• Configuring SSL for SAP Host Agent on UNIX


    https://help.sap.com/viewer/141cbf7f183242b0ad0964a5195b24e7/114/en-US/8d12f7b9244b44219bd14d619d3a2123.html

    Configuring SSL for SAP Host Agent on UNIX
    This section exemplarily describes SSL configuration for the SAP Host Agent on UNIX.

    Prerequisites
    You are logged on as a user with root authorization.

    Context
    In the following procedure we assume that you are using the default naming for the server PSE. If you want to override the default .pse name, you can use the following value in the profile file of SAP Host Agent ( host_profile):

         ssl/server_pse= <Path to Server PSE>
    

    Procedure
    Prepare the Personal Security Environment (PSE) for the server:
    The server PSE contains the server certificate that is presented to the client when establishing the SSL connection, and the names and public keys of the trusted certificates. Trusted certificates can be either certificates issued by a Certification Authority (CA) or individually trusted certificates.

    Proceed as follows:

            Create a directory /usr/sap/hostctrl/exe/sec using the mkdir command.
    

    Note
    Alternatively, you can also use another directory, but then you have to specify the location of the PSE file using the parameter ssl/server_pse as described above. In the following steps we always refer to the sec directory for the sake of simplicity.

                       Assign the ownership for the sec directory to sapadm:sapsys.
    
                        Set up the shared library search path ( LD_LIBRARY_PATH, LIBPATH or SHLIB_PATH) and SECUDIR environment variables, and change to the exe directory of SAP Host Agent.
    

    Example
    On Linux and Solaris, the required commands are as follows:

                    export LD_LIBRARY_PATH=/usr/sap/hostctrl/exe/
    
                    export SECUDIR=/usr/sap/hostctrl/exe/sec
    
                          cd /usr/sap/hostctrl/exe
    

    On HP-UX, the required commands are as follows:

    export SHLIB_PATH=/usr/sap/hostctrl/exe/

    export SECUDIR=/usr/sap/hostctrl/exe/sec

    cd /usr/sap/hostctrl/exe

    On AIX , the required commands are as follows:

    export LIBPATH=/usr/sap/hostctrl/exe

    export SECUDIR=/usr/sap/hostctrl/exe/sec

    cd /usr/sap/hostctrl/exe

    Recommendation
    Set up SECUDIR as an absolute path in order to avoid trouble with the sapgenpse tool.

    Create the server PSE, the server certificate therein, and the Certificate Signing Request (CSR).
    Run the command as user sapadm so that the created files are owned by this user.
    Example

                        sudo -u sapadm LD_LIBRARY_PATH=/usr/sap/hostctrl/exe SECUDIR=/usr/sap/hostctrl/exe/sec /usr/sap/hostctrl/exe/sapgenpse gen_pse -p SAPSSLS.pse -x <password> -r /tmp/myhost-csr.p10 "CN=myhost.wdf.sap.corp, O=SAP AG, C=DE"
    

    This command creates a PSE file named SAPSSLS.pse (name is fixed), which can be used to authenticate myhost.wdf.sap.corp for incoming SSL connections. The access to the PSE file is protected with a password. Use the -r option to direct the certificate signing request to a file, or omit it if you intend to copy and paste the CSR into a web formular.

    Grant SAP Host Agent access to the server PSE.
    

    Example

                  sudo -u sapadm LD_LIBRARY_PATH=/usr/sap/hostctrl/exe SECUDIR=/usr/sap/hostctrl/exe/sec /usr/sap/hostctrl/exe/sapgenpse seclogin -p SAPSSLS.pse -x <password> -O sapadm
    

    Get the certificate as follows:
    Send the certificate signing request to an appropriate CA.

    Assuming that the CA replies to the request file with a CA-response-file which contains the signed certificate in the PKCS#7 format, you can use this file as an input for importing the signed certificate into the server PSE.

    Example
    If the used format is PKCS#7, the text file could be named myhost.p7b. We use this file name in the following examples.

    Import the signed certificate into the server PSE.
    Example
    sudo -u sapadm LD_LIBRARY_PATH=/usr/sap/hostctrl/exe SECUDIR=/usr/sap/hostctrl/exe/sec /usr/sap/hostctrl/exe/sapgenpse import_own_cert -p SAPSSLS.pse -x -c /tmp/myhost.p7b

    Verify the server certificate chain.
    Example
    sudo -u sapadm LD_LIBRARY_PATH=/usr/sap/hostctrl/exe SECUDIR=/usr/sap/hostctrl/exe/sec /usr/sap/hostctrl/exe/sapgenpse get_my_name -p SAPSSLS.pse -x -v

    Restart SAP Host Agent.
    Prepare the Personal Security Environment (PSE) for the client:
    The client PSE contains the client certificate that is sent to SAP Host Agent when the SSL connection is established, and the names and public keys of the trusted certificates from CA.

    The configuration steps are client-specific, that is why we only describe them in a generic way. Follow the instructions in the specific client documentation.

    Examples for possible clients are the SAP Management Console (SAP MC), the SAP Solution Manager Diagnostics Agent, or the SAP Landscape Virtualization Management (LVM) software (formerly known as Adaptive Computing Controller (ACC)).

    Results
    Recommendation
    If you successfully applied the procedure described above, SAP Host Agent also serves port 1129 for SSL communication.

  • 相关阅读:
    [转]Centos 查看端口占用情况和开启端口命令
    [转]简单美观的文字标签云组件
    [转]scp、sftp命令使用
    清华大学《C++语言程序设计基础》线上课程笔记03---数据的共享和保护&数组
    清华大学《C++语言程序设计基础》线上课程笔记02---类与对象
    清华大学《C++语言程序设计基础》线上课程笔记01---基础概念与一些注意事项
    新的玩具:Windows上的awesome
    环境变量ANDROID_SDK_HOME的作用
    Android Dalvik和JVM的区别
    是否使用TDD(测试驱动开发)进行UI开发
  • 原文地址:https://www.cnblogs.com/weikui/p/10339528.html
Copyright © 2020-2023  润新知