2n_APVHqH7sE_i2NoQV4nQXhY
--server=https://api.xgklmocp.cp.fyre.ibm.com:6443
Logged into "https://api.xgklmocp.cp.fyre.ibm.com:6443" as "kube:admin" using the
token provided.

You have access to 60 projects, the list has been suppressed. You can list all
projects with 'oc projects'

Using project "sklm".

30 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 14, 2021 5:30 pm 8472_ch_Installation_ce.fm

2. Navigate to the openshift-helm directory and apply the Security Context Constraint (SCC)
with the following command, as shown in Example 3-4.

Example 3-4 Apply WebSphere Liberty security context


c:\>oc apply -f liberty_scc.yaml
securitycontextconstraints.security.openshift.io/ibm-websphere-scc configured

3. Create the WebSphere service account and bind the ibm-websphere-scc to the
namespace (project) sklm, as shown in Example 3-5.

Example 3-5 Create WebSphere service account


c:\>oc create serviceaccount websphere -namespace sklm
serviceaccount/websphere created

c:\>oc adm policy add-scc-to-user ibm-websphere-scc -z websphere -namespace sklm


securitycontextconstraints.security.openshift.io/ibm-websphere-scc added to:
["system:serviceaccount:sklm:websphere"]

4. Update the values.yaml file and modify the parameter values in the file as per your
requirement.
5. Run the helm install command, as shown in Example 3-6.

Example 3-6 Helm install command


c:\>helm install sklmapp sklmapp
NAME: sklmapp
LAST DEPLOYED: Sat May 8 12:48:00 2021
NAMESPACE: sklm
STATUS: deployed
REVISION: 1
TEST SUITE: None

6. Verify the installation.


a. Log in to the Red Hat OpenShift Container Platform.
b. In the left pane, expand Workloads -> Pods, a new pod for the application is created
with the status as Running, as shown in Figure 3-5.

Figure 3-5 GKLM Installation Verification

Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 31
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm

7. To access the application, create a route.


a. In the left pane, expand Networking -> Routes, and click Create Route, as shown in
Figure 3-6 on page 32.

Figure 3-6 Create Route

b. Provide the appropriate values for route Name e.g. sklm-route, as shown in Figure 3-7.

Figure 3-7 Specify Route Name

c. Select the Service, Target Port, Security as enabled and TLS_Termination as


Passthrough, as shown in Figure 3-8.

32 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 14, 2021 5:30 pm 8472_ch_Installation_ce.fm

Figure 3-8 Specify Route details

d. Specify the Insecure Traffic as Redirect and click Create, as shown in Figure 3-9.

Figure 3-9 Specify Insecure Traffic mode for Route

3.2.2 Activate the license and login to IBM Security Guardium Key Lifecycle
Manager
1. Launch Web Browser.
2. Log in to IBM Security Guardium Key Lifecycle Manager by going to the following URL and
using SKLMAdmin user and password set during the installation.
https://<ip address/hostname>:<port>/ibm/SKLM/login.jsp

Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 33
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm

Note: Use the port number in above URL which is mapped in Route details, as shown
in Figure 3-8 on page 33.

3. On the Configuration page that appears, select the I accept the terms in the License
Agreements, as shown in Figure 3-10.

Figure 3-10 License Activation Page

4. Click Activate License, upload the IBM Security Guardium Key Lifecycle Manager license
activation file from the local file-system, as shown in Figure 3-11.

Figure 3-11 Upload license file

Note: You must download the license activation file from IBM Passport Advantage Site as
described in Step 4a under Chapter 3.2, “Installing IBM Security Guardium Key Lifecycle
Manager on Red Hat OpenShift” on page 29.

34 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 14, 2021 5:30 pm 8472_ch_Installation_ce.fm

5. Once you upload the license file it will show the success message, as shown in
Figure 3-12.

Figure 3-12 License upload success message

6. Click Close. This will re-direct the user back to Login page as shown in Figure 3-13.

Figure 3-13 Login to IBM Security Guardium Key Lifecycle Manager

7. Login to the IBM Security Guardium Key Lifecycle Manager graphical user interface with
SKLMAdmin user and verify that license is activated. Once license is activated, user will see
the GKLM welcome page, as shown in Figure 3-14 on page 35.

Figure 3-14 Welcome page after license activation

Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 35
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm

3.2.3 Installing IBM Security Guardium Key Lifecycle Manager Container


Edition on Red Hat OpenShift with Db2U
The IBM Security Guardium Key Lifecycle Manager can also be installed with IBM Db2
container version, Db2U. The installation steps with Db2U are imilar to installing with
PostgreSQL. For more details on how to install Db2U, see Deploying Db2U on OpenShift
Cluster Platform.

Once you are done with the Db2U installation, run the following command to get port details,
as shown in Example 3-7.

Example 3-7 Get the Db2U Services Details


oc get svc
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S)
AGE
db2u-release-1-db2u ClusterIP 172.30.70.176 <none>
50000/TCP,50001/TCP,25000/TCP,25001/TCP,25002/TCP,25003/TCP,25004/TCP,25005/TCP
29m
db2u-release-1-db2u-engn-svc NodePort 172.30.43.152 <none>
50000:30654/TCP,50001:30363/TCP
29m
db2u-release-1-db2u-internal ClusterIP None <none>
50000/TCP,9443/TCP
29m
db2u-release-1-db2u-ldap ClusterIP 172.30.179.248 <none>
50389/TCP
29m
db2u-release-1-db2u-rest-svc NodePort 172.30.13.126 <none>
50050:30430/TCP
29m
db2u-release-1-etcd ClusterIP None <none>
2380/TCP,2379/TCP
29m

Update the details of Db2 database in values.yaml (Openshift-helm.zip) as follow:


򐂰 sklmdb_host and sklmdb_port from service db2u-release-1-db2u-engn-svc with
172.30.43.152 and 30654 respectively.
򐂰 sklmdb_type should be db2
򐂰 If you have not mentioned db username and db name during Db2U installation, then
default values should be mentioned for sklmdb_username and sklmdb_name as
db2inst1 and bludb respectively.

3.2.4 Exposing non-HTTP Port in Red Hat OpenShift Installation


When you deploy the IBM Security Guardium Key Lifecycle Manager on Red Hat OpenShift,
with route definition, you can access the application with HTTP ports only. To access the
application with non-HTTP port (IPP, KMIP), you need to make some configuration settings.
Follow below steps to configure route for IPP and KMIP ports.
1. Define the routes for other ports (IPP, KMIP) as mentioned in Installing IBM Security
Guardium Key Lifecycle Manager Container Edition on Red Hat OpenShift with
PostgreSQL with details, as shown in Example 3-8.

36 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 14, 2021 5:30 pm 8472_ch_Installation_ce.fm

Example 3-8 Route details


Route Name - IPP-route
Service - sklm
Target Port - 3801
Security - Secure route checked
TLS Termination - Passthrough
Insecure Traffic - Redirect

Route Name - IPP-secure-route


Service - sklm
Target Port - 1441
Security - Secure route checked
TLS Termination - Passthrough
Insecure Traffic - Redirect

Route Name - KMIP-route


Service - sklm
Target Port - 5696
Security - Secure route checked
TLS Termination - Passthrough
Insecure Traffic - Redirect

2. Login to the infrastructure system with root credentials.

Note: The infrastructure node has public IP and the details of which are provided with
the OpenShift cluster creation

3. Open the haproxy.cfg file with vi or similar editor, as shown in Example 3-9.

Example 3-9 Open haproxy.cfg


#cd /etc/haproxy
#vi haproxy.cfg

4. Update the file with entries for each route defined for IPP and KMIP ports, as shown in
Example 3-10 and save the changes.

Note: Depending on the OpenShift cluster configuration, the number of Master and
Worker nodes varies. You need to replace all Master and Worker nodes private ip for
backend entry in the given example.

Example 3-10 Update with route entries


frontend IPP-route
bind *:33801
default_backend IPP-route
mode tcp
option tcplog

backend IPP-route
balance source
mode tcp
server worker0 10.17.91.228:33801 check
server worker1 10.17.94.243:33801 check
server worker2 10.17.95.61:33801 check

Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 37
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm

frontend IPP-secure-route
bind *:31441
default_backend IPP-secure-route
mode tcp
option tcplog

backend IPP-secure-route
balance source
mode tcp
server worker0 10.17.91.228:31441 check
server worker1 10.17.94.243:31441 check
server worker2 10.17.95.61:31441 check

frontend KMIP-route
bind *:35696
default_backend IKMIP-route
mode tcp
option tcplog

backend KMIP-route
balance source
mode tcp
server worker0 10.17.91.228:35696 check
server worker1 10.17.94.243:35696 check
server worker2 10.17.95.61:35696 check

5. Restart the haproxy service, as shown in Example 3-11.

Example 3-11 Restart haproxy


#systemctl restart haproxy

3.2.5 Installing IBM Security Guardium Key Lifecycle Manager Container


Edition as Fix Pack on Red Hat OpenShift
If you have already installed IBM Security Guardium Key Lifecycle Manager v4.1 and
planning to install v4.1.0.1, follow the steps given below:
1. Update the values.yaml in the Helm chart (Openshift-helm.zip) with build tag for the
newer version, specifcally 4.1.0.1.
2. Run the helm upgrade command to update the build with two parameters release name
and chart name (for example: sklmapp) as shown in Example 3-12.

Example 3-12 Helm upgrade command


helm upgrade sklmapp sklmapp
Release "sklmapp" has been upgraded. Happy Helming!
NAME: sklmapp
LAST DEPLOYED: Sun May 9 15:48:58 2021
NAMESPACE: sklmdb2
STATUS: deployed
REVISION: 2
TEST SUITE: None

38 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 14, 2021 5:30 pm 8472_ch_Installation_ce.fm

3. Verify the upgrade of deployment with helm list command, as shown in Example 3-13, the
REVISION show updated value ( 2, in our example).

Example 3-13 Helm list command


c:\>helm list -a
NAME NAMESPACE REVISION UPDATED
STATUS CHART APP VERSION
sklmapp sklmdb2 2 2021-05-09 15:48:58.5430135 +0530 IST
deployed sklmapp-1.1.0 4.1

3.2.6 Troubleshooting in Red Hat OpenShift


If you face any issue during deployment of IBM Security Guardium Key Lifecycle Manager in
Red Hat OpenShift, the following commands will help in identify the issue.
򐂰 List Pods
This command helps to list pod created by GKLM deployment which gives details like
Type, Cluster-IP, Port as shown in .Example 3-14.

Example 3-14 List pod command for OpenShift

#oc get pod | grep sklm

NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S)


AGE

sklmapp NodePort 172.30.116.64 <none>


9443:31443/TCP,1441:31441/TCP,5696:31696/TCP,3801:31801/TCP,1111:32331/TCP,2222:30
123/TCP 19h

򐂰 Describe Pod
This command helps to get the details of a particular pod, (mentioned the pod-id obtained
by above command oc get pod). This command gives the complete details of the pod
right from the pod creation as shown in Example 3-15.

Example 3-15 Describe pod command for OpenShift

#oc describe pod sklmapp

򐂰 Get Service Details


This command helps to get the service details defined by GKLM deployment, it also shows
the details like Nodeport, ClusterIP, mapped host ports as shown in Example 3-16.

Example 3-16 Get service details command for OpenShift

#oc get svc


NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S)
AGE
db2-db2u ClusterIP 172.30.174.140 <none>
50000/TCP,50001/TCP,25000/TCP,25001/TCP,25002/TCP,25003/TCP,25004/TCP,25005/TCP
19h

Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 39
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm

db2-db2u-engn-svc NodePort 172.30.113.104 <none>


50000:31653/TCP,50001:32706/TCP
19h
db2-db2u-internal ClusterIP None <none> 50000/TCP,9443/TCP
19h
db2-db2u-ldap ClusterIP 172.30.4.204 <none> 50389/TCP
19h
db2-db2u-rest-svc NodePort 172.30.245.77 <none> 50050:31974/TCP
19h
db2-etcd ClusterIP None <none> 2380/TCP,2379/TCP
19h
sklmapp NodePort 172.30.116.64 <none>
9443:31443/TCP,1441:31441/TCP,5696:31696/TCP,3801:31801/TCP,1111:32331/TCP,2222
:30123/TCP 19h

򐂰 Pod Logs
This command helps viewing the pod logs during deployment of GKLM, so that you can
identify the root cause of deployment as shown in Example 3-17.

Example 3-17 Pod logs command for OpenShift

#oc logs -f sklmapp-5c8d548c64-kh7rw

3.3 Installing IBM Security Guardium Key Lifecycle Manager


Container Edition on Kubernetes
Before installing the IBM Security Guardium Key Lifecycle Manager on Kubernetes cluster,
make sure that you have completed the steps given in “Pre-requisite” on page 28 and then
perform the following tasks:
1. Prepare the Kubernetes cluster
Set up a Kubernetes cluster. You can use Version 1.17 or later. For more information, see
https://kubernetes.io/docs/setup/.
2. Obtain the Helm charts
Install Helm Version 3.4.0 on the system from which you will access the Kubernetes
cluster. For more information, see https://helm.sh/docs/intro/install/.
3. Create storage class for persistent storage
Create a storage class for persistent storage of the database and the IBM Security
Guardium Key Lifecycle Manager application data. For more information, see
https://kubernetes.io/docs/concepts/storage/storage-classes/.

3.3.1 Installing IBM Security Guardium Key Lifecycle Manager on Kubernetes


Complete the following steps on the system on which you installed Helm:
1. Extract the k8s-helm.zip file.
2. In the directory where you extracted the files, navigate to k8s-helm -> sklm directory.

40 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 14, 2021 5:30 pm 8472_ch_Installation_ce.fm

3. Open the values.yaml file and modify the parameter values in the file as per your
requirement. The file has information about the mandatory parameters to be updated and
description of all the parameters.
4. Navigate to k8s-helm directory and run the command as shown in Example 3-18 with
name and chartname as sklm and sklm respectively.

Example 3-18 Helm install command


# helm install sklm sklm
NAME: sklm
LAST DEPLOYED: Sun May 9 16:45:14 2021
NAMESPACE: default
STATUS: deployed
REVISION: 1
TEST SUITE: None

5. Run the command as shown in Example 3-19 to know the available node port assigned to
service.

Example 3-19 Get service details


# kubectl get svc
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S)
AGE
kubernetes ClusterIP 10.233.0.1 <none> 443/TCP
142d
postgressqldb NodePort 10.233.24.187 <none> 5432:32432/TCP
4m49s
sklmapp NodePort 10.233.39.88 <none>
9443:30443/TCP,1441:31441/TCP,5696:32696/TCP,3801:31801/TCP,1111:31111/TCP,2222:32
222/TCP 4m49s

6. Launch the IBM Security Guardium Key Lifecycle Manager graphical user interface with
following url:
https://master_server_IP_address:port/ibm/SKLM/login.jsp
Where,
master_server_IP_address is the IP address of the master server on the Kubernetes
cluster.
port is the node port of sklmapp service, 30443 in this case.
7. To activate the license and verify the login. See “Activate the license and login to IBM
Security Guardium Key Lifecycle Manager” on page 33.

3.3.2 Installing IBM Security Guardium Key Lifecycle Manager Container


Edition as Fix Pack on Kubernetes
If you already have installed IBM Security Guardium Key Lifecycle Manager v4.1 and are
planning to update with IBM Security Guardium Key Lifecycle Manager v4.1.0.1 on top of it,
perform the following steps.
1. Update the values.yaml with build tag (4.1.0.1, in our case).
2. Run the helm command to update the build with two parameters release name and chart
name (sklm here), as shown in Example 3-20.

Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 41
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm

Example 3-20 Helm upgrade command


# helm upgrade sklm sklm
Release "sklm" has been upgraded. Happy Helming!
NAME: sklm
LAST DEPLOYED: Sun May 9 17:14:36 2021
NAMESPACE: default
STATUS: deployed
REVISION: 2
TEST SUITE: None

3. Verify the upgrade with helm list command, the revision column shows the updated value,
as can be seen in Example 3-21.

Example 3-21 Verify helm update


# helm list -a
NAME NAMESPACE REVISION UPDATED
STATUS CHART APP VERSION
sklm default 2 2021-05-09 17:14:36.432063241
+0530 IST deployed sklm-0.1.0 4.1
sklmnfsrelease default 1 2020-12-22 15:06:09.246916985
+0530 IST deployed nfs-client-provisioner-1.2.93.1.0

3.3.3 Troubleshooting in Kubernetes environment


If you face any issue during deployment of IBM Security Guardium Key Lifecycle Manager in
the Kubernetes cluster, the following commands can be helpful to identify the issue.
򐂰 List Pods
This command helps to get pod details such as status (Running, Exited), Readiness (1/1)
as shown in Example 3-22.

Example 3-22 List pod command for Kubernetes

#kubectl get pods


NAME READY STATUS RESTARTS
AGE
postgressqldb-78fbf89b68-t4bn2 1/1 Running 0
51m
sklmapp-fdfc6cd6c-pgjdk 1/1 Running 3
51m
sklmnfsrelease-nfs-client-provisioner-797fc84478-thfxf 1/1 Running 81
138d

򐂰 Describe Pod
This command helps to get the details of the pod from the time the pod is being created as
shown in Example 3-23.

Example 3-23 Describe pod command for Kubernetes

#kubectl describe pod sklmapp-fdfc6cd6c-pgjdk

42 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 14, 2021 5:30 pm 8472_ch_Installation_ce.fm

򐂰 Pod Logs
This command helps to get the logs for GKLM pod during deployment. The pod id is
obtained from the kubectl get pods command as shown in Example 3-24.

Example 3-24 Pod logs command for Kubernetes

# kubectl logs -f sklmapp-fdfc6cd6c-pgjdk

򐂰 Get Service Details


This command helps to get the service details defined by GKLM deployment. It also
shows details such as Nodeport, ClusterIP, mapped host ports as shown in Example 3-25.

Example 3-25 Get service details command for Kubernetes

# kubectl get svc


NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S)
AGE
kubernetes ClusterIP 10.233.0.1 <none> 443/TCP
142d
postgressqldb NodePort 10.233.24.187 <none> 5432:32432/TCP
4m49s
sklmapp NodePort 10.233.39.88 <none>
9443:30443/TCP,1441:31441/TCP,5696:32696/TCP,3801:31801/TCP,1111:31111/TCP,2
222:32222/TCP 4m49s

3.4 Installing IBM Security Guardium Key Lifecycle Manager


Container Edition on IBM Z/OS Container Extensions (zCX)
You can install IBM Security Guardium Key Lifecycle Manager on IBM zCX environment with
Db2 for z/OS® or PostgreSQL database.

3.4.1 Installing IBM Security Guardium Key Lifecycle Manager on zCX with
PostgreSQL
To install the IBM Security Guardium Key Lifecycle Manager on zCX environment with
PostgreSQL, perform the following tasks.
1. Install the PostgreSQL database with a docker command as shown in Example 3-26.

Example 3-26 Docker command for PostgreSQL


docker run -itd -v gklmpostgresvolume:/var/lib/postgresql/data -e
POSTGRES_PASSWORD=GKLM@postgres -e POSTGRES_USER=gklmdb41 -e POSTGRES_DB=gklmdb41
-p 5432:5432 --restart always postgres

2. Create an environment variable list file (gklmenvz.txt) with the parameters, as shown in
Example 3-27 for the IBM Security Guardium Key Lifecycle Manager container.

Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 43
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm

Example 3-27 Sample gklmevnz.txt


DB_TYPE=postgres
DB_NAME=gklmdb41
DB_USER=gklmdb41
DB_PASSWORD=GKLM@postgres
DB_HOST=9.x.x.x
DB_PORT=5432
LICENSE=accept
SKLM_SEED=68d95f0081f1dbfc0b06de9b0916df1c
SKLMADMIN_USERNAME=sklmadmin
SKLMADMIN_PASSWORD=change@Me123

3. Install the IBM Security Guardium Key Lifecycle Manager container as shown in
Example 3-28.

Example 3-28 Docker run command for GKLM Container


docker run --name gklmapp -itd -p 9443:9443 -p 3801:3801 -p 5696:5696 -p 1441:1441
--env-file=gklmenvz.txt -v gklmAppVolume:/opt/ibm/wlp/usr/products --restart
always ibmcom/sklm:4.1.0.1

4. Launch the IBM Security Guardium Key Lifecycle Manager graphical user interface with
following URL.
https://IP_address/Hostname:port/ibm/SKLM/login.jsp
Where,
IP_address/Hostname is the IP address or FQDN of the IBM Security Guardium Key
Lifecycle Manager server.
port is the port number that IBM Security Guardium Key Lifecycle Manager server listens
on for requests.
5. To activate the license and verify the login, see “Activate the license and login to IBM
Security Guardium Key Lifecycle Manager” on page 33.

3.4.2 Installing IBM Security Guardium Key Lifecycle Manager with Db2 for
z/OS
To install the IBM Security Guardium Key Lifecycle Manager on zCX environment with Db2 for
z/OS, perform the following tasks.
1. Install Db2 for z/OS. For more information, see Installing or migrating to Db2.
2. Create a database, using the parameter values, as shown in Example 3-29.

Example 3-29 Database variable


DB_USER=gklmdb41
DB_NAME=gklmdb41

Note: Make sure the Db2 user has appropriate permission to create tablespace, tables

3. Obtain the container installation files (eImages) and license activation file for IBM Security
Guardium Key Lifecycle Manager and for Db2 for z/OS (db2jcc_license_cisuz.jar).

44 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 14, 2021 5:30 pm 8472_ch_Installation_ce.fm

Note: db2jcc_license_cisuz.jar file is used by the Guardium Key Lifecycle Manager


container to connect to the Db2 for z/OS database.

4. Create a file (Dockerfile) with the content and save the file in the same directory where
you saved the license file for Db2 for z/OS (db2jcc_license_cisuz.jar) on the host
system, as shown in Example 3-30.

Example 3-30 Sample Dockerfile


# Extend from SKLM Application Repository
ARG LATEST_IMAGE
FROM ${LATEST_IMAGE}
ARG DB2_LICENSE_FILE=${DB2_LICENSE_FILE}

#Copy license file to SKLM


COPY $DB2_LICENSE_FILE /opt/ibm/wlp/usr/sklm/custom

# Set Environment variable


ENV DB2_LICENSE_FILE=$DB2_LICENSE_FILE

5. Log in to the host system and navigate to the directory where you saved the eImage,
license, and Docker files, as shown in Example 3-31.

Example 3-31 Connect to z/CX system


# ssh -p 8022 <user-name>@<zCX-IP-Address>
# cd /GKLM/

6. Extract the Docker image of the Guardium Key Lifecycle Manager application from the
image file, as shown in Example 3-32 on page 45.

Example 3-32 Docker image load command


#docker load -i GKLM_4.1.0.1_CONTAINER_FOR_ZCX.tar

7. Verify the docker image is listed in local repository, as shown in Example 3-33.

Example 3-33 Docker image list command


# docker images
REPOSITORY TAG IMAGE ID CREATED SIZE
sklm Rel_4101.S390X d101350128d8 1 hour ago 1.02GB

8. Build the Docker image of the Guardium Key Lifecycle Manager application by using the
Docker file to include the Db2 license file, as shown in Example 3-34.

Example 3-34 Build docker image with zOS Db2 license


#docker build -t gklmzos --build-arg LATEST_IMAGE=sklm:Rel_4101.s390x --build-arg
DB2_LICENSE_FILE=db2jcc_license_cisuz.jar --no-cache .

Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 45
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm

9. Create an environment variable list file (gklmenvz.txt) with the parameters, as shown in
Example 3-35 for the IBM Security Guardium Key Lifecycle Manager container.

Example 3-35 Sample gklmenvz.txt


DB_TYPE=zos_db2
DB_NAME=gklmdb41
DB_USER=gklmdb41
DB_PASSWORD=xxxxx
DB_HOST=9.x.x.x
DB_PORT=446
LICENSE=accept
SKLM_SEED=68d95f0081f1dbfc0b06de9b0916df1c
SKLMADMIN_USERNAME=sklmadmin
SKLMADMIN_PASSWORD=adminpassword

10.Run the IBM Security Guardium Key Lifecycle Manager Docker container, as shown in
Example 3-36.

Example 3-36 Docker run command for GKLM Container


docker run --name gklmapp -itd -p 9443:9443 -p 3801:3801 -p 5696:5696 -p 1441:1441
--env-file=sklmenvz.txt -v gklmAppVolume:/opt/ibm/wlp/usr/products gklmzos

11.Launch the IBM Security Guardium Key Lifecycle Manager graphical user interface with
below URL.
https://IP_address/hostname:port/ibm/SKLM/login.jsp

Where,
IP_address/hostname is the IP address or FQDN of the IBM Security Guardium Key
Lifecycle Manager server.
Port is the port number that IBM Security Guardium Key Lifecycle Manager server listens
on for requests.
12.To activate the license and verify the login, see “Activate the license and login to IBM
Security Guardium Key Lifecycle Manager” on page 33.

3.4.3 Installing IBM Security Guardium Key Lifecycle Manager Container


Edition as Fix Pack in z/CX Environment
If you already have installed IBM Security Guardium Key Lifecycle Manager v4.1 and
planning to update IBM Security Guardium Key Lifecycle Manager v4.1.0.1 on top of it,
perform the following tasks.
1. List all containers running with a docker command, as shown in Example 3-37.

Example 3-37 Docker list container command


#docker ps -a

2. Kill the GKLM Container without deleting the volume, as shown in Example 3-38.

Example 3-38 Docker kill command for GKLM container


#docker kill a36e51a24e0e
a36e51a24e0e

46 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 14, 2021 5:30 pm 8472_ch_Installation_ce.fm

3. Start the IBM Security Guardium Key Lifecycle Manager container pointing to same
volume with docker command, as shown in Example 3-39.

Example 3-39 Docker run command for GKLM container


docker run --name sklmapp -itd -p 9443:9443 -p 3801:3801 -p 5696:5696 -p 1441:1441
--env-file=sklmenvz.txt -v sklmAppVolume:/opt/ibm/wlp/usr/products --restart
always ibmcom/sklm:4.1.0.1

4. Once the IBM Security Guardium Key Lifecycle Manager container deployment is
successful, login to graphical user interface and verify the version.

Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation 47
8472_ch_Installation_ce.fm Draft Document for Review June 14, 2021 5:30 pm

48 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Migration.fm

Chapter 4. IBM Security Guardium Key


Lifecycle Manager Migration
This chapter describes the different options available and corresponding steps involved in
migrating the data from an older version of IBM Security Guardium Key Lifecycle Manager to
version 4.1.0.1. This process is applicable only for IBM Security Guardium Key Lifecycle
Manager Traditional Edition (TE).

This chapter covers the following topics:


򐂰 Migrating from an earlier version of IBM Security Key Lifecycle Manager
򐂰 Inline migration
򐂰 Cross migration

© Copyright IBM Corp. 2021. All rights reserved. 49


8472_ch_Migration.fm Draft Document for Review June 11, 2021 12:08 pm

4.1 Migrating from an earlier version of IBM Security Key


Lifecycle Manager
IBM Security Guardium Key Lifecycle Manager does not support direct upgrade of a
previously installed version to a newer version. However, it supports data migration using two
methods:
򐂰 Inline migration
When the host system of the target version is the same as the existing version, use inline
migration of data. In this case, a new copy of GKLM is installed on the same host machine
and data is copied from the GKLM instance of existing version to the GKLM instance of
the target version. Inline migration option is not available for fix-pack releases and is
available only for major and Mod releases. (Every Mod Release or a Fix Pack has a
specific naming convention. The format is V.R.M.F, which is Version. Release. Mod.
FixPack).
򐂰 Cross migration
When the host system of the target version is different than the host system of the existing
version, use cross migration approach for data migration. The existing version and target
version can be installed on host machines with different versions of operating system. e.g.
the existing version can be installed on windows operating system while the target version
can be installed on host machine with Linux operating system and vice-versa. IBM
Security Guardium Key Lifecycle Manager provides sample properties files that you can
use to cross migrate data. This is a preferable method for migration.

Supported migration paths and migration methods are shown in Figure 4-1.

Figure 4-1 Supported migration paths and methods

50 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Migration.fm

Note: Migration from IBM Tivoli® Key Lifecycle Manager and Encryption Key Manager
(EKM) is not covered in this section. For more information, see the following resources:
򐂰 Migrating from Encryption Key Manager
򐂰 Migrating from IBM Tivoli Key Lifecycle Manager

4.2 Inline migration


This section describes the tasks that are associated with inline migration for IBM Security Key
Lifecycle Manager V2.7.0.6 to Version 4.1.0.0. Complete the following steps:
1. Run the launchpad.sh script to start the installation wizard, and follow the installation
process that is described in Chapter 2, “IBM Security Guardium Key Lifecycle Manager
Traditional Edition installation” on page 5; up until Version 4.1.0.0 the installer detects the
existing version that is installed on the machine. Change the HTTPS WebSphere
Application Server (WAS) port from 9083 to 9087. Provide Credentials of the WAS user
and GKLM user of the previously installed and detected version, click Validate
Credentials, and then click Next, as shown in Figure 4-2.

Figure 4-2 Configuration details

2. Review the installation summary and click Install to install the product, as shown in
Figure 4-3 on page 52.

Chapter 4. IBM Security Guardium Key Lifecycle Manager Migration 51


8472_ch_Migration.fm Draft Document for Review June 11, 2021 12:08 pm

Figure 4-3 Installation summary

3. After a successful installation, select the None option and click Finish to exit the
installation wizard, as shown in Figure 4-4.

Figure 4-4 Installation Successful

52 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Migration.fm

4. Log on to the IBM Security Guardium Key Lifecycle Manager portal to confirm the version
and that the previous data is migrated, as shown in Figure 4-5.

Figure 4-5 Configuration and version details

5. You can now install fix pack, as shown in Chapter 2.5, “Installing fix pack for IBM Security
Guardium Key Lifecycle Manager Traditional Edition” on page 21.

4.3 Cross migration


Cross migration of data from source GKLM system to target system can be performed using
one of the following two approaches.
򐂰 Using backup and restore utility.
򐂰 Using regular backup taken from GKLM GUI. This feature is available for backup of
version 2.7 onwards.

4.3.1 Cross migration using backup and restore utility


This section describes the tasks that are associated with cross migration of data from IBM
Security Guardium Key Lifecycle Manager V3.0.0.0 to Version 4.1.0.1 using utility scripts.
Complete the following steps:
1. Find the migration utility on the server where IBM Security Guardium Key Lifecycle
Manager V4.1.0.1 is installed, as shown in Figure 4-6 on page 54.

Chapter 4. IBM Security Guardium Key Lifecycle Manager Migration 53


8472_ch_Migration.fm Draft Document for Review June 11, 2021 12:08 pm

Figure 4-6 Migration Utility

2. Transfer the corresponding version of the utility directory to the server where IBM Security
Key Lifecycle Manager V3.0.0.0 is installed (in this case, it is the sklmv30 directory), as
shown in Figure 4-7 on page 54.

Figure 4-7 Transfer migration utility to source system

3. Modify the backup.properties file to include the actual WAS_HOME, JAVA_HOME paths and
correct credentials for the sklmdb30(Db2 user for source system) and wasadmin accounts.
as shown in Example 4-1.

Example 4-1 Modifying the backup.properties file


[root@sklm sklmv30]# ls
additonal_backup.properties backup.properties backupV30.bat
com.ibm.sklm.server.migrate.sklmv30.jar restore.properties restoreV30.bat

54 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Migration.fm

additonal_restore.properties backupUsersRolesGroups.py backupV30.sh


readme.html restoreUserRolesGroups.py restoreV30.sh
[root@sklm sklmv30]#
[root@sklm sklmv30]# cat backup.properties
WAS_HOME=/opt/IBM/WebSphere/AppServer
JAVA_HOME=/opt/IBM/WebSphere/AppServer/java/8.0
BACKUP_PASSWORD=Change@Password123
DB_PASSWORD=Change@Password123
WAS_USER_PWD=Change@Password123
[root@sklm sklmv30]#

4. Run the backupV30.sh script to generate the cross-platform migration file. The migration
file is in the backup directory within the utility directory, as shown in Example 4-2.

Example 4-2 Generating the migration file


[root@sklm sklmv30]# chmod +x *.sh
[root@sklm sklmv30]# ./backupV30.sh
CURR_DIR=/backup_utilities/sklmv30/
Backup completed, please refer to backup.log for more details.
[root@sklm sklmv30]# ls backup/
backupStatus.properties sklm_v3.0.0.0_20210515035746-0700_migration_backup.jar
[root@sklm sklmv30]#

5. Transfer the migration file to the destination server where IBM Security Key Lifecycle
Manager V4.1.0.1 is installed, as shown in Figure 4-8.

Figure 4-8 Transfer backup file to destination

6. In the IBM Security Guardium Key Lifecycle Manager V4.1.0.1 modify the
restore.properties file to include the actual WAS_HOME, JAVA_HOME and RESTORE_FILE
paths and correct password for the Backup, Db2 user, and wasadmin accounts as shown
in Figure 4-9.
To be able to restore the user accounts along with their passwords from source GKLM
version to GKLM V4.1.0.1 set RESTORE_USER_ROLES=y. If the destination GKLM
system is configured with HSM, uncomment the line for parameter pkcs11.cfg and set its
value to point to the actual path of HSM configuration file.

Chapter 4. IBM Security Guardium Key Lifecycle Manager Migration 55


8472_ch_Migration.fm Draft Document for Review June 11, 2021 12:08 pm

Figure 4-9 Update restore.properties

7. Run restoreV30.bat to perform restore operation as shown in Example 4-3

Example 4-3 Perform restore operation


c:\Program Files\IBM\SKLMV41\migration\utilities\sklmv30>restoreV30.bat
CURR_DIR c:\Program Files\IBM\SKLMV41\migration\utilities\sklmv30\

Credentials for same user accounts that exist on both source and target servers
are not migrated.
Restore completed, Please refer to restore.log for more details.
For the changes to take effect, restart the IBM Security Guardium Key Lifecycle
Manager server.

c:\Program Files\IBM\SKLMV41\migration\utilities\sklmv30>

Note: In IBM Security Guardium Key Lifecycle Manager V4.1.0.1, user credentials for
the user accounts that exist on both source and target servers are not migrated. In that
case if user SKLMAdmin exist on IBM Security Key LifeCycle Manager V3.0.0.0 then its
user credentials will not be migrated to IBM Security Guardium Key Lifecycle Manager
V4.1.0.1. User SKLMAdmin will be able to login using the same password that was set
before the data migration operation was initiated.

8. Check restore.log for presence of any error or exception during the restore operation.
9. Restart the WebSphere Application Server from the Windows services console as
described in Figure 4-10

Figure 4-10 Restart WebSphere Application Server

10.Log in to the IBM Security Guardium Key Lifecycle Manager GUI and verify the data has
been migrated successfully.

56 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Migration.fm

4.3.2 Cross migration using backup and restore from GUI


This section describes the tasks that are associated with cross migration for IBM Security Key
Lifecycle Manager V3.0.0.0 to Version 4.1.0.1 using GKLM GUI. Complete the following
steps.
1. Login to GUI interface for IBM Security Guardium Key Lifecycle Manager V3.0.0.0 and
take backup of the GKLM server using the steps described in Section 5.2.1 “Backing up
IBM Security Guardium Key Lifecycle Manager” on page 68.
2. Transfer the backup file from the file-system hosting IBM Security Guardium Key Lifecycle
Manager V3.0.0.0 to the server where IBM Security Guardium Key Lifecycle Manager
V4.1.0.1 is installed, as shown in Figure 4-8.
3. Login to GUI interface for IBM Security Guardium Key Lifecycle Manager V4.1.0.1 and
perform restore operation using the steps described in Section 5.2.2 “Restoring IBM
Security Guardium Key Lifecycle Manager” on page 70. Restore operation will restart the
WAS server automatically and GKLM server will be unavailable for sometime.
4. Log in back to the IBM Security Guardium Key Lifecycle Manager V4.1.0.1 GUI and verify
the data has been migrated successfully.

Chapter 4. IBM Security Guardium Key Lifecycle Manager Migration 57


8472_ch_Migration.fm Draft Document for Review June 11, 2021 12:08 pm

58 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

Chapter 5. IBM Security Guardium Key


Lifecycle Manager Configuration
This chapter describes the tasks that are associated with configuring IBM Security Guardium
Key Lifecycle Manager including, creating a self-signed, certificate authority (CA) signed IBM
Security Guardium Key Lifecycle Manager TLS / Key Management Interoperability Protocol
(KMIP) certificate, setting up a backup/restore process, configuring replication for IBM
Security Guardium Key Lifecycle Manager, configuring IBM Security Guardium Key Lifecycle
Manager in a Multi-Master cluster, and some other configurations.

This chapter covers the following topics:


򐂰 Configuring an TLS/KMIP certificate for IBM Security Guardium Key Lifecycle Manager
򐂰 Backing up and restoring IBM Security Guardium Key Lifecycle Manager
򐂰 Configuring replication for IBM Security Guardium Key Lifecycle Manager
򐂰 Configuring a Multi-Master cluster
򐂰 Integrating LDAP with IBM Security Guardium Key Lifecycle Manager Traditional Edition
using configuration scripts
򐂰 Integrating LDAP with IBM Security Guardium Key Lifecycle Manager Container Edition
򐂰 Configuring signed CA certificates for IBM Security Guardium Key Lifecycle Manager
portal and WebSphere console access.

© Copyright IBM Corp. 2021. All rights reserved. 59


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

5.1 Configuring an TLS/KMIP certificate for IBM Security


Guardium Key Lifecycle Manager
After you install IBM Security Guardium Key Lifecycle Manager, you must configure secure
communication by using the TLS protocol.

5.1.1 Login to IBM Security Guardium Key Lifecycle Manager GUI


Login to IBM Security Guardium Key Lifecycle Manager graphical user interface (GUI) by
following the below steps.
1. Launch a Web Browser.
2. Log in to IBM Security Guardium Key Lifecycle Manager (see Figure 5-1) by going to the
following URL and using SKLMAdmin user and password set during the installation.
https://<ip address/hostname>:<port>/ibm/SKLM/login.jsp

Important: IBM Security Guardium Key Lifecycle Manager v4.1.0.1 by default uses port
9443 for GUI and REST API’s.

Figure 5-1 Login page

After login to IBM Security Guardium Key Lifecycle Manager GUI, you can create Server
certificate for TLS communication. Server certificate can be of two types:
򐂰 Type-1: Self-Signed Certificate. See “Creating a self-signed server certificate” on page 61
for more details.
򐂰 Type-2: Third-party CA Signed Certificate. See “Creating a Third-party CA signed server
certificate” on page 63 for more details.

60 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

5.1.2 Creating a self-signed server certificate


To create a self-signed server certificate, complete the following steps:
1. Click Advanced Configuration → Server certificates and then click Add, as shown in
Figure 5-2.

Figure 5-2 Server certificate

2. Select Create a self-signed certificate option and fill the details as shown in Figure 5-3.
The validity period determines how long the certificate is valid. By default, IBM Security
Guardium Key Lifecycle Manager creates 2048-bit RSA public-private key pair for Server
certificates.

Figure 5-3 Self-signed Server Certificate - Add page

3. After all details are correctly filled, click Add Certificate.


4. a Message showing confirmation of successful certificate creation is displayed, as shown
in Figure 5-4 on page 62. Click Close.

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 61


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

Figure 5-4 Server certificate created successfully

5. Verify details of newly created server certificate, as shown in Figure 5-5.

Figure 5-5 Self-signed server certificate Status

6. Validate the status from Welcome page as well, as shown in Figure 5-6.

Figure 5-6 Welcome page with Server certificate configured

7. Restart the IBM Security Guardium Key Lifecycle Manager by select sklmadmin user in
the upper right corner, click Restart Server as shown in Figure 5-7 on page 62.

Figure 5-7 Restarting Server

62 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

5.1.3 Creating a Third-party CA signed server certificate


To create a certificate request for a signed CA server certificate, complete the following steps:
1. Click Advanced Configuration → Server certificates and then click Add, as shown in
Figure 5-2 on page 61.
2. Select Request certificate from a third-party provider, specify the certificate details and
validity period, and then click Add certificate, as shown in Figure 5-8.

Figure 5-8 Third-Party CA signed Server certificate - Add Page

3. A message showing confirmation of successful certificate signing request is displayed, as


shown in Figure 5-4 on page 62. Click Close.
4. Validate the status of the created certificate which will be in Pending state, as shown in
Figure 5-9.

Figure 5-9 Third-party CA Signed Server certificate Status - Pending

Note: The most recently created server certificate from the IBM Security Guardium Key
Lifecycle Manager GUI becomes the active certificate for the server, which might break
the communication between the configured devices and the server. Plan carefully when
you need a new server certificate.

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 63


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

The server certificate with Pending status is shown with a question mark. The certificate
signing request file is automatically created in the GKLM data directory as shown in
Figure 5-10, which is as follows:
Linux: /opt/IBM/WebSphere/AppServer/products/sklm/data
Windows: C:\Program Files\IBM\WebSphere\AppServer\products\sklm\data

Figure 5-10 CSR file in operating system directory

5. The CSR file can be download from IBM Security Guardium Key Lifecycle Manager GUI
by clicking on the download link, as shown in Figure 5-9 or directly from the data directory
using file copy tools like scp, sftp.
6. Get the certificate signing request file signed from the trusted CA.
7. Upload the signed certificate in GKLM data directory again, as shown in Figure 5-11.

Figure 5-11 Signed CA certificate uploaded in data directory

8. Go to Welcome page in the IBM Security Guardium Key Lifecycle Manager GUI and
check the Action Items.
9. Click on link for Third-party certificates pending import, as shown in Figure 5-12.

Figure 5-12 Welcome page - Third party Certificate pending import

64 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

10.On the Import page, select the Pending certificate, and click Import as shown in
Figure 5-13.

Figure 5-13 Select Certificate for upload

11.Click Browse, as shown in Figure 5-14.

Figure 5-14 Browse for signed certificate

12.Select signed certificate and click Select, as shown in Figure 5-15.

Figure 5-15 Import Signed Certificate

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 65


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

13.Click Import, as shown in Figure 5-16.

Figure 5-16 Import Signed certificate

14.After importing the signed certificate, status of the server certificate is changed to Valid, as
shown in Figure 5-17.

Figure 5-17 Valid Server Certificate

15.Restart the IBM Security Guardium Key Lifecycle Manager Server, as shown in Figure 5-7
on page 62.

5.1.4 Exporting and downloading Server certificate


To establish TLS communication, you may need to download IBM Security Guardium Key
Lifecycle Manager Server certificate to get it trusted on the client side.

Complete the following steps to export and download the TLS/KMIP Server certificate.
1. Login to IBM Security Guardium Key Lifecycle Manager GUI and navigate to Advanced
Configuration → Server certificates page.
2. Select the server certificate which is marked in Use.
3. Click on download icon as shown in Figure 5-18.

Figure 5-18 Export & download certificate

66 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

4. Click on Download button to download exported certificate on your local machine, as


shown in Figure 5-19.

Figure 5-19 Download certificate

The TLS/KMIP Certificate is now exported and downloaded.

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 67


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

5.2 Backing up and restoring IBM Security Guardium Key


Lifecycle Manager
IBM Security Guardium Key Lifecycle Manager creates cross-platform backup files in a
manner that is independent of operating systems and the directory structure of the server.
You can restore the backup files to an operating system that is different from the one from
which it was backed up. For example, you can restore a backup file that is taken on a Linux
system and restore it on a Windows system. Your role must have permissions to back up or to
restore files.

5.2.1 Backing up IBM Security Guardium Key Lifecycle Manager


To back up IBM Security Guardium Key Lifecycle Manager, complete the following steps:
1. Log on to the IBM Security Guardium Key Lifecycle Manager GUI.
2. Click Administration -> Backup and Restore, as shown in Figure 5-20.

Figure 5-20 Backup & Restore menu

3. Click Browse to specify the backup repository location. the default location is GKLM data
directory. Click Create button, as shown in Figure 5-21.

Figure 5-21 Backup & Restore Browse directory

4. In the Create Backup window as shown in Figure 5-22 on page 69, enter the password for
the backup, provide appropriate description and, click Create Backup button. This
password is required to restore this backup.

68 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

Figure 5-22 Create Backup

5. Confirmation window will be displayed. Click OK.


6. When backup is complete, information window will be displayed as shown in Figure 5-23.
Click Close.

Figure 5-23 Backup successful

7. Backup file is shown in the table. Click on download icon to download this backup. as
shown in Figure 5-24. This backup file should be protected and can be used for recovery
during disaster situation.

Figure 5-24 Download backup file

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 69


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

5.2.2 Restoring IBM Security Guardium Key Lifecycle Manager


To restore IBM Security Guardium Key Lifecycle Manager, complete the following steps:
1. Ensure that backup archive file is uploaded to the GKLM data directory of the IBM Security
Guardium Key Lifecycle Manager server.
2. Login to the IBM Security Guardium Key Lifecycle Manager GUI.
3. Go to Administration menu → Backup and Restore. You should see all the backup files
in the GKLM data, as shown in Figure 5-25.

Figure 5-25 Display Backups

4. Select the backup file, click Restore, as shown in Figure 5-25.


5. Enter the password that was specified during the backup process and click Restore
Backup, as shown in Figure 5-26.

Figure 5-26 Restore Backup

70 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

6. Read instruction carefully which is shown in confirmation window and Click OK, as shown
in Figure 5-27. The restore process might take some time to complete depending on the
size of the data.

Figure 5-27 Restore confirmation box with important instructions

Note: All the data previously present in the IBM Security Guardium Key Lifecycle
Manager server will be erased when backup is restored. IBM Security Guardium Key
Lifecycle Manager Server will be restarted after successful restore and server will
remain unavailable for key serving during restart process.

7. A confirmation message appears when the backup is restored successfully, as shown in


Figure 5-28.

Figure 5-28 Restore Successful

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 71


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

5.3 Configuring replication for IBM Security Guardium Key


Lifecycle Manager
IBM Security Guardium Key Lifecycle Manager can be configured to automatically replicate
cryptographic keys, configuration files, and other critical data from a master server to up to 20
clone servers. The automatic replication ensures continuous keys and certificates availability
to encrypting devices.

The data replication enables cloning of IBM Security Guardium Key Lifecycle Manager
environments to multiple servers in a manner that is independent of operating systems and
directory structures of the servers.

The master server is the primary system that is replicated, and the replication process is
triggered only when new keys or devices are added or modified on the master server. Each
clone server is identified by an IP address or host name, and a port number. The server uses
the properties in the ReplicationSKLMConfig.properties file to control the replication
process.

IBM Security Guardium Key Lifecycle Manager Replication can be configured in three modes:
1. Master-Clone Full Replication: In this mode, full data backup of master server will be
replicated on the clone server. Default replication schedule is 1 day and minimum
schedule can be 1 hour.
2. Master-Clone Incremental Replication: In this mode, data created on master server will
be replicated on the clone server since last backup instead of full data replication. Default
replication schedule is 1 minute which is minimum as well. Incremental replication is near
real-time synchronization.
Incremental Replication can only be configured along with Full Replication.
3. Master only for scheduled backup: This mode is also called scheduled backup. In this
mode, only a master server is configured with no clone. This mode will take full automated
backup at the scheduled time only if new keys or certificates are created.

Here are the actions performed by IBM Security Guardium Key Lifecycle Manager replication
server during Full Replication:
1. Check if backup is required at the scheduled time.
2. If no backup is required (means no keys are created), then replication will be skipped.
3. If backup is required (means new keys are created), then IBM Security Guardium Key
Lifecycle Manager replication master server will trigger replication process.
4. Replication master server will start a secure TLS 1.2 communication with clone servers.
5. Replication master server will transmit backup file created above.
6. Replication clone server will restore the backup.
7. Replication clone server will send the status to Replication master.
8. Replication clone server will be restarted at the end of the process.

72 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

5.3.1 Configuring the master server for replication


To configure the master server for replication, complete the following steps:
1. Log on to the IBM Security Guardium Key Lifecycle Manager GUI and navigate to
Administration → Replication, as shown in Figure 5-29.

Figure 5-29 Replication Menu

2. Select the Master role, and click OK, as shown in Figure 5-30.

Figure 5-30 Replication master selection

3. From the list, select any certificate to be used for the replication, provide Passphrase for
protecting backup files, Click Add Clone to add the clone servers, save the replication
configuration, and then click Start Replication Server, as shown in Figure 5-31 on
page 74.

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 73


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

Figure 5-31 Replication Master configuration

Notes:
򐂰 Any available certificates, regardless of whether they are being used or not, can be
used for replication. However, the chosen certificate must exist on the clone servers.
򐂰 The host name of the clone server must be resolvable either by using the
/etc/hosts file or DNS.
򐂰 Make sure that the firewall is configured to allow communication between Master
and Clones on configured ports.
򐂰 Make sure to use mapped ports of Clone if using IBM Security Guardium Key
Lifecycle Manager Container edition.

4. Click OK to save the master server configuration. Click Ok in the confirmation dialog box.
5. Click Start Replication Server, as shown in Figure 5-32 on page 75.

74 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

Figure 5-32 Replication Master - Start Replication Server

6. A confirmation window will be shown when the Replication server is started, as shown in
Figure 5-33.

Figure 5-33 Replication Task started successfully

7. Navigate to Welcome page and check the status of replication server, as shown in
Figure 5-34 on page 76.

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 75


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

Figure 5-34 Replication Master status on Welcome page

This step completes the configuration of master server for full replication.

5.3.2 Configuring the master server for Incremental Replication


To configure the master server for incremental replication, complete the following steps:
1. Follow the steps for configuring master in full replication mode. For more information, see
“Configuring the master server for replication” on page 73.
2. Navigate to the Administration → Replication page.
3. Click Advanced Properties tab, as shown in Figure 5-35.

Figure 5-35 Replication Master - Advanced Configuration Menu

76 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

4. Select checkbox for Incremental replication frequency (in seconds): option and click
OK, as shown in Figure 5-36.

Figure 5-36 Replication Master with Incremental option enabled

5. Click OK in the confirmation window.


6. Click Stop Replication Server.
7. Click Start Replication Server.
8. Navigate to the Welcome page to check the Replication status, as shown in Figure 5-37.

Figure 5-37 Replication Master in Incremental mode - Welcome page status

This step completes the configuration of Replication Master in Incremental mode.

5.3.3 Configuring the clone server for replication


The replication process enables the cloning of IBM Security Guardium Key Lifecycle Manager
environment from master server to multiple clone servers. IBM Security Guardium Key
Lifecycle Manager supports up to 20 clones with one master.

To configure the clone server for replication, complete the following steps:
1. Login to the master server and take a backup. For more information, see “Backing up IBM
Security Guardium Key Lifecycle Manager” on page 68.
2. Copy the backup file created in step-1 above to clone server.

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 77


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

3. Login to the clone server and restore backup file. For more information, see “Restoring
IBM Security Guardium Key Lifecycle Manager” on page 70.
4. The clone server will restart automatically after successful restore.

Note: It is very important that same server certificate is available on all masters and
clones in a replication cluster. If a certificate which is configured on Replication master
configuration page is not available on clones then replication will not work. If a server
certificate on the master is replaced due to expiration or any other reason then make
sure that the same server certificate is copied to clone servers with private key. This
action can be done in one of the following ways:
򐂰 Backup from the master and restore on the clone. This is preferable option.
򐂰 Use Key Export REST API to export public-private key pair on the master server and
and use Key Import REST API to import public-private key pair on the clone servers.

5. Login to the clone server and navigate to Administration → Replication page.


6. Select Clone option, configure ports as desired and click OK, as shown in Figure 5-38.

Figure 5-38 Replication Clone - Configuration screen

78 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

7. Click Start Replication Server, as shown in Figure 5-39.

Figure 5-39 Replication Clone - Start Replication Server

8. A success message is displayed when the Replication clone server is started successfully,
as shown in Figure 5-40.

Figure 5-40 Replication Clone started successfully

9. Navigate to the Welcome page to see the Replication clone status, as shown in
Figure 5-41.

Figure 5-41 Replication Clone status - Welcome page

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 79


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

5.4 Configuring a Multi-Master cluster


Implementation of a high availability (HA) solution requires configuring IBM Security
Guardium Key Lifecycle Manager master servers in a Multi-Master cluster. All IBM Security
Guardium Key Lifecycle Manager instances in the cluster point to a single data source that is
configured for Db2 HA disaster recovery (DR) (HADR) to ensure real-time availability of the
latest data to all the master servers in the cluster.

You can use the IBM Security Guardium Key Lifecycle Manager Multi-Master configuration for
data transmission to achieve the following objectives:
򐂰 Ensure consistent and continuous data availability of IBM Security Guardium Key Lifecycle
Manager across the organization.
򐂰 Avoid a single point of failure by using the HA solution.
򐂰 Place master servers at several physical sites, that is, distributed across the network.

To set up HADR, you must configure the necessary Db2 parameters in the IBM Security
Guardium Key Lifecycle Manager master servers with a primary database and a standby
database. Figure 5-42 shows a simple deployment of IBM Security Guardium Key Lifecycle
Manager and Db2 HADR for a Multi-Master environment where four instances (master
servers) of Db2 HADR and N instances of IBM Security Guardium Key Lifecycle Manager are
configured.

Figure 5-42 Deployment example

Note: The Multi-Cluster setup is more suitable in a dynamic environment, which requires
frequent key or certificate creation or modification. For a relatively static environment, the
backup/restore and replication approach is recommended.

80 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

5.4.1 Types of servers in a Multi-Master cluster


In a Multi-Master cluster, servers can be of different types.

Primary
The server where the database is currently up and applications are able to connect and
update data. All servers in HADR cluster point to this database. There can be only one
primary server in the cluster at a time.

Principal Standby
The standby server of the HADR cluster that is target for the defined SYNCMODE from the
primary server. Only one standby may be the principal standby at a time.

Auxiliary Standby
Any standby server of the HADR, which is not the principal standby. The only syncmode
supported for Auxiliary standby is SUPERASYNC. Any server in the HADR cluster beyond
the first two is an Auxiliary standby. This server is for disaster recovery (DR) purpose, and as
such is generally placed in a geographically dispersed data center.

Master Server or Non-Standby Server


Any server which is not Primary or Standby, is setup as master server. Master servers are the
servers that connect to the database which is being used by Db2 HADR. If data
synchronization service is configured, the primary server will send regular backups to this
server (by default every 24 hours). This backup server can be used for disaster recovery as it
has the backup from primary. For more information on data synchronization service see, Data
Synchronization Service.

5.4.2 Setting up minimal deployment of a Multi-Master cluster


This section covers the configuration of the minimal deployment of a Multi-Master cluster, as
shown in Figure 5-43.

Figure 5-43 Minimal deployment of a Multi-Master cluster

The deployment prerequisites are:


򐂰 Both primary and standby Db2 database servers must be installed on the same version of
the operating system.
򐂰 The Db2 version that is installed on the IBM Security Guardium Key Lifecycle Manager
primary and standby master servers must match.
򐂰 You must use a dedicated network for the Db2 HADR primary and standby connections.

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 81


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

򐂰 Db2 user names and passwords must be same on all masters servers of IBM Security
Guardium Key Lifecycle Manager Multi-Master cluster.
For more information about requirements for Multi-Master configuration, see IBM
Documentation (formerly IBM Knowledge Center).

You must ensure that your computer host name is configured correctly before you set up
IBM Security Guardium Key Lifecycle Manager master servers for a Multi-Master
configuration. You can resolve an IP address to a host name by editing the /etc/hosts file.

For Db2 HADR configuration, you must update the /etc/hosts file in the primary and standby
master servers of the cluster to enable host name to IP address mapping, as shown in
Example 5-1.

Example 5-1 The /etc/hosts file on the primary master and standby master servers
Primary Master
[root@manumits1 ~]$ cat /etc/hosts
127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
10.41.4.87 manumits1.fyre.ibm.com manumits1
10.41.5.152 abjectly1.fyre.ibm.com abjectly1

Standy Master
[root@abjectly1 ~]# cat /etc/hosts
127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
10.41.5.152 abjectly1.fyre.ibm.com abjectly1
10.41.4.87 manumits1.fyre.ibm.com manumits1

Complete the following steps:


1. Update the Db2 kernel parameters on the primary master and standby master servers if
IBM Security Guardium Key Lifecycle Manager is installed on a Linux operating system by
editing the /etc/sysctl.conf file, as shown in Example 5-2.

Example 5-2 Db2 kernel parameters


#Example for a computer with 16GB of RAM:
kernel.shmmni=4096
kernel.shmmax=17179869184
kernel.shmall=8388608
#kernel.sem=<SEMMSL> <SEMMNS> <SEMOPM> <SEMMNI>
kernel.sem=250 1024000 32 4096
kernel.msgmni=16384
kernel.msgmax=65536
kernel.msgmnb=65536

For more information about setting up kernel parameters, see IBM Documentation
(formerly IBM Knowledge Center).
2. Log on to the IBM Security Guardium Key Lifecycle Manager portal on the primary master
server, and add a server certificate on the primary master server. For more information,
see 5.1, “Configuring an TLS/KMIP certificate for IBM Security Guardium Key Lifecycle
Manager” on page 60.

82 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

3. Once the server certificate is added and marked in use, go to Administration →


Multi-Master. Click Multi-Master and then OK to start the Multi-Master configuration, as
shown in Figure 5-44.

Figure 5-44 Multi-Master configuration

4. Click Add Master to add the standby master server, and specify the details in the Basic
Properties tab, as shown in Figure 5-45.

Figure 5-45 Multi-Master Configuration - Basic Properties

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 83


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

5. Select Advanced Properties and then select Yes to make the server that is added a
standby master. Keep the defaults for HADR port and Standby priority index, as shown
in Figure 5-46.

Figure 5-46 Multi-Master Configuration - Advanced Properties

Note: The standby server to be added must be a clean installation with no


configurations on it. Even a server certificate should not be created on the server being
added as the standby.

6. Click Check Prerequisites to verify whether the standby master server meets the
requirement, as shown in Figure 5-47.

Figure 5-47 Check Prerequisites

84 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

7. Click Add to add the standby master server. The process might take some time to
complete. A confirmation message is shown when the standby server is successfully
added, as shown in Figure 5-48.

Figure 5-48 Confirmation of the standby master successfully added

8. Verify the HADR status on the master and standby servers, as shown in Example 5-3.

Example 5-3 HADR status


[sklmdb41@manumits1 ~]$ db2pd -d sklmdb41 -hadr

Database Member 0 -- Database SKLMDB41 -- Active -- Up 2 days 10:01:04 -- Date


2021-05-07-01.53.30.743979

HADR_ROLE = PRIMARY
REPLAY_TYPE = PHYSICAL
HADR_SYNCMODE = SYNC
STANDBY_ID = 1
LOG_STREAM_ID = 0
HADR_STATE = PEER
HADR_FLAGS = TCP_PROTOCOL
PRIMARY_MEMBER_HOST = manumits1.fyre.ibm.com
PRIMARY_INSTANCE = sklmdb41
PRIMARY_MEMBER = 0
STANDBY_MEMBER_HOST = abjectly1.fyre.ibm.com
STANDBY_INSTANCE = sklmdb41
STANDBY_MEMBER = 0
HADR_CONNECT_STATUS = CONNECTED

output omitted......

[[sklmdb41@abjectly1 ~]$ db2pd -d sklmdb41 -hadr

Database Member 0 -- Database SKLMDB41 -- Active Standby -- Up 0 days 00:21:50 --


Date 2021-05-07-01.54.37.267242

HADR_ROLE = STANDBY
REPLAY_TYPE = PHYSICAL
HADR_SYNCMODE = SYNC
STANDBY_ID = 0

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 85


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

LOG_STREAM_ID = 0
HADR_STATE = PEER
HADR_FLAGS = TCP_PROTOCOL
PRIMARY_MEMBER_HOST = manumits1.fyre.ibm.com
PRIMARY_INSTANCE = sklmdb41
PRIMARY_MEMBER = 0
STANDBY_MEMBER_HOST = abjectly1.fyre.ibm.com
STANDBY_INSTANCE = sklmdb41
STANDBY_MEMBER = 0
HADR_CONNECT_STATUS = CONNECTED
output omitted......

9. The IBM Security Guardium Key Lifecycle Manager portal for both primary and standby
server would also reflect the Multi-Master status on the welcome page, as shown in
Figure 5-49 and Figure 5-50.

Figure 5-49 Multi-Master status on primary server

Figure 5-50 Multi-Master status on standby server

86 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

5.4.3 Agent Status


You can view the status of Agent service and Agent certificate expiry status on IBM Security
Guardium Key Lifecycle Manager GUI, notification area.
򐂰 Login to the IBM Security Guardium Key Lifecycle Manager GUI.
򐂰 On the Welcome page notification area, you would see a panel for Agent. This panel
shows the status (Started/ Stopped /Disabled) of Agent service, as shown in
Figure 5-51.

Figure 5-51 Agent Status

򐂰 Agent service status is disabled by default when you install IBM Security Guardium Key
Lifecycle Manager.
򐂰 The notification area on the Welcome page also indicates if the Agent certificate has
expired or will expire soon, as shown in Figure 5-52.

Figure 5-52 Agent Certificate Expiry Status

򐂰 Click on the Expiring or expired certificates link to see which certificate has expired or
will expire soon.

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 87


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

5.4.4 HADR takeover scenarios


This section covers the takeover scenarios that are shown in Figure 5-53. It also explains the
Multi-Master behavior starting with version 4.1.0.1. where Auto takeover is no longer
supported.

Figure 5-53 HADR takeover scenarios

For more information on how to recover a cluster from a read-only state see, Recovering
Multi-Master cluster from read-only state.

Primary database down


This section describes the primary database down scenario, as shown in Figure 5-54.

Figure 5-54 Primary database down

If you see a scenario where primary database is down, complete the following steps:
1. When the primary database is unreachable, the cluster goes in read-only state. The
read-only state ensures that key serving is not impacted. You can confirm that the standby
database is connected in read-only state from the Welcome → Multi-Master section on

88 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

the IBM Security Guardium Key Lifecycle Manager graphical user interface, as shown in
Figure 5-55.

Figure 5-55 Multi-Master cluster read-only state

2. In this state, the whole cluster will remain in read-only mode and no new crypto objects
can be created. Already created crypto objects can continue to be served.
3. Do not perform any takeover operations, until it is known that you cannot recover the
original primary server.
4. As long as any takeover operations are not performed the cluster remains operating in
read-only mode. and your key serving is not affected. You can wait for the database of the
primary master server to be reachable again, so that the cluster restores its healthy state.

Primary server down or connection lost between primary and standby


servers
This section describes the primary server down scenario, as shown in Figure 5-56.

Figure 5-56 Multi-Master primary server down

1. If the primary server will be unreachable or completely down, cluster will operate in
read-only state. Auto Takeover is not applicable starting GKLM V4.1.0.1.

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 89


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

2. Once the network between the primary server and principal standby is restored or the
primary server is brought up. The cluster will become healthy and recover from read-only
state.
3. If the primary server is unavailable or unreachable for a longer duration, and you need to
perform write operations on the cluster, you will have to promote the principal standby
server as primary. Run the following command to promote the current principle standby
server to become new primary using the sklmTakeoverHADR.sh/.bat script, as shown in
Example 5-4.

Example 5-4 Promote principal standby to primary


Run the sklmTakeover.sh script on the principal standby server.
[root@abjectly1 agent]# ./sklmTakeoverHADR.sh /opt/IBM/WebSphere/AppServer/
HADR Takeover successful.
Verify the standby server is promoted to primary, using the following command:
[sklmdb41@abjectly1 ~]$ db2pd -d sklmdb41 -hadr
Database Member 0 -- Database SKLMDB41 -- Active -- Up 3 days 21:53:03 -- Date
2021-05-10-23.25.50.671871
HADR_ROLE = PRIMARY
REPLAY_TYPE = PHYSICAL
HADR_SYNCMODE = SYNC
STANDBY_ID = 1
LOG_STREAM_ID = 0
HADR_STATE = DISCONNECTED
HADR_FLAGS =
PRIMARY_MEMBER_HOST = abjectly1.fyre.ibm.com
PRIMARY_INSTANCE = sklmdb41
PRIMARY_MEMBER = 0
STANDBY_MEMBER_HOST = manumits1.fyre.ibm.com
STANDBY_INSTANCE = sklmdb41
STANDBY_MEMBER = 0
HADR_CONNECT_STATUS = DISCONNECTED
output omitted......

Note: The HADR state shows disconnected as the primary master server in the cluster
is still unreachable.

4. Once the connectivity is restored and the original primary server is reachable again, and
you have promoted the principal standby server as primary, you need to recover the
Multi-Master cluster from possible split-cluster scenario, see, Recover from Split
Cluster.

90 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

5.5 Integrating LDAP with IBM Security Guardium Key Lifecycle


Manager Traditional Edition using configuration scripts
You can integrate LDAP with IBM Security Guardium Key Lifecycle Manager by using LDAP
configuration scripts. The configuration scripts also take the backup of WebSphere
configuration and IBM Security Guardium Key Lifecycle Manager data.

You might need to restore the following data to the state it was before the LDAP configuration
steps were run:
򐂰 WebSphere Application Server configuration data for IBM Security Guardium Key
Lifecycle Manager
򐂰 IBM Security Guardium Key Lifecycle Manager application data

5.5.1 Preparing for the configuration


To prepare for running the LDAP configuration scripts:
1. Log on to the server where IBM Security Guardium Key Lifecycle Manager is installed, and
open the config.py file under SKLM_INSTALL_HOME\bin\LDAPIntegration.
SKLM_INSTALL_HOME points to following directories:
a. Windows: C:\Program Files\IBM\SKLMV41
b. Linux: /opt/IBM/SKLMV41/
2. Edit the config.py file to add values to properties like ip (IP address of the LDAP server),
port (port to connect to LDAP server,) LDAP_server_type (type of LDAP server like IDS),
and base_entry (distinguished name of the base entry) as shown in Example 5-5

Example 5-5 Edit the config.py


[root@manumits1 bin]# cat /opt/IBM/SKLMV41/bin/LDAPIntegration/config.py
import string, sys
LDAP_server_type="IDS"
login_id="uid"
ip="ldapserver.company.com"
port="389"
gr_name="Group"
pr_name="PersonAccount"
gr_obj_class="groupOfUniqueNames"
pr_obj_class="person"
mem_name="uniqueMember"
mem_obj_class="groupOfUniqueNames"
base_entry="o=company.com"
scope="direct"
backupPassword="Change@Password123"

Note: Make sure to change the value for property in backupPassword. This is the
password used while creating the IBM Security Guardium Key Lifecycle Manager
application backup.

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 91


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

5.5.2 LDAP configuration database and updating the data source for WIM
To create the database for the LDAP configuration and update the data source for
WebSphere Identity Manager (WIM), complete the following steps:
1. Create the database for the LDAP configuration (example: USERDB41) and connect to
USERDB41 to verify successful creation, as shown in Example 5-6.

Example 5-6 Creating the database


[root@manumits1 LDAPIntegration]# su - sklmdb41
[sklmdb41@manumits1 ~]$ db2 create database USERDB41 using codeset UTF-8
territory US
DB20000I The CREATE DATABASE command completed successfully.
[sklmdb41@manumits1 ~]$ db2 connect to USERDB41
Database Connection Information
Database server = DB2/LINUXX8664 11.5.4.0
SQL authorization ID = SKLMDB41
Local database alias = USERDB41

[sklmdb41@manumits1 ~]$ db2 connect reset


DB20000I The SQL command completed
successfully.

2. Log on to the WebSphere Integrated Solutions Console as wasadmin and select


Resource → JDBC → Data Sources → WIM Data Source to update the data source, as
shown in Figure 5-57.

Figure 5-57 Updating WIM Datasource

92 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

3. Update the database name from SKLMDB41 to USERDB41, as shown in Figure 5-58.

Figure 5-58 Updating database name in WIM Datasource

4. Click on Apply and Save to save the configuration changes.

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 93


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

5. Select the WIM Data Source and click on Test Connection to ensure the connection is
working, as shown in Figure 5-59.

Figure 5-59 Test Connection with WIM Data Source

6. Copy the Db2 driver and license to the WAS_HOME/lib folder, as shown in Example 5-7.

Example 5-7 Copying the essential Db2 drivers


[root@manumits1 bin]# cp /opt/IBM/DB2SKLMV41/java/db2jcc*
/opt/IBM/WebSphere/AppServer/lib
[root@manumits1 bin]# ls -al /opt/IBM/WebSphere/AppServer/lib/db2jcc*
-rwxr-x--- 1 root root 6568346 May 13 16:02
/opt/IBM/WebSphere/AppServer/lib/db2jcc4.jar
-rwx------ 1 root root 3618758 May 13 16:02
/opt/IBM/WebSphere/AppServer/lib/db2jcc.jar
-rwxr-x--- 1 root root 1534 May 13 16:02
/opt/IBM/WebSphere/AppServer/lib/db2jcc_license_cu.jar

Note: Make sure the db2jcc* jars under the WAS_HOME/lib directory have Db2 admin
(sklmdb41) as the owner of the files.

94 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

5.5.3 Creating a database-based repository


To create a database-based repository, complete the following steps:
1. Open the file soap.client.props, and edit the com.ibm.SOAP.requestTimeout property.
Default value of com.ibm.SOAP.requestTimeout is 360. Change the value to 0, as
shown in Example 5-8.

Example 5-8
[root@manumits1 LDAPIntegration]# cat
/opt/IBM/WebSphere/AppServer/profiles/KLMProfile/properties/soap.client.props |
grep com.ibm.SOAP.requestTimeout
com.ibm.SOAP.requestTimeout=0

2. Restart the WebSphere server as shown in Example 5-9

Example 5-9 Restart the WebSphere Application Server


[root@manumits1 bin]# /opt/IBM/WebSphere/AppServer/bin/stopServer.sh server1
-username wasadmin -password Change@Password123
ADMU0116I: Tool information is being logged in file

/opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/stopServer.log
ADMU0128I: Starting tool with the KLMProfile profile
ADMU3100I: Reading configuration for server: server1
ADMU3201I: Server stop request issued. Waiting for stop status.
ADMU4000I: Server server1 stop completed.

[root@manumits1 bin]# /opt/IBM/WebSphere/AppServer/bin/startServer.sh server1


ADMU0116I: Tool information is being logged in file

/opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/startServer.log
ADMU0128I: Starting tool with the KLMProfile profile
ADMU3100I: Reading configuration for server: server1
ADMU3200I: Server launched. Waiting for initialization status.
ADMU3000I: Server server1 open for e-business; process id is 52786

3. Run the command to create a database-based repository, as shown in Example 5-10.

Example 5-10 Creating a database-based repository


[root@manumits1 LDAPIntegration]# pwd
/opt/IBM/SKLMV41/bin/LDAPIntegration
[root@manumits1 bin]# ./wsadmin.sh -username wasadmin -password Change@Password123
-lang jython -f /opt/IBM/SKLMV41/bin/LDAPIntegration/createDBRepos.py
/opt/IBM/WebSphere/AppServer/ USERDB41 sklmdb41 Change@Password123 50070
WASX7209I: Connected to process "server1" on node SKLMNode using SOAP connector;
The type of process is: UnManagedProcess
WASX7303I: The following options are passed to the scripting environment and are
available as arguments that are stored in the argv variable:
"[/opt/IBM/WebSphere/AppServer/, USERDB41, sklmdb41, G@KdLbM2, 50070]"
washome=/opt/IBM/WebSphere/AppServer/
Creating DB Repository Tables in SKLM DB..

Created DB Repository Tables in SKLM DB..


Creating DB Repository..

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 95


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

CWWIM5046W Each configured repository must contain at least one base entry. Add a
base entry before saving the configuration. For LDAP repository, add the LDAP
server before adding the base entry.
Created DB Repository - SKLMDBRepos...CWWIM5046W Each configured repository must
contain at least one base entry. Add a base entry before saving the configuration.
For LDAP repository, add the LDAP server before adding the base entry.
Adding DB Repository base entry...
CWWIM5028I The configuration is saved in a temporary workspace. You must use the
"$AdminConfig save" command to save it in the master repository.
Added DB Repository base entry - o=sklmrepdb.ibm...CWWIM5028I The configuration
is saved in a temporary workspace. You must use the "$AdminConfig save" command to
save it in the master repository.
Adding base entry to realm...
CWWIM5028I The configuration is saved in a temporary workspace. You must use the
"$AdminConfig save" command to save it in the master repository.
Added base entry to realm - o=sklmrepdb.ibm...CWWIM5028I The configuration is
saved in a temporary workspace. You must use the "$AdminConfig save" command to
save it in the master repository.
Saving Config...

4. Verify that the database-based repository was created and listed in the realm, as shown in
Figure 5-60.

Figure 5-60 Repositories in the realm

96 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

5. Run the sklmLDAPConfigure.sh script to configure the IBM Security Guardium Key
Lifecycle Manager (GKLM) with the LDAP server, shown in Example 5-11. This script also
removes the GKLM application groups from file based repository and adds them to
database-based repository. It also updates WebSphere federated repository with LDAP
based repository and maps the administrator role to klmGUICLIAccessGroup for
integrating IBM Security Guardium Key Lifecycle Manager with LDAP user repositories.

Example 5-11 Configuring with LDAP server


[root@manumits1 bin]# cd /opt/IBM/SKLMV41/bin/LDAPIntegration/
[root@manumits1 LDAPIntegration]# ./sklmLDAPConfigure.sh
"/opt/IBM/WebSphere/AppServer" "/opt/IBM/SKLMV41" wasadmin
Change@Password123Change@Password123 sklmadmin
Change@Password123Change@Password123 "/opt/IBM/DB2SKLMV41"
Stopping WAS
Backup KLMProfile..
Starting WAS
SKLM Backup started
SKLM Backup Finished
LDAP Configuration Started..
LDAP Configuration Ends..
Restarting WAS...
Removing Groups from File Based Repository..
Groups removed from file based repository..
Modify Security Role to User/group mapping to remove the administrator role
mapping to klmGUICLIAccessGroup..
Restarting WAS...
Add the SKLM Application groups to database based repository..
update the WAS federated repository with LDAP repository..
Add Security Role to User/group mapping and map administrator role to
klmGUICLIAccessGroup ..
Restarting WAS...

6. The sklmLDAPConfigure.sh script also creates a backup of WebSphere Application


Server configuration data and IBM Security Guardium Key Lifecycle Manager
application data at SKLM_DATA location, as shown in Example 5-12

Example 5-12 WebSphere and IBM Security Guardium Key Lifecycle Manager backups
WebSphere profile backup:
[root@manumits1 /]# ls -al
/opt/IBM/WebSphere/AppServer/products/sklm/data/WASProfile*
-rw-r--r-- 1 root root 133068355 May 13 16:46
/opt/IBM/WebSphere/AppServer/products/sklm/data/WASProfile_Backup

IBM Security Guardium Key Lifecycle Manager backup:


[[root@manumits1 /]# ls -al /opt/IBM/WebSphere/AppServer/products/sklm/data/sklm_*
-rw-r--r-- 1 sklmdb41 sklmdb41 49706 May 13 16:51
/opt/IBM/WebSphere/AppServer/products/sklm/data/sklm_v4.1.0.1_20210513165151+0530_
backup.jar

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 97


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

7. Verify that the IBM Security Guardium Key Lifecycle Manager is configured with the LDAP
server from the WebSphere Integrated Console, as shown in Figure 5-61 on page 98.

Figure 5-61 Verify LDAP configuration

8. For any LDAP users and groups that need IBM Security Key Lifecycle Manager admin
access, the user must be made a member of klmSecurityOfficerGroup too, as shown in
Example 5-13.

Example 5-13 Adding LDAP users and groups to klmSecurityOfficerGroup


[root@manumits1 LDAPIntegration]# ./addLDAPUserToGroup.sh
"/opt/IBM/WebSphere/AppServer" "/opt/IBM/SKLMV41" wasadmin Change@Password123
"uid=067195744,c=in,ou=ldapserver,o=company.com" sklmadmin Change@Password123

9. Log on to the IBM Security Guardium Key Lifecycle Manager portal with the above
configured LDAP account to verify the configuration, as shown in Figure 5-62 on page 99.

98 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

Figure 5-62 Logging on to the IBM Security Guardium Key Lifecycle Manager portal with an LDAP
account

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 99


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

5.6 Integrating LDAP with IBM Security Guardium Key Lifecycle


Manager Container Edition
You can configure IBM Security Guardium Key Lifecycle Manager containerized edition to use
the Lightweight Directory Access Protocol (LDAP) for user authentication.
1. Login to the IBM Security Guardium Key Lifecycle Manager portal, click on User
Management tab, as shown in Figure 5-63.

Figure 5-63 IBM Security Guardium Key Lifecycle Manager Containerized Edition portal

2. On the User Management panel, click on Configuration and then click on Update
button, as shown in Figure 5-64.

Figure 5-64 Configure LDAP

100 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

3. Configure LDAPUser Authentication by clicking on LDAP Authentication tab. Check the


Enable LDAP-based Authentication, checkbox. Enter all details about the LDAP server,
like the LDAP Server type, LDAP Host, port, Base Entry, as shown in Figure 5-65 and
click on Update button.

Figure 5-65 Configure User Authentication - Basic configurations

4. Once all the details have been updated, you will be logged out of the graphical user
interface.
5. Log in to the portal as SKLMAdmin, go to User Management panel, Users tab. and click
on Add, search for the user that needs to added as the administrator. Select that user and
click on Select. as shown in Figure 5-66.

Figure 5-66 Add User Assignment

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 101


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

6. Assign the correct roles and groups to the LDAP user by selecting on Assign Roles and
Assign Groups tabs.
7. Click on Assign Roles and assign the klmSecurityOfficer role to the LDAP user, as
shown in Figure 5-67 on page 102.

Figure 5-67 Assign Roles

8. Assign the LDAP user to groups like klmGUICLIAccessGroup,


klmSecurityOfficerGroup, as shown in Figure 5-68 on page 102 and click Save.
Assigning to these groups will make sure the user can access the IBM Security Guardium
Key Lifecycle Manager portal. You can assign to specific groups based on your need.

Figure 5-68 Assign Group

102 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

9. You can verify your configuration by logging in to the IBM Security Guardium Key Lifecycle
Manager portal with the LDAP account configured as the administrator, as shown in
Figure 5-69.

Figure 5-69 Logging on to the Container Edition IBM Security Guardium Key Lifecycle Manager portal
with LDAP account

10.In the Containerized edition of IBM Security Guardium Key Lifecycle Manager you can still
continue to login using the SKLMAdmin account (file based repository) until you have the
Enable File-based Authentication, checked under the Configure User Authentication
on User Management Panel, as shown in Figure 5-70.

Figure 5-70 File-based Authentication

11.Once you disable the File-based Authentication, only LDAP account will be active to login
to the IBM Security Guardium Key Lifecycle Manager.

Note: Unlike in traditional edition, you can continue to use your SKLMAdmin account to
login to the IBM Security Guardium Key Lifecycle Manager along with the LDAP user
account.

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 103


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

5.7 Configuring signed CA certificates for IBM Security


Guardium Key Lifecycle Manager portal and WebSphere
console access
Before you begin, ensure that you have completed the following tasks:
򐂰 Submitted a Certificate Signing Request (CSR) for CA approval in a WebSphere
Application Server environment.
򐂰 Received the certificates from the CA.

Complete the following steps:


1. Log on to the IBM WebSphere Integrated Solutions Console (https://<IP
address>:9083/ibm/console/logon.jsp), select Security and then SSL certificate and
Key management, and select Key stores and certificates, as shown in Figure 5-71.

Figure 5-71 Key stores and certificates

2. Select the NodeDefaultKeyStore resource, as shown in Figure 5-72 on page 104.

Figure 5-72 Key stores and certificates

104 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

3. Select Personal certificate request to generate the signing request, as shown in


Figure 5-73.

Figure 5-73 Personal certificate requests

4. Click New to specify the certificate details, as shown in Figure 5-74.

Figure 5-74 Certificate details

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 105


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

The default location for the signing request is <WAS HOME>/profiles/KLMProfile/etc, as


shown in Figure 5-75.

Figure 5-75 Signing Request default location

5. Send the request to a signing authority, upload the signed certificate and the root
certificate of the signing authority to the <WAS HOME>/profiles/KLMProfile/etc directory,
and click on NodeDefaultKeyStore → Personal certificates → Receive from a
certificate authority. to import the signed certificate, as shown in Figure 5-76 on
page 106.

Figure 5-76 Selecting Receive certificate from CA

106 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

6. Specify the file name of the signed certificate to import, click OK, and save the
configuration, as shown in Figure 5-77.

Figure 5-77 Importing the signed certificate

7. Select the NodeDefaultKeyStore > Signer certificates to import the root certificate and
intermediate certificates, as shown in Figure 5-78.

Figure 5-78 Signer certificates

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 107


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

8. Select Add and specify the details of the root certificate, click OK, and save the
configuration, as shown in Figure 5-79.

Figure 5-79 Certificate details

9. Select NodeDefaultKeyStore > Personal certificates to verify that the certificates are
imported correctly, as shown in Figure 5-80 on page 108.

Figure 5-80 Imported certificates

108 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

10.Select the default certificate and click Replace to replace the default with the signed
certificate, as shown in Figure 5-81.

Figure 5-81 Replacing the default certificate

11.Select the certificate from the drop-down menu, click OK, and save the configuration, as
shown in Figure 5-82.

Figure 5-82 Replacement certificate and deleting the old certificate

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 109


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

12.Restart the WebSphere Application Server and add the signer to the truststores, as shown
in Example 5-14.

Example 5-14 Adding the new signer certificate to the truststore


[root@sklm ~]# /opt/IBM/WebSphere/AppServer/bin/stopServer.sh server1 -username
wasadmin -password Change@Password123
ADMU0116I: Tool information is being logged in file

/opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/stopServer.log
ADMU0128I: Starting tool with the KLMProfile profile
ADMU3100I: Reading configuration for server: server1
ADMU3201I: Server stop request issued. Waiting for stop status.
ADMU4000I: Server server1 stop completed.

[root@sklm ~]# /opt/IBM/WebSphere/AppServer/bin/startServer.sh server1


ADMU0116I: Tool information is being logged in file

/opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/startServer.log
ADMU0128I: Starting tool with the KLMProfile profile
ADMU3100I: Reading configuration for server: server1
ADMU3200I: Server launched. Waiting for initialization status.
ADMU3000I: Server server1 open for e-business; process id is 19702
[root@sklm ~]# /opt/IBM/WebSphere/AppServer/bin/stopServer.sh server1 -username
wasadmin -password Change@Password123
ADMU0116I: Tool information is being logged in file

/opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/stopServer.log
ADMU0128I: Starting tool with the KLMProfile profile
ADMU3100I: Reading configuration for server: server1

*** SSL SIGNER EXCHANGE PROMPT ***


SSL signer from target host 192.168.48.210 is not found in truststore
/opt/IBM/WebSphere/AppServer/profiles/KLMProfile/etc/trust.p12.

Here is the signer information (verify the digest value matches what is displayed
at the server):

Subject DN: CN=sklm.itso.ibm.com, OU=ITSO, O=IBM, L=SYD, ST=NSW, C=AU


Issuer DN: CN=itso-DC-CA, DC=itso, DC=ibm, DC=com
Serial number: 401413413669045698007453891124786212800299026
Expires: Fri Jan 29 18:15:49 EST 2021
SHA-1 Digest: 3D:28:D3:BC:33:53:03:79:04:1D:1F:F2:DE:05:4B:9A:5C:80:28:13
MD5 Digest: 47:51:49:3C:9F:82:C4:43:80:82:0D:19:34:AA:A7:2F

Subject DN: CN=itso-DC-CA, DC=itso, DC=ibm, DC=com


Issuer DN: CN=itso-DC-CA, DC=itso, DC=ibm, DC=com
Serial number: 94842738440144989988203292676995008084
Expires: Fri Jan 10 00:21:35 EST 2025
SHA-1 Digest: 3D:28:D3:BC:33:53:03:79:04:1D:1F:F2:DE:05:4B:9A:5C:80:28:13
MD5 Digest: 47:51:49:3C:9F:82:C4:43:80:82:0D:19:34:AA:A7:2F

Add signer to the truststore now? (y/n) y


A retry of the request may need to occur if the socket times out while waiting for
a prompt response. If the retry is required, note that the prompt will not be

110 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472_ch_Configuration.fm

redisplayed if (y) is entered, which indicates the signer has already been added
to the truststore.
ADMU3201I: Server stop request issued. Waiting for stop status.
ADMU4000I: Server server1 stop completed.

[root@sklm ~]# /opt/IBM/WebSphere/AppServer/bin/startServer.sh server1


ADMU0116I: Tool information is being logged in file

/opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/startServer.log
ADMU0128I: Starting tool with the KLMProfile profile
ADMU3100I: Reading configuration for server: server1
ADMU3200I: Server launched. Waiting for initialization status.
ADMU3000I: Server server1 open for e-business; process id is 20182

13.Open the browser to verify that the connection is secured, as shown in Figure 5-83.

Figure 5-83 Verifying the connection

Chapter 5. IBM Security Guardium Key Lifecycle Manager Configuration 111


8472_ch_Configuration.fm Draft Document for Review June 11, 2021 12:08 pm

112 IBM Security Guardium Key Lifecycle Manager


Draft Document for Review June 11, 2021 12:08 pm 8472bibl.fm

Related publications

The publications that are listed in this section are considered suitable for a more detailed
description of the topics that are covered in this book.

IBM Redbooks
The following IBM Redbooks publication provides more information about the topics in this
book:

IBM DS8000 Encryption for data at rest, Transparent Cloud Tiering, and Endpoint Security
(DS8000 Release 9.1), REDP-4500

You can search for, view, download, or order this document and other Redbooks, Redpapers,
web docs, drafts, and additional materials, at the following website:
ibm.com/redbooks

Online resources
These websites are also relevant as further information sources:
򐂰 IBM Security Key Lifecycle Manager:
https://www.ibm.com/docs/en/sgklm/4.1?topic=quick-start-guide
򐂰 IBM Security Key Lifecycle Manager Dashboard:
https://www.ibm.com/support/pages/node/876126
򐂰 IBM Security Key Lifecycle Manager Support Matrix:
https://www.ibm.com/support/pages/node/296957

Help from IBM


IBM Support and downloads
ibm.com/support

IBM Global Services


ibm.com/services

© Copyright IBM Corp. 2021. 113


8472bibl.fm Draft Document for Review June 11, 2021 12:08 pm

114 IBM Security Guardium Key Lifecycle Manager


To determine the spine width of a book, you divide the paper PPI into the number of pages in the book. An example is a 250 page book using Plainfield opaque 50# smooth which has a PPI of 526. Divided
250 by 526 which equals a spine width of .4752". In this case, you would use the .5” spine. Now select the Spine width for the book and hide the others: Special>Conditional
Text>Show/Hide>SpineSize(-->Hide:)>Set . Move the changed Conditional text settings to all files in your book by opening the book file with the spine.fm still open and File>Import>Formats the
Conditional Text Settings (ONLY!) to the book files.
Draft Document for Review June 11, 2021 12:08 pm 8472spine.fm 115
IBM Security Guardium Key SG24-8472-01
Lifecycle Manager ISBN DocISBN
(1.5” spine)
1.5”<-> 1.998”
789 <->1051 pages
IBM Security Guardium Key SG24-8472-01
Lifecycle Manager ISBN DocISBN
(1.0” spine)
0.875”<->1.498”
460 <-> 788 pages
SG24-8472-01
IBM Security Guardium Key Lifecycle Manager ISBN DocISBN
(0.5” spine)
0.475”<->0.873”
250 <-> 459 pages
IBM Security Guardium Key Lifecycle Manager
(0.2”spine)
0.17”<->0.473”
90<->249 pages
(0.1”spine)
0.1”<->0.169”
53<->89 pages
To determine the spine width of a book, you divide the paper PPI into the number of pages in the book. An example is a 250 page book using Plainfield opaque 50# smooth which has a PPI of 526. Divided
250 by 526 which equals a spine width of .4752". In this case, you would use the .5” spine. Now select the Spine width for the book and hide the others: Special>Conditional
Text>Show/Hide>SpineSize(-->Hide:)>Set . Move the changed Conditional text settings to all files in your book by opening the book file with the spine.fm still open and File>Import>Formats the
Conditional Text Settings (ONLY!) to the book files.
Draft Document for Review June 11, 2021 12:08 pm 8472spine.fm 116
IBM Security Guardium SG24-8472-01
Key Lifecycle Manager ISBN DocISBN
(2.5” spine)
2.5”<->nnn.n”
1315<-> nnnn pages
IBM Security Guardium Key SG24-8472-01
Lifecycle Manager ISBN DocISBN
(2.0” spine)
2.0” <-> 2.498”
1052 <-> 1314 pages
Back cover
Draft Document for Review June 15, 2021 8:04 pm

SG24-8472-01

ISBN DocISBN

Printed in U.S.A.

®
ibm.com/redbooks

You might also like