Configuring the WebSphere and HTTP Server plugin method
There are two methods used to deploy the WAS Web Server plugins depending on whether IHS and the WAS profiles are local or remote. To demonstrate both methods, we will assume that the JTS, RM and CCM application server profiles are co-located with the IHS server (local), with the QM application on it's own server (remote).
The user accessible Public URIs (and the actual servers they redirect to) will be:
https://clm.example.org/qm (https://qmserver01.example.org:9443/qm)
https://clm.example.org/jts (https://clm.example.org:9447/jts)
https://clm.example.org/rm (https://clm.example.org:9448/rm)
https://clm.example.org/ccm (https://clm.example.org:9449/ccm)
https://clm.example.org/qm (https://qmserver01.example.org:9443/qm)
https://clm.example.org/jts (https://clm.example.org:9447/jts)
https://clm.example.org/rm (https://clm.example.org:9448/rm)
https://clm.example.org/ccm (https://clm.example.org:9449/ccm)
We will also configure single sign-on with WAS such that a user only needs to log into one of the products and subsequent access to the other applications will not require re-authentication. The configuration will use an LDAP directory.
Experienced WAS administrators will be aware that the WAS configuration steps in this guide can be carried out in different ways using "wsadmin" or the WAS Integrated Solutions console.
Experienced WAS administrators will be aware that the WAS configuration steps in this guide can be carried out in different ways using "wsadmin" or the WAS Integrated Solutions console.
Example server configuration
For the purposes of this article we use two separate Windows 2008 servers configured as follows:
- Server 1 (Host-name: clm.example.org):
IBM HTTP Server already installed, listening on port 80 with the IHS Administrative console on port 8008
WAS profile with JTS, Admin and CLMHelp applications deployed (HTTPS port : 9447)
WAS profile with CCM WAR deployed (HTTPS port : 9449)
WAS profile with RM WAR deployed (HTTPS port : 9448)
LDAP Server
WAS profile with CCM WAR deployed (HTTPS port : 9449)
WAS profile with RM WAR deployed (HTTPS port : 9448)
LDAP Server
- Server 2 (Host-name: qmserver01.example.org):
WAS profile hosting QM (HTTPS port: 9443)
Prerequisites and Assumptions
- Use the instructions provided in the CLM Infocenter to deploy the different applications
- Each of the WAS profiles is configured to use LDAP domain "example.org" for authentication
- IBM WebSphere plugin installation media is available
- Administrative console access to each WAS profile is available
- Username and password available for access to IHS Administrative console
- Firewalls on the two servers are configured appropriate, allowing access to the internal ports only between the Server 1 and Server 2. In other words ports 9443, 9447, 9448, 9449, 8008 are not visible to the outside world
- The firewall on Server 1 allows access to port 443 from the outside world
Procedure
- Create a key database and self-signed certificate for IHS
- Enable SSL directives within the IBM HTTP Server's configuration file (httpd.conf)
- Setup SSL Handshake Between the WAS profiles and IHS
Now we need to proxy SSL requests from IHS to the WAS servers by exporting the WAS keys and importing them into the IHS keystore database previously created. - Login to the WAS Integration Solutions Console for the JTS profile.
- Navigate to Security -> SSL certificate and key management -> Key Stores and Certificates, create a new Key store with the following values:
Name: jtswaskeys
Path: jtswaskeys.kdb
Type: CMSKS
Password:secret
- Click OK then Save. This will create the file
/etc/jtswaskeys.kdb. - Navigate to SSL certificate and key management -> Key stores and certificates -> NodeDefaultKeyStore
- Choose "Personal certificates" from the right sidebar
- Check the default certificate and click Export.
- Specify the following values in the Export certificates pane:
Key Store Password: WebAS (unless this has been changed)
Select the "Key Store File" radio button
Key File Name: jtswaskeys.kdb
Type: CMSKS
Password: secret - Click OK. This will export the default WAS personal certificates into
/etc/jtswaskeys.kdb. - Add the certificates from the exported keystore (jtswaskeys.kdb) into the previously created IHS keystore(ihskeys.kdb).
- Force WAS To Honor Host Headers
- Login to the WAS Integration Solutions Console for each WAS profile and navigate to Servers -> Server Types -> WebSphere application servers -> server1
- Under "Container Settings" expand Web Container Settings. Choose "Web Container".
- Add the following custom properties:
- Single Sign-On(SSO) with WAS To alllow sharing of authentication tokens between the different WAS profiles, we need to enable the SSO property in each WAS profile, export the LTPA (Lightweight Third Party Authentication) keys from one profile and import them into each of the other profiles.
- Login to the WAS Integration Solutions Console for the JTS WAS profile.
- Navigate to Global Security -> Web and SIP Security -> Single sign-on (SSO) and set the following properties:
Enabled
Domain name: example.org
Requires SSL - Click OK then Save.
- Navigate to Global Security,select LTPA and enter the following values:
Password : secret
Confirm Password : secret
Fully qualified key file name : jtsssokey - Click Export keys.
- Click OK then Save. This will create a file
/jtsssokey which we will import into the other WAS profiles. - Stop and restart the JTS profile.
- Copy the jtssokey generated above from
to /jtsssokey - Login to the WAS Integration Solutions Console for the RM WAS profile.
- Navigate to Global Security -> Web and SIP Security -> Single sign-on (SSO) and set the following properties:
Enabled
Domain name : example.org
Requires SSL - Click OK then Save.
- Navigate to Global Security,select LTPA and enter the following values:
Password : secret
Confirm Password : secret
Fully qualified key file name : jtsssokey - Click Import keys.
- Click OK then Save.
- Stop and restart the RM profile.
- Configure WAS IHS Plug-in for JTS (Server 1) We will now use the WAS Web Server Plugin install wizard to configure IHS such that all requests to https://clm.example.org/jts,https://clm.example.org/admin and https://clm.example.org/clmhelp are redirected to https://clm.example.org:9447/jts,https://clm.example.org:9447/admin and https://clm.example.org:9447/clmhelp respectively. As noted before, for the purposes of this example, the WAS profile to which the JTS, Admin and CLMHelp applications have been deployed is co-located on the same server as IHS. We therefore use the procedure described in Configuring a Web server and an application server profile on the same machine.
Generate the plugin configuration file
- Stop the JTS WAS profile.
- Stop IHS.
- Launch the Plug-ins installation wizard.
- Clear the check box for the roadmaps and click Next.
- Read the license agreement and accept the agreement it if you agree to its terms. Click Next.
- Select "IBM HTTP Server V7" for Web server type and click Next.
- Select WebSphere Application Server machine (local) and click Next.
- Specify a location for the installation root directory for the plug-ins. Click Next. (Click Yes if prompted with a warning that the directory is not empty).
- Specify the Application Server Installation Location root directory and click Next.
- Select the profile that the JTS, Admin and CLMHelp applications are deployed to and click Next.
- Click Browse to select the configuration file for IHS, verify that the Web server port is correct, and then click Next when you are finished.
- Specify a unique nickname for the Web server. Click Next when you are finished.
- Specify the location for the plugin-cfg.xml file to be generated and click Next.
- Click Next on the pre-installation summary panel to begin the installation. The wizard begins installing the plug-ins and configuring the Web server and the application server. Not the path of the Plug-in configuration file, which we will use later.
- Verify the success of the installation on the Installation summary panel and click Finish to exit the wizard.
Edit httpd.conf
- Open the IHS httpd.conf file in a text editor and verify that the following two lines have been added to the end of it.
- Open the generated plugin configuration file (C:\IBM\HTTPServer\Plugins\config\webserver1\plugin-cfg.xml in this case) and modify the keyring and stashfile properties of the HTTPS Transport attributes to use the IHS keyfile and SSL Stashfile.
- Start IHS and the JTS WAS profile.
- Configure WAS IHS Plug-in for RM and CCM applications (Server 1) We will now use the WAS Web Server Plugin install wizard to configure IHS such that all requests tohttps://clm.example.org/rm and https://clm.example.org/ccm are redirected to https://clm.example.org:9448/rm andhttps://clm.example.org:9449/ccm respectively. As noted before, for the purposes of this example, the WAS profiles to which the RM and CCM applications have been deployed are co-located on the same server as IHS. We therefore use the procedure described in Configuring a Web server and an application server profile on the same machine.
Generate plugin configuration file
- Stop the RM WAS profile.
- Stop IHS.
- Launch the Plug-ins installation wizard on the machine.
- Clear the check box for the roadmaps and click Next.
- Read the license agreement and accept the agreement it if you agree to its terms. Click Next.
- Select "IBM HTTP Server V7" for Web server type click Next.
- Select WebSphere Application Server machine (local) and click Next.
- Specify the location for the installation root directory for the plug-ins. Click Next. (Click Yes if prompted with a warning that the directory is not empty).
- Specify the Application Server Installation Location root directory and click Next.
- Select the profile that the RM application is deployed to and click Next.
- Click Browse to select the configuration file for IHS, and then click Next. Click OK when prompted that the HTTP Server configuration file already contains plugin entries.
- Specify a unique nickname for the Web server. Click Next when you are finished.
- Specify the location for the plugin-cfg.xml file and click Next.
Note that the location for this should be different to that of the plugin configuration file previously generated for the JTS. - Click Next on the pre-installation summary panel to begin the installation. The wizard begins installing the plug-ins and configuring the Web server and the application server. Note the path of the Plug-in configuration file, which we will use later.
- Verify the success of the installation on the Installation summary panel and click Finish to exit the wizard.
Edit httpd.conf
We pointed the wizard to the same httpd.conf file as when we configured the JTS profile and it will have modified it to use the new plugin configuration file generated for the RM profile. We need to edit it to revert it to the previous configuration where it uses the plugin configuration generated for the JTS.Merge plugin directives
- Configure WAS IHS Plug-in for the QM application (Server 2) We will now use the WAS Web Server Plugin install wizard to configure IHS such that all requests tohttps://clm.example.org/qm are redirected to https://qmserver01.example.org:9443/qm and. As noted before, for the purposes of this example, the WAS profile to which the QM application has been deployed is *not* co-located on the same server as IHS. We therefore use the procedure in Configuring a Web server and an application server on separate machines (remote). This is similar to the procedure used for the RM and CCM applications with the exception that we will use the IHS Admin console from the QM WAS profile to propagate the plugin configuration file to the IHS server.
In this step we create a CMS keystore database file and a self-signed certificate which are needed to authenticate IHS during an SSL handshake. Note that Self-signed certificates should only be used for test/development scenarios. In production environments use the appropriate organizational certificates provided by a trusted certificate authority. We will later add the WAS certificates to this same keystore database.
Make sure the IHS Server is stopped
Run the "gsk7cmd" utility (alternatively use the ikeyman GUI) to create a new keystore database (ihskeys.kdb) and password stash file (ihskeys.sth) both of which will be created in the current directory (C:/IBM/HTTPServer/bin in this example).
Run the "gsk7cmd" utility (alternatively use the ikeyman GUI) to create a new keystore database (ihskeys.kdb) and password stash file (ihskeys.sth) both of which will be created in the current directory (C:/IBM/HTTPServer/bin in this example).
gsk7cmd.bat -keydb -create -db ihskeys.kdb -pw secret -expire 365 -stash -type cms
Create a self-signed certificate and add it to the the new keystore db
gsk7cmd.bat -cert -create -db ihskeys.kdb -label clm.example.org -expire 365 -dn "CN=clm.example.org" -default_cert yes -pw secret
In this step we need to first direct IHS to load the SSL support module (mod_ibm_ssl.so) and then direct IHS to listen for secure requests (on port 443 in this example). We also need to point IHS to the key database file (ihskeys.kdb) and password stash file (ihskeys.sth) that were created earlier.
Add (or uncomment) the following lines in httpd.conf, making sure that the values for the KeyFile and SSLStashFile directives match the names of the files generated in the previous section:
Add (or uncomment) the following lines in httpd.conf, making sure that the values for the KeyFile and SSLStashFile directives match the names of the files generated in the previous section:
LoadModule ibm_ssl_module modules/mod_ibm_ssl.so Listen 0.0.0.0:443 ## Uncomment for IPv6 support: #Listen [::]:443SSLEnable KeyFile C:/IBM/HTTPServer/bin/ihskeys.kdb SSLStashFile C:/IBM/HTTPServer/bin/ihskeys.sth SSLDisable
cd C:\IBM\HTTPServer\bin gsk7cmd -cert -import -db/etc/jtswaskeys.kdb -pw secret -type cms -target ihskeys.kdb -target_pw secret -target_type cms -label default -new_label default_jtswas
trusthostheaderport = true com.ibm.ws.webcontainer.extracthostheaderport = true
Part I: Setup JTS profile for SSO and export keys
Part II: Setup RM, QM and CCM for SSO and import JTS keys
LoadModule was_ap22_module "C:\IBM\HTTPServer\Plugins\bin\32bits\mod_was_ap22_http.dll" WebSpherePluginConfig "C:\IBM\HTTPServer\Plugins\config\webserver1\plugin-cfg.xml"
C:/IBM/HTTPServer/bin/ihskeys.kdb"/> C:/IBM/HTTPServer/bin/ihskeys.sth"/>
This is similar to the procedure used for the JTS with the exception that we will need to manually merge some of the content from the plugin configuration file generated for the RM and CCM profiles into the plugin configuration file already created for the JTS.
Open the IHS httpd.conf file, uncomment the following two lines.
LoadModule was_ap22_module "C:\IBM\HTTPServer\Plugins\bin\32bits\mod_was_ap22_http.dll" WebSpherePluginConfig "C:\IBM\HTTPServer\Plugins\config\webserver1\plugin-cfg.xml"and delete the following two lines:
LoadModule was_ap22_module "C:\IBM\HTTPServer\Plugins\bin\32bits\mod_was_ap22_http.dll" WebSpherePluginConfig "C:\IBM\HTTPServer\Plugins\config\webserver_rm\plugin-cfg.xml"Save the httpd.conf file.
Open the plugin configuration file generated when configuring the JTS profile (C:\IBM\HTTPServer\Plugins\config\webserver1\plugin-cfg.xml in this case) in a text editor. Also open the plugin configuration file generated when configuring the RM profile (C:\IBM\HTTPServer\Plugins\config\webserver_rm\plugin-cfg.xml in this case) in a separate text editor window.
Copy and paste the following lines
from the webserver_rm\plugin-cfg.xml to the
Next copy over the
Also modify the keyring and stashfile properties of the HTTPS Transport attributes for port 9448 to use the IHS keyfile and SSLStashfile.
C:/IBM/HTTPServer/bin/ihskeys.kdb"/> C:/IBM/HTTPServer/bin/ihskeys.sth"/>
Save the webserver1\plugin-cfg.xml.
Start IHS and the RM WAS profile.
First verify that you can still access the JTS page using the IHS URL https://clm.example.org/jts.
Next verify that you can access the RM page using the "internal" URL: https://clm.example.org:9448/rm. Next verify that the IHS URL https://clm.example.org/rm displays the same page.
Generate manual plugin configuration script
- Stop IHS.
- Launch the Plug-ins installation wizard on the server where IHS is installed (Server 1).
- Clear the check box for the roadmaps and click Next.
- Read the license agreement and accept the agreement it if you agree to its terms. Click Next.
- Select "IBM HTTP Server V7" for Web server type click Next.
- Select Web Server machine (remote) and click Next.
- Specify the location for the installation root directory for the plug-ins. Click Next. (Click Yes if prompted with a warning that the directory is not empty).
- Click Browse to select the configuration file for IHS, and then click Next. Click OK when prompted that the HTTP Server configuration file already contains plugin entries.
- Specify a unique nickname for the Web server. Click Next when you are finished.
- Specify the location for the plugin-cfg.xml file and click Next.
Note that the location for this should be different to that of the plugin configuration file previously generated for the JTS. - Specify the host-name (qmserver01.example.org) of the server hosting the QM WAS profile.
- Click Next on the pre-installation summary panel to begin the installation. The wizard begins installing the plug-ins and configuring the Web server and the application server. Note the path of the Plug-in configuration file, which we will use later.
- Once the installation completes, the wizard generates a manual configuration script which must be run on the QM server. The path to the script is displayed in the installation summary panel.
- Verify the success of the installation on the Installation summary panel and click Finish to exit the wizard.
Edit httpd.conf
We pointed the wizard to the same httpd.conf file as when we configured the JTS profile and it will have modified it to use the new plugin configuration file generated for the QM profile. We need to edit it to revert it to the previous configuration where it uses the plugin configuration generated for the JTS.Run manual configuration script on Server 2
We now copy the manual configuration script generated above (C:\ibm\HTTPServer\Plugins\bin\configurewebserver_qm.bat) to the Propagate the QM plugin configuration file to the IHS server
Login to the WAS Integration Solutions Console for the QM WAS profile.Merge plugin directives
Open the IHS httpd.conf file, uncomment the following two lines.
LoadModule was_ap22_module "C:\IBM\HTTPServer\Plugins\bin\32bits\mod_was_ap22_http.dll" WebSpherePluginConfig "C:\IBM\HTTPServer\Plugins\config\webserver1\plugin-cfg.xml"and remove the following two lines:
LoadModule was_ap22_module "C:\IBM\HTTPServer\Plugins\bin\32bits\mod_was_ap22_http.dll" WebSpherePluginConfig "C:\IBM\HTTPServer\Plugins\config\webserver_qm\plugin-cfg.xml"Save the httpd.conf file.
If the WAS profile hosting the QM application isn't already running start it.
Run the configurewebserver_qm.bat script:
C:\ibm\WebSphere\AppServer\bin>configurewebserver_qm.bat -profileName qm -user wasadminuser -password wasadminpassword Using the profile qm Using WebSphere admin userID wasadminuser WASX7209I: Connected to process "server1" on node qm using SOAP connector; The type of process is: UnManagedProcess WASX7303I: The following options are passed to the scripting environment and are available as arguments that are stored in the argv variable: "[webserverqm, IHS, C:\\IBM\\HTTPServer, C:\\IBM\\HTTPServer\\conf\\httpd.conf, 80, MAP_ALL, C:\\IBM\\WebSphere\\Plugins, unmanaged, clm.example.org-node, clm.example.org, windows]" Input parameters: Web server name - webserverqm Web server type - IHS Web server install location - C:\IBM\HTTPServer Web server config location - C:\IBM\HTTPServer\conf\httpd.conf Web server port - 80 Map Applications - MAP_ALL Plugin install location - C:\IBM\WebSphere\Plugins Web server node type - unmanaged Web server node name - clm.example.org-node Web server host name - clm.example.org Web server operating system - windows IHS Admin port - 8008 IHS Admin user ID - "" IHS Admin password - "" IHS service name - "" .... Start saving the configuration. Configuration save is complete.
Navigate to Servers -> Server Types -> Web Servers
Click "webserver_qm" and click "Remote web server management"
Specify the Port, Username and password to allow WAS to connect to the IHS Admin console. Click OK and Save.
Select "webserver_qm" and click "Generate Plug-in".
Once the plugin file has been generated, select select "webserver_qm" and click "Propagate Plug-in".
If successful WAS will generate a message such as:
InformationPLGC0062I: The plug-in configuration file is propagated from C:\ibm\WebSphere\AppServer\profiles\qm\config\cells\qm\nodes\clm.example.org-node\servers\webserver_qm\plugin-cfg.xml to C:\IBM\HTTPServer\Plugins/config/webserver_qm/plugin-cfg.xml on the Web server computer. InformationPLGC0048I: The propagation of the plug-in configuration file is complete for the Web server. qm.clm.example.org-node.webserver_qm.Note the path displayed for the generated plugin configuration file on Server 1 which is the IHS Server:
C:\IBM\HTTPServer\Plugins/config/webserver_qm/plugin-cfg.xml
Open the plugin configuration file generated when configuring the JTS profile (C:\IBM\HTTPServer\Plugins\config\webserver1\plugin-cfg.xmlin this case) in a text editor. Also open the plugin configuration file generated when configuring the QM profile (C:\IBM\HTTPServer\Plugins\config\webserver_qm\plugin-cfg.xml in this case) in a separate text editor window.
Copy and paste the following lines
from the webserver_qm\plugin-cfg.xml to the
Next copy over the
Also modify the keyring and stashfile properties of the HTTPS Transport attributes for port 9448 to use the IHS keyfile and SSLStashfile.
C:/IBM/HTTPServer/bin/ihskeys.kdb"/> C:/IBM/HTTPServer/bin/ihskeys.sth"/>
Save the webserver1\plugin-cfg.xml.
Start IHS.
First verify that you can still access the JTS page using the IHS URL https://clm.example.org/jts.
Also verify that you can still access the RM and CCM pages using the IHS URLs https://clm.example.org/rm andhttps://clm.example.org/ccm respectively.
Next verify that you can access the QM page using the "internal" URL: https://qmserver01.example.org:9443/qm. and then verify that the IHS URL https://clm.example.org/qm displays the same page.
Running the JTS Setup wizard
Now that we have URLs that are server agnostic we can run the JTS setup wizard and use these URLs when registering the applications. Here are the discovery URLs that will be used:Requirements Management: https://clm.example.org/rm/scr
Quality Management: https://clm.example.org/qm/scr
Change and Configuration Management: https://clm.example.org/ccm/scr
Lifecycle Project Administration: https://clm.example.org/admin/scr
Moving an application
Now suppose that we wish to redeploy the CCM application to it's own separate server (for example, ccmserver01.example.org) without affecting users' ability to access it through https://clm.example.org/ccm. Here is a summary of the steps, previously detailed, to be repeated:- Deploy the CCM application to WAS on ccmserver01.example.org
Follow the instructions in the CLM Infocenter, making sure to copy over the directory that contains the indexes and configuration files, located at/server/conf/ccm for the CCM application from the original server. - Setup SSL Handshake Between WAS profile on ccmserver01.example.org and IHS on clm.example.org
Follow the procedure detailed in Setup SSL Handshake Between the WAS profiles and IHS, creating a new "ccmwaskeys.kdb" keystore from the new WAS profile, copying this keystore over to the IHS server and using gs7cmd to import it into the IHS keystore (ihskeys.kdb). - Force WAS To Honor Host Headers
Follow the procedure in Force WAS To Honor Host Headers on the new WAS profile hosting the CCM application. - Setup Single Sign-On(SSO) with WAS and import JTS keys
Follow the procedure in Part II: Setup RM, QM and CCM for SSO and import JTS keys to set the domain name and import the keys from thejtsssokey key file. - Configure WAS IHS Plug-in for the CCM application
Follow the procedure in Configure WAS IHS Plug-in for the QM application (Server 2) to generate the plugin configuration script for the CCM profile, edit the httpd.conf file, copy the generated script to the new CCM server, run the script and propagate the plugin configuration back to the IHS server - Replace plugin directives
Finally follow the procedure in Merge plugin directives this time replacing the CCM application related entries in the merged plugin configuration file (C:\IBM\HTTPServer\Plugins\config\webserver1\plugin-cfg.xml) with the corresponding entries from the plugin configuration generated for the new CCM WAS profile.
댓글 없음:
댓글 쓰기