Upload
wsudy2
View
171
Download
4
Embed Size (px)
Citation preview
Entrust®
Entrust IdentityGuard 8.1
Installation Guide
Document issue: 3.0
Date of Issue: April 2007
2 Entrust IdentityGuard 8.1 Installation Guide
Copyright © 2007 Entrust. All rights reserved.
Entrust is a trademark or a registered trademark of Entrust, Inc. in certain countries. All Entrust product names and logos are trademarks or registered trademarks of Entrust, Inc. in certain countries. All other company and product names and logos are trademarks or registered trademarks of their respective owners in certain countries.
This information is subject to change as Entrust reserves the right to, without notice, make changes to its products as progress in engineering or manufacturing methods or circumstances may warrant.
Export and/or import of cryptographic products may be restricted by various regulations in various countries. Export and/or import permits may be required.
3Table of contents
Table of contents
About this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Revision information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Documentation conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Note and Attention text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Related documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Obtaining documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Documentation feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Obtaining technical assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Technical support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Telephone numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Email address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Professional Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
CHAPTER 1Preparing for installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Preinstallation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Preinstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Downloading Entrust IdentityGuard software . . . . . . . . . . . . . . . . . . . . . . . . . 21
Preparing your repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Preparing your VPN network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Installation worksheet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Installing the token support patch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Reconfiguring for third-party tokens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
CHAPTER 2Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX . 31
Creating the UNIX group and user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Installing Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Linux Red Hat Enterprise 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
4 IdentityGuard 8.1 Installation Guide Document issue: 3.0
Configuring the primary Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . 36
Starting the Entrust IdentityGuard configuration . . . . . . . . . . . . . . . . . . . . . . . 36
Adding Directory information to Entrust IdentityGuard . . . . . . . . . . . . . . . . . . 37
Adding Database information to Entrust IdentityGuard . . . . . . . . . . . . . . . . . . 42
Completing the Entrust IdentityGuard configuration . . . . . . . . . . . . . . . . . . . . 43
Initializing the primary Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . . 47
What initialization does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
If initialization fails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Initializing the primary server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Configuring the sample application on UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Running the scripts manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Testing your installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Managing the Entrust IdentityGuard service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Starting and stopping Entrust IdentityGuard . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Starting and stopping Entrust IdentityGuard with the UNIX service command . 63
Enabling and disabling individual Entrust IdentityGuard services . . . . . . . . . . . . 64
CHAPTER 3Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Installing Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Configuring the primary Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . 70
Using the Configuration Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Starting the Entrust IdentityGuard Configuration wizard . . . . . . . . . . . . . . . . . 70
Selecting your repository settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Selecting Entrust IdentityGuard service ports . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Selecting your system host name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Completing Entrust IdentityGuard configuration . . . . . . . . . . . . . . . . . . . . . . . 82
Initializing the primary Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . . 83
What initialization does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
If initialization fails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Running the Entrust IdentityGuard Initialization wizard . . . . . . . . . . . . . . . . . . 84
Configuring the sample application on Microsoft Windows . . . . . . . . . . . . . . . . . . 87
Testing your installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Installation troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
5Table of contents
Managing the Entrust IdentityGuard service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
CHAPTER 4Installing Entrust IdentityGuard Server with an existing application server . . 95
Preparing WebLogic for installation of IdentityGuard . . . . . . . . . . . . . . . . . . . . . . . 96
Preparing WebLogic 8.1 for installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Configuring SSL for WebLogic 8.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Configuring SSL for WebLogic 9.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Preparing WebSphere for installation of Entrust IdentityGuard . . . . . . . . . . . . . . . 100
Configuring SSL for WebSphere 6.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Installing Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Configuring the primary Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . 109
Starting the Entrust IdentityGuard configuration . . . . . . . . . . . . . . . . . . . . . . 109
Adding Directory information to Entrust IdentityGuard . . . . . . . . . . . . . . . . . 110
Completing the Entrust IdentityGuard configuration . . . . . . . . . . . . . . . . . . . 115
Initializing the primary Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . 118
What initialization does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
If initialization fails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Initializing the primary server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Configuring the sample application on an existing application server . . . . . . . . . . 121
Running the scripts manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
CHAPTER 5Deploying Entrust IdentityGuard services on an existing application server . 127
Deploying Entrust IdentityGuard services on WebLogic . . . . . . . . . . . . . . . . . . . . 128
Deploying Entrust IdentityGuard services on WebLogic 8.1 application server 128
Deploying Entrust IdentityGuard services on WebLogic 9.1 application server 134
Deploying Entrust IdentityGuard services on WebSphere 6.0 application server . . 142
Defining and deploying shared library settings . . . . . . . . . . . . . . . . . . . . . . . . 142
Installing Entrust IdentityGuard services on WebSphere 6.0 . . . . . . . . . . . . . . 155
Testing your installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
6 IdentityGuard 8.1 Installation Guide Document issue: 3.0
Managing the Entrust IdentityGuard service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Query the status of Entrust IdentityGuard service . . . . . . . . . . . . . . . . . . . . . . 166
Stopping Entrust IdentityGuard Services on WebLogic 8.1 . . . . . . . . . . . . . . . 167
Stopping Entrust IdentityGuard Services on WebLogic 9.1 . . . . . . . . . . . . . . . 168
Stopping Entrust IdentityGuard Services on WebSphere 6.0 . . . . . . . . . . . . . . 169
CHAPTER 6Configuring the Entrust IdentityGuard Radius proxy . . . . . . . . . . . . . . . . . .171
Radius proxy integration overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Configuring the Radius proxy for groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Using Entrust IdentityGuard groups with a VPN server . . . . . . . . . . . . . . . . . . 175
Radius server example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
External authentication example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Matching a group to a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Using the Radius proxy with a Radius server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Using the Radius proxy with a domain controller or LDAP directory . . . . . . . . . . . 187
Configuring the VPN server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Configuring a Radius server for first-factor authentication . . . . . . . . . . . . . . . . . . 194
Configuring Radius server failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Managing the Radius proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Managing the Radius proxy on UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Managing the Radius proxy on Microsoft Windows . . . . . . . . . . . . . . . . . . . . 199
CHAPTER 7Postinstall configuration options for Entrust IdentityGuard Server . . . . . . . . .201
Configuring Entrust IdentityGuard for external authentication . . . . . . . . . . . . . . . 202
Configuring external authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Adding Entrust IdentityGuard replica servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Configuring failover on the repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Configuring failover for a database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Configuring failover for a directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Storing unassigned cards and tokens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Configuring Syslog for remote logging on UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Disabling the non-SSL port on the Authentication service . . . . . . . . . . . . . . . . . . . 228
Enabling the non-SSL port on the Administration service . . . . . . . . . . . . . . . . . . . 230
7Table of contents
Disabling the SSL port on the Administration service . . . . . . . . . . . . . . . . . . . . . . 231
Securing the LDAP connection with SSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Changing the Entrust IdentityGuard certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
Creating self-signed certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
Importing CA-signed certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Exporting the certificate to client applications . . . . . . . . . . . . . . . . . . . . . . . . 238
Updating certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
Enabling system binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
CHAPTER 8Backing up and restoring Entrust IdentityGuard Server. . . . . . . . . . . . . . . . 243
Planning a backup strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
Backing up your configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Restoring Entrust IdentityGuard from a backup . . . . . . . . . . . . . . . . . . . . . . . . . . 250
Restoring a file-based repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Reconfiguring the system or Entrust IdentityGuard serial number . . . . . . . . . . . . . 254
APPENDIX AConfiguring the Entrust IdentityGuard Server properties file . . . . . . . . . . . . 255
Editing property values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Encrypting property values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Enabling the authentication success audit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
Enabling a WSDL query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
Configuring additional search bases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Configuring LDAP directory properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Configuring database properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Enabling cached challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
Caching policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
Changing log configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Changing log locations on UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Configuring master user shell formatting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Configuring license auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Configuring the Entrust IdentityGuard Radius proxy properties . . . . . . . . . . . . . . 282
Configuring external authentication properties . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Configuring token properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
8 IdentityGuard 8.1 Installation Guide Document issue: 3.0
Configuring the Administration interface properties for bulk operations . . . . . . . . 296
Configuring the Administration interface to control the output format . . . . . . . . . 297
APPENDIX BUpgrading Entrust IdentityGuard Server on Linux . . . . . . . . . . . . . . . . . . . .299
Upgrading Entrust IdentityGuard Server 7.2 to 8.1 . . . . . . . . . . . . . . . . . . . . . 299
Upgrading Entrust IdentityGuard Server from 8.0 to 8.1 . . . . . . . . . . . . . . . . 302
APPENDIX CUsing the sample Web application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .305
Preparing to use the sample Web application . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
Accessing the sample Web application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Registering as a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
Activating a card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Registering a token . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
Using machine authentication to log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Using generic authentication to log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Using step-up authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Using temporary PIN authentication to log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Using one-step grid authentication to log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Using two-step grid authentication to log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
APPENDIX DUninstalling Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . . . .335
Uninstalling Entrust IdentityGuard Server with embedded Tomcat on UNIX . . . . . 336
Uninstalling Entrust IdentityGuard Server on Microsoft Windows . . . . . . . . . . . . . 337
Uninstalling Entrust IdentityGuard Server with an existing application server . . . . 338
Uninstalling Entrust IdentityGuard on WebLogic 8.1 . . . . . . . . . . . . . . . . . . . 338
Uninstalling Entrust IdentityGuard on WebLogic 9.1 . . . . . . . . . . . . . . . . . . . 340
Uninstalling Entrust IdentityGuard on WebSphere 6.0 . . . . . . . . . . . . . . . . . . 342
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .345
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .357
9
About this guide
The Entrust IdentityGuard Installation Guide provides detailed information for administrators to plan, install, configure, and troubleshoot the Entrust IdentityGuard Server installation.
This guide contains the following sections:
• Chapter 1 “Preparing for installation” describes important preinstallation steps for installers as well as directory and database administrators.
• Chapter 2 “Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX” provides all the necessary steps for installing, configuring, initializing, and testing Entrust IdentityGuard.
• Chapter 3 “Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows” provides all the necessary steps for installing, configuring, initializing, and testing Entrust IdentityGuard.
• Chapter 4 “Installing Entrust IdentityGuard Server with an existing application server” provides all the necessary steps for installing, configuring, initializing, and testing Entrust IdentityGuard using WebLogic 8.1 or 9.1 and WebSphere 6.0 applications servers.
• Chapter 5 “Deploying Entrust IdentityGuard services on an existing application server” provides all the necessary steps to deploy Entrust IdentityGuard services using the WebLogic 8.1 or 9.1 or WebSphere 6.0 application servers.
• Chapter 6 “Configuring the Entrust IdentityGuard Radius proxy” provides all the necessary steps for configuring the Radius Proxy for VPN use and to manage the Radius Proxy.
• Chapter 7 “Postinstall configuration options for Entrust IdentityGuard Server” describes steps for configuring or reconfiguring Entrust IdentityGuard after installation.
• Chapter 8 “Backing up and restoring Entrust IdentityGuard Server” provides guidelines for planning a backup strategy and steps for restoring Entrust IdentityGuard from a backup.
10 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
• Appendix A “Configuring the Entrust IdentityGuard Server properties file” provides guidelines to reconfigure your installation by editing or adding settings to the identityguard.properties file.
• Appendix B “Upgrading Entrust IdentityGuard Server on Linux” describes steps to upgrade to Entrust IdentityGuard from a previous installation of IdentityGuard 7.2 or 8.0.
• Appendix C “Using the sample Web application” provides instructions for using the “Any Bank” sample Web application.
• Appendix D “Uninstalling Entrust IdentityGuard Server” provides instructions for uninstalling Entrust IdentityGuard from your system.
11About this guideFeedback on guide
Revision informationTable 1: Revisions in this document
Revision Section Description
Document issue 3.0 • “Preparing for installation” on page 19
Expands the chapter introduction to describe the various installation scenarios available to users.
• “Downloading Entrust IdentityGuard software” on page 21
Adds steps for downloading and extracting the token patch file.
• “Installing the token support patch” on page 30
Adds instructions for installing the patch that supports Entrust tokens.
• “Defining and deploying shared library settings” on page 142
Changes the instructions (Step 11) to include adding Entrust tokens to the WebSphere shared library.
• “Configuring the Radius proxy for groups” on page 175
• “Configuring the Entrust IdentityGuard Radius proxy properties” on page 282
Adds an explanation of how you can configure the Radius proxy to convert names with the form “name@group” or “group\name” to “group/name,” which is the form used by Entrust IdentityGuard.
• “Configuring external authentication” on page 202.
Describes a problem that can occur with the Kerberos protocol if LDAP user names are in mixed case.
• “Configuring token properties” on page 295
Adds a section that explains new token-related properties added to the identityguard.properties file.
Document Issue 2.0 • “Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX” on page 31
Adds a section on required preinstallation steps if using Linux Red Hat Enterprise 4.
12 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Document Issue 1.0, patch 108508
• “Preparing WebSphere for installation of Entrust IdentityGuard” on page 100
• “Deploying Entrust IdentityGuard services on WebSphere 6.0 application server” on page 142
• “Configuring the Radius proxy for groups” on page 175
• “Configuring Entrust IdentityGuard for external authentication” on page 202
Adds instructions on installing Entrust IdentityGuard on an AIX server with IBM WebSphere 6.0.
Modifies instructions for configuring external authentication with a domain controller. This patch removed the identityguard.externalauth.kerberos.kdc property and replaced it with a igkrb5.conf file instead.
For more information, see “External authentication example” on page 177.
Table 1: Revisions in this document
Revision Section Description
13About this guideFeedback on guide
Documentation conventionsFollowing are documentation conventions which appear in this guide:
Note and Attention textThroughout this guide, there are paragraphs set off by ruled lines above and below the text. These paragraphs provide key information with two levels of importance, as shown below.
Note: Information to help you maximize the benefits of your Entrust product.
Attention: Issues that, if ignored, may seriously affect performance, security, or the operation of your Entrust product.
Table 2: Typographic conventions
Convention Purpose Example
Bold text (other than headings)
Indicates graphical user interface elements and wizards
Click Next.
Italicized text Used for book or document titles
Entrust TruePass 7.0 Deployment Guide
Blue text Used for hyperlinks to other sections in the document
Entrust TruePass supports the use of many types of digital ID.
Underlined blue text
Used for Web links For more information, visit our Web site at www.entrust.com.
Courier type Indicates installation paths, file names, Windows registry keys, commands, and text you must enter
Use the entrust-configuration.xml file to change certain options for Verification Server.
Angle brackets
< >
Indicates variables (text you must replace with your organization’s correct values)
By default, the entrust.ini file is located in <install_path>/conf/security/entrust.ini.
Square brackets
[courier type]
Indicates optional parameters
dsa passwd [-ldap]
14 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Related documentationEntrust IdentityGuard is supported by a complete documentation suite:
• For instructions on installing and configuring Entrust IdentityGuard on UNIX and Microsoft Windows, see the Entrust IdentityGuard Installation Guide.
• For instructions on administering Entrust IdentityGuard users and groups, see the Entrust IdentityGuard Administration Guide.
• For information on deploying Entrust IdentityGuard, see the Entrust IdentityGuard Deployment Guide.
• For information on configuring Entrust IdentityGuard to work with a supported LDAP repository—Microsoft® Active Directory, Microsoft® Active Directory Application Mode, Critical Path InJoin Directory, IBM Tivoli Directory, Novell eDirectory, or Sun ONE Directory—see the Entrust IdentityGuard Directory Configuration Guide.
• For information on configuring Entrust IdentityGuard to work with a supported database—IBM DB2 Universal Database, Microsoft SQL Server, or Oracle Database—see the Entrust IdentityGuard Database Configuration Guide.
• For information on Entrust IdentityGuard error messages, see the Entrust IdentityGuard Error Messages.
• For information on new features, limitations and known issues in the latest release, see the Entrust IdentityGuard Release Notes.
• For information on integrating the authentication and administration processes of your applications with Entrust IdentityGuard, see the Entrust IdentityGuard Programming Guide that applies to your development platform (either Java Platform or C#).
• For Entrust IdentityGuard product information and a data sheet, go to http://www.entrust.com/strong-authentication/identityguard/index.htm
• For information on identity theft protection seminars, go to http://www.entrust.com/events/identityguard.htm
15About this guideFeedback on guide
Obtaining documentationEntrust product documentation, white papers, technical notes, and a comprehensive Knowledge Base are available through Entrust TrustedCare Online. If you are registered for our support programs, you can use our Web-based Entrust TrustedCare Online support services at:
https://www.entrust.com/trustedcare
Documentation feedbackYou can rate and provide feedback about Entrust product documentation by completing the online feedback form. You can access this form by
• clicking the Feedback on guide link located in the footer of Entrust’s PDF documents (see bottom of this page).
• following this link: http://sottwebdev2.entrust.com/products/feedback/index.cfm
Feedback concerning documentation can also be directed to the Customer Support email address.
16 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Obtaining technical assistanceEntrust recognizes the importance of providing quick and easy access to our support resources. The following subsections provide details about the technical support and professional services available to you.
Technical supportEntrust offers a variety of technical support programs to help you keep Entrust products up and running. To learn more about the full range of Entrust technical support services, visit our Web site at:
http://www.entrust.com/
If you are registered for our support programs, you can use our Web-based support services.
Entrust TrustedCare Online offers technical resources including Entrust product documentation, white papers and technical notes, and a comprehensive Knowledge Base at:
https://www.entrust.com/trustedcare
If you contact Entrust Customer Support, please provide as much of the following information as possible:
• Your contact information
• Product name, version, and operating system information
• Your deployment scenario
• Description of the problem
• Copy of log files containing error messages
• Description of conditions under which the error occurred
• Description of troubleshooting activities you have already performed
Telephone numbersFor support assistance by telephone call one of the numbers below:
• 1-877-754-7878 in North America
• 1-613-270-3700 outside North America
Email addressThe email address for Customer Support is:
17About this guideFeedback on guide
Professional ServicesThe Entrust team assists e-businesses around the world to deploy and maintain secure transactions and communications with their partners, customers, suppliers and employees. We offer a full range of professional services to deploy our e-business solutions successfully for wired and wireless networks, including planning and design, installation, system integration, deployment support, and custom software development.
Whether you choose to operate your Entrust solution in-house or subscribe to hosted services, Entrust Professional Services will design and implement the right solution for your e-business needs. For more information about Entrust Professional Services please visit our Web site at:
http://www.entrust.com
18 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
19
Chapter 1
Preparing for installation
Use this chapter before you install Entrust IdentityGuard Server. It contains important preinstallation steps for installers, as well as for directory and database administrators.
• For a first-time installation of Entrust IdentityGuard, follow instructions in this guide related to a full install on your platform. Then install the latest patch.
• For an upgrade from an earlier version of Entrust IdentityGuard, see “Upgrading Entrust IdentityGuard Server on Linux” on page 299.
• To add support for tokens to an existing installation of Entrust IdentityGuard 8.1, install patch 129366 or a later patch (see “Installing the token support patch” on page 30). (Not available for AIX.)
Attention: Complete the steps in this chapter before you install Entrust IdentityGuard Server.
This chapter contains the following sections:
• “Preinstallation overview” on page 20
• “Preinstallation” on page 21
• “Installation worksheet” on page 25
• “Installing the token support patch” on page 30
20 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Preinstallation overviewThe following flowchart outlines the high level preinstallation steps you must complete before doing a full install of Entrust IdentityGuard Server, including an install on AIX.
Figure 1: Preinstallation overview
RadiusGather addresses and shared
secrets for your VPN and Radiusservers
Download the Entrust IdentityGuard software
Back up your repository
LDAP
Add attributes and object classes to LDAP directory
schemaGather configuration data
JDBC
Create database user and table spaces
Install schema fileInstall JDBC driver
Gather configuration data
Preparing your data repository
What method are you using for primary authentication?
Are you using a VPN server?
ExternalDecide if you will use a domain controller or LDAP directory for
primary authentication
VPNDetermine the group names to
use, if applicable
Create UNIX group and UNIX user (if you are installing on UNIX)
21Preparing for installationFeedback on guide
PreinstallationComplete the following procedures before you install Entrust IdentityGuard Server.
Topics in this section:
• “Downloading Entrust IdentityGuard software” on page 21
• “Preparing your repository” on page 22
• “Preparing your VPN network” on page 23
Note: Some versions of Solaris may not have ZIP. If required, download ZIP from Sun’s Web site at http://www.sun.com/software/solaris/freeware. You will need ZIP for some procedures later in this document.
Downloading Entrust IdentityGuard softwareDownload the Entrust IdentityGuard software package or patch from Entrust TrustedCare Online Web site. They include any schema files you need to set up your repository.
To download Entrust IdentityGuard software1 Browse to the Entrust IdentityGuard downloads page on the Entrust TrustedCare
Online Web site:
https://www.entrust.com/trustedcare
You should have an email from Entrust that includes:
• your user name and password for accessing the downloads page
• instructions on how to access the downloads page
• activation and installation keys required for the installer
2 For a full install, download one of the following files (depending on the operating system you are using) by clicking the Download link:
• IG_81_Linux.tar
• IG_81_Solaris.tar
• IG_81_Windows.zip
• IG_81_WebLogic_WebSphere.tar
• IG_81_WebSphere_AIX.tar
Save the .tar or .zip file to any directory on the computer you want to use to run Entrust IdentityGuard.
22 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
3 For the patch that adds support for Entrust tokens, download either IG_81_129366.zip (for Windows) or IG_81_129366.tar (for Linux or Solaris). If a newer patch is available, download it instead.
4 For a full install, extract the files to a temporary directory.
To do so:
• On UNIX, enter the command,
tar -xvf IG_81_<your_version>.tar
where <your_version> is the file you have downloaded for your specific installation.
• On Microsoft Windows, locate the IG_81_Windows.zip file and extract the files using a utility such as WinZip®.
Extracting the file for a full install creates a subdirectory called IG_81 that contains all the Entrust IdentityGuard files and subdirectories.
5 For patch 129366 or a later patch, extract the files to the existing Entrust IdentityGuard 8.1 root directory.
If an error occurs, try the download again. If the problem persists, contact Entrust Customer Support.
To install patch 129366 or a later patch, skip to “Installing the token support patch” on page 30.
For a full install (including an AIX install), continue with the preinstallation instructions in this chapter, and then follow the applicable installation instructions in later chapters.
Preparing your repositoryConfigure your repository to work with Entrust IdentityGuard before you begin the Entrust IdentityGuard Server installation. Entrust IdentityGuard supports the use of an Active Directory, LDAP directory, or a database as the data repository.
Whether you are upgrading Entrust IdentityGuard Server, or installing for the first time, you must apply the Entrust IdentityGuard schema changes by running the LDIF or SQL files.
To do so, follow the instructions in the Entrust IdentityGuard Directory Configuration Guide or Entrust IdentityGuard Database Configuration Guide.
For up-to-date and detailed information on configuring your repository, see the Technical Integration Guides.
These guides are available for download from Entrust TrustedCare Online at:
https://www.entrust.com/trustedcare
23Preparing for installationFeedback on guide
Preparing your VPN networkTo enable multifactor authentication for VPN connections, you can install and configure the Entrust IdentityGuard Radius proxy component with your full installation of Entrust IdentityGuard Server.
There are two ways you can set up the system to perform the required first-factor authentication before the second-factor authentication provided by Entrust IdentityGuard:
• Configure a separate Radius server that will perform the first-factor authentication, and use the Entrust IdentityGuard Radius proxy to communicate with Entrust IdentityGuard for second-factor authentication. For more information, see “Using the Radius proxy with a Radius server” on page 180.
• Configure the external authentication feature provided with Entrust IdentityGuard. This enables Entrust IdentityGuard to perform first-factor authentication using the Windows domain controller or the information from the LDAP directory. For more information, see “Configuring Entrust IdentityGuard for external authentication” on page 202.
If you are configuring Entrust IdentityGuard to add multifactor authentication to VPN connections, ensure that the following are already installed:
• an external Radius server installed using the instructions provided by the vendor, if you plan to use a Radius server for first-factor authentication
For details, see the Technical Integration Guide that applies to your VPN platform.
• a VPN client and server installed using the instructions provided by the vendor
Note: If you want to configure your VPN servers to recognize Entrust IdentityGuard groups, ensure that you create the groups (or at least know what you are going to name the groups) before installing and configuring the Entrust IdentityGuard Radius proxy. For more information, see “Configuring the Radius proxy for groups” on page 175.
The details of Radius use and implementation vary with the platform and provider. Entrust supports several authentication protocols with Radius for grid authentication:
• Challenge Handshake Authentication Protocol (CHAP)
• Microsoft Challenge Handshake Authentication Protocol versions 1 and 2 (MS-CHAP and MS-CHAPv2)
• Password Authentication Protocol (PAP)
For token authentication, Entrust IdentityGuard supports only PAP. If you configure the Radius proxy to use external authentication, you must use PAP.
24 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
PAP supports the cell replacement properties in the card specification attributes (cardspec) and temporary PIN attributes (pinspec) of the Entrust IdentityGuard policies; however, CHAP and MS-CHAP do not. This means that, for example, user entries are treated as case-sensitive in CHAP.
25Preparing for installationFeedback on guide
Installation worksheetFor a full install, ensure you have the following information before installing Entrust IdentityGuard.
Attention: If you choose to record passwords on this worksheet, remember to always keep passwords secure. Store this worksheet in a secure place.
Table 3: Installation worksheet
Required information Value
Which type of install of Entrust IdentityGuard?
• Entrust IdentityGuard Server with embedded Tomcat application server on UNIX
• Entrust IdentityGuard Server with embedded Tomcat application server on Microsoft Windows
• Entrust IdentityGuard Server with an existing application server on Solaris or AIX
Entrust IdentityGuard Server host name
UNIX user and group that owns Entrust IdentityGuard (on embedded Tomcat application server on UNIX install only)
Application server user and group that owns the application server (for installations with an existing application server only).
Group:
Name:
Password:
Complete “Creating the UNIX group and user” on page 32 (for installation with embedded Tomcat)
Entrust IdentityGuard installation directory. The default is: on UNIX /opt/entrust; on Windows c:\Program Files\Entrust\IdentityGuard)
Radius proxy required? yes or no
Complete “Radius proxy information” on page 28
Location of server trust store (installs with existing application server only)
26 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Location of Java directory (installs with existing application server only)
Database, Active Directory, or LDAP directory?
DB, AD, or LDAP
Complete “Database information” on page 27 or “Directory information” on page 27
Entrust IdentityGuard Authentication Web service port number (8080)
Entrust IdentityGuard Administration Web service port number (8443)
Installation key
Activation key
Master1 password
Master2 password
Master3 password
Enable sample application? yes or no
If yes, complete one of:
• “Configuring the sample application on Microsoft Windows” on page 87 if you are installing on Windows with the embedded Tomcat server
• “Configuring the sample application on UNIX” on page 51 if you are installing on UNIX with the embedded Tomcat server
• “Configuring the sample application on an existing application server” on page 121 if you are installing on an existing application server
Sample application administrator1 Name:
Password:
1. If you are using a Directory as your repository, you need to create this user in the Directory prior to installation.
Table 3: Installation worksheet (continued)
Required information Value
27Preparing for installationFeedback on guide
For a list of applicable .jar files for your database, the JDBC class name, and related details, see the Entrust IdentityGuard Database Configuration Guide.
For details related to your Directory type, see the Entrust IdentityGuard Directory Configuration Guide.
Table 4: Database information
Database required information Value
Database driver .jar files.
(Ensure they are copied to the Entrust IdentityGuard computer.)
Database driver class name
Database URL
Database user Name:
Password:
Schema name
Table 5: Directory information
Directory required information Value
Using the LDAP or LDAPS protocol?
LDAP or LDAPS
If using LDAPS, copy the certificate to the Entrust IdentityGuard computer.
LDAP host name
LDAP port number
LDAP base DN
LDAP user DN DN:
Password:
LDAP policy RDN
LDAP user ID attribute
28 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Table 6: Radius proxy information
Radius proxy required information
Value
Radius proxy ports
VPN server information Label:
Host name/IP address:
Port:
Shared secret:
Should VPN servers recognize Entrust IdentityGuard groups?
yes or no
Entrust IdentityGuard groups for VPN servers
Will the Radius proxy connect to a Radius server, domain controller or LDAP directory?
If the Radius proxy will use a Radius server, what is the unique Radius server name?
Unique name:
Host name/IP address:
Port:
Shared secret:
Table 7: External authentication information
Radius proxy required information
Value
Will Entrust IdentityGuard use an LDAP directory or Windows domain controller for first-factor authentication?
yes or no
If yes, answer one of the next two questions.
For a Windows domain controller, what server will host the Kerberos realm and the Kerberos Key Distribution Center (KDC)?
Kerberos realm server:
Kerberos KDC server:
29Preparing for installationFeedback on guide
For an LDAP directory, Entrust IdentityGuard must be configured to use an LDAP repository. Is that configuration complete?
yes or no
Table 7: External authentication information
Radius proxy required information
Value
30 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Installing the token support patchFollow these steps to install a patch that provides support for Entrust tokens on Linux or Windows.
1 Download either IG_81_129366.zip (for Windows) or IG_81_129366.tar (for Linux). See “Downloading Entrust IdentityGuard software” on page 21. If a newer patch is available, download it instead.
2 To install the patch:
• On Linux, run the patch install script install.sh.
• On Windows, run the patch installer file, for example IG_81_129366.msp.
3 Examine the instructions in the “Installation notes” section of the readme.txt file included with the download. It includes instructions that may be specific to your system or environment. For example, these instructions include:
• Deployment instructions for WebSphere and WebLogic.
• Fixing performance problems that can occur with preproduced cards stored in a database repository.
• Instructions on using Oracle Internet Directory as a repository.
The patch automatically sets properties in the identityguard.properties file related to tokens.
Reconfiguring for third-party tokensWhen you run this patch, it sets up Entrust IdentityGuard to use only Entrust tokens. If you are already using supported Vasco tokens, or plan to use them, you must add the following entry to the identityguard.properties file after you install this patch or a later patch:
identityguard.token.impl=
com.entrust.identityGuard.common.token.vasco.VascoTokenManager
To reset the property to use Entrust tokens, change the setting to this:
identityguard.token.impl=
com.entrust.identityGuard.common.token.activIdentity.ActivIdentity
TokenManager
Restart Entrust IdentityGuard for this setting to take effect.
You can configure Entrust IdentityGuard to use Entrust tokens or Vasco tokens, but not both.
31
Chapter 2
Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX
This chapter provides all the necessary steps to install Entrust IdentityGuard Server (with the Apache Tomcat application server embedded) on UNIX. Complete the instructions in this chapter to install, configure, initialize, and test a full install of the Entrust IdentityGuard Server. Once you complete the full installation, install the latest patch.
To install the patch that supports Entrust tokens, see “Installing the token support patch” on page 30.
This chapter contains the following sections:
• “Creating the UNIX group and user” on page 32
• “Installing Entrust IdentityGuard Server” on page 33
• “Configuring the primary Entrust IdentityGuard Server” on page 36
• “Initializing the primary Entrust IdentityGuard Server” on page 47
• “Configuring the sample application on UNIX” on page 51
• “Running the scripts manually” on page 53
• “Testing your installation” on page 58
• “Managing the Entrust IdentityGuard service” on page 62
32 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Creating the UNIX group and userBefore you install Entrust IdentityGuard Server on UNIX, create the UNIX group and user that will own the Entrust IdentityGuard installation. In a later step (Step 4 on page 34), you are asked to name the UNIX group and user that you create here.
Attention: Arrange to have a dedicated user account and group created on the servers that will host Entrust IdentityGuard. You must use the same account for any future upgrades and patches.
Note: On Solaris, use lowercase for creating groups and users. For example, use iggroup and iguser, instead of IGgroup and IGuser.
To create a new UNIX group and user1 As root, create a new UNIX group. For example, IGgroup:
• on Linux and Solaris,
groupadd iggroup
2 As root, create a new UNIX user. For example, IGuser. The user is a member of IGgroup and has a password:
• on Linux,
useradd -g iggroup -s /bin/bash -p password123 IGuser
• on Solaris if using c-shell,
– useradd -g iggroup -s /usr/bin/csh iguser
– passwd iguser
• on Solaris if using b-shell,
– useradd -g iggroup -s /usr/bin/bsh iguser
– passwd iguser
When you run passwd, enter your password at the prompt. For example, password123.
You have created a UNIX group and user.
Note: Ensure that the user and group that you create here have permissions to access the directory to which you extracted the IG_81_Linux.tar or the IG_81_Solaris.tar file.
33Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
Installing Entrust IdentityGuard ServerEntrust IdentityGuard Server runs on UNIX and should be installed on a dedicated machine. Other software products on the same machine can interfere with the operation of Entrust IdentityGuard.
To install and configure Entrust IdentityGuard, you must have an understanding of UNIX administration.
Attention: If you are installing Entrust IdentityGuard on Linux, the install requires the native library file, libstdc++.so.5. Linux Red Hat 4.0 does not provide this file by default. For further information on downloading this file, see the Entrust IdentityGuard Release notes.
Note: Before installing Entrust IdentityGuard, ensure that you have completed the tasks in “Preparing for installation” on page 19.
If you are upgrading your version of Linux, you should do so before installing Entrust IdentityGuard 8.1.
Linux Red Hat Enterprise 4When using Linux Red Hat Enterprise 4, you need to include libstdc++.so.5. You can add this during Linux installation by selecting the Legacy Software Development package.
If you have installed Linux Red Hat Enterprise 4 and have an X11 Window Manager such as KDE or Gnome, you can add the library after installation by doing the following:
1 Select Applications > System Settings > Add/Remove Applications.
2 On the Development tab, select Legacy Software Development.
You are prompted for your Linux installation CD.
If you have installed Linux Red Hat Enterprise 4 without access to an X11 Window Manager, and you are using the command line interface, you must install the most recent compat-libstdc++ package (for example, compat-libstdc++-33-3.2.3-47.3.i386.rpm).
1 Download the most recent package from the Red Hat Web site, www.redhat.com.
2 To install the package at the command line type
rpm -i <compat-libstdc++-33-3.2.3-47.3.i386.rpm>
34 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Note: Replace the file name with the one you downloaded from the Red Hat Web site.
To install Entrust IdentityGuard1 As root, change to the directory that you extracted the IG_81_Linux.tar or
IG_81_Solaris.tar file to (<download_dir>/IG_81), and run install.sh by entering:
./install.sh
Note: Cancel out of the script at any time by pressing Ctrl + C.
2 Read through the license carefully, pressing Enter until you reach the end. The following message appears:
Do you agree to the above license terms? [yes or no]
3 Type yes and press Enter to accept the terms. Otherwise, if you do not agree with the license, type no and press Enter. The installation will cancel. Contact Entrust (“Obtaining technical assistance” on page 16).
The following message appears:
Enter the UNIX user name that will own the installation:
4 Type the user name for the UNIX user you created in Step 2 of “Creating the UNIX group and user” on page 32 and press Enter.
Note: You cannot specify root as the owner.
The following message appears:
Enter the UNIX group name that will own the installation:
5 Enter the name for the UNIX group you created in Step 1 of “Creating the UNIX group and user” on page 32 and press Enter.
The following message appears:
Enter the install directory (default /opt/entrust):
6 Press Enter to accept the default, or type in another directory location.
Note: If you have a previous installation of Entrust IdentityGuard, the installation detects the older version and prompts you to upgrade. If you are installing an upgrade, see the section “Upgrading Entrust IdentityGuard Server on Linux” on page 299.
35Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
The Java Runtime license agreement appears.
7 Read through the license carefully, pressing Enter until you reach the end.
8 You are asked to accept the Java Runtime license agreement.
Do you agree to the above license terms? [yes or no]
Type yes and press Enter to accept the terms. Otherwise, if you do not agree with the license, type no and press Enter. The installation will cancel. Contact Entrust (“Obtaining technical assistance” on page 16).
The JRE, Java policy files, and the Application server are installed in the installation directory you entered in Step 6.
The identityguard.zip file is automatically extracted into the directory $IDENTITYGUARD_HOME, where $IDENTITYGUARD_HOME is usually /opt/entrust/identityguard81.
9 The installation creates the Entrust IdentityGuard Radius service.
Creating igradius service...
Do you want the Entrust IdentityGuard Radius proxy to start
automatically when the host starts after reboot? [yes or no]
If you answer no, you can enable automatic startup later.
If you wish to enable automatic startup in the future, run the
command "chkconfig igradius reset" when logged on as root.
Note: If you want to configure your VPN servers to recognize Entrust IdentityGuard groups, you must first install Entrust IdentityGuard and define the groups. In this case, enter no.
See “Configuring the Entrust IdentityGuard Radius proxy” on page 171 for further details.
10 When the initial install steps are complete, you are prompted to respond to the following message:
Installation complete.
Do you want to configure the application now? [yes or no]
• Answer yes and press Enter to start the configuration tasks. Proceed to “Configuring the primary Entrust IdentityGuard Server” on page 36.
• If you answer no, you must run the configure.sh script manually from the $IDENTITYGUARD_HOME/bin directory before you can use Entrust IdentityGuard. To do so, proceed to “To run the primary Entrust IdentityGuard Server configuration manually” on page 53.
36 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Configuring the primary Entrust IdentityGuard Server
As part of the installation procedure, you are prompted to configure and initialize Entrust IdentityGuard. You can choose to complete these configuration steps at the same time as the installation, or after.
Refer to your installation worksheet (“Installation worksheet” on page 25) when you complete this section.
Topics in this section:
• “Starting the Entrust IdentityGuard configuration” on page 36
• “Adding Directory information to Entrust IdentityGuard” on page 37
• “Adding Database information to Entrust IdentityGuard” on page 42
• “Completing the Entrust IdentityGuard configuration” on page 43
Starting the Entrust IdentityGuard configurationComplete the following steps to start configuring the primary Entrust IdentityGuard Server.
To start the Entrust IdentityGuard configuration1 Respond to the following prompt:
Are you configuring an Entrust IdentityGuard primary or replica
server? (PRIMARY or REPLICA):
• Primary. If this is your first Entrust IdentityGuard Server installation, answer primary and continue on with the steps in this procedure.
Note: There can only be one primary server.
• Replica. If you have already installed an Entrust IdentityGuard Server, and you want to install more instances, answer replica.
To configure and initialize a replica server, proceed to “Adding Entrust IdentityGuard replica servers” on page 210.
2 You are asked to indicate whether the user information is stored in an Active Directory (AD), LDAP, or database (DB) repository.
What type of repository will you use to store Entrust
IdentityGuard information?
37Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
AD - Microsoft(R) Active Directory or Microsoft Active Directory
in Application Mode
LDAP - LDAP-compliant Directory
DB - Database
(AD, LDAP or DB):
• If you are using an LDAP repository, proceed to “To add LDAP directory information to Entrust IdentityGuard” on page 37.
• If you are using an Active Directory or Active Directory Application Mode (ADAM) repository, proceed to “To add Active Directory (or ADAM) information to Entrust IdentityGuard” on page 39.
• If you are using a database repository, proceed to “To add Database information to Entrust IdentityGuard” on page 42.
Note: You can cancel the script at any time by pressing Ctrl + C.
Adding Directory information to Entrust IdentityGuardThe following steps sets up Entrust IdentityGuard to communicate with a directory repository.
The identityguard.properties file is created based on the values you enter.
Follow the appropriate steps:
• if you are adding a LDAP directory, proceed to “To add LDAP directory information to Entrust IdentityGuard”
• if you are adding Active Directory or Active Directory Application Mode, proceed to “To add Active Directory (or ADAM) information to Entrust IdentityGuard”
Note: For more information on LDAP and Active Directory configuration, see the Entrust IdentityGuard Directory Configuration Guide.
To add LDAP directory information to Entrust IdentityGuard1 Respond to the following prompt:
LDAP CONFIGURATION
Do you wish to use SSL to connect to the LDAP server? [yes or no]
38 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Type yes and press Enter to add the SSL certificate. If you answer no, proceed to Step 3 on page 38.
Note: You can enable LDAPS after installation. For instructions, see “Securing the LDAP connection with SSL” on page 233.
2 If you answered yes, complete the following steps:
a The following message appears:
In order to verify the SSL connection to the LDAP server,
Entrust IdentityGuard requires that the LDAP server's SSL
certificate or the certificate of the CA that issued it be
imported into its trust store. The Entrust IdentityGuard trust
store already contains several public root CA certificates. If
the server's certificate was not issued by a public root you
must import the certificate. If Entrust IdentityGuard cannot
trust the server's certificate, it will be unable to connect to
the LDAP server causing operations including initialization to
fail.
Do you wish to import the LDAP server's SSL certificate? [yes
or no]
Answer yes and press Enter to import the certificate.
For manual instructions on importing the certificate, see “To import the LDAP SSL certificate” on page 233.
The following message appears:
Enter the filename of the certificate:
b Enter the path and file name of the LDAPS certificate.
c The installer displays the details of the certificate. If they are correct, respond with yes to the prompt that asks if you wish to trust the certificate.
<certificate information>
Trust this certificate? [no]: yes
Certificate was added to keystore.
3 At the following prompt, enter the host name or IP address of the computer hosting the directory.
Enter the LDAP host (ex: identityguard.anycorp.com):
4 Enter the port number of the directory.
39Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
Enter the LDAP port number (default is 389):
The default port for LDAPS is 636.
5 Enter the LDAP base DN (the DN under which all Entrust IdentityGuard entries are found).
Enter the LDAP base DN (ex: dc=anycorp,dc=com):
Note: See the Entrust IdentityGuard Directory Configuration Guide for more information on directory configuration. It includes information on setting the DN, RDN, and LDAP user name for several popular directories.
6 Enter the LDAP user DN information at the following prompts. The LDAP user DN and password define the credentials used by Entrust IdentityGuard to connect to the repository.
Enter the LDAP user DN (ex: cn=Directory Manager):
This is an existing LDAP user DN.
Enter the LDAP password:
Confirm:
This is an existing LDAP password.
7 At the following prompt, enter the RDN of the entry that Entrust IdentityGuard should use to store its policy information.
The LDAP policy RDN defines the entry in the LDAP repository used
to store Entrust IdentityGuard policy information. The entry must
already exist. Enter the LDAP policy RDN (ex: uid=policy):
The RDN is the prefix that when joined with the base DN, comprises the full DN of the policy object.
8 At the following prompt, enter the attribute that uniquely identifies Entrust IdentityGuard users.
The LDAP user name is the attribute that uniquely identifies
Entrust IdentityGuard users. Entrust IdentityGuard uses this
attribute to find entries in the repository. Enter the LDAP user
name attribute (ex: uid):
Proceed to “To complete the configuration script” on page 43.
To add Active Directory (or ADAM) information to Entrust IdentityGuard1 Respond to the following prompt:
40 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
MICROSOFT ACTIVE DIRECTORY CONFIGURATION
Do you wish to use SSL to connect to the Microsoft Active
Directory server? [yes or no]
Type yes and press Enter to add the SSL certificate. If you answer no, proceed to Step 3 on page 40.
2 If you answered yes, complete the following steps:
The following message appears:
In order to verify the SSL connection to the Microsoft Active
Directory server, Entrust IdentityGuard requires that the
Microsoft Active Directory server's SSL certificate or the
certificate of the CA that issued it be imported into its trust
store. The Entrust IdentityGuard trust store already contains
several public root CA certificates. If the server's certificate
was not issued by a public root you must import the certificate.
If Entrust IdentityGuard cannot trust the server's certificate, it
will be unable to connect to the Microsoft Active Directory server
causing operations including initialization to fail.
Do you wish to import the Microsoft Active Directory server's SSL
certificate? [yes or no]
a Answer yes and press Enter to import the certificate.
The following message appears:
Enter the filename of the certificate:
b Enter the path and file name of the Active Directory certificate.
c The installer displays the details of the certificate. If they are correct, respond with yes to the prompt that asks if you wish to trust the certificate.
<certificate information>
Trust this certificate? [no]: yes
Certificate was added to keystore
3 At the following prompt, enter the host name or IP address of the computer hosting the directory.
Enter the Microsoft Active Directory host (ex:
identityguard.anycorp.com):
4 Enter the port number of the directory.
Enter the Microsoft Active Directory port number (default is 636):
41Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
5 Enter the Active Directory base DN (the DN under which all Entrust IdentityGuard entries are found).
Enter the Microsoft Active Directory base DN (ex:
dc=anycorp,dc=com):
Note: Entrust IdentityGuard configuration automatically converts spaces in the Active Directory base DN to %20. If you edit the Active Directory base DN after installation in the identityguard.properties file, remember to replace spaces with %20.
6 Enter the Active Directory user DN information at the following prompts. The Active Directory user DN and password define the credentials used by Entrust IdentityGuard to connect to the repository.
Enter the Microsoft Active Directory user DN (ex:
cn=Administrator,cn=Users,dc=anycorp,dc=com):
This is an existing Active Directory user DN.
Enter the Microsoft Active Directory password:
Confirm:
This is an existing Active Directory password.
7 At the following prompt, enter the RDN of the entry that Entrust IdentityGuard should use to store its policy information.
The policy RDN defines the entry in the Microsoft Active Directory
repository used to store Entrust IdentityGuard policy information.
The entry must already exist. Enter the Microsoft Active Directory
policy RDN (ex: cn=igpolicy,cn=Users):
The RDN is the prefix that when joined with the base DN, comprises the full DN of the policy object.
8 At the following prompt, enter the attribute that uniquely identifies Entrust IdentityGuard users.
The Microsoft Active Directory user name is the attribute that
identifies Entrust IdentityGuard users. Entrust IdentityGuard uses
this attribute to find entries in the repository. Enter the
Microsoft Active Directory user name attribute (ex:
sAMAccountName):
Proceed to “To complete the configuration script” on page 43.
42 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Note: Use sAMAccountName for Active Directory. Use CN (common name) or uid for ADAM. See the Entrust IdentityGuard Directory Configuration Guide for more information on Active Directory and Active Directory Application Mode configuration.
Adding Database information to Entrust IdentityGuardThe following steps sets up Entrust IdentityGuard to communicate with a database repository.
The identityguard.properties file is created based on the values you enter.
Note: For more information on database configuration, see the Entrust IdentityGuard Database Configuration Guide. It includes information on the drivers, classes, and database URLs used with three common databases.
To add Database information to Entrust IdentityGuard1 Respond to the following prompt:
DATABASE CONFIGURATION
Enter the database type (Oracle, DB2, SQLServer, Other):
Type the database you are using and press Enter.
The following message appears:
Enter the JDBC driver JAR file name:
2 Enter the path of the JDBC driver file (for example, /temp/ojdbc14.jar). Ensure the file permissions on this file allow the Entrust IdentityGuard user (“Creating the UNIX group and user” on page 32) to read and execute it.
Note: Some databases require multiple .jar files. You can add other files in a later step.
3 At the following prompt, enter the JDBC driver class that Entrust IdentityGuard should use, (for example, oracle.jdbc.driver.OracleDriver).
Enter the JDBC driver class name:
The following message appears:
Are there any other JDBC JAR files to be installed? [yes or no]
43Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
4 If your database requires multiple JDBC driver files, type yes and press Enter. You are prompted to enter more file names. If your database only requires one file, type no and press Enter to continue.
The following message appears:
Enter the DB URL:
5 Type the database URL Entrust IdentityGuard requires to connect to the database server and press Enter.
6 Provide Entrust IdentityGuard with the database administrator information. This database administrator was created to own the Entrust IdentityGuard database and schema.
a At the following prompt, type the database administrator user name:
Enter the DB user name:
b At the following prompts, type and confirm the database administrator password:
Enter the DB password:
Confirm:
The following message appears:
Enter the DB schema name:
7 Type the schema name for your database.
In some databases (for example, Oracle), the schema is automatically named with the user name associated with it. For these databases, type the database administrator user name.
Completing the Entrust IdentityGuard configurationThe following steps complete the initial configuration of Entrust IdentityGuard.
You are prompted for the ports that the Application server should use. Client applications—through the Authentication API—communicate with the Entrust IdentityGuard Authentication service to perform challenge retrieval and response validation. The API communicates with Entrust IdentityGuard using SOAP over HTTP/HTTPS. The following prompts define the ports that Entrust IdentityGuard services listens on.
To complete the configuration script1 Enter a value for each, or leave it blank and press Enter to accept the default value
at the prompts.
APPLICATION SERVER CONFIGURATION
44 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
a Enter the Authentication Service HTTP port number (default is 8080):
b Enter the Authentication Service HTTPS port number (default is 8443):
The Entrust IdentityGuard Authentication service and the Entrust IdentityGuard sample application are deployed at both the HTTP and HTTPS ports.
c Enter the Administration Service HTTPS port number (default is 8444):
This is the port that administration applications use to connect to the Administration service when using SSL (HTTPS). This port is only used for remote administration of Entrust IdentityGuard.
A self-signed SSL certificate and private key are created to protect the HTTPS connections to the Authentication service and Administration service. This certificate includes the host name of the Entrust IdentityGuard Server in its distinguished name (DN) and uses the RSA-1024 algorithm.
Optionally, you can replace this certificate after configuration. See the section “Changing the Entrust IdentityGuard certificate” on page 235 for instructions.
Note: Ensure the host name that you use in the service URLs matches the host name in the SSL certificate.
2 You are prompted to confirm the host name used in the service URLs and the SSL certificate:
Entrust IdentityGuard will create a self-signed certificate for
SSL communication.
The hostname to be used in the service URLs and the SSL
certificate is <hostname>.
Do you want to use this hostname? [yes or no]
3 Enter yes to use this host name or enter no to choose another host name.
a You are prompted to set the lifetime of the self-signed certificate:
Enter the lifetime in days of the certificate (default is 365):
Enter a new value, or leave it blank and press Enter to accept the default value of 365 days.
The location of the certificate appears after you press Enter. Entrust IdentityGuard automatically exports a copy of the self-signed certificate to a file. The name and location of the file appears after you press Enter. Within
45Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
the keystore, the self-signed certificate and private key are stored under the alias “tomcat.”
4 You are prompted to configure Entrust IdentityGuard logs:
LOG CONFIGURATION
a The following question appears:
Should Entrust IdentityGuard log to files or syslog [FILE or
SYSLOG]:
If you answer file, Entrust IdentityGuard displays the location of the files and configuration is complete.
b If you answer syslog, logs are logged to Syslog. Entrust IdentityGuard prompts you for the host name.
Enter the syslog host name (default is localhost):
Ensure that Syslog on this host is configured to accept Entrust IdentityGuard logs. For more information, see the section “Configuring Syslog for remote logging on UNIX” on page 226.
The following message appears:
Do you want to configure the Entrust IdentityGuard Radius
Proxy? [yes or no]
5 Do one of the following:
• If you plan to use a Radius server for first-factor authentication and are not using VPN groups, enter yes. Proceed to Step 4 in “To configure the Radius proxy on UNIX” on page 180.
• If you plan to use a Radius server for first-factor authentication and you want to configure your VPN servers to recognize Entrust IdentityGuard groups, you need to first complete the configuration and initialization of Entrust IdentityGuard and define the groups. In this case, enter no.
• If you plan to use a Windows domain controller or LDAP directory for first-factor authentication, enter yes. Follow the instructions under “Using Entrust IdentityGuard groups with a VPN server” on page 175.
• Otherwise, enter no.
6 When you finish the configuration procedure, respond to the following message:
Configuration complete.
Do you wish to initialize the primary system? [yes or no]
• Enter yes and press Enter to start the initialization tasks. Proceed to “Initializing the primary Entrust IdentityGuard Server” on page 47.
• If you enter no, you must run the init command in the supersh command shell from the $IDENTITYGUARD_HOME/bin directory before you can use
46 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Entrust IdentityGuard. Proceed to “To initialize the primary Entrust IdentityGuard Server manually” on page 53.
47Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
Initializing the primary Entrust IdentityGuard Server
Read this section for instructions on initializing the primary Entrust IdentityGuard Server in your system.
Topics in this section:
• “What initialization does” on page 47
• “If initialization fails” on page 47
• “Initializing the primary server” on page 48
What initialization doesInitialization creates master keys and the various policy structures. The identityguard.properties file specifies two files that are used to store the keys that protect the repository and the master users. The files that store this information are:
• Entrust IdentityGuard master keys file (masterkeys.enc)—a file containing the encryption keys that protect the repository.
• Entrust IdentityGuard key protection file (masterkeys.kpf)—a file containing an obfuscation key which is used to encrypt the three master user passwords that are stored in the file.
The contents of the master keys file can be unlocked by a master user. The contents of the key protection file provide access to the master user passwords. This access can then be used to unlock the master keys file.
If initialization failsThe most likely causes of an initialization failure are:
• The Entrust IdentityGuard properties file contains invalid values. To resolve this, go to $IDENTITYGUARD_HOME/etc/identityguard.properties and edit the file.
• Your repository is not configured correctly to work with Entrust IdentityGuard.
• The repository is not running.
For more information on Entrust IdentityGuard error messages, see Entrust IdentityGuard Error Messages included with your documentation package.
48 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Initializing the primary serverThis section provides the steps necessary to initialize the primary server.
Attention: As previously stated, if you are installing Entrust IdentityGuard on Linux, the install requires the native library file, libstdc++.so.5. Ensure that you have this file for initializing the system. Linux Red Hat 4.0 does not provide this file by default.
If you are initializing a replica server, see “Managing the Entrust IdentityGuard service” on page 62.
To initialize the primary Entrust IdentityGuard Server during installation1 Respond to the following message:
PRIMARY SYSTEM INITIALIZATION
If you are reinstalling Entrust IdentityGuard, the following prompt appears:
An existing system has been detected. Overwriting an existing
system will mean the existing data can no longer be accessed. Are
you sure you want to overwrite the existing system? (y/n) [n]:
Attention: If you are using an LDAP repository, and you run init -overwrite, you must first manually remove the fpcr folder located at $IDENTITYGUARD_HOME/etc/fpcr/ and the ftkr folder located at $IDENTITYGUARD_HOME/etc/ftkr.
Attention: If you reinitialize an Entrust IdentityGuard system by running init -overwrite, you must first replace any encrypted values in the identityguard.properties file with cleartext values because Entrust IdentityGuard cannot decrypt the old values once the reinitialization is performed. See the section “Editing property values” on page 257.
When you answer y, the command init -overwrite runs automatically.
The init command:
• generates a new master key and stores it in the master keys file
• generates the key protection file
• initializes default policy settings
49Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
If you answer n, or if initialization fails, you must run the init command in the master user shell (supersh) at a later time. For steps for initializing manually, see the section “To initialize the primary Entrust IdentityGuard Server manually” on page 53.
Note: Cancel out of the script at any time by pressing Ctrl + C.
The following messages appear:
Enter install key:
Enter activation key:
2 Enter the installation key and the activation key you received from Entrust. Once the activation key is validated, masters keys are then generated.
Attention: The two master keys files are created in $IDENTITYGUARD_HOME/etc. After initialization, back up masterkeys.enc. If this file is lost, the system cannot be recovered. See the system restore procedure in “Restoring Entrust IdentityGuard from a backup” on page 250.Do not back up the key protection file (masterkeys.kpf). The masterkeys.kpf file is unique to each server.
3 Type the three master user passwords for the user names—Master1, Master2, and Master3.
The passwords must meet the following criteria:
• be over eight characters in length
• contain upper and lowercase characters
• contain a numerical value
The following prompts are displayed:
Enter a new password for Master1.
Password:
Confirm:
Enter a new password for Master2.
Password:
Confirm:
Enter a new password for Master3.
Password:
Confirm:
4 When you have finished creating passwords, the following message appears:
50 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
System initialized.
Do you wish to setup the sample application [yes or no]
• Enter yes to configure the sample application. Proceed to “Configuring the sample application on UNIX” on page 51.
• If you enter no, you can optionally configure the sample application later. Proceed to “Testing your installation” on page 58.
51Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
Configuring the sample application on UNIX
Entrust IdentityGuard provides a sample application that includes user registration functionality as well as various authentication samples. This sample requires an administrator user name and password. If you are using a directory, you must create the administrator before configuring the sample application.
For more information on the sample application, see “Using the sample Web application” on page 305 or see the Entrust IdentityGuard Administration Guide.
Attention: The sample administrator password is stored in clear text in the file $IDENTITYGUARD_HOME/etc/igsample.properties. For security reasons, disable the sample application when you are not using it.
The configsample.sh script creates the following:
• a role called samplerole
• a policy called samplepolicy
• a group called samplegroup
• an administrator in the samplegroup (the administrator has access to the samplegroup)
• an igsample.properties file
If you are configuring the sample application manually, see “To enable the sample application manually” on page 52.
To configure the sample application1 You are prompted to enter the user name for the sample administrator:
Enter adminid for sample administrator:
2 You are prompted to enter and confirm a password:
Enter password for sample administrator:
Confirm:
The password must meet the following criteria:
• be over eight characters in length
• contain upper and lowercase characters
• contain a numerical value
3 Log in as a master user to complete the setup.
You are prompted for a master user name and password:
52 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Userid:
Password:
4 When you are finished setting up the sample, the following message appears:
Setup of Entrust IdentityGuard sample successful.
5 You are prompted to enable the sample.
Do you want to enable the sample service? [yes or no]
If you answer yes, the sample is enabled.
If you answer no, the sample is disabled. You can manually enable the sample later.
6 Once you have enabled the sample application, it is running and you can use it.
Proceed to “Using the sample Web application” on page 305 to start Entrust IdentityGuard and test your installation.
To enable the sample application manually1 From $IDENTITYGUARD_HOME, enter
. ./env_settings.sh
(Include a space between the two periods in the command.)
2 Enter
identityguard.sh enable sample
To disable the sample application manually1 From $IDENTITYGUARD_HOME, enter:
. ./env_settings.sh
(Include a space between the two periods in the command.)
2 Enter
identityguard.sh disable sample
53Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
Running the scripts manuallyIf you did not run the scripts during the installation procedure, you have the option to manually run the configuration and initialization scripts.
To run the primary Entrust IdentityGuard Server configuration manually1 Log in as the UNIX user that belongs to the UNIX group that was specified during
the installation. See “To install Entrust IdentityGuard” on page 34.
2 Change to $IDENTITYGUARD_HOME (default is /opt/entrust/identityguard81).
3 From $IDENTITYGUARD_HOME, source the environment settings file by entering:
. ./env_settings.sh
(Include a space between the two periods in the command.)
4 Run the configure.sh script.
If you have previously configured Entrust IdentityGuard, the following message appears:
An identityguard.properties file exists. If you continue, this
file will be overwritten.
Do you want to continue? [yes or no]
5 Type yes and continue from Step 1 of the “To start the Entrust IdentityGuard configuration” on page 36.
To initialize the primary Entrust IdentityGuard Server manually1 Log in as the UNIX user that belongs to the UNIX group that was specified during
the installation. See “To install Entrust IdentityGuard” on page 34.
2 Change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81).
3 From $IDENTITYGUARD_HOME, source the environment settings file by entering
. ./env_settings.sh
(Include a space between the two periods in the command.)
4 Enter the following command to start the master user shell:
supersh
Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.
54 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Note: You can view copyright and version information at any time by entering version at the command prompt.
5 Enter
init <optionalvalues>
where <optionalvalues> are listed in the table below:
6 Complete Step 2 and Step 3 on page 49.
7 Type exit to leave the command shell.
8 Check the log files for errors. If you chose to log to files when you installed Entrust IdentityGuard, the logs are stored in $IDENTITYGUARD_HOME/logs.
Values Description
-sernum To start card serial numbers at a specific number, enter:
init -sernum <num>
where <num> is a positive integer.
Defaults to 1 if not specified.
Use this option if you are adding additional cards to your system. For example, if you have previously loaded 350 cards, enter:
init -sernum 351
-overwrite If the system was initialized previously, this command overwrites the existing data.
You are prompted to confirm that you want existing data to be overwritten.
Attention: If you are using an LDAP repository, and you run init -overwrite, you must first manually remove the fpcr folder located at $IDENTITYGUARD_HOME/etc/fpcr/.
Attention: If you reinitialize an Entrust IdentityGuard system by running init -overwrite, you must first replace any encrypted values in the identityguard.properties file with cleartext values because Entrust IdentityGuard cannot decrypt the old values once the reinitialization is performed. See the section “Editing property values” on page 257.
-force If you use the -force option, you are not prompted for confirmation.
55Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
To configure the sample application1 Log in as the UNIX user that belongs to the UNIX group that was specified during
the installation. See “To install Entrust IdentityGuard” on page 34.
2 Change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81).
3 From $IDENTITYGUARD_HOME, source the environment settings file by entering:
. ./env_settings.sh
(Include a space between the two periods in the command.)
4 Run the configsample.sh script.
5 You are prompted to enter the user name for the sample administrator:
Enter adminid for sample administrator:
6 You are prompted to enter and confirm a password:
Enter password for sample administrator:
Confirm:
The password must meet the following criteria:
• be over eight characters in length
• contain upper and lowercase characters
• contain a numerical value
7 Log in as a master user to complete the setup.
You are prompted for a master user name and password:
Userid:
Password:
When you are finished setting up the sample, the following message appears:
Setup of Entrust IdentityGuard sample successful.
8 You are prompted to enable the sample.
Do you want to enable the sample service? [yes or no]
If you answer yes, the sample is enabled.
If you answer no, the sample is disabled. You can manually enable the sample later.
Once you have enabled the sample application, it is running and you can use it.
To make changes to the sample Web application configuration1 Log in as the UNIX user that belongs to the UNIX group that was specified during
the installation. See “To install Entrust IdentityGuard” on page 34.
56 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
2 Change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81).
3 From $IDENTITYGUARD_HOME, source the environment settings file by entering
. ./env_settings.sh
(Include a space between the two periods in the command.)
4 Enter the following command to start the master user shell:
supersh
Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.
5 Log in as a master user. For example,
Master1
6 If you have previously configured the sample, delete each of the following individually:
• sample administrator
• sample group
• sample role
• sample policy
To do so:
a Run the delete command for each. For example,
admin delete sample/SampleAdmin1
Note: Use the list command to list sample administrators, groups, roles, and policies, so that you can see which ones to delete. For example, use admin list to list all the sample administrators that have already been created. Use group list to list the sample groups that exist, and so on.
b Answer yes to confirm the delete.
Are you sure you wish to delete the admin? (y/n) [n]:
7 Type exit to exit the master user shell and return to the command-line.
8 Enter the following command to start configuring the sample:
configsample.sh
You are warned that the igsample.properties file already exists. For example:
/opt/entrust/identityguar81/etc/igsample.properties file already
exists. Do you wish to continue? [yes or no]
9 Answer yes.
57Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
10 Follow the steps in “To configure the sample application” on page 51.
58 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Testing your installationThis section provides testing steps that determine whether your installation is working properly. It assumes you have completed the installation, configuration, and initialization tasks.
To test your installation1 Check the log files for errors. If you chose to log to files when you installed
Entrust IdentityGuard, the logs are stored in $IDENTITYGUARD_HOME/logs.
2 Start the Entrust IdentityGuard Server as the Entrust IdentityGuard application owner. For instructions, see “Starting and stopping Entrust IdentityGuard” on page 62.
3 Check whether all Entrust IdentityGuard services are running as expected. Enter:
igservice.sh all status
The following is an example of the status report when all services are running:
Entrust IdentityGuard (pid 1247) is running...
Authentication V1 service at
http://<hostname>:8080/IdentityGuardAuthService/
services/AuthenticationService
is available.
Authentication V2 service at
http://<hostname>:8080/IdentityGuardAuthService/
services/AuthenticationServiceV2
is available.
Sample application is enabled.
Sample application at
https://<hostname>:8444/IdentityGuardSampleApp
is available.
Administration V1 service at
https://<hostname>:8444/IdentityGuardAdminService/
services/AdminService
is available.
Administration V2 service at
https://<hostname>:8444/IdentityGuardAdminService/
services/AdminServiceV2
59Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
is available.
Administration interface at
https://<hostname>:8444/IdentityGuardAdmin
is available.
Entrust IdentityGuard Radius (pid 1275) is running...
The following is an example of the output when there are no services running (only the sample application is enabled):
Entrust IdentityGuard (pid 13267) is not running...
Sample application is enabled.
Entrust IdentityGuard Radius (pid 1275) is not running...
4 Ensure that you can log in to the Administration webservice.
a Create an administrator account or use the sample administrator account, if you have configured the sample application.
For information on creating an administrator, see the Entrust IdentityGuard Administration Guide.
b Open a browser and enter the following URL:
https://<FQDN>:<port>/IdentityGuardAdmin
where:
– <FQDN> is the Entrust IdentityGuard host name.– <port> is the Administration webservice port (default 8444).
Note: If you cannot access the Entrust IdentityGuard services (administration or authentication), verify that firewall rules are not blocking the HTTPS ports (by default 8443 and 8444).
60 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
c At the login page, enter the administrator user name and password. Optionally, enter the group name, if the user does not belong to the default group.
d You are prompted to change the administrator password. (There will be no prompt if you are using an account that has already logged in, such as the sample account created earlier in “To configure the sample application” on page 51.)
e Follow the rules on the screen to change the administrator password.
61Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
The Entrust IdentityGuard Administration interface appears:
5 Optionally, test the sample application. To do so, follow the steps in “Using the sample Web application” on page 305.
You have completed testing of the Entrust IdentityGuard installation.
You can now:
• complete various advanced configuration tasks (“Postinstall configuration options for Entrust IdentityGuard Server” on page 201 and “Configuring the Entrust IdentityGuard Server properties file” on page 255) such as adding replica Entrust IdentityGuard Servers to your system
• set up Entrust IdentityGuard by adding policies, groups, users, authentication methods, and so on (see the Entrust IdentityGuard Administration Guide)
62 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Managing the Entrust IdentityGuard service
Complete the following steps to start, stop, check the status, or restart the Entrust IdentityGuard service. You have the option of using either the identityguard.sh command, or the UNIX service command.
Topics in this section:
• “Starting and stopping Entrust IdentityGuard” on page 62
• “Starting and stopping Entrust IdentityGuard with the UNIX service command” on page 63
• “Enabling and disabling individual Entrust IdentityGuard services” on page 64
Starting and stopping Entrust IdentityGuard The identityguard.sh command enables you to start, stop, restart, and query the status of the Entrust IdentityGuard service.
Note: If you are root, you cannot start Entrust IdentityGuard using identityguard.sh start, igradius.sh start, or the igservice start commands. To stop the Entrust IdentityGuard service, you must be the user who started the service.
To start and stop Entrust IdentityGuard using identityguard.sh1 Log in as the UNIX user that belongs to the UNIX group that was specified during
the installation. See “To install Entrust IdentityGuard” on page 34.
2 From $IDENTITYGUARD_HOME, enter
. ./env_settings.sh
3 To start, stop, restart, or query the status of the Entrust IdentityGuard service, enter
identityguard.sh
followed by one of the options in Table 8:
63Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
Note: Once IdentityGuard is installed, the service is started automatically when you reboot.
Starting and stopping Entrust IdentityGuard with the UNIX service commandYou can also start and stop the Entrust IdentityGuard services using the UNIX service command. If these commands are run as root, they start the service as the UNIX user ID that installed Entrust IdentityGuard.
To start and stop Entrust IdentityGuard with the Linux service command1 To start, stop, restart, or query the status of the Entrust IdentityGuard service,
enter
service identityguard
followed by one of the options shown in Table 9:
Table 8: Starting and stopping Entrust IdentityGuard
Command Description
start Starts the Entrust IdentityGuard service.
You can also start the Entrust IdentityGuard service by entering igstartup.sh
Entrust IdentityGuard generates audits that indicate if the services have started successfully or failed to start. You will not see an error message if the service fails to start.
stop Stops the Entrust IdentityGuard service.
You can also stop the Entrust IdentityGuard service by entering igservice.sh identityguard stop
status Tells you if the Entrust IdentityGuard service is running. If the service is running, the process ID number appears.
restart Stops and restarts the Entrust IdentityGuard service.
When you change some settings in the identityguard.properties file, you must restart the service so that the server recognizes the new settings.
64 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Enabling and disabling individual Entrust IdentityGuard servicesYou can use the manual command identityguard.sh to enable and disable the following Entrust IdentityGuard individual services:
• administration service
• Administration interface
• sample
To enable Entrust IdentityGuard manually using identityguard.sh1 From $IDENTITYGUARD_HOME, enter:
. ./env_settings.sh
(Include a space between the two periods in the command.)
2 Enter
identityguard.sh enable adminservice|admininterface|sample
For example, to enable the administration service, use the command
identityguard.sh enable adminservice
To disable the Entrust IdentityGuard manually using identityguard.sh1 From $IDENTITYGUARD_HOME, enter
Table 9: Linux service command
Command Description
start Starts the Entrust IdentityGuard service.
IdentityGuard generates audits that indicate if the services have started successfully or failed to start. You will not see an error message if the service fails to start.
stop Stops the Entrust IdentityGuard service.
status Tells you if the Entrust IdentityGuard service is running. If the service is running, the process ID number appears.
restart Stops and restarts the Entrust IdentityGuard service.
Changes to some settings in identityguard.properties require a restart so that the server recognizes the new settings.
65Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide
. ./env_settings.sh
(Include a space between the two periods in the command.)
2 Enter
identityguard.sh disable adminservice|admininterface|sample
For example, to disable the Administration interface, use the command
identityguard.sh disable admininterface
You can also use the Entrust IdentityGuard igsvcconfig.sh command to enable or disable Entrust identityGuard.
To enable Entrust IdentityGuard manually using igsvcconfig.sh • As root in $IDENTITYGUARD_HOME/bin enter
./igsvccongif.sh identityguard enable
To disable the Entrust IdentityGuard manually igsvcconfig.sh • As root in $IDENTITYGUARD_HOME/bin enter
./igsvccongif.sh identityguard disable
66 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
67
Chapter 3
Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows
This chapter provides all the necessary steps to install Entrust IdentityGuard Server (with Apache Tomcat application server embedded) on Microsoft Windows. Complete the instructions in this chapter to unzip and run the Entrust IdentityGuard Installation wizard. Once you complete the full installation, install the latest patch.
To install the patch that supports Entrust tokens, see “Installing the token support patch” on page 30.
This chapter contains the following information:
• “Installing Entrust IdentityGuard Server” on page 68.
• “Configuring the primary Entrust IdentityGuard Server” on page 70
• “Initializing the primary Entrust IdentityGuard Server” on page 83
• “Configuring the sample application on Microsoft Windows” on page 87
• “Testing your installation” on page 89
• “Managing the Entrust IdentityGuard service” on page 94
68 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Installing Entrust IdentityGuard ServerInstall Entrust IdentityGuard Server on a dedicated machine. Other software products on the same machine can interfere with the operation of Entrust IdentityGuard.
Attention: Arrange to have a dedicated account and group created on the servers that will host Entrust IdentityGuard. You must use the same account for any future upgrades and patches.
Note: Before installing Entrust IdentityGuard, ensure that you have completed the tasks in “Preparing for installation” on page 19. Also, exit all Windows programs before running the Entrust IdentityGuard Installation wizard to prevent any conflicts in resources.
To install Entrust IdentityGuard Server1 Change to the directory in which you extracted the Entrust IdentityGuard Server
for Windows installation package.
2 Double-click the IG_81_Windows.msi installer.
The Entrust IdentityGuard Installation wizard opens.
3 Click Next on the Entrust IdentityGuard Installation wizard Welcome page to begin installation.
Note: If you are not prepared to install, click Cancel at any time to exit. Click Back to re-enter previous information.
4 Read the license agreement for Entrust IdentityGuard software carefully, select I accept the licence agreement, and then click Next.
If you do not agree with the license, select I do not accept the license agreement. The installation cannot continue. Contact Entrust (“Obtaining technical assistance” on page 16).
5 Read the licence agreement for Sun Microsystems, Inc. carefully, select I accept the licence agreement, and then click Next.
If you do not agree with the license, select I do not accept the license agreement. The installation cannot continue. Contact Entrust (“Obtaining technical assistance” on page 16).
6 Click Next to accept the default destination folder for the Entrust IdentityGuard installation (C:\Program Files\Entrust\IdentityGuard\). Alternatively,
69Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide
click Browse to select your own destination location and then click Next to accept it.
7 Click Next to install Entrust IdentityGuard.
8 Click Finish to exit the installation.
The Entrust IdentityGuard Configuration Panel appears. Proceed to “Configuring the primary Entrust IdentityGuard Server” on page 70.
70 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Configuring the primary Entrust IdentityGuard Server
As part of the installation procedure, you are prompted to configure and initialize Entrust IdentityGuard Server using the configuration panel.
Refer to your installation worksheet (“Installation worksheet” on page 25) when you complete this section.
Topics in this section:
• “Starting the Entrust IdentityGuard Configuration wizard” on page 70.
• “Selecting your repository settings” on page 72
• “Selecting Entrust IdentityGuard service ports” on page 79
• “Selecting your system host name” on page 81
• “Completing Entrust IdentityGuard configuration” on page 82
Using the Configuration PanelThe Configuration Panel includes the following features:
• The main page of the Configuration Panel contains help sections. Click Find Out More beside any option for helpful tips.
• You can maneuver through the options and buttons on the main page using the Tab key.
• Hot keys are available on the procedural pages. When you hold down the Alt key, one letter on each option or button displays an underline. With the Alt key still depressed, enter one of the underlined letters to navigate directly to that option or button.
• During any procedure, click Cancel at any time to exit. Click Back to re-enter any previous information.
Starting the Entrust IdentityGuard Configuration wizardTo configure Entrust IdentityGuard, use the Entrust IdentityGuard Configuration wizard.
The Entrust IdentityGuard Configuration wizard is located on the Entrust IdentityGuard Configuration Panel, which appears immediately after running the Entrust IdentityGuard Installation wizard.
71Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide
To start the Entrust IdentityGuard Configuration wizard1 Launch the Entrust IdentityGuard Configuration Panel, if it is not open.
Open the Configuration Panel by clicking Start > All Programs > Entrust > IdentityGuard > Configuration Panel.
2 From the Entrust IdentityGuard Configuration Panel, select Primary as your system type.
Attention: You can only have one primary Entrust IdentityGuard Server. If you are configuring another Entrust IdentityGuard Server as a replica, see “Adding Entrust IdentityGuard replica servers” on page 210.
3 Select Configure Entrust IdentityGuard to start the Entrust IdentityGuard Configuration wizard.
The Entrust IdentityGuard Configuration wizard Welcome page appears.
4 Click Next to begin your Entrust IdentityGuard configuration.
72 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Note: Click Back if you need to re-enter information on a previous page. No information will be lost. You may click Cancel or close the Entrust IdentityGuard Configuration wizard window at any time to exit the configuration process; however, all configurations will be lost.
Selecting your repository settingsSelect a repository to store and retrieve your Entrust IdentityGuard data.
To select your repository settings1 On the Repository Settings page, select the repository. There are three choices:
• Microsoft Active Directory. Proceed to “To use Active Directory as your repository” on page 73 for the configuration procedure. See the Entrust IdentityGuard Directory Configuration Guide before you begin this process. It contains detailed information on the DN, RDN, and user attribute.
• LDAP. Proceed to “To use an LDAP directory as your repository” on page 75 for the configuration procedure. See the Entrust IdentityGuard Directory Configuration Guide before you begin this process.
73Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide
• Database. Proceed to “To use a database as your repository” on page 77 for the configuration procedure. See the Entrust IdentityGuard Database Configuration Guide before you begin this process.
2 Click Next.
To use Active Directory as your repository 1 Under Microsoft Active Directory Server SSL Configuration, select Yes or No
depending on whether you want to secure Entrust IdentityGuard’s communications with your Active Directory server by using SSL.
• If you select Yes, click Browse to import your SSL certificate and then click Next.
Entrust IdentityGuard verifies your SSL connection to the Active Directory server by adding your imported certificate to its trust store. If the certificate cannot be trusted, Entrust IdentityGuard cannot connect to the directory.
• If you select No, click Next.
74 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
2 Under Microsoft Active Directory Server Connection Information, do the following:
a Enter the following information into the respective fields:
– Microsoft Active Directory host name – Microsoft Active Directory server port– Microsoft Active Directory user DN– Microsoft Active Directory password– Confirm passwordOnce you enter this information, click Test Connection. Entrust IdentityGuard performs a query and informs you if there is a successful connection to the repository.
Note: If the connection attempt fails, you can still proceed to the next step in the configuration process by clicking Next. However, all fields must be filled and passwords must match.
b Click Next to perform the host name validation check. If the host name cannot be validated, a warning message gives you the option to proceed with the configuration or enter the server connection information.
3 On the Microsoft Active Directory Server Settings page:
75Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide
a Enter the following information into the respective fields:
– Microsoft Active Directory base DN– Policy RDN– Microsoft Active Directory userid attributeSee the Entrust IdentityGuard Directory Configuration Guide for detailed information on the DN, RDN, and user attribute.
b Click Next.
4 Proceed to “Selecting Entrust IdentityGuard service ports” on page 79 to continue your Entrust IdentityGuard configuration.
To use an LDAP directory as your repository 1 Under LDAP Server SSL Configuration, select Yes or No depending on whether
you want to secure Entrust IdentityGuard’s communications with your LDAP server by using SSL.
• If you select Yes, click Browse to import your SSL certificate and then click Next.
Entrust IdentityGuard verifies your SSL connection to the LDAP server by adding your imported certificate to its trust store. If you select Yes when you browse for and select a certificate, a warning message displays the certificate details and prompts you to proceed.
76 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Note: If the certificate cannot be trusted, Entrust IdentityGuard cannot connect to the server.
• If you select No, click Next.
2 Under LDAP Server Connection Information (see the Entrust IdentityGuard Directory Configuration Guide for more information), do the following:
a Enter the following information into the respective fields:
– LDAP server host name – LDAP server port (SSL default 636, non-SSL default 389)– LDAP user DN– LDAP password– Confirm passwordOnce you enter this information, click Test Connection. Entrust IdentityGuard performs a query and informs you if there is a successful connection to the repository.
Note: If the connection attempt fails, you can still proceed to the next step in the configuration process by clicking Next. However, all fields must be filled and passwords must match.
77Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide
b Click Next to perform the host name validation check. If the host name cannot be validated, a warning message gives you the option to proceed with the configuration or enter the server connection information.
3 On the LDAP Server Settings page:
a Enter the following information into the respective fields:
– LDAP base DN– Policy RDN– LDAP userid attributeSee the Entrust IdentityGuard Directory Configuration Guide for detailed information on the DN, RDN, and user attribute.
b Click Next.
4 Proceed to “Selecting Entrust IdentityGuard service ports” on page 79 to continue your Entrust IdentityGuard configuration.
To use a database as your repository1 Under Database Settings, select your database from the drop-down list.
The choices are
• Oracle
• DB2
78 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
• SQL Server
• Other
Note: Use “Other” only if you are instructed to do so by Entrust Support.
2 Under JDBC Driver Information:
a Click Browse to import your JDBC driver .jar file.
b Enter your JDBC driver class name.
c Click Add to include any additional JDBC .jar files (optional). Alternatively, to remove any additional JDBC .jar files that you have added, highlight the .jar file in the Additional JDBC JAR files list, and click Remove.
If your JDBC driver does not require additional .jar files, leave this field blank.
3 Click Next.
4 Under Database Connection Information:
a Enter the following information into the respective fields:
– Database URL in driver-specific formatSee the vendor-specific driver documentation for additional details on URL format.
79Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide
– Database user name– Database password– Confirm database password– Database schema nameOnce you enter this information, click Test Connection. Entrust IdentityGuard performs a query and informs you if there is a successful connection to the database.
Note: If the connection test fails, you may still proceed to the next step in the configuration process by clicking Next; however, all fields on this page must be filled and passwords must match.
b Click Next.
5 Proceed to “Selecting Entrust IdentityGuard service ports” on page 79 to continue your Entrust IdentityGuard configuration.
Selecting Entrust IdentityGuard service portsSpecify the ports on which Entrust IdentityGuard services listen.
80 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Note: Ensure the ports for each Entrust IdentityGuard service are unique for that computer.
To select Entrust IdentityGuard service ports1 Under Authentication Service, enter a port number:
• in the Authentication Service HTTP port number field (default 8080)
• in the Authentication Service HTTPS port number field (default 8443)
Note: You can always disable the HTTP port later to enhance security. See “Disabling the non-SSL port on the Authentication service” on page 228.
2 Under Administration Service, enter a port number in the Administration service HTTPS port number field (default 8444).
3 Click Next.
4 Proceed to “Selecting your system host name” on page 81.
81Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide
Selecting your system host nameSelect a host name to generate the self-signed certificate and service URLs that are used by Entrust IdentityGuard.
To select your system host name1 From the System host name page,
a Validate the system host name in the Enter the host name to be used in the self-signed certificate and service URLs field.
The self-signed certificate secures outside communication with Entrust IdentityGuard’s services using HTTPS.
b Validate the certificate lifetime in the Self-signed SSL certificate lifetime (in days) field. Optionally, change the lifetime value. Default is 365.
Note: Optionally, you can choose to reconfigure the LDAP repository connection later. For instructions, see “To import the LDAP SSL certificate” on page 233
c Click Next.
2 Proceed to “Completing Entrust IdentityGuard configuration” on page 82.
82 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Completing Entrust IdentityGuard configurationThe Configuration Summary page contains a list of all information you have entered into the Entrust IdentityGuard Configuration wizard. Review this information carefully and record and store the information in a secure place, if necessary.
All text boxes in the Configuration Panel include basic, context-sensitive Windows menu commands. This lets you copy the contents of any text box. For example, you can copy the contents of the Configuration Summary page.
To copy contents of the Configuration Summary page1 Right-click in the content area of the Configuration Summary page.
2 Choose Select All from the menu.
3 Right-click again and select Copy from the menu.
4 Paste the copied text into a text file or other document.
To complete Entrust IdentityGuard Server configuration1 On the Configuration Summary page, click Confirm and Save if all the
information in the summary list is complete and correct.
Note: If you choose to cancel, all information will be lost.
Note: If the system has already been initialized, when you click Initialize Entrust IdentityGuard a warning message explains the consequences of reinitializing an existing system.
2 Click Finish to complete the configuration process.
You can now initialize the server. Go to “Initializing the primary Entrust IdentityGuard Server” on page 83.
83Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide
Initializing the primary Entrust IdentityGuard Server
Once you configure your Entrust IdentityGuard Server, initialize it using the Entrust IdentityGuard Initialization wizard. If you have not yet configured, see “Configuring the primary Entrust IdentityGuard Server” on page 70.
Attention: If you are reinitializing, all stored information (such as user accounts, cards, and groups) will be lost and all settings reset to their defaults.
Topics in this section:
• “What initialization does” on page 83
• “If initialization fails” on page 83
• “Running the Entrust IdentityGuard Initialization wizard” on page 84.
What initialization doesInitialization creates master keys and the various policy structures. The identityguard.properties file specifies two files used to store the keys that protect the repository and the master users. The files that store this information are:
• Entrust IdentityGuard master keys file (masterkeys.enc)—a file containing the encryption keys that protect the repository.
• Entrust IdentityGuard key protection file (masterkeys.kpf)—a file containing an obfuscation key which is used to encrypt the three master user passwords that are stored in the file.
The contents of the master keys file can be unlocked by a master user. The contents of the key protection file provide access to the master user passwords. This access can then be used to unlock the master keys file.
If initialization failsReview the sytem.log file to identify the cause of failure. The log file is in <IG_Install_Dir>\identityguard81\logs\system.log. By default <IG_Install_Dir> is C:\Program Files\Entrust\IdentityGuard.
Some possible causes of an initialization failure are:
• The Entrust IdentityGuard properties file contains invalid values. To resolve this, go to <IG_Install_Dir>\etc\identityguard.properties and edit the file.
84 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
• Your repository is not configured correctly.
• The repository is not running.
• Your Entrust IdentityGuard Server service is running. See, “To check the status of Entrust IdentityGuard” on page 94.
For more information on Entrust IdentityGuard error messages, see Entrust IdentityGuard Error Messages included with your documentation package.
Running the Entrust IdentityGuard Initialization wizardStart and run the Entrust IdentityGuard Initialization wizard by completing the following procedures.
To start the Entrust IdentityGuard Initialization wizard1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking
Start > All Programs > Entrust > IdentityGuard > Configuration Panel.
2 Select Primary as the system type.
3 Select Initialize Entrust IdentityGuard.
85Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide
The Primary System Initialization page appears.
Note: If you cancel at any time, all information will be lost.
4 Under License Information:
a Type your Entrust IdentityGuard installation key in the Entrust IdentityGuard Installation Key field.
b Type your Entrust IdentityGuard activation key in the Entrust IdentityGuard Activation Key field.
5 Click Validate.
The master user information fields are enabled as soon as the licence information is validated.
6 Under Master User Information, enter passwords for each one of the three master users (Master1, Master2, and Master3), and confirm each password.
The passwords must meet the following criteria:
• be over 8 characters in length
• contain upper and lowercase characters
86 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
• contain a numerical value
7 Click Initialize.
The Entrust IdentityGuard Server initializes.
8 Click OK.
You can now configure the sample application or test your installation. Go to one of:
• “Configuring the sample application on Microsoft Windows” on page 87
• “Testing your installation” on page 89
87Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide
Configuring the sample application on Microsoft Windows
This section details how you can configure and enable the Entrust IdentityGuard sample application.
The sample Web application demonstrates how Entrust IdentityGuard registers users and authenticates them. This sample requires an administrator user ID and password. If you are using a directory, create the user ID entry in the directory prior to installing the sample Web application.
For details on how to use the sample application, see “Using the sample Web application” on page 305.
For more information about authentication features shown in the sample application, see the Entrust IdentityGuard Administration Guide.
Note: You cannot configure the sample application on a replica Entrust IdentityGuard Server.
Attention: The sample administrator password is stored in clear text in the <IG_INSTALL_DIR>\identityguard81\ect\igsamples.properties file. For security reasons, disable the sample application when you are not using it.
If you have previously configured the sample, delete each of the following individually to reconfigure the sample:
• sample administrator
• sample group
• sample role
• sample policy
You can only disable or enable the sample application after initial configuration, using the Entrust IdentityGuard Web interface and Application Manager located on the Entrust IdentityGuard Configuration Panel.
To configure the sample application 1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking
Start > All Programs > Entrust > IdentityGuard > Configuration Panel.
2 Under Sample Application Setup, select Set Up the Sample Application to run the utility.
88 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
The Master User Login page appears.
3 Enter your master user name and master user password in the applicable fields. Use any one of the three master users set up in “Initializing the primary Entrust IdentityGuard Server” on page 83.
The Entrust IdentityGuard Sample Web Application Setup page appears.
4 Under Configure Web Sample Administrator, type the following information:
• Administrator user name. If you are using an LDAP or Active Directory repository, enter the ID of a user that already exists in the directory.
• Administrator password. The password must be over 8 characters in length, contain upper and lower case characters, and contain a numerical value.
• Confirm password. Re-enter the password entered in the field above.
5 Click Save to configure the sample application.
The sample application is configured and by default, enabled.
89Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide
Testing your installationThis section provides testing steps that determine whether your installation is working properly. It assumes you have completed the installation, primary configuration, and initialization tasks.
To test your installation1 Check the log files in <IG_INSTALL_DIR>\identityguard81\logs for
errors, where <IG_INSTALL_DIR> is C:\Program Files\Entrust\IdentityGuard, by default.
2 Start the Entrust IdentityGuard Server. For instructions, see “Managing the Entrust IdentityGuard service” on page 94.
3 Check the status of all services in Entrust IdentityGuard Web interface and Application Manager, accessible through the Entrust IdentityGuard Configuration Panel.
a Launch the Entrust IdentityGuard Configuration Panel and select Launch Web Service and Application Manager.
b On the Status tab, check the status of each service:
90 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
– Administration service– Authentication service– Administration interface– Sample Web applicationIf the status of any of these is offline, see “Installation troubleshooting” on page 92.
If the status of any of these is Error, ensure that the URLs correspond to valid svcs/apps in IdentityGuard.properties. To edit the URLs, go to <IG_Install_Dir>\etc\identityguard.properties.
4 Ensure that you can log in to the Administration Web interface.
a Create an administrator account or use the sample administrator account, if you have configured the sample application.
For information on creating an administrator, see the Entrust IdentityGuard Administration Guide.
b Once you have created an administrator, do one of the following:
– In Windows, click Start > All Programs > Entrust > IdentityGuard >Administration Interface. This opens the interface in your default browser.
– In a Web browser, enter the URL of your Administration interface.https://<hostname>:<port>/IdentityGuardAdmin
Where:<hostname> is the server host name you selected during configuration.<port> is the administration port you selected during configuration (default 8444).
Note: If you cannot access the Entrust IdentityGuard services (Administration or Authentication), verify that firewall rules are not blocking the HTTPS ports (by default 8443 and 8444).
91Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide
c At the login page, enter the administrator user name and password. Optionally, enter the group name, if the user does not belong to the default group.
The Entrust IdentityGuard Administration interface appears.
5 Optionally, test the sample application. To do so, follow the steps in “Using the sample Web application” on page 305.
You have now completed testing the Entrust IdentityGuard installation.
92 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
You can now:
• Complete various advanced configuration tasks (“Postinstall configuration options for Entrust IdentityGuard Server” on page 201 and “Configuring the Entrust IdentityGuard Server properties file” on page 255) such as adding replica Entrust IdentityGuard Servers to your system.
• Set up your Entrust IdentityGuard system by adding policies, groups, users, authentication methods, and so on (see the Entrust IdentityGuard Administration Guide).
Installation troubleshootingWhen you reinstall Entrust IdentityGuard, its Windows services may need to be restarted. If one or more services is marked as Offline on the Status tab of the Web Service and Application Manager page, restart the services. See “Managing the Entrust IdentityGuard service” on page 94.
If the Administration interface does not appear, but you know the services are running, you need to check if it is disabled.
To enable the Administration interface and service1 Select Launch Web Service and Application Manager on the Entrust
IdentityGuard Configuration Panel.
The Web Service and Application Manager page appears.
2 Click the Controls tab.
3 Under Administration Service, select Enabled.
4 Under Administration Interface, select Enabled.
5 Click Apply Changes.
The interface is enabled.
To enable the sample application 1 Select Launch Web Service and Application Manager on the Entrust
IdentityGuard Configuration Panel.
93Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide
The Web Service and Application Manager page appears.
2 Click the Controls tab.
3 Under Sample Application, select Enabled.
4 Click Apply Changes.
The sample application is enabled and the IdentityGuard service is restarted.
To disable the sample application
Note: Only a configured sample application can be disabled.
1 Select Launch Web Service and Application Manager on the Entrust IdentityGuard Configuration Panel.
2 Click the Controls tab.
3 Under Sample Application, select Disabled.
4 Click Apply Changes.
The sample application is disabled.
94 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Managing the Entrust IdentityGuard service
Complete the following steps to start, stop, check the status, or restart the Entrust IdentityGuard service.
Starting and stopping events are logged in the Event Viewer.
Note: By default, Entrust IdentityGuard starts automatically whenever you reboot the computer.
The following commands allow you to start, stop, restart, and query the status of the Entrust IdentityGuard Server.
Changes to some settings in identityguard.properties require a restart so that the server recognizes the new settings.
To start, stop, and restart Entrust IdentityGuard 1 Go to Start > All Programs > Control Panel > Administrative Tools > Services.
The Services window appears.
2 To stop, start, or restart, the Entrust IdentityGuard Server (including the sample application), right-click Entrust IdentityGuard Server and select the appropriate command.
3 To start, stop, or restart the Entrust IdentityGuard Radius proxy, right-click Entrust IdentityGuard Radius Proxy and select the appropriate command.
To check the status of Entrust IdentityGuard1 Go to Start > All Programs > Control Panel > Administrative Tools > Services.
The Services window appears.
2 Locate Entrust IdentityGuard Server and check the status column to view the status.
The status tells you if the Entrust IdentityGuard Server is running.
95
Chapter 4
Installing Entrust IdentityGuard Server with an existing application server
This chapter provides all the necessary steps to install, configure, initialize, and test Entrust IdentityGuard Server on UNIX using a WebLogic 8.1 or 9.1 or a WebSphere 6.0 application server. Once you complete the full installation, install the latest patch.
To install the patch that supports Entrust tokens, see “Installing the token support patch” on page 30.
This chapter contains the following sections:
• “Preparing WebLogic for installation of IdentityGuard” on page 96
• “Preparing WebSphere for installation of Entrust IdentityGuard” on page 100
• “Installing Entrust IdentityGuard Server” on page 106
• “Configuring the primary Entrust IdentityGuard Server” on page 109
• “Initializing the primary Entrust IdentityGuard Server” on page 118
• “Configuring the sample application on an existing application server” on page 121
• “Running the scripts manually” on page 123
96 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Preparing WebLogic for installation of IdentityGuard
Complete the following tasks to prepare your WebLogic application server for Entrust IdentityGuard.
Topics in this section:
• “Preparing WebLogic 8.1 for installation” on page 96
• “Configuring SSL for WebLogic 8.1” on page 97
• “Preparing WebLogic 9.1 for install” on page 98
• “Configuring SSL for WebLogic 9.1” on page 98
Attention: Arrange to have a dedicated user account and group created on the servers that will host Entrust IdentityGuard. You must use the same account for any future upgrades and patches.
Preparing WebLogic 8.1 for installationComplete the following procedure to prepare WebLogic 8.1 server for the installation of Entrust IdentityGuard.
Note: The following steps use $WEBLOGIC as the directory in which the WebLogic server was installed, for example /usr/local/bea. $DOMAIN is the directory of the WebLogic domain where Entrust IdentityGuard is being installed, for example, /opt/bea/weblogic/samples/domains/wl_server.
To prepare for install1 Download and install the unlimited strength cryptography policy files for the Java
Development Kit (JDK) being used to run WebLogic from the Sun Java Web site http://java.sun.com/j2se/1.4.2/download.html, and depending on the JRE you are using, install them in $WEBLOGIC/<java>/jre/lib/security
where <java> is the directory for the Java version used by the application server.
Note: It is important that you install the policy files specific to your Java Development Kit (JDK).
2 Extract the policy files.
97Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide
The files are extracted to a new directory called jce. You must move the two .jar files from the jce directory to the security directory.
3 To move the jar files enter:
mv local_policy.jar $WEBLOGIC/<java>/jre/lib/security
mv US_export_policy.jar $WEBLOGIC/<java>/jre/lib/security
Note: It is recommended that you backup the existing versions of the policy files.
Configuring SSL for WebLogic 8.1You can configure SSL using public CA or self-signed certificates.
SSL configuration is straightforward if you are using certificates signed by a public Certification Authority (CA) such as Entrust Certificate Services (http://www.entrust.net/index.htm). If you are using a public CA you must:
• Ensure that the SSL protocol is set to SSLv3.
• Have a secure connection between administration services and Web administration—128+ bit strength algorithms are recommended.
If you want an SSL certificate from a public CA, use the Java keytool to create a certificate signing request (CSR). Then, follow the instructions on the public CA Web site to create a certificate. Once the certificate is created, import it and the CA certificate into your keystore using the Java keytool.
For detailed instructions on configuring SSL on WebLogic, refer to http://edocs.bea.com/wls/docs91/secmanage/ssl.html.
Additional steps are required if you are using a self-signed certificate. To set up a self-signed certificate you configure the Java Virtual Machine (JVM) property to javax.net.ssl.trustStore by following “To set up a self-signed certificate” on page 97 below.
To set up a self-signed certificate1 Edit $DOMAIN/startWebLogic.sh.
2 Move to the line where JAVA_OPTIONS are specified and set the argument
-Djavax.net.ssl.trustStore=<$TRUST_STORE>.JKS
<$TRUST_STORE>.JKS refers to the file that contains the trusted certificates.
98 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Preparing WebLogic 9.1 for installComplete the following procedure to prepare your WebLogic 9.1 server for installation of Entrust IdentityGuard.
Note: In the following, $WEBLOGIC is the directory in which the WebLogic server was installed, for example, /usr/local/bea.$DOMAIN is the directory of the WebLogic domain where Entrust IdentityGuard is being installed, for example /opt/bea/weblogic/samples/domains/wl_server.
To prepare for install1 Download the unlimited strength cryptography policy files for Java 1.5.0 from
the Sun Java Web site at http://java.sun.com/j2se/1.5.0/download.jsp, and depending on the JRE you are using, install them in $WEBLOGIC/<java>/jre/lib/security, where <java> is the directory for the Java version used by the application server.
Note: It is important that you install the policy files specific to your Java Development Kit (JDK).
2 Extract the policy files.
The files are extracted to a new directory called jce. You must move the two .jar files from the jce directory to the security directory:
3 To move the jar files enter:
mv local_policy.jar $WEBLOGIC/<java>/jre/lib/security
mv US_export_policy.jar $WEBLOGIC/<java>/jre/lib/security
where <java> is the directory for the Java version used by the application server.
Note: It is recommended that you back up the existing versions of the policy files.
Configuring SSL for WebLogic 9.1You can configure SSL using public CA or self-signed certificates.
SSL configuration is straightforward if you are using certificates signed by a public Certification Authority (CA) such as Entrust Certificate Services (http://www.entrust.net/index.htm). If you are using a public CA you must:
• Ensure that the SSL protocol is set to SSLv3.
99Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide
• Have a secure connection between administration services and Web administration—128+ bit strength algorithms are recommended.
If you want an SSL certificate from a public CA, use the Java keytool to create a certificate signing request (CSR). Then, follow the instructions on the public CA Web site to create a certificate. Once the certificate is created, import it and the CA certificate into your keystore using the Java keytool.
For detailed instructions on configuring SSL on WebLogic, refer to http://edocs.bea.com/wls/docs81/index.html.
Additional steps are required if you are using a self-signed certificate. You must update the command line options to start the domain.
To set up a self-signed certificate1 Edit $DOMAIN/setDomainEnv.sh.
2 Move to the line where JAVA_OPTIONS are specified and set the following argument:
-Djavax.net.ssl.trustStore=<$trustStore>.jks
where <$trustStore> refers to the file that contains the trusted certificates.
100 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Preparing WebSphere for installation of Entrust IdentityGuard
These instructions assume that you have already installed and tested your application server and enabled SSL. They also assume that you are using the default Java Virtual Machine (JVM) in $WEBSPHERE/AppServer/java.
Complete one of the following procedures, depending on your platform:
• “To prepare for installation on Solaris” on page 100
• “To prepare for installation on AIX” on page 100
To prepare for installation on Solaris1 Download and install the unlimited strength cryptography policy files for the Java
Development Kit (JDK) being used to run WebSphere from the Sun Java Web site http://java.sun.com/j2se/1.4.2/download.html, and depending on the JRE you are using, install them in $WEBSPHERE/<java>/jre/lib/security
where <java> is the directory for Java version used by the application server.
Note: It is important that you install the policy files specific to your Java Development Kit (JDK) if you are not using J2SE 1.4.2.
2 Extract the policy files.
The files are extracted to a new directory called jce. You must move the two jar files from the jce directory to the security directory.
3 To move the jar files to the security directory enter:
mv local_policy.jar $WEBSPHERE/<java>/jre/lib/security
mv US_export_policy.jar $WEBSPHERE/<java>/jre/lib/security
4 Repeat Step 2 and Step 3 for each JRE on your computer.
Note: It is recommended that you back up the existing versions of the policy files.
To prepare for installation on AIX1 Download the following RPMs from AIX Toolkit for Linux applications
(http://www-03.ibm.com/servers/aix/products/aixos/linux/download.html):
• bash
• unzip
101Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide
• zip
2 Install each package on your AIX server. To do so, run the following command as root:
rpm -i <package file>
3 Download and install the unlimited strength cryptography policy files for the Java Development Kit (JDK) being used to run WebSphere. You can download the policy files by browsing to https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=jcesdk and selecting “Unrestricted JCE Policy files for SDK 1.4.2”.
4 Install them in $WEBSPHERE/<java>/jre/lib/security, where <java> is the directory for Java version used by the application server. For example, $WEBSPHERE/AppServer/java/jre/lib/security.
For further instructions, refer to http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/topic/com.ibm.websphere.base.doc/info/aes/ae/tsec_egs.html.
Note: It is recommended that you back up the existing versions of the policy files.
Configuring SSL for WebSphere 6.0You can configure SSL using public CA or self-signed certificates.
SSL configuration is straightforward if you are using certificates signed by a public Certification Authority (CA) such as Entrust Certificate Services (http://www.entrust.net/index.htm). If you are using a public CA you must:
• Ensure that the SSL protocol is set to SSLv3.
• Have a secure connection between administration services and Web administration—128+ bit strength algorithms are recommended.
If you want an SSL certificate from a public CA, use the key management utility to create a certificate signing request (CSR). Then, follow the instructions on the public CA Web site to create a certificate. Once the certificate is created, import it and the CA certificate into your keystore using the key management utility.
For detailed instructions on configuring SSL on WebSphere, refer to http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.base.doc/info/aes/ae/tsec_ssl.html.
Additional steps are required if you are using a self-signed certificate. To set up a self-signed certificate you can do one of the following:
• Import the self-signed certificate into the root store for the JRE, in $WEBSPHERE/AppServer/java/jre/lib/security/cacerts.
102 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
• Set the Java Virtual Machine (JVM) property to javax.net.ssl.trustStore by following “To set up a self-signed certificate by setting the JVM property” on page 102 below.
To set up a self-signed certificate by setting the JVM property1 Start your WebSphere server from $WEBSPHERE/AppServer/bin by entering
./startServer.sh <server_name>
where server_name is the name of the server you are starting.
2 Start the administration console for your server.
The default URL is http://localhost:9060/ibm/console.
3 Log in to your server.
The WebSphere main page appears.
4 From the WebSphere main page, select Servers > Application servers.
103Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide
The Application servers page appears.
5 Click the server name on which you want to deploy Entrust IdentityGuard services from the Application servers list.
The Server page appears.
104 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
6 Under Server Infrastructure, select Java and Process Management > Process Definition > Java Virtual machine > Custom Properties.
105Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide
The Custom Properties page appears.
7 Click New.
The Custom Properties configuration page appears.
8 Name the new property javax.net.ssl.trustStore and set the value to <$trustStore>.jks where <$trustStore> is the name of the file that contains the trusted certificates.
9 Click OK.
106 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Installing Entrust IdentityGuard ServerInstall Entrust IdentityGuard on a dedicated machine. Other software products on the same machine can interfere with the operation of Entrust identityGuard.
To install and configure Entrust IdentityGuard, you must have an understanding of UNIX administration.
Note: Before installing Entrust IdentityGuard, ensure that you have also completed the tasks in “Preparing for installation” on page 19.
To install Entrust IdentityGuard1 As root, change to the IG_81 directory. This directory was created when you
extracted the download package.
2 Run install.sh by entering:
./install.sh
Note: Cancel out of the script at any time by pressing Ctrl + C or Ctrl + @.
3 Read through the license carefully, pressing Enter until you reach the end. The following message appears:
Do you agree to the above license terms? [yes or no]
4 Enter yes to accept the terms. Otherwise, if you do not agree with the license, type no and press Enter. The installation will cancel. Contact Entrust (“Obtaining technical assistance” on page 16).
The following message appears:
Enter the UNIX user name that will own the installation:
5 Enter the user name already created for your WebLogic or WebSphere application server.
The following message appears:
Enter the UNIX group name that will own the installation:
6 Enter the name for the group already created for your WebLogic or WebSphere application server.
The following message appears:
Enter the install directory (default /opt/entrust):
107Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide
Note: The installer will create this directory. If someone has already created the installation directory, you must ensure that the directory permissions allow the installer to write to that directory.
7 Press Enter to accept the default, or type in another directory location.
After pressing Enter, the identityguard.zip file is automatically extracted into the directory $IDENTITYGUARD_HOME, where $IDENTITYGUARD_HOME is usually /opt/entrust/identityguard81.
To continue Java must already be installed. It is recommended that you use the version of Java installed on your application server.
The following message appears:
Enter the Java directory:
8 Enter the full directory path of the Java directory where the JCE policy files were installed.
The following message appears:
Entrust IdentityGuard uses the trust store of the application
server.
Enter the file name of the application server trust store:
9 Enter the full directory path and file name of the application server trust store. See “Configuring SSL for WebSphere 6.0” on page 101. This file sets environment variables needed to run Entrust IdentityGuard.
10 The installation creates the Entrust IdentityGuard Radius service:
Creating igradius service...
Do you wish the Entrust IdentityGuard Radius proxy to start
automatically when the host starts after reboot? [yes or no]
If you answer no, you can enable automatic startup later.
If you wish to enable automatic startup in the future, run the
command “igsvcconfig.sh igradius enable” when logged on as root.
Note: If you want to configure your VPN servers to recognize Entrust IdentityGuard groups, you must first install Entrust IdentityGuard and define the groups. In this case, enter no.
See “Configuring the Entrust IdentityGuard Radius proxy” on page 171 for further details.
11 When the initial installation steps are complete, you must respond to the following prompt:
108 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Installation complete.
Do you wish to configure the application now? [yes or no]
• Answer yes and press Enter to start the configuration tasks. Proceed to “Configuring the primary Entrust IdentityGuard Server” on page 109.
• If you answer no, you must run the configure.sh script manually from the $IDENTITYGUARD_HOME/bin directory before you can use Entrust IdentityGuard. To do so, proceed to “To run the primary Entrust IdentityGuard Server configuration manually” on page 123.
109Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide
Configuring the primary Entrust IdentityGuard Server
As part of the installation procedure, you are prompted to configure and initialize Entrust IdentityGuard. You can choose to complete these configuration steps at the same time as the installation or after.
Refer to your installation worksheet (“Installation worksheet” on page 25) when you complete this section as you use this information to answer the prompts during configuration.
Topics in this section:
• “Starting the Entrust IdentityGuard configuration” on page 109
• “Adding Directory information to Entrust IdentityGuard” on page 110
• “Adding Database information to Entrust IdentityGuard” on page 114
• “Completing the Entrust IdentityGuard configuration” on page 115
Starting the Entrust IdentityGuard configurationComplete the following steps to start configuring the primary Entrust IdentityGuard Server.
To start the Entrust IdentityGuard configuration1 Respond to the following prompt:
Are you configuring an Entrust IdentityGuard primary or replica
server? (PRIMARY or REPLICA):
• Primary. If this is your first Entrust IdentityGuard Server installation, answer primary and continue with the steps in this procedure.
Note: There can only be one primary server.
• Replica. If you have already installed an Entrust IdentityGuard Server, and you want to install more instances, answer replica.
To configure and initialize a replica server, proceed to“Adding Entrust IdentityGuard replica servers” on page 210.
2 You are asked to indicate whether the user information is stored in an Active Directory (AD), LDAP, or database (DB) repository.
110 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
What type of repository will you use to store Entrust
IdentityGuard information?
AD - Microsoft(R) Active Directory or Microsoft Active
Directory in Application Mode
LDAP - LDAP-compliant Directory
DB - Database
(AD, LDAP or DB):
• If you are using an LDAP repository, proceed to “To add LDAP Directory information to Entrust IdentityGuard” on page 110.
• If you are using an Active Directory or Active Directory Application Mode (ADAM) repository, proceed to “To add Active Directory (or ADAM) information to Entrust IdentityGuard” on page 112.
• If you are using a database repository, proceed to “To add Database information to Entrust IdentityGuard” on page 114.
Note: You can cancel the script at any time by pressing Ctrl + C.
Adding Directory information to Entrust IdentityGuardThe following steps sets up Entrust IdentityGuard to communicate with a directory repository. The steps create the identityguard.properties file based on the values you enter.
Follow the appropriate steps:
• if you are adding a LDAP Directory, proceed to “To add LDAP Directory information to Entrust IdentityGuard”
• if you are adding Active Directory or Active Directory Application Mode, proceed to “To add Active Directory (or ADAM) information to Entrust IdentityGuard”
Note: See the Entrust IdentityGuard Directory Configuration Guide for more information on LDAP and Active Directory configuration.
To add LDAP Directory information to Entrust IdentityGuard1 Respond to the following prompt:
LDAP CONFIGURATION
111Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide
Do you wish to use SSL to connect to the LDAP server? [yes or no]
Note: You can enable LDAPS after installation. For instructions, see “Securing the LDAP connection with SSL” on page 233.
2 If you answered yes, the following message appears:
Make sure that SSL certificate of the LDAP server is installed
into the application server trust store.
If you answer no, no further message appears.
3 At the following prompt, enter the host name or IP address of the computer hosting the Directory:
Enter the LDAP host (ex: identityguard.anycorp.com):
4 Enter the port number of the Directory:
Enter the LDAP port number (default is 389):
The default port for LDAPS is 636.
5 Enter the LDAP base DN (the DN under which all Entrust IdentityGuard entries are found):
Enter the LDAP base DN (ex: dc=anycorp,dc=com):
Note: Entrust IdentityGuard configuration automatically converts spaces in the Active Directory base DN to %20. If you edit the Active Directory base DN after installation in the identityguard.properties file, remember to replace spaces with %20.
6 Enter the LDAP user DN information at the following prompts. The LDAP user DN and password define the credentials used by Entrust IdentityGuard to connect to the repository.
Enter the LDAP user DN (ex: cn=Directory Manager):
This is an existing LDAP user DN.
Enter the LDAP password:
Confirm:
This is an existing LDAP password.
7 At the following prompt, enter the RDN of the entry that Entrust IdentityGuard should use to store its policy information:
112 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
The LDAP policy RDN defines the entry in the LDAP repository used
to store Entrust IdentityGuard policy information. The entry must
already exist. Enter the LDAP policy RDN (ex: uid=policy):
The RDN is the prefix that, when joined with the base DN, comprises the full DN of the policy object.
8 At the following prompt, enter the attribute that uniquely identifies Entrust IdentityGuard users:
The LDAP user name is the attribute that uniquely identifies
Entrust IdentityGuard users. Entrust IdentityGuard uses this
attribute to find entries in the repository. Enter the LDAP user
name attribute (ex: uid):
Proceed to “To complete the configuration script” on page 115.
To add Active Directory (or ADAM) information to Entrust IdentityGuard1 Respond to the following prompt:
MICROSOFT ACTIVE DIRECTORY CONFIGURATION
Do you wish to use SSL to connect to the Microsoft Active
Directory server? [yes or no]
2 If you answered yes, the following message appears:
Make sure that SSL certificate of the of the Microsoft Active
Directory server is installed into the application server trust
store.
If you answer no, no further message appears.
3 At the following prompt, enter the host name or IP address of the computer hosting the Directory:
Enter the Microsoft Active Directory host (ex:
identityguard.anycorp.com):
4 Enter the port number of the Directory:
Enter the Microsoft Active Directory port number (default is 636):
If you do not use SSL to connect to ADAM, the default port is 389.
5 Enter the Active Directory base DN (the DN under which all Entrust IdentityGuard entries are found):
Enter the Microsoft Active Directory base DN (ex:
dc=anycorp,dc=com):
113Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide
Note: Entrust IdentityGuard configuration automatically converts spaces in the Active Directory base DN to %20. If you edit the Active Directory base DN after installation in the identityguard.properties file, remember to replace spaces with %20.
6 Enter the Active Directory user DN information at the following prompts. The Active Directory user DN and password define the credentials used by Entrust IdentityGuard to connect to the repository.
Enter the Microsoft Active Directory user DN (ex:
cn=Administrator,cn=Users,dc=anycorp,dc=com):
This is an existing Active Directory user DN.
Enter the Microsoft Active Directory password:
Confirm:
This is an existing Active Directory password.
7 At the following prompt, enter the RDN of the entry that Entrust IdentityGuard should use to store its policy information:
The policy RDN defines the entry in the Microsoft Active Directory
repository used to store Entrust IdentityGuard policy information.
The entry must already exist. Enter the Microsoft Active Directory
policy RDN (ex: cn=igpolicy,cn=Users):
The RDN is the prefix that when joined with the base DN, comprises the full DN of the policy object.
8 At the following prompt, enter the attribute that uniquely identifies Entrust IdentityGuard users:
The Microsoft Active Directory user name is the attribute that
identifies Entrust IdentityGuard users. Entrust IdentityGuard uses
this attribute to find entries in the repository. Enter the
Microsoft Active Directory user name attribute (ex:
sAMAccountName):
Proceed to “To complete the configuration script” on page 115.
114 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Adding Database information to Entrust IdentityGuardThe following steps sets up Entrust IdentityGuard to communicate with a database repository. The steps create the identityguard.properties file based on the values you enter.
Note: See the Entrust IdentityGuard Database Configuration Guide for more information on database configuration.
To add Database information to Entrust IdentityGuard1 Respond to the following prompt:
DATABASE CONFIGURATION
Enter the database type (Oracle, DB2, SQLServer, Other):
Enter the type of database you are using.
The following message appears:
Enter the JDBC driver JAR file name:
2 Enter the path of the JDBC driver file (for example, /temp/ojdbc14.jar). Ensure that the file permissions on this file allow the Entrust IdentityGuard user to read and execute it.
Note: Some databases require multiple .jar files. You can add other files in a later step.
3 At the following prompt, enter the JDBC driver class that Entrust IdentityGuard should use. For example, oracle.jdbc.driver.OracleDriver.
Enter the JDBC driver class name:
The following message appears:
Are there any other JDBC JAR files to be installed? [yes or no]
Press Enter.
4 If your database requires multiple JDBC driver files, type yes and press Enter. You are prompted to enter more file names. If your database only requires one file, type no and press Enter to continue.
The following message appears:
Enter the DB URL:
5 Enter the database URL Entrust IdentityGuard requires to connect to the database server.
115Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide
6 Provide Entrust IdentityGuard with the database administrator information. This database administrator was created to own the Entrust IdentityGuard database and schema.
a At the following prompt, enter the database administrator user name:
Enter the DB userid:
b At the following prompts, enter and confirm the database administrator password:
Enter the DB password:
Confirm:
The following message appears:
Enter the DB schema name:
c Enter the schema name for your database.
In some databases (for example, Oracle), the schema is automatically named with the user name associated with it. For these databases, type the database administrator user name.
Completing the Entrust IdentityGuard configurationThe following steps complete the initial configuration of Entrust IdentityGuard.
Attention: It is important that you do not allow non-SSL access to the Administration Service. Allowing non-SSL access could severely compromise the security of your system.
To complete the configuration script1 You are prompted for the ports that the Application server should use.
Client applications—through the use of the IdentityGuardAuthAPI client toolkit—communicate with the Entrust IdentityGuard Authentication service to perform challenge retrieval and response validation. The client toolkit communicates with Entrust IdentityGuard using SOAP over HTTP/HTTPS. The following prompts define the ports that Entrust IdentityGuard services listen on.
Enter a value for each.
Note: The http and https ports should be the ones used by your application server.
APPLICATION SERVER CONFIGURATION
116 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
a Enter the Authentication Service HTTP port number:
b Enter the Authentication Service HTTPS port number:
The Entrust IdentityGuard Authentication service and the Entrust IdentityGuard sample application are deployed at both the HTTP and HTTPS ports.
c Enter the Administration Service HTTPS port number:
This is the port that administration applications use to connect to the Administration service when using SSL (HTTPS).
Note: The Authentication Service HTTPS and Administration Service HTTPS port numbers can be the same.
2 You are prompted to confirm the host name used in the service URLs.
The hostname to be used in the service URLs is <hostname>.
Do you want to use this hostname? [yes or no]
Enter yes to use this host name or enter no to choose another host name.
3 You are prompted to configure Entrust IdentityGuard logs:
LOG CONFIGURATION
a The following question appears:
Should Entrust IdentityGuard log to files or syslog? [FILE or
SYSLOG]:
If you answer file, Entrust IdentityGuard displays the location of the files and configuration is complete.
b If you answer syslog, logs are logged to Syslog. Entrust IdentityGuard prompts you for the host name.
Enter the syslog host name (default is localhost):
Ensure that Syslog on this host is configured to accept Entrust IdentityGuard logs. For more information, see the section “Configuring Syslog for remote logging on UNIX” on page 226.
4 The following message appears:
Do you want to configure the Entrust IdentityGuard Radius
Proxy? [yes or no]
Do one of the following:
• If you plan to use a Radius server for first-factor authentication and are not using VPN groups, enter yes. Proceed to Step 4 in “To configure the Radius proxy on UNIX” on page 180.
117Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide
• If you plan to use a Radius server for first-factor authentication and you want to configure your VPN servers to recognize Entrust IdentityGuard groups, you need to first complete the configuration and initialization of Entrust IdentityGuard and define the groups. In this case, enter no.
• If you plan to use a Windows domain controller or LDAP directory for first-factor authentication, enter yes. Follow the instructions under “Using Entrust IdentityGuard groups with a VPN server” on page 175.
• Otherwise, enter no.
5 When you finish the configuration procedure, this message appears:
Configuration complete.
Do you wish to initialize the primary system? [yes or no]
• Enter yes to start the initialization tasks. Proceed to “Initializing the primary Entrust IdentityGuard Server” on page 118.
• If you enter no you must run the init command in the supersh command shell from the $IDENTITYGUARD_HOME/bin directory before you can use Entrust IdentityGuard. Proceed to “To initialize the primary Entrust IdentityGuard Server manually” on page 123.
118 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Initializing the primary Entrust IdentityGuard Server
Complete the following procedure to initialize the primary Entrust IdentityGuard Server on your system.
Topics in this section:
• “What initialization does” on page 118
• “If initialization fails” on page 118
• “Initializing the primary server” on page 119
What initialization doesInitialization creates master keys and the various policy structures. The identityguard.properties file specifies two files that are used to store the keys that protect the repository and the master users. The files that store this information are:
• Entrust IdentityGuard master keys file (masterkeys.enc)—a file containing the encryption keys that protect the repository.
• Entrust IdentityGuard key protection file (masterkeys.kpf)—a file containing an obfuscation key which is used to encrypt the three master user passwords that are stored in the file.
The contents of the master keys file can be unlocked by a master user. The contents of the key protection file provide access to the master user passwords. This access can then be used to unlock the master keys file.
If initialization failsThe most likely causes of an initialization failure are:
• The Entrust IdentityGuard properties file contains invalid values. To resolve this, go to $IDENTITYGUARD_HOME/etc/identityguard.properties and edit the file.
• Your repository is not configured correctly to work with Entrust IdentityGuard.
• The repository is not running.
For more information on Entrust IdentityGuard error messages, see Entrust IdentityGuard Error Messages included with your documentation package.
119Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide
Initializing the primary serverThis section provides the steps necessary to initialize the primary server.
To initialize the primary Entrust IdentityGuard Server during installation1 Respond to the following prompt:
PRIMARY SYSTEM INITIALIZATION
If you are reinstalling Entrust IdentityGuard, the following prompt appears:
An existing system has been detected. Overwriting an existing
system will mean the existing data can no longer be accessed. Are
you sure you want to overwrite the existing system? (y/n) [n]:
Attention: If you are using an LDAP repository, and you run init -overwrite, you must first manually remove the fpcr directory located at $IDENTITYGUARD_HOME/etc/fpcr/ as well as the ftkr directory located at $IDENTITYGUARD_HOME/etc/ftkr.
Attention: If you reinitialize an Entrust IdentityGuard system by running init -overwrite, you must first replace any encrypted values in the identityguard.properties file with cleartext values because Entrust IdentityGuard cannot decrypt the old values once the reinitialization is performed. See the section “Editing property values” on page 257.
When you answer y, the command init -overwrite runs automatically. The init command:
• generates a new master key and stores it in the master keys file
• generates the key protection file
• initializes default policy settings
If you answer n or if initialization fails, you must run the init command in the master user shell (supersh) at a later time. For steps for initializing manually, see the section “To initialize the primary Entrust IdentityGuard Server manually” on page 123.
Note: You can cancel the script at any time by pressing Ctrl + C.
The following messages appear:
Enter install key:
120 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Enter activation key:
2 Enter the installation key and the activation key you received from Entrust. Once the activation key is validated, master keys are then generated.
Attention: The two master keys files are created in $IDENTITYGUARD_HOME/etc. After initialization, back up masterkeys.enc. If this file is lost, the system cannot be recovered. See the system restore procedure in “Restoring Entrust IdentityGuard from a backup” on page 250.
Do not back up the key protection file (masterkeys.kpf). The masterkeys.kpf file is unique to each server.
3 Type the three master user passwords for the user names—Master1, Master2, and Master3.
The passwords must meet the following criteria:
• be over eight characters in length
• contain upper and lowercase characters
• contain a numerical value
The following prompts are displayed:
Enter a new password for Master1.
Password:
Confirm:
Enter a new password for Master2.
Password:
Confirm:
Enter a new password for Master3.
Password:
Confirm:
4 When you have finished creating passwords, the following message is displayed:
System initialized.
Do you wish to setup the sample application [yes or no]
• Enter yes to configure the sample application. Proceed to “Configuring the sample application on an existing application server” on page 121.
• If you enter no you can optionally configure the sample application later. Proceed to “Deploying Entrust IdentityGuard services on an existing application server” on page 127.
121Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide
Configuring the sample application on an existing application server
Entrust IdentityGuard provides a sample Web application that includes user registration functionality as well as various authentication samples. This sample requires an administrator user name and password. If you are using a directory you must create the administrator before configuring the sample application.
For more information on the sample application, see the Entrust IdentityGuard Administration Guide.
Attention: The sample administrator password is stored in clear text in the file $IDENTITYGUARD_HOME/etc/igsample.properties. For security reasons, disable the sample application when you are not using it.
The configsample.sh script creates the following:
• a role called samplerole
• a policy called samplepolicy
• a group called samplegroup
• an administrator in the samplegroup (the administrator has access to the samplegroup)
• an igsample.properties file
If you are configuring the sample application manually, refer to “To configure the Entrust IdentityGuard Server sample application manually” on page 125.
To configure the sample application1 You are prompted to enter the user name for the sample administrator.
Enter adminid for sample administrator:
2 You are prompted to enter and confirm a password:
Enter password for sample administrator:
Confirm:
The password must meet the following criteria:
• be over eight characters in length
• contain upper and lowercase characters
• contain a numerical value
3 Log in as a master user to complete the setup.
You are prompted for a master user name and password:
122 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Userid:
Password:
4 When you are finished setting up the sample, the following message appears:
Setup of Entrust IdentityGuard sample successful.
You can now deploy the sample Web application from your application server (see “Deploying Entrust IdentityGuard services on an existing application server” on page 127).
123Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide
Running the scripts manuallyIf you did not run the scripts during the installation procedure, you have the option to manually run the configuration and initialization scripts.
To run the primary Entrust IdentityGuard Server configuration manually1 Log in as the UNIX user that belongs to the UNIX group that was specified during
the installation. See “To install Entrust IdentityGuard” on page 106.
2 Change to $IDENTITYGUARD_HOME (default is /opt/entrust/identityguard81).
3 From $IDENTITYGUARD_HOME, source the environment settings file by entering
. ./env_settings.sh
(Include a space between the two periods in the command.)
4 Run the configure.sh script.
If you have previously configured Entrust IdentityGuard, the following message appears:
An identityguard.properties file exists. If you continue, this
file will be overwritten.
Do you want to continue? [yes or no]
5 Enter yes and continue from Step 1 of the “To start the Entrust IdentityGuard configuration” on page 109.
To initialize the primary Entrust IdentityGuard Server manually1 Log in as the UNIX user that belongs to the UNIX group that was specified during
the installation. See “To install Entrust IdentityGuard” on page 106.
2 Go to $IDENTITYGUARD_HOME.
3 From $IDENTITYGUARD_HOME, source the environment settings file by entering
. ./env_settings.sh
(Include a space between the two periods in the command.)
4 Enter the following command to start the master user shell:
supersh
Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.
124 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Note: You can view copyright and version information at any time by entering version at the command prompt.
5 Enter
init <optionalvalues>
where <optionalvalues> are listed in Table 10:
6 Complete Step 2 and Step 3 on page 120.
7 Type exit to leave the command shell.
Table 10: Initialization optional values
Values Description
-sernum To start card serial numbers at a specific number, enter init -sernum <num> where <num> is a positive integer.
Defaults to 1 if not specified.
Use this option if you are adding additional cards to your system. For example, if you have previously loaded 350 cards, enter:
init -sernum 351
-overwrite If the system was initialized previously, this command overwrites the existing data.
You are prompted to confirm that you want existing data to be overwritten.
Attention: If you are using an LDAP repository, and you run init -overwrite, you must first manually remove the fpcr folder located at $IDENTITYGUARD_HOME/etc/fpcr/.
Attention: If you reinitialize an Entrust IdentityGuard system by running init -overwrite, you must first replace any encrypted values in the identityguard.properties file with cleartext values because Entrust IdentityGuard cannot decrypt the old values once the reinitialization has been performed. See the section “Editing property values” on page 257.
-force If you use the -force option, you are not prompted for confirmation.
125Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide
8 Check the log files for errors. If you chose to log to files when you installed Entrust IdentityGuard, the logs are stored in $IDENTITYGUARD_HOME/logs.
To configure the Entrust IdentityGuard Server sample application manually1 Log in as the UNIX user that belongs to the UNIX group that was specified during
the installation. See “To install Entrust IdentityGuard” on page 106.
2 Change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81).
3 From $IDENTITYGUARD_HOME, source the environment settings file by entering
. ./env_settings.sh
(Include a space between the two periods in the command.)
4 Run the configsample.sh script.
5 You are prompted to enter the user name for the sample administrator.
Enter adminid for sample administrator:
6 You are prompted to enter and confirm a password:
Enter password for sample administrator:
Confirm:
The password must meet the following criteria:
• be over eight characters in length
• contain upper and lowercase characters
• contain a numerical value
7 Log in as a master user to complete the setup.
You are prompted for a master user name and password:
Userid:
Password:
8 When you are finished setting up the sample, the following message is displayed:
Setup of Entrust IdentityGuard sample successful.
To make changes to the sample Web application configuration1 Log in as the UNIX user that belongs to the UNIX group that was specified during
the installation. See “To install Entrust IdentityGuard” on page 106.
2 Change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81).
3 From $IDENTITYGUARD_HOME, source the environment settings file by entering
126 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
. ./env_settings.sh
(Include a space between the two periods in the command.)
4 Enter the following command to start the master user shell:
supersh
Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.
5 Log in as a master user. For example,
Master1
6 If you have previously configured the sample, delete each of the following individually:
• sample administrator
• sample group
• sample role
• sample policy
To do so:
a Run the delete command for each. For example,
admin delete sample/SampleAdmin1
Note: Use the list command to list sample administrators, groups, roles, and policies, so that you can see which ones to delete. For example, use admin list to list all the sample administrators that have already been created. Use group list, to list the sample groups that exist, and so on.
b Answer yes to confirm the delete.
Are you sure you wish to delete the admin? (y/n) [n]:
7 Type exit to exit the master user shell and return to the command-line.
8 Enter the following command to start configuring the sample:
configsample.sh
9 You are warned that the igsample.properties file already exists. For example:
/opt/entrust/identityguar81/etc/igsample.properties file already
exists. Do you wish to continue? [yes or no]
Answer yes.
10 Follow the steps in “To configure the sample application” on page 121.
127
Chapter 5
Deploying Entrust IdentityGuard services on an existing application server
This chapter provides all the necessary steps to deploy Entrust IdentityGuard services using the WebLogic 8.1 or 9.1 or WebSphere 6.0 application servers.
This chapter contains the following sections:
• “Deploying Entrust IdentityGuard services on WebLogic” on page 128.
• “Deploying Entrust IdentityGuard services on WebSphere 6.0 application server” on page 142
• “Testing your installation” on page 162
• “Managing the Entrust IdentityGuard service” on page 166
128 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Deploying Entrust IdentityGuard services on WebLogic
Once you have installed Entrust IdentityGuard on a WebLogic 8.1 or 9.1 application server, you must install and deploy the Entrust IdentityGuard services. The process is different depending on the version of WebLogic you are using.
Topics in this section:
• “Deploying Entrust IdentityGuard services on WebLogic 8.1 application server” on page 128
• “Deploying Entrust IdentityGuard services on WebLogic 9.1 application server” on page 134
Deploying Entrust IdentityGuard services on WebLogic 8.1 application serverTo deploy Entrust IdentityGuard services on a WebLogic 8.1 application server you must:
• extract and install the Entrust IdentityGuard service files
• deploy the Entrust IdentityGuard services
Note: In the following, $WEBLOGIC is the directory in which the WebLogic server was installed. $DOMAIN is the directory of the WebLogic domain where Entrust IdentityGuard is being installed, for example /bea/weblogic81/samples/domains/wl_server.
To install Entrust IdentityGuard services1 Install the native libraries libaal2sdk.so and libualjni.so required by
Entrust IdentityGuard to one of the directories listed in the LD_LIBRARY_PATH environment variable.
The native libraries are located in $IDENTITYGUARD_HOME/lib/solaris. Enter at the command line:
LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/opt/entrust/identityguard81/lib/
solaris/;export LD_LIBRARY_PATH
Note: Substitute the correct installation directory if it is different from the default /opt/entrust.
129Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
2 Edit the domain startup script $DOMAIN/startWebLogic.sh and add enttoolkit.jar, log4j-1.2.14.jar and any database driver .jar files to the line that sets the CLASSPATH environment variable.
3 Still in $DOMAIN/startWebLogic.sh, move to the line where it sets JAVA_OPTIONS, and at the end add
-Didentityguard.home=/opt/entrust/identityguard81
Note: Substitute the correct install directory if it is different from the default /opt/entrust and add the line if there is currently no setting of JAVA_OPTIONS.
4 At the command line, go to (cd) to $IDENTITYGUARD_HOME/services/auth.
5 Create a directory named IdentityGuardAuthService.
6 Go to (cd) to the IdentityGuardAuthService directory.
7 Using the jar tool from the WebLogic JDK ($WEBLOGIC/jdk_141_05/bin/jar), extract the file IdentityGuardAuthService.war by entering the following at the command line:
jar xvf ../IdentityGuardAuthService.war
A new directory called WEB-INF is created.
8 Go to (cd) to the WEB-INF directory, and create a file named weblogic.xml and give it the following content:
Note: The file name is case-sensitive.
<!DOCTYPE weblogic-web-app PUBLIC "-//BEA Systems, Inc.//DTD Web
Application 8.1//EN" "http://www.bea.com/servers/wls810/
dtd/weblogic810-web-jar.dtd">
<weblogic-web-app>
<container-descriptor>
<prefer-web-inf-classes>true</prefer-web-inf-classes>
</container-descriptor>
</weblogic-web-app>
9 In $IDENTITYGUARD_HOME/services/admin create a directory named IdentityGuardAdmin.
10 Go to the IdentityGuardAdmin directory.
130 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
11 Extract IdentityGuardAdmin.war by entering the following at the command line:
jar xvf ../IdentityGuardAdmin.war
12 Repeat Step 8.
13 In $IDENTITYGUARD_HOME/services/admin, create a directory named IdentityGuardAdminService.
14 Change to the IdentityGuardAdminService directory.
15 Extract IdentityGuardAdminService.war by entering the following at the command line:
jar xvf ../IdentityGuardAdminService.war
16 Repeat Step 8.
17 Optionally, deploy the sample application:
a In $IDENTITYGUARD_HOME/services/auth, create a directory named IdentityGuardSampleApp.
b Change to the IdentityGuardSampleApp directory.
c Extract IdentityGuardSampleApp.war by entering the following at the command line:
jar xvf ../IdentityGuardSampleApp.war
d Repeat Step 8.
To deploy Entrust IdentityGuard services1 Start your WebLogic domain from $DOMAIN by entering
./startWeblogic.sh
2 Start the administration console for your server (default URL http://localhost:7001/console) and log in.
The WebLogic 8.1 main page appears.
131Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
3 From the WebLogic 8.1 main page, select Deployments > Web Application Modules.
The Deploy a Web Application Module page appears.
132 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
4 Click the Deploy a New Web Application link.
The Select the archive for this Web application module page appears.
5 Browse through the location link to locate the directory where authentication service WAR file, was extracted.
The directory is $IDENTITYGUARD_HOME/services/auth/IdentityGuardAuthService
The Select the archive for this Web application module page appears.
133Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
6 Click the radio button to the left of the directory IdentityGuardAuthService and then click Target Module.
The Review your choices and deploy page appears.
7 After reviewing your choices, click Deploy.
A deployment status page appears showing the status of the Web application deployment.
8 Repeat Step 3 through Step 7 to install the Administration service from $IDENTITYGUARD_HOME/services/admin/IdentityGuardAdminService
134 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
9 Repeat Step 3 through Step 7 to install the Administration interface from $IDENTITYGUARD_HOME/services/admin/IdentityGuardAdmin
10 Optionally, repeat Step 3 through Step 7 to enable the sample application from $IDENTITYGUARD_HOME/services/auth/IdentityGuardSampleApp.
Deploying Entrust IdentityGuard services on WebLogic 9.1 application serverTo deploy Entrust IdentityGuard services on a WebLogic 9.1 application server you must:
• extract and install the entrust IdentityGuard service files
• deploy the Entrust IdentityGuard services
Note: In the following, $WEBLOGIC is the directory in which the WebLogic server was installed, and $DOMAIN is the directory of the WebLogic domain where Entrust IdentityGuard is being installed, for example /opt/bea/weblogic91/samples/domains/wl_server.
To install and deploy Entrust IdentityGuard services1 Install the native libraries libaal2sdk.so and libualjni.so required by
Entrust IdentityGuard to one of the directories listed in the LD_LIBRARY_PATH environment variable.
The native libraries are located in $IDENTITYGUARD_HOME/lib/solaris. Install them by entering at the command line:
LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/opt/entrust/identityguard81/lib/
solaris/;export LD_LIBRARY_PATH
Note: Substitute the correct installation directory if it is different than the default /opt/entrust.
2 Copy enttoolkit.jar, log4j-1.2.14.jar found in $IDENTITYGUARD_HOME/lib and any database driver .jar files to $DOMAIN/lib.
All .jar files in this directory are added to the Classpath environment when the server starts.
3 Edit the domain startup script that sets the environment variables, $DOMAIN/bin/setDomainEnv.sh. Move to the line that sets JAVA_OPTIONS
135Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
and add -Didentityguard.home=/opt/entrust/identityguard81 to the end of the line.
Note: Your installation directory may be different.
4 Start your WebLogic server from $DOMAIN/bin by typing:
./startWebLogic.sh
5 Start the administration console for your server (the default URL is http://localhost:7001/console) and log in.
The WebLogic main page appears.
6 Under Change Center click Lock & Edit.
136 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
7 Under Domain Configurations, click Deployments.
The Summary of Deployments page appears.
8 Click Install.
The Install Applications Assistant page appears.
9 Click Upload your file(s) located in the Note paragraph.
The Install Application Assistant appears prompting you to upload a deployment to the administration server.
137Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
10 Click Browse to the right of Deployment Archive to locate the authentication service WAR file, IdentityGuardAuthService.war and click Open.
The file is located in
$IDENTITYGUARD_HOME/services/auth/IdentityGuardAuthService.war
11 Click Next on the Install Applications Assistant page to upload a deployment to the administration server.
The Install Applications Assistant page updates so that you can locate the deployment to install and prepare for deployment.
138 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
12 Click the radio button to the left of the file name IdentityGuardAuthService.war to locate the deployment to install and prepare for deployment.
13 Click Next.
The Install Applications Assistant page updates and prompts you to choose a targeting style.
14 Select Install this deployment as an application, and then click Next.
The Install Applications Assistant page updates with optional settings.
139Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
15 Accept the default optional settings and click Next.
The Install Applications Assistant page updates to enable you to review your choices.
140 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
16 Review the choices, and click Finish.
The Settings for IdentityGuardAuthService page appears.
17 Under Change Center in the top left of the page, click Activate Changes to accept the changes.
18 Repeat Step 6 through Step 17 to install the Administration service ($IDENTITYGUARD_HOME/services/admin/IdentityGuardAdminService.war).
19 Repeat Step 6 through Step 17 to install the Administration interface ($IDENTITYGUARD_HOME/services/admin/IdentityGuardAdmin.war).
20 Optionally, repeat Step 6 through Step 17 to enable the sample application ($IDENTITYGUARD_HOME1/services/auth/IdentityGuardSampleApp.war).
21 Under Domain Structure on the main page, click Deployments.
141Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
The IdentityGuard deployments display in a prepared state, but they are not running yet.
22 Select the checkbox for each Entrust IdentityGuard application.
23 Click the Start drop-down menu.
24 Select Start servicing all requests.
The Start Application Assistant page appears.
25 Click Yes to start deployments. Entrust IdentityGuard is now up and running.
142 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Deploying Entrust IdentityGuard services on WebSphere 6.0 application server
After completing installation of Entrust IdentityGuard server, you must deploy IdentityGuard services on a WebSphere application server.
Topics in this section:
• “Defining and deploying shared library settings” on page 142
• “Installing Entrust IdentityGuard services on WebSphere 6.0” on page 155
Defining and deploying shared library settingsYou must define the shared library settings for the Security Toolkit for Java Platform, your Entrust tokens (if applicable), and the database driver.
To define shared library settings1 Start your WebSphere server from $WEBSPHERE/AppServer/bin by entering
./startServer.sh <server_name>
where server_name is the name of the server you are starting.
2 Start the administration console for your server.
The default URL is http://localhost:9060/ibm/console.
3 Log in to your server.
The WebSphere main page appears.
143Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
4 From the WebSphere main page, click Environment > Shared Libraries.
The Shared Libraries page appears.
144 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
5 Click the Node scope for the library and click Apply.
6 Under Preferences, click New.
The New Shared Libraries page appears prompting you to define the settings for the shared library. These are the settings for the Security Toolkit for Java Platform.
145Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
7 Define the Shared Library settings:
a In the Name field, type Security Toolkit for Java Platform
b Leave the Description field blank.
c Set the Classpath to the enttoolkit.jar file to/opt/entrust/identityguard81/lib/enttoolkit.jar
d If the log4j-1.2.14.jar file is not already a shared library, also add /opt/entrust/identityguard81/lib/log4j-1.2.14.jar
e Set the Native library path to /opt/entrust/identityguard81/lib/solaris or /opt/entrust/identityguard81/lib/aix
8 Click OK.
You are returned to the Shared Libraries page. Security Toolkit for Java Platform appears in the preferences list and a message displays indicating that changes have been made to your local configuration and that the server may need to be restarted for the changes to take place.
146 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
9 Click Save to save the changes, but do not restart the server at this time.
The Shared Libraries Save page appears prompting you to click Save to update the master repository with changes.
147Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
10 Click Save to return to the Shared Libraries page.
11 If your installation will uses Vasco tokens, repeat Step 6 to Step 10 to define a shared token library.
• Add a Classpath for each of the following:
/opt/entrust/identityguard81/lib/aal2wrap.jar
• The library path is /opt/entrust/identityguard81/lib/solaris
12 If using a database, repeat Step 6 to Step 10 to define the database driver library file.
13 Click Save.
To deploy shared libraries1 From the WebSphere server main page, click Servers > Application Servers.
The Application servers page appears.
2 Click the server name on which you want to deploy Entrust IdentityGuard services from the Application servers list.
148 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
The Server page appears.
3 Under Server Infrastructure, click Java and Process Management > Class loader.
149Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
The Application servers Class Loader page appears.
4 Select the class loader from the list.
If there are no class loaders defined:
a Click New to create a new class.
The Class loader configuration page appears.
b Select Class loader mode Parent First.
c Click OK.
You are returned to the Server page and a Class Loader appears in the preferences list.
d Select the Class loader.
The Class loader configuration page appears.
150 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
5 Under Additional Properties, select Libraries.
The Application servers Library Reference page appears.
6 Click Add.
The Application server Library Reference General Properties page appears.
151Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
7 Under Library name, select Security Toolkit for Java Platform.
8 Click OK.
The Library Reference page updates with Security Toolkit for Java Platform listed in the preferences list.
9 Repeat Step 6 to Step 8 for the Entrust token library and, optionally, the database driver library.
10 Return to the server page from Step 2. You can do this by clicking the server name from the Library Reference page.
11 From the server page, click Java and Process Management > Process Definition > Java Virtual Machine > Custom Properties.
The Custom Properties page appears.
152 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
12 Click New.
The Custom Properties configuration page appears.
13 Name the new property identityguard.home.
14 Set the value to the install directory of Entrust IdentityGuard to /opt/entrust/identityguard81
15 Click OK.
153Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
Note: When using the default JDK on Solaris, applications running in WebSphere do not understand the HTTPS protocol. To resolve this issue, you must define another custom property with the name java.protocol.handler.pkgs and value com.ibm.net.ssl.www.protocol.
16 Click Save followed by Save on the Custom Properties Save page.
17 Repeat Step 12 to Step 16 to define the java.protocol.handler.pkgs custom property.
Note: Ensure that you have also set up the javax.net.ssl.trustStore custom property if you are using self-signed certificates (see “Configuring SSL for WebSphere 6.0” on page 101).
18 If you are using AIX, complete this step. On Solaris, proceed to Step 19 on page 155.
a Return to the server page from Step 2.
b From the server page, click Java and Process Management > Environment Entries.
The Application server Custom Properties page opens.
c Click New. The General Properties page opens.
154 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
d Set Name to LIBPATH (all caps) and Value to the path of the native libraries. For example, /opt/entrust/identityguard81/lib/aix.
155Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
e Click Apply. You are returned to the Custom Properties page.
f Click Save followed by Save.
19 Restart the server.
Installing Entrust IdentityGuard services on WebSphere 6.0After setting the shared libraries you can deploy the Entrust identityGuard authentication and administration services.
To install Entrust IdentityGuard services1 From the WebSphere main page, select Applications > Install New Application.
156 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
The Preparing for the application installation page appears.
2 Click Browse under Specify path to locate the authentication service WAR file, IdentityGuardAuthService.war, which is most likely in /opt/entrust/identityguard81/services/auth/.
3 Type /IdentityGuardAuthService in the Context Root text box.
4 Click Next.
The Preparing for the application installation page updates prompting you to choose to generate default bindings and mappings.
5 Select Generate Default Bindings and click Next.
157Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
An Application Security Warnings page appears warning about contents of the was.policy file.
6 Accept the warning and click Continue.
The Install New Application page updates prompting you to select your installation options.
158 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
7 Select the installation options.
You can select to keep the default settings or, optionally in the Directory to install application text box, specify an installation directory and remove _war from the Application name.
8 Click Next.
The Map modules to servers page appears.
159Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
9 On the Map Modules to Servers page, select the server(s) on which to deploy the Entrust IdentityGuard authentication service.
Note: You must select at least one server.
10 Click Next.
The Map virtual hosts for Web modules page appears.
11 On the Map Virtual Hosts for Web Modules page, select the virtual host to deploy the Entrust IdentityGuard authentication service.
12 Click Next.
The Summary page appears.
160 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
13 Review the details on the Summary page, and click Finish.
WebSphere attempts to load the Entrust IdentityGuard authentication service. If this fails, consult the WebSphere logs for the domain to see why.
When installation completes the following message appears:
Application IdentityGuardAuthServices installed successfully.
To start the application, first save changes to the master
configuration.
14 Click Save to Master Configuration.
The Save page appears.
15 Click Save.
16 Repeat Step 1 through Step 15 to install the administration service from /opt/entrust/identityguard81/services/admin/IdentityGuardAdminService.war
17 Repeat Step 1 through Step 15 to install the Web interface from /opt/entrust/identityguard81/services/admin/IdentityGuardAdmin.war.
18 Optionally, repeat Step 1 through Step 15 to install the sample applicationfrom
opt/entrust/identityguard81/services/auth/IdentityGuardSampleApp.war.
161Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
To start Entrust IdentityGuard services1 From the WebSphere main menu, select Applications > Enterprise Applications.
The Enterprise Applications page appears.
2 Select the box next to Entrust IdentityGuard service(s), and then click Start.
A message appears indicating that the services have started successfully.
Note: You can select to start multiple services simultaneously.
162 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Testing your installationThis section provides testing steps that determine if your installation is working properly. It assumes that you have completed the installation, configuration, and initialization tasks.
To test your installation1 Check the log files for errors. If you chose to log to files when you installed
Entrust IdentityGuard, the logs are stored in $IDENTITYGUARD_HOME/logs.
2 Start the Entrust IdentityGuard Server as the Entrust IdentityGuard application owner. For instructions, see “Query the status of Entrust IdentityGuard service” on page 166.
3 Check whether all Entrust IdentityGuard services are running as expected.
a Source env_settings.sh by entering:
. ./env_settings.sh
b Enter
igservice.sh all status
The following shows part of the status report generated when all services are running:
Authentication V1 service at
http://<hostname>/IdentityGuardAuthService/services/Authenticat
ionService is available.
Authentication V1 service at
https://<hostname>/IdentityGuardAuthService/services/Authentica
tionService is available.
Authentication V2 service at
http://<hostname>/IdentityGuardAuthService/services/Authenticat
ionServiceV2 is available.
Authentication V2 service at
https://<hostname>/IdentityGuardAuthService/services/Authentica
tionServiceV2 is available.
Sample application at http://<hostname>/IdentityGuardSampleApp
is available.
163Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
Administration V1 service at
https://<hostname>/IdentityGuardAdminService/services/AdminServ
ice is available.
Administration V2 service at
https://<hostname>/IdentityGuardAdminService/services/AdminServ
iceV2 is available.
Administration interface at
https://<hostname>/IdentityGuardAdmin is available.
4 Ensure that you can log in to the Administration Web interface.
a Create an administrator account or use the sample administrator account, if you have configured the sample application.
For information on creating an administrator, refer to the Entrust IdentityGuard Administration Guide.
b Open a browser and enter the following URL:
https://<FQDN>:<port>/IdentityGuardAdmin
where:
– <FQDN> is the Entrust IdentityGuard host name.– <port> is the Administration interface service port.
Note: If you cannot access the Entrust IdentityGuard services (administration or authentication), verify that firewall rules are not blocking the HTTP and HTTPS ports.
164 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
c At the login page, enter the administrator user name and password. Optionally, enter the group name, if the user does not belong to the default group.
d You are prompted to change the administrator password.
e Follow the rules on the screen to change the administrator password.
The Entrust IdentityGuard Administration interface appears:
165Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
5 Optionally, test the sample application. To do so, follow the steps in “Using the sample Web application” on page 305.
You have now completed testing of the Entrust IdentityGuard installation.
You can now:
• complete various advanced configuration tasks (“Postinstall configuration options for Entrust IdentityGuard Server” on page 201 and “Configuring the Entrust IdentityGuard Server properties file” on page 255) such as adding replica Entrust IdentityGuard Servers to your system
• set up Entrust IdentityGuard by adding policies, groups, users, authentication methods, and so on (see the Entrust IdentityGuard Administration Guide)
166 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Managing the Entrust IdentityGuard service
Complete the following steps to check the status of the Entrust IdentityGuard service. You have the option of using either the identityguard.sh command, or the UNIX output command.
Topics in this section:
• “Query the status of Entrust IdentityGuard service” on page 166
• “Stopping Entrust IdentityGuard Services on WebLogic 8.1” on page 167
• “Stopping Entrust IdentityGuard Services on WebLogic 9.1” on page 168
• “Stopping Entrust IdentityGuard Services on WebSphere 6.0” on page 169
Query the status of Entrust IdentityGuard serviceThe following command allows you to query the status of the Entrust IdentityGuard service.
Note: If you are root, you cannot start Entrust IdentityGuard Radius service using the igradius.sh start command. Also, to stop the Entrust IdentityGuard service, you must be the user who started the service.
To query the status of Entrust IdentityGuard 1 Log in as the UNIX user that belongs to the UNIX group that was specified during
the installation.
2 From $IDENTITYGUARD_HOME, enter
. ./env_settings.sh
3 To query the status of the Entrust IdentityGuard service, enter
identityguard.sh status
Note: Once Entrust IdentityGuard is installed, the service is started automatically when you reboot.
167Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
Stopping Entrust IdentityGuard Services on WebLogic 8.1Complete the following procedure to stop Entrust IdentityGuard on WebLogic 8.1.
To stop Entrust IdentityGuard Services1 From the WebLogic 8.1 main page, select Deployments > Web Application
Modules.
The Deploy a Web Application Module page appears showing a list of all deployed Web applications.
2 Click the application name, for example, IdentityGuardAdmin.
The Deployment status page appears.
3 Click Stop.
168 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
4 Repeat Step 1 to Step 3 for each Entrust IdentityGuard service you want to stop.
Stopping Entrust IdentityGuard Services on WebLogic 9.1You can stop Entrust IdentityGuard Services using one of the following three options:
• When work completes. Specifies that WebLogic Server wait for the application to finish its work and for all currently connected users to disconnect.
• Force stop now. Specifies that WebLogic Server stop the application immediately, regardless of the work that is being performed and the users that are connected.
• Stop, but continue servicing administrative requests. Specifies that WebLogic Server stops the application once all its work has finished, but to then puts the application in Administrative Mode so it can be accessed for administrative purposes.
To stop Entrust IdentityGuard Services1 Under Domain Structure on the left of the main page click Deployments.
The Deployment Summary Page appears with a list of Entrust IdentityGuard services.
169Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide
2 Select the checkbox for the service(s) you want to stop.
3 From the Stop drop-down menu select the desired stop option.
The Stop Application Assistant page appear.
4 Click Yes to stop the application.
You are returned to the Summary of Deployments page.
Stopping Entrust IdentityGuard Services on WebSphere 6.0Complete the following procedure to stop Entrust IdentityGuard on WebSphere 6.0.
To stop Entrust IdentityGuard services1 From the WebSphere main page click Applications > Enterprise Applications.
170 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
The Enterprise Applications page appears.
2 Select the service(s) you want to stop.
3 Click Stop.
A message appears indicating that the service was stopped successfully.
171
Chapter 6
Configuring the Entrust IdentityGuard Radius proxy
This chapter provides all the necessary steps for configuring the Entrust IdentityGuard Radius proxy component for use with your VPN servers, and for managing the Radius proxy after installation. You can configure the Entrust IdentityGuard Radius proxy during installation of Entrust IdentityGuard Server or afterwards.
This chapter includes the following sections:
• “Radius proxy integration overview” on page 172
• “Configuring the Radius proxy for groups” on page 175
• “Matching a group to a user” on page 179
• “Using the Radius proxy with a Radius server” on page 180
• “Using the Radius proxy with a domain controller or LDAP directory” on page 187
• “Configuring the VPN server” on page 193
• “Configuring a Radius server for first-factor authentication” on page 194
• “Configuring Radius server failover” on page 195
• “Managing the Radius proxy” on page 196
172 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Radius proxy integration overviewEntrust IdentityGuard provides a way to use the Radius authentication protocol with a VPN server and optionally, an actual Radius server.
During configuration of the Radius proxy, you are asked to choose between a Radius server or an external authentication resource for first-factor authentication. Regardless of your choice, the VPN server still believes it is communicating with a Radius server. It is actually communicating with the Entrust IdentityGuard Radius proxy.
In a normal VPN and Radius implementation, the VPN server communicates with the VPN client and with the Radius server, while the Radius server communicates directly with the VPN server. When you integrate with Entrust IdentityGuard, the Entrust IdentityGuard Radius proxy intercepts messages between the VPN server and the first-factor authentication resource, as shown in Figure 2 on page 173. That resource may be one of a:
• Radius server
• Windows domain controller
• LDAP directory
Once your VPN server uses the Radius proxy for first-factor authentication, you can configure Entrust IdentityGuard to add the grid, token, or temporary PIN multifactor authentication methods to the first-factor authentication performed by the Radius proxy.
You can configure some VPN servers to use a Radius server and some to use a different first-factor authentication resource.
You can take advantage of the Entrust IdentityGuard groups feature to organize users into different groups for authentication purposes. This way you can direct the users of some groups to one first-factor authentication resource and other users to other resources. For details, see “Configuring the Radius proxy for groups” on page 175.
Note: When you configure the Entrust IdentityGuard Radius proxy, the program stores the results in the identityguard.properties file. You can edit this file to change settings or to add additional VPN servers and their first-factor authentication method later. For information on the property settings, see section “Configuring the Entrust IdentityGuard Radius proxy properties” on page 282.
173Configuring the Entrust IdentityGuard Radius proxyFeedback on guide
Figure 2: Radius proxy integrated with a VPN and Radius server
Note: In the above diagram and the next, the Entrust IdentityGuard Radius proxy is shown as a separate physical entity just for illustration. In reality, it is a component that resides on the Entrust IdentityGuard Server.
VPN authentication through the Entrust IdentityGuard Radius proxy follows these steps:
1 A user enters a user name and password using a VPN client.
2 The VPN server passes this information to the Entrust IdentityGuard Radius proxy.
3 The Entrust IdentityGuard Radius proxy forwards the request to the first-factor authentication resource to verify the user.
4 The first-factor authentication resource responds with an accept or reject message to the Entrust IdentityGuard Radius proxy.
If the Radius proxy receives a reject message, the Radius proxy forwards it unchanged to the VPN server.
5 If the Radius proxy receives an accept message, it requests either a grid or token challenge from Entrust IdentityGuard and sends it to the VPN server.
6 The VPN server forwards this to the VPN client.
The challenge requires a temporary PIN or a response from a user’s card or token.
7 The VPN server sends the user’s response to the challenge back to the Entrust IdentityGuard Radius proxy.
8 The Radius proxy forwards the response to Entrust IdentityGuard.
9 Entrust IdentityGuard checks the response and the Radius proxy sends an accept or reject message to the VPN server.
`
VPN server
VPN client Entrust IdentityGuard Server
Entrust IdentityGuard Radius proxy Radius server
174 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
10 An accept message indicates that the user has passed second-factor authentication.
Figure 3: Radius proxy integrated with a VPN and external authentication
Authentication using a Windows domain controller or LDAP directory follows these steps:
1 A user enters a user name and password in the VPN client. The VPN server passes the data to the Entrust IdentityGuard Radius proxy.
2 The Radius proxy forwards the request to the Entrust IdentityGuard Server to verify the user.
3 Entrust IdentityGuard checks the first-factor authentication resource to verify the user.
4 Entrust IdentityGuard sends a success or fail message to the Radius proxy.
5 If the Radius proxy receives a fail message, the Radius proxy generates a reject message and sends it to the VPN server.
6 If the Radius proxy receives a success message, it requests a challenge from Entrust IdentityGuard and sends the challenge to the VPN server.
7 The VPN server forwards this to the VPN client. The challenge requires a temporary PIN or a response from a user’s card or token.
8 The VPN server sends the response to the Radius proxy.
9 The Radius proxy forwards the information to Entrust IdentityGuard for authentication.
10 Entrust IdentityGuard authenticates the response (or not) and the Radius proxy sends an accept or reject message to the VPN server.
11 An accept message indicates the user has now passed second-factor authentication.
`
VPN server
VPN client Entrust IdentityGuard Server
Entrust IdentityGuard Radius proxy
First-factor authentication resource: domain controller or LDAP
directory
175Configuring the Entrust IdentityGuard Radius proxyFeedback on guide
Configuring the Radius proxy for groups
Your VPN server must already be configured to recognize specific user groups. The group names used by your VPN server do not have to be the same as those you created in Entrust IdentityGuard.
Note: While VPN groups can be specifically paired with Entrust IdentityGuard groups during configuration of the Radius proxy, this pairing is optional if the names of users are unique in your system. In this case, Entrust IdentityGuard determines the correct group. See “Matching a group to a user” on page 179 for an explanation.
Entrust IdentityGuard expects group and user name pairs to be in the form “group/name.” You can configure the Radius proxy to convert names with the form “name@group” or “group\name” to “group/name.” See the processbackslash and processat Radius proxy properties in the section “Configuring the Entrust IdentityGuard Radius proxy properties” starting on page 282.
Using Entrust IdentityGuard groups with a VPN serverThis section applies if you want to associate groups of VPN users with Entrust IdentityGuard groups.
You need to define a VPN server entry for each VPN group you wish to pair with an Entrust IdentityGuard group. You can use the same VPN server for multiple groups or you can use different servers for different groups.
During configuration of the Radius proxy, you are asked to respond to prompts in UNIX or to choose options in Windows. Your answers to several of those prompts or options determine how the VPN and Entrust IdentityGuard groups are paired. The key prompts related to groups are:
1 When asked to enter a list of Radius ports, enter one port number for each VPN group.
2 When asked to enter a unique VPN server host, specify either a DNS or IP address.
If you plan to associate several groups with the same VPN server, enter the same IP each time you run through the Radius proxy configuration. Enter a different IP for another VPN server.
3 You are asked to enter the Radius port used by the VPN server.
176 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
The default is all the ports you entered in Step 1. Enter a specific port only when you want the current VPN configuration to apply to a predefined group.
4 When asked to enter the VPN server secret, enter the applicable secret for the VPN server.
5 You are asked for the Entrust IdentityGuard group name.
Enter the group you plan to associate with the port number entered above in Step 3.
6 You are asked to select Radius or external authentication.
For a Radius server, enter RADIUS; otherwise, enter EXTERNAL.
7 If you choose Radius in Step 6, you are asked to enter the Radius server name. You can use the same Radius server for all VPN servers or use different servers.
Once you complete the configuration for one VPN server, the installation program prompts you to define an additional VPN server. Answer yes at the prompt to complete a configuration for another group. Alternatively, you can edit the identityguard.properties file to add values for the properties related to the prompts listed above.
Radius server exampleAssume you want to set up one Radius server to provide first-factor authentication for two VPN groups (on a single VPN server) named SalesVPN and MarketingVPN. These groups are paired with two Entrust IdentityGuard user groups, IGSales and IGMarketing. In this scenario, the relevant settings in the identityguard.properties file would look like this:
# IdentityGuard Radius ports
identityguard.igradius.port=1812 1813
# VPN sales
identityguard.igradius.vpn.salesVPN.igport=1812
identityguard.igradius.vpn.salesVPN.radius=radius1
identityguard.igradius.vpn.salesVPN.host=10.12.1.1
identityguard.igradius.vpn.salesVPN.secret=xyz
identityguard.igradius.vpn.salesVPN.group=IGSales
identityguard.igradius.vpn.salesVPN.useradius=true
# VPN marketing
identityguard.igradius.vpn.marketingVPN.igport=1813
identityguard.igradius.vpn.marketingVPN.radius=radius1
identityguard.igradius.vpn.marketingVPN.host=10.12.1.1
177Configuring the Entrust IdentityGuard Radius proxyFeedback on guide
identityguard.igradius.vpn.marketingVPN.secret=xyz
identityguard.igradius.vpn.marketingVPN.group=IGMarketing
identityguard.igradius.vpn.marketingVPN.useradius=true
You can follow the prompts in the Radius proxy configuration script twice to achieve these results or you can edit the identityguard.properties file directly.
External authentication exampleIn this example, assume you want to set up an LDAP directory to provide first-factor authentication for the same two VPN groups, SalesVPN and MarketingVPN. These groups are paired with two Entrust IdentityGuard user groups, IGSales and IGMarketing. In this scenario, the relevant settings in the identityguard.properties file would look like this:
# IdentityGuard Radius ports
identityguard.igradius.port=1812 1813
# VPN sales
identityguard.igradius.vpn.salesVPN.igport=1812
identityguard.igradius.vpn.salesVPN.host=10.12.1.1
identityguard.igradius.vpn.salesVPN.secret=xyz
identityguard.igradius.vpn.salesVPN.group=IGSales
identityguard.igradius.vpn.salesVPN.useradius=false
# VPN marketing
identityguard.igradius.vpn.marketingVPN.igport=1813
identityguard.igradius.vpn.marketingVPN.host=10.12.1.1
identityguard.igradius.vpn.marketingVPN.secret=xyz
identityguard.igradius.vpn.marketingVPN.group=IGMarketing
identityguard.igradius.vpn.marketingVPN.useradius=false
# external authentication
identityguard.externalauth.impl=com.entrust.identityGuard.authenticationManagement.external.ldap.LdapAuthentication
If you use a domain controller as an external authentication resource, the last section would look like this:
# external authentication
identityguard.externalauth.impl=com.entrust.identityGuard.authenticationManagement.external.kerberos.KerberosAuthentication
178 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
identityguard.externalauth.kerberos.realm=ENTRUST.COM
Also, if you are using a domain controller, you will need to map each realm to its KDC in the igkrb5.conf file. For more information, see “To set the external authentication properties for a domain controller” on page 203.
Note: This patch removes the identityguard.externalauth.kerberos.kdc property that existed in previous Entrust IdentityGuard releases and replaces it with the igkrb5.conf file.
You can follow the prompts in the Radius proxy configuration script twice to achieve these results or you can edit the identityguard.properties file directly. The identityguard.externalauth.impl and Kerberos-related properties must always be added manually.
The identityguard.externalauth.impl property can include a group name. When it does not, as in the above example, the property creates a default entry for all users. When you include an Entrust IdentityGuard group name in the identityguard.externalauth.impl property, it limits the authentication resource to just members of that group. For more details, see “Using groups with external authentication” on page 209.
Also see “Configuring Entrust IdentityGuard for external authentication” on page 202 for more information on the identityguard.externalauth.impl and Kerberos-related properties.
179Configuring the Entrust IdentityGuard Radius proxyFeedback on guide
Matching a group to a userYou do not need to include group names as part of a user identification if your system contains only unique user names.
When Entrust IdentityGuard needs to verify a user and that user is not specifically identified with a group, Entrust IdentityGuard tries to match the user with the correct group following these rules:
• First search the repository for all users with the given user name.
For an LDAP directory, look in all search bases.
• If no matching user name is found, return an error.
• If one unique user entry is found, use that entry.
• If multiple entries are found with the same user name, return an error.
180 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Using the Radius proxy with a Radius server
You can configure the Entrust IdentityGuard Radius proxy to use a Radius server for first-factor authentication by completing one of the following procedures:
• “To configure the Radius proxy on UNIX” on page 180
• “To configure the Radius proxy on Microsoft Windows” on page 182
If you intend to associate specific predefined VPN group names with existing Entrust IdentityGuard group names, read “Configuring the Radius proxy for groups” on page 175 before you begin to configure the Radius proxy.
Attention: Entrust IdentityGuard rejects any VPN server configuration that creates an explicit or implied duplicate VPN server/port combination. An explicit duplicate occurs when you specify the same port more than once for the same VPN server. An implied duplicate occurs if you select the default port (any port in Unix or All in Windows) more than once for the same VPN server.
To configure the Radius proxy on UNIX1 Log in as the UNIX user that belongs to the UNIX group that was specified during
the installation.
2 Navigate to the $IDENTITYGUARD_HOME (/opt/entrust/identityguard81) directory and enter:
. ./env_settings.sh
3 Navigate to the $IDENTITYGUARD_HOME directory and enter:
configradius.sh
4 At the prompt, enter a list of Radius ports for the Radius proxy or accept the default:
Enter a space-separated list of ports used by IdentityGuard Radius
(default: 1812):
Each port value must be an integer between 1024 and 65535.
Note: If you plan to associate different VPN server groups with separate Radius proxy ports, enter all applicable ports separated by spaces. There can be only one VPN server defined for each port.
5 At the next prompt, define a VPN server.
Do you wish to define a VPN server? [yes or no]
181Configuring the Entrust IdentityGuard Radius proxyFeedback on guide
If you answer yes, continue with these configuration steps.
If you answer no, the configuration will stop. You are asked whether you want to initialize the system. Proceed to “Initializing the primary server” on page 48.
6 At the next prompt, type a unique VPN server name. This provides a unique string that is used by Entrust IdentityGuard to reference this server.
Note: A VPN server name must not include the equals sign (=).
Enter a unique label for the VPN server:
7 At the next prompt, enter a unique VPN server host, using either a DNS or IP address:
Enter the VPN server host name (or IP address):
Entrust IdentityGuard Radius proxy identifies a VPN server by its host name and the Radius port to which it sends messages. If you do not specify a port in the next step, the Radius proxy treats all requests as coming from the same VPN server regardless of which port receives them.
8 At the next prompt, type the Entrust IdentityGuard Radius port used by the VPN server:
Enter the Entrust IdentityGuard Radius port used by the VPN
server:
The default is the ports you set in Step 4. If you enter a specific port, then any communication from this VPN server uses that port only. Enter a specific port if you want the current VPN configuration to apply to an Entrust IdentityGuard group.
9 At the next prompt, type and confirm the VPN server secret. The secret you use for Entrust IdentityGuard Radius proxy must match the server secret already set for the VPN server:
Enter the VPN server shared secret:
Confirm:
10 If you have already defined Entrust IdentityGuard user groups, you can set a specific Entrust IdentityGuard group for use with the current VPN server. If you do, the group is included with the user ID when VPN sends requests to Entrust IdentityGuard.
Enter the Entrust IdentityGuard group for the VPN server:
Note: You do not need to enter a group name if the names of users are unique in your system. Entrust IdentityGuard will determine the correct group. See “Matching a group to a user” on page 179 for an explanation.
182 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
11 If you want the Radius proxy to use a Radius server for first-factor authentication, enter RADIUS at the next prompt:
Do you want to use External or Radius authentication? (EXTERNAL or
RADIUS):
Enter RADIUS and continue with these configuration steps.
(If you enter EXTERNAL, the configuration will stop. Proceed to “Configuring Entrust IdentityGuard for external authentication” on page 202.)
12 Each VPN server needs a corresponding Radius server that performs the first-factor authentication. At the next prompt, enter the server name:
Enter the label of the Radius server for this VPN server:
13 If no Radius server configuration exists for the name you chose in Step 12, enter it at this prompt:
No Radius server is defined with the label <your server name>
Do you wish to define a new Radius server? [yes or no]
a If you enter no, the configradius.sh script prompts you for another Radius server name.
b If you enter yes, the configradius.sh script prompts you for the Radius server host name and port:
Enter the Radius server host name (or IP address):
Enter the Radius server port (default: 1812):
This provides the address of the Radius server where the Radius proxy sends Radius requests.
14 At the next prompt, enter and confirm the Radius server secret:
Enter the Radius server shared secret:
Confirm:
The server secret is the password value the Radius client uses to protect the message. The secret you enter must match the server secret set for the Radius server.
The Entrust IdentityGuard Radius proxy is now configured for this VPN server and your Radius server. Answer yes to configure another server or no to exit.
To configure the Radius proxy on Microsoft Windows1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking
Start > All Programs > Entrust > IdentityGuard > Configuration Panel.
2 Select Set Up the Radius Proxy to run the Entrust IdentityGuard Radius Proxy Setup.
The Entrust IdentityGuard Radius Proxy Configuration page appears.
183Configuring the Entrust IdentityGuard Radius proxyFeedback on guide
3 In the Ports used by the Entrust IdentityGuard Radius Proxy field, specify the ports that the Entrust IdentityGuard Radius Proxy will listen on.
Use commas to separate your various ports. Each port value must be an integer between 1 and 65535. The port value entered must be unique to the system.
4 If you are using a Radius server for first-factor authentication, in the Radius Authentication Servers section, click Add. Alternatively, you can select an existing server definition and click Change to modify it or Remove to remove it.
The Add/Change Radius Server page appears.
184 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
5 On the Add/Change Radius Server page, enter the connection details for a Radius server.
Note: If you plan to use external authentication, skip this step.
• Radius server label. Enter a unique string that is used by Entrust IdentityGuard to reference this server. Once a label is saved it cannot be changed.
• Radius server host name. Type a unique Radius server host, using either a DNS or IP address.
• Radius server port. Type the port on the Radius server where the Radius proxy sends messages. This is the same port that the VPN server uses.
• Radius server shared secret. Type the shared secret value the client uses to protect the message. The secret you enter must match the shared secret set on the Radius server.
• Confirm shared secret. Type the shared secret again.
• Click OK.
6 In the VPN Servers section, click Add to map your VPN Server to your first-factor Authentication Server. Alternatively, you can select an existing server definition and click Change to modify it or Remove to remove it.
The Add/Change VPN Server page appears.
185Configuring the Entrust IdentityGuard Radius proxyFeedback on guide
7 On the Add/Change VPN Server page, enter the connection details for a VPN server:
• VPN server label. This provides a unique string that is used by Entrust IdentityGuard to reference this server. Once the label is saved it cannot be changed.
• VPN server host name. Enter a VPN server host, using either a FQDN, hostname, or IP address.
• VPN server shared secret. Enter the VPN server secret. This secret you use for Entrust IdentityGuard Radius proxy must match the server secret already set for the VPN server
• Confirm shared secret. Enter the VPN server secret again.
• Entrust IdentityGuard group (optional). If you have already defined Entrust IdentityGuard user groups, you can set a specific Entrust IdentityGuard group for use with the current VPN server.
Note: You do not need to enter a group name if the names of users are unique in your system. Entrust IdentityGuard determines the correct group. See “Matching a group to a user” on page 179 for an explanation.
• Radius Proxy port. This drop-down list contains:
186 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
– all port numbers you entered earlier in the Ports used by the Entrust IdentityGuard Radius Proxy field
– as well as, the all option If you enter a specific port, then any communication from this VPN server uses that port only.
Enter a specific port if you want the current VPN configuration to apply to an Entrust IdentityGuard group. Select all if the port used is not important. The Server hostname and Radius proxy port number must be unique.
• First-factor authentication server. This drop-down list contains the names of all Radius servers you defined on the Add/Change Radius Server page. Select the server to use with this VPN server.
• Click OK.
8 Click Save.
A pop-up box appears validating your configuration.
The Entrust IdentityGuard Radius proxy is now configured for this VPN server and your Radius server. You can configure additional VPN and Radius servers.
187Configuring the Entrust IdentityGuard Radius proxyFeedback on guide
Using the Radius proxy with a domain controller or LDAP directory
Configure the Entrust IdentityGuard Radius proxy to use an external authentication resource completing these steps.
Topics in this section:
• “To configure Radius proxy on UNIX” on page 187
• “To configure the Radius proxy on Microsoft Windows” on page 189
Note: When you configure Entrust IdentityGuard Radius proxy, the program stores the results in the identityguard.properties file. You can edit this file to change settings or to add additional VPN servers and their first-factor authentication method later. For information on the property settings, see section “Configuring the Entrust IdentityGuard Radius proxy properties” on page 282.
If you intend to associate specific predefined VPN group names with existing Entrust IdentityGuard group names, read “Configuring the Radius proxy for groups” on page 175 before you begin to configure the Radius proxy.
Attention: Entrust IdentityGuard rejects any VPN server configuration that creates an explicit or implied duplicate VPN server/port combination. An explicit duplicate occurs when you specify the same port more than once for the same VPN server. An implied duplicate occurs if you select the port default (any port in UNIX or All in Windows) more than once for the same VPN server.
To configure Radius proxy on UNIX1 Log in as the UNIX user that belongs to the UNIX group that was specified during
the installation. See “Installing Entrust IdentityGuard Server” on page 33 for installations with embedded Tomcat or “Installing Entrust IdentityGuard Server” on page 106 for installation using an existing application server.
2 Navigate to the $IDENTITYGUARD_HOME (/opt/entrust/identityguard81) directory and enter:
. ./env_settings.sh
3 Navigate to the $IDENTITYGUARD_HOME directory and enter:
configradius.sh
4 At the prompt, enter a list of Radius ports for the Radius proxy or accept the default:
188 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Enter a space-separated list of ports used by IdentityGuard Radius
(default: 1812):
Each port value must be an integer between 1024 and 65535.
Note: If you plan to associate different VPN server groups with separate Radius proxy ports, enter all applicable ports separated by spaces. There can be only one VPN server defined for each port.
5 At the next prompt, confirm that you want to use a VPN server.
Do you wish to define a VPN server? [yes or no]
If you type no, the configuration stops. You are asked whether you want to initialize the system. Proceed to “Initializing the primary server” on page 48 for installations with embedded Tomcat or “Initializing the primary Entrust IdentityGuard Server” on page 118 for installations using an existing application server.
6 At the next prompt, enter a unique VPN server name. This provides a unique string that is used by Entrust IdentityGuard to reference this server.
Note: A VPN server name must not include the equal sign (=).
Enter a unique label for the VPN server:
7 At the next prompt, enter a unique VPN server host, using either a DNS or IP address:
Enter the VPN server host name (or IP address):
The Entrust IdentityGuard Radius proxy identifies a VPN server by its host name, and the port to which it sends messages. If you do not specify a port in the next step, the Radius proxy treats all requests as coming from the same VPN server regardless of which port receives them.
8 At the next prompt, enter the Entrust IdentityGuard port used by the VPN server:
Enter the Entrust IdentityGuard Radius port used by the VPN
server:
The default is the ports you set in Step 4. If you enter a specific port, then any communication from this VPN server uses that port only. Enter a specific port if you want the current VPN configuration to apply to an Entrust IdentityGuard group.
9 At the next prompt, enter and confirm the VPN server secret. This secret you use for Entrust IdentityGuard Radius proxy must match the server secret already set for the VPN server:
Enter the VPN server shared secret:
189Configuring the Entrust IdentityGuard Radius proxyFeedback on guide
Confirm:
10 If you have already defined Entrust IdentityGuard user groups, you can set a specific Entrust IdentityGuard group for use with the current VPN server.
Enter the Entrust IdentityGuard group for the VPN server:
Note: You do not need to enter a group name if the names of users are unique in your system. Entrust IdentityGuard determines the correct group. See “Matching a group to a user” on page 179 for an explanation.
11 If you want the Radius proxy to use a domain controller or LDAP directory for first-factor authentication, enter EXTERNAL at the next prompt:
Do you want to use External or Radius authentication? (EXTERNAL or
RADIUS):
(If you enter RADIUS, the configuration continues. Proceed to “To configure the Radius proxy on UNIX” on page 180.) When you enter EXTERNAL, the configuration script stop and you see the following message:
Make sure that the Entrust IdentityGuard Server is configured so
that External authentication is enabled.
Answer yes to configure another VPN server or no to exit.
Go to “Configuring Entrust IdentityGuard for external authentication” on page 202 to finish this configuration.
To configure the Radius proxy on Microsoft Windows1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking
Start > All Programs > Entrust > IdentityGuard > Configuration Panel.
2 Select Set Up the Radius Proxy to run the Entrust IdentityGuard Radius proxy setup program.
The Entrust IdentityGuard Radius Proxy Configuration page appears.
190 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
3 In the Ports used by the Entrust IdentityGuard Radius Proxy field, enter a list of Radius ports for the Radius proxy or accept the default.
Use commas to separate the port numbers. The port value entered must be unique to the system.
4 Skip the Radius Authentication Servers section if you plan to use external authentication.
5 In the VPN Servers section, click Add to configure a VPN server for use with Entrust IdentityGuard. Alternatively, you can select an existing server definition and click Change to modify it or Remove to remove it.
191Configuring the Entrust IdentityGuard Radius proxyFeedback on guide
The Add/Change VPN Server page appears.
6 On the Add/Change VPN Server page, enter the connection details for a VPN server:
• VPN server label. This provides a unique string that is used by Entrust IdentityGuard to reference this server.
• VPN server host name. Enter a unique VPN server host, using either a FQDB, hostname, or IP address. The hostname and Radius proxy port combination must be unique for each VPN server entry.
• VPN server shared secret. Enter the VPN server secret. This secret you use for Entrust IdentityGuard Radius proxy must match the server secret already set for the VPN server
• Confirm shared secret. Enter the VPN server secret again.
• Entrust IdentityGuard group (optional). If you have already defined Entrust IdentityGuard user groups, you can set a specific Entrust IdentityGuard group for use with the current VPN server.
Note: You do not need to enter a group name if the names of users are unique in your system. Entrust IdentityGuard will determine the correct group. See “Matching a group to a user” on page 179 for an explanation.
• Radius Proxy port. This drop-down list contains all port numbers you entered earlier in the Ports used by the Entrust IdentityGuard Radius Proxy field plus
192 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
the all option (the default). If you enter a specific port, then any communication from this VPN server uses that port only. It makes sense to enter a specific port if you want the current VPN configuration to apply to an Entrust IdentityGuard group. Select all if the port used is not important.
• First-factor authentication server. To use external authentication, select IdentityGuard External.
• Click OK.
7 Click Save.
A pop-up box appears validating your configuration.
The Entrust IdentityGuard Radius proxy is now configured for this VPN server. Add as many VPN servers as required.
Go to “Configuring Entrust IdentityGuard for external authentication” on page 202 to finish this configuration for external authentication.
193Configuring the Entrust IdentityGuard Radius proxyFeedback on guide
Configuring the VPN server Follow these general steps to configure your VPN server to communicate with the Entrust IdentityGuard Radius proxy. The interface details vary depending on your platform and the interface tool you use.
For detailed integration instructions specific to your platform, see the Technical Integration Guide that applies to your VPN server.
To configure the VPN server1 Log in to the VPN server as administrator.
2 If applicable, select a VPN user group.
You may have more than one choice here if your VPN recognizes different groups of users.
3 Select Radius as the server used for authentication.
(Select Radius even if you plan to use a Windows domain controller or an LDAP directory with the Entrust IdentityGuard Radius proxy.)
4 For the authentication server, set the IP address to that of the Entrust IdentityGuard Radius proxy instead of a Radius server.
5 If you are using groups, for the server port, enter the port assigned to the VPN group selected in Step 10 on page 181 (UNIX) or Step 7 on page 185. (Windows).
The default Entrust IdentityGuard Radius proxy port is 1812. (See also “Configuring the Radius proxy for groups” above.)
6 For the server secret (configured in Step 4 on page 176 in UNIX and Step 7 on page 185 in Windows), enter a value that matches the value known to Entrust IdentityGuard.
7 Save your settings.
194 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Configuring a Radius server for first-factor authentication
Remote Authentication Dial-In User Service (Radius) is an industry standard authentication protocol.
Radius authenticates users through a series of communications between Radius clients and the Radius server. A Radius client passes information about a user to a designated Radius server and then acts on the response that the Radius server returns. Transactions between the Radius client and the Radius server are authenticated through a shared secret, which is never sent over the network. Many networks use Radius to centralize and coordinate VPN authentication.
If you configure your remote VPN access gateway (IPSec or SSL) to use an existing Radius server for configuration, the Entrust IdentityGuard Radius proxy lets you add Entrust IdentityGuard for second-factor authentication. The Radius proxy sends the authentication request to the Radius server to perform first-factor authentication and then it adds an Entrust IdentityGuard authentication step. Users that do not exist in Entrust IdentityGuard are authenticated by the first-factor authentication mechanism only.
If you plan to use a Radius server for first-factor authentication, follow these general steps to configure the Radius server to communicate with the Entrust IdentityGuard Radius proxy. The interface details will vary depending on your platform and the interface tool you use.
To configure the Radius server for first-factor authentication1 Log in to the Radius server as administrator.
2 For the Radius client address, change the IP address from the VPN server to that of the Entrust IdentityGuard Radius proxy.
3 For the server secret, enter a value that matches the value known to Entrust IdentityGuard.
4 Save your settings.
195Configuring the Entrust IdentityGuard Radius proxyFeedback on guide
Configuring Radius server failover By configuring Radius server failover on the Entrust IdentityGuard Radius proxy, you ensure that there are backup Radius servers if the primary system fails. When failover is configured, if a timeout occurs while waiting for a response from the Radius server, Entrust IdentityGuard Radius proxy uses the next IP address in the list (for the next request that it receives). The current request times out. When Entrust IdentityGuard Radius proxy reaches the end of the list of IP addresses, it restarts at the beginning of the list.
Complete the following steps to add the list of Radius server IP addresses to the identityguard.properties file.
For more information on high availability and disaster recovery, see the Entrust IdentityGuard Deployment Guide.
To configure the Radius server for failover1 Open the $IDENTITYGUARD_HOME/etc/identityguard.properties file.
2 Edit the file to include the multiple Radius servers in the Radius server address property.
For example,
identityguard.igradius.radius.{0}.address=radius_server1:1812
radius_server2:1812 radius_server3:1813
where the {0} placeholder is replaced by the Radius server name.
Use a space to separate each of radius servers in the list.
Note: All the Radius servers should use the same secret.
196 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Managing the Radius proxyYou can set the Entrust IdentityGuard Radius proxy to start automatically when you reboot, or you can start and stop it manually.
Topics in this section:
• “Managing the Radius proxy on UNIX” on page 196
• “Managing the Radius proxy on Microsoft Windows” on page 199
Managing the Radius proxy on UNIXComplete one of the following procedures to manage the Radius proxy:
• “To enable/disable automatic restart of the Radius proxy” on page 196
• “To start and stop the Radius proxy” on page 196
• “To start and stop Entrust IdentityGuard and the Radius proxy together” on page 197
• “To start and stop the Radius proxy with the Linux service command” on page 198
To enable/disable automatic restart of the Radius proxy• As root in $IDENTITYGUARD_HOME/bin, enable automatic restart by
entering:
./igsvvconfig.sh igradius enable
The Entrust IdentityGuard Radius proxy will start every time the computer reboots.
• As root in $IDENTITYGUARD_HOME/bin disable automatic restart by entering:
./igsvvconfig.sh igradius disable
You must start the Entrust IdentityGuard Radius proxy manually.
To start and stop the Radius proxy1 Log in as the UNIX user that belongs to the UNIX group that was specified during
the installation. See “Installing Entrust IdentityGuard Server” on page 33 for installations with embedded Tomcat or “Installing Entrust IdentityGuard Server” on page 106 for installation using an existing application server.
2 Navigate to the $IDENTITYGUARD_HOME directory and enter:
. ./env_settings.sh
3 Enter the following command at the command prompt followed by one of the options in Table 11:
197Configuring the Entrust IdentityGuard Radius proxyFeedback on guide
igradius.sh
Note: When the Entrust IdentityGuard Radius proxy starts, it checks that at least one VPN client and one resource (external authentication or Radius server) are defined and that each server referred to by a client exists. If that is not the case, it issues an error to the logs and the Radius proxy exits.
To start and stop Entrust IdentityGuard and the Radius proxy together1 Log in as the UNIX user that belongs to the UNIX group that was specified during
the installation.
See “Installing Entrust IdentityGuard Server” on page 33 for installations with embedded Tomcat or “Installing Entrust IdentityGuard Server” on page 106 for installations using an existing application server.
2 Navigate to $IDENTITYGUARD_HOME directory and enter:
. ./env_settings.sh
3 Enter one of these commands at the command prompt followed by one of the options in Table 12:
igservice.sh identityguard
igservice.sh igradius
igservice.sh all
Table 11: Managing the Radius proxy
Command Description
start Starts the Radius proxy.
Entrust IdentityGuard generates audits that you can use to determine if the services started successfully or failed to start. You will not see an error message if the service fails to start.
stop Stops the Radius proxy.
status Tells you if the Radius proxy is running. If it is running, Entrust IdentityGuard displays the process ID number.
restart Stops and restarts the Radius proxy.
198 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
For example, to restart Entrust IdentityGuard and the Radius proxy on installations of Entrust IdentityGuard with embedded Tomcat, enter:
igservice.sh all restart
Note: In versions of Entrust IdentityGuard installed on an existing application service, you can use any of these commands for the Radius proxy; however, only the status command is available for Entrust IdentityGuard.
To start and stop the Radius proxy with the Linux service commandYou can also use the Linux service command to start and stop the Entrust IdentityGuard Radius proxy.
1 Enter this command at the command prompt followed by one of the options in the table below:
service igradius
Table 12: Managing the Radius proxy service
Command Description
start Starts the specified service.
Entrust IdentityGuard does not display an error message if the service fails to start. Check the logs to determine if startup failed.
stop Stops the specified service.
status Tells you if the specified service is running.
restart Stops and restarts the specified service.
Command Description
start Starts the specified services.
Entrust IdentityGuard does not display an error message if the service fails to start. Check the logs to determine if startup failed.
stop Stops the specified service.
status Tells you if the specified service is running.
restart Stops and restarts the specified service.
199Configuring the Entrust IdentityGuard Radius proxyFeedback on guide
If you run the service igradius command as root, the service automatically switches to the UNIX user ID originally used to install Entrust IdentityGuard.
Managing the Radius proxy on Microsoft WindowsYou can set the Entrust IdentityGuard Radius proxy to start automatically when you reboot, or you can start and stop it manually.
Note: You must log in as administrator to install Entrust IdentityGuard. You then select a user/group that will own the installation. That user (or any member of the group) can then start or stop the services as described below.
To enable automatic restart of the Radius proxy1 Log in as a user that belongs to the group that was specified during the
installation as the owner of the installation.
2 Go to Start > Control Panel > Administrative Tools > Services.
The Services window appears.
3 Right-click Entrust IdentityGuard Radius Proxy and select Properties.
4 In the Startup type drop-down menu, select Automatic.
To disable automatic restart of the Radius proxy1 Log in as a user that belongs to the group that was specified during the
installation as the owner of the installation.
2 Go to Control Panel > Administrative Tools > Services.
The Services window appears.
3 Right-click Entrust IdentityGuard Radius Proxy and select Properties.
4 In the Startup type drop-down menu, select Disabled. (Select Manual if you want to start this Radius proxy service manually.)
To start and stop the Radius proxy1 Log in as a user that belongs to the group that was specified during the
installation as the owner of the installation.
2 Go to Control Panel > Administrative Tools > Services.
The Services window appears.
3 Right-click Entrust IdentityGuard Radius Proxy and select Properties.
200 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
4 In the Service status section, click either Start or Stop depending on your requirements.
Note: When the Entrust IdentityGuard Radius proxy starts, it checks that at least one VPN client and one service (external authentication or Radius server) are defined and that each server referred to by a client exists. If that is not the case, it issues an error and the Radius proxy exits.
201
Chapter 7
Postinstall configuration options for Entrust IdentityGuard Server
Use this chapter to configure or reconfigure Entrust IdentityGuard Server after installation.
This chapter contains the following sections:
• “Configuring Entrust IdentityGuard for external authentication” on page 202
• “Adding Entrust IdentityGuard replica servers” on page 210
• “Configuring failover on the repository” on page 218
• “Storing unassigned cards and tokens” on page 220
• “Configuring Syslog for remote logging on UNIX” on page 226
• *“Disabling the non-SSL port on the Authentication service” on page 228
• *“Enabling the non-SSL port on the Administration service” on page 230
• *“Disabling the SSL port on the Administration service” on page 231
• “Securing the LDAP connection with SSL” on page 233
• *“Changing the Entrust IdentityGuard certificate” on page 235
• “Enabling system binding” on page 240
Attention: *These sections only apply to versions of Entrust IdentityGuard that use embedded Tomcat.
202 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Configuring Entrust IdentityGuard for external authentication
The external authentication feature provided with Entrust IdentityGuard lets you use Entrust IdentityGuard to manage first-factor authentication using the Windows domain controller or LDAP directory information as authentication sources. Typically, you would use external authentication as the first layer of a multifactor Entrust IdentityGuard authentication regime.
To configure Entrust IdentityGuard for external authentication, you need to do the following:
• Add external authentication as an authentication option for the users in each applicable Entrust IdentityGuard group. Use the master user shell to add the External option to the applicable policies like this:
policy userspec set -genericauthtype GRID EXTERNAL
policy userspec set -machineauthtype GRID EXTERNAL
Note: This example shows how to add grid and External authentication options. Add all the authentication options that you want to use with this command.
For more information, see “Modifying, exporting and importing the user specification attributes for a policy” in the Entrust IdentityGuard Administration Guide.
• Edit the identityguard.properties file to set the external authentication properties, as explained:
– If you store Entrust IdentityGuard user information in Active Directory, ADAM, or other supported LDAP repository, proceed to “To set the external authentication properties for an LDAP directory” on page 203.
– If you want to use the Windows domain controller for first-factor authentication, proceed to “To set the external authentication properties for a domain controller” on page 203.
When you configure external authentication, it applies to all deployment types managed by Entrust IdentityGuard, whether the user is accessing your application through VPN, a Web application, or other method.
Configuring external authenticationIn the following procedures, when you make changes to the identityguard.properties file, ensure that you restart Entrust IdentityGuard Server. For instructions on restarting, see “Managing the Entrust IdentityGuard service” on page 62 for installations with embedded Tomcat, “Managing the Entrust
203Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
IdentityGuard service” on page 166 for installations using an existing application server, or “Managing the Entrust IdentityGuard service” on page 94 for Windows.
To set the external authentication properties for an LDAP directory1 Open the identityguard.properties file located:
• on UNIX, $IDENTITYGUARD_HOME/etc/
• on Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\
2 Add the identityguard.externalauth.impl property to the file.
3 Set the property to the correct Java class for an LDAP directory. The entry appears as follows:
identityguard.externalauth.impl=com.entrust.identityGuard.authenti
cationManagement.external.ldap.LdapAuthentication
This example creates a global or default setting for all users. This property can also include an Entrust IdentityGuard group name, such as IGSales in this example:
identityguard.externalauth.impl.IGSales=com.entrust.identityGuard.
authenticationManagement.external.ldap.LdapAuthentication
See “Using groups with external authentication” on page 209 for more information using groups with external authentication.
During LDAP directory authentication, Entrust IdentityGuard attempts to bind to the user’s LDAP entry. If the bind succeeds, the user is authenticated.
Note: The directory used for external authentication must be the same one used as the Entrust IdentityGuard repository.
The Kerberos protocol used for authentication through a domain controller is case-sensitive. If the user enters an ID that does not match the case Kerberos expects, the authentication fails. If you use a Directory repository and user names are stored in mixed case, make sure the user names entered in Entrust IdentityGuard use exactly the same case for all letters.
Entrust IdentityGuard and LDAP do not care about the case of user names. They can be uppercase, lowercase or mixed case. While you can specify that Kerberos convert names to uppercase or lowercase, this is no solution for mixed case user names.
To set the external authentication properties for a domain controller1 Open the identityguard.properties file located:
• on UNIX, $IDENTITYGUARD_HOME/etc/
• on Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\
204 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
2 Add the identityguard.externalauth.impl property to the file.
3 Set the property to the correct Java class for a domain controller. The entry looks like this:
• if you are not using groups:
identityguard.externalauth.impl=com.entrust.identityGuard.authenti
cationManagement.external.kerberos.KerberosAuthentication
The above example creates a global or default setting for all users.
• If you are using groups, for example IGSales:
identityguard.externalauth.impl.IGSales=com.entrust.identityGuard.
authenticationManagement.external.kerberos.KerberosAuthentication
4 Domain controller authentication uses the Kerberos protocol. You must add a property to specify the server acting as the Kerberos realm. For example:
identityguard.externalauth.kerberos.realm=ENTRUST.COM
The realm provides the name the domain controller. Make sure to enter the realm name in uppercase characters.
5 Kerberos authentication is case-sensitive. If the user enters an ID that does not match the case Kerberos expects, the authentication fails. Use this property to convert the user ID to upper or lowercase, for example:
identityguard.externalauth.kerberos.caseconvert=lower
Valid entries are upper or lower. If this property is absent or contains another value, Entrust IdentityGuard does not change the entered user ID.
The case should always be set to lower when using a domain controller for external authentication.
The Kerberos properties can also include an Entrust IdentityGuard group name, such as IGSales in this example:
identityguard.externalauth.kerberos.realm.IGSales=ENTRUST.COM
identityguard.externalauth.kerberos.caseconvert.IGSales=lower
When specified without a group name, they create a global or default setting for users. When specified with an Entrust IdentityGuard group name, they set the realm, KDC and user ID case to use for members of that group.
See “Using groups with external authentication” on page 209 for more information using groups with external authentication.
6 Save your changes.
7 Open igkrb5.conf in a text editor, located:
• on UNIX, $IDENTITYGUARD_HOME/etc/
• on Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\
205Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
8 Using Kerberos syntax, map each realm to the server hosting the corresponding Kerberos Key Distribution Center (KDC). For example:
[realms]
IG1.ENTRUST.COM = {
kdc = ig1.entrust.com
}
IG2.ENTRUST.COM = {
kdc = ig2.entrust.com
}
Make sure to enter the realm name in uppercase characters. For an example, see the igkrb5.sample file stored in the same location.
9 Add other Kerberos-related settings as required. For example, you may want to change the default encryption key type. For more information on syntax, refer to http://web.mit.edu/kerberos/krb5-1.5/krb5-1.5.1/doc/krb5-admin/krb5.conf.html.
10 Save your changes.
If you are not using WebSphere, you have finished setting up external authentication properties for a domain controller. If you are using WebSphere, complete the following procedure (“To finish setting up external authentication for a domain controller on WebSphere”).
To finish setting up external authentication for a domain controller on WebSphere1 Start the administration console for your WebSphere server.
The default URL is http://localhost:9060/ibm/console.
2 Select Security > Global Security > JAAS Configuration.
3 In the JAAS Configuration page, click Application Logins.
4 Click New.
206 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
5 Set the Alias value to IGKerberos.
207Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
6 Click Apply. The JAAS login modules link under Additional Properties becomes available.
7 Click JAAS login modules.
208 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
8 Set the Module class name to com.ibm.security.auth.module.Krb5LoginModule.
9 Click Apply.
10 Click Save followed by Save.
209Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
Using groups with external authenticationWhen you include an Entrust IdentityGuard group name in one of the identityguard.externalauth.impl property entries, it limits the authentication resource to just members of that group. This way, you can direct users in different groups to different authentication resources or exclude some groups from an authentication resource.
You can have multiple entries for the identityguard.externalauth.impl property as long as each is unique. For example, you can have one default entry with no group name, and several entries each with a different group name.
If all entries for this property include a group name (that is, there is no entry without a group), this means there is no default and only the users in the specified groups can use external authentication.
You do not need to include external authentication groups unless you intend to direct certain groups of users to specific external authentication resources.
See “Using the Radius proxy with a domain controller or LDAP directory” on page 187 for details on configuring a VPN server to use the Radius proxy for external authentication.
210 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Adding Entrust IdentityGuard replica servers
Replica systems help decrease the load on the primary Entrust IdentityGuard Server. Add replica servers to set up a loadbalanced or failover environment when you are administering very large numbers of users. You may add any number of replica servers.
Note: For information on repository failover, see “Configuring failover on the repository” on page 218. For information on high availability and disaster recovery, see the Entrust IdentityGuard Deployment Guide.
You must have a existing Entrust IdentityGuard Server before attempting to create a replica system.
When adding a replica, consider the following:
• Do not enable a file-based repository on a replica server.
The replica configuration enables a file-based repository by default. For more details, see “Storing unassigned cards and tokens” on page 220.
Note: If you are using a file-based repository, ensure that administrators and master users log in to the primary Entrust IdentityGuard Server when assigning tokens or cards to users.
• The repository is not copied when you add a replica.
The replica uses the same repository that the primary Entrust IdentityGuard Server uses.
• With Entrust IdentityGuard Server installations with embedded Tomcat only, a new self-signed certificate with the proper host name is created during the replica configuration.
If you create a new SSL certificate for the replica server, ensure the host name in the SSL certificate is the same as the host name used by the server.
For details on creating an SSL certificate, after completing this procedure, see the section “Changing the Entrust IdentityGuard certificate” on page 235.
• If you make any configuration changes to the primary Entrust IdentityGuard Server, you must manually propagate the changes to any replicas.
For example, if you update the certificates or change the identityguard.properties file, you must also update the replicas.
211Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
Note: All files being added should be readable and writable by the user and group selected during installation.
Follow the appropriate procedures in this section depending on what type of system you are using to run Entrust IdentityGuard Server:
• for UNIX, proceed to “To add a replica server on UNIX” on page 211
• for Microsoft Windows, proceed to “To add a replica server on Microsoft Windows” on page 213
To add a replica server on UNIX1 As the UNIX user on the existing Entrust IdentityGuard Server, run the partial
backup command:
igbackup.sh -partial
For instructions and options (such as creating a partial or full backup file, and naming a backup file), see “Backing up your configuration” on page 247.
2 Copy the backup onto the computer that will host the new Entrust IdentityGuard replica server. The default location for the backup ZIP file is $IDENTITYGUARD_HOME/backups.
3 Complete the following preinstallation tasks on the computer that will host the replica:
a Create a UNIX group and user for Entrust IdentityGuard (“Creating the UNIX group and user” on page 32) or use the UNIX group already created for your application server.
b Copy the Entrust IdentityGuard installation package (“Downloading Entrust IdentityGuard software” on page 21).
4 Start the Entrust IdentityGuard installation procedure (“Installing Entrust IdentityGuard Server” on page 33 for installations with embedded Tomcat or “Installing Entrust IdentityGuard Server” on page 106 for installations using an existing application server) on the computer that will host the replica until you see the message:
Installation complete
Do you wish to configure the application now? [yes or no]
Answer yes.
5 The following message appears:
Are you configuring an Entrust IdentityGuard primary or replica
server?(PRIMARY or REPLICA):
Answer replica.
6 You are prompted to enter the backup file name.
212 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Enter the name of the configuration backup file:
Type the name of the partial (or full) configuration backup file that you copied in in Step 2 in this procedure.
For example, igpartialbackup_20060224150045.zip.
7 You are prompted to select the mode of the Administration service:
How should the administration services be setup? (ENABLED,
DISABLED, or PRIMARY)?
Choose one of the three modes:
• ENABLED enables the Administration service, which the Administration interface uses.
The sample will use the local services.
• DISABLED disables the Administration service and the Administration interface.
The sample is also disabled since it uses the local Administration service.
• PRIMARY disables the Administration service on the replica server and enables it on the primary server.
Note: If you are using file-based repositories, select either disabled or primary.
The Administration interface is enabled on the replica server.
In this mode, the SSL certificate of the primary must be installed in the local key store. This is done automatically with installations of Entrust IdentityGuard with embedded Tomcat, but you must complete this manually if your installation of Entrust IdentityGuard uses an existing application server.
8 You are prompted for the ports that the Application server should use.
APPLICATION SERVER CONFIGURATION
Complete Step 2 to Step 4 on page 45 for installations with embedded Tomcat or Step 1 on page 115 to Step 3 on page 116 for installations using an existing application server.
9 You are prompted to initialize the replica.
Do you wish to initialize the replica system? [yes or no]
Answer yes, to initialize the replica.
REPLICA SYSTEM INITIALIZATION
If you want to initialize the system manually later, follow the steps below “To initialize the replica manually on UNIX” on page 213.
10 All three master users must enter their passwords.
213Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
The following message appears:
Replica initialized.
11 If you are using a directory, remove the file-based repository settings. See “Storing unassigned cards and tokens” on page 220.
12 Optionally, if you want to enable system binding on the replica, from the master user shell, run the command system bind to enable system binding.
For more information on system binding, see “Enabling system binding”.
13 To configure and enable the sample application, proceed to the procedure on “Configuring the sample application on UNIX” on page 51 for installations with embedded Tomcat or “Configuring the sample application on an existing application server” on page 121 for installations using an existing application server.
Your replica server is now installed, configured, and initialized. Proceed to “Testing your installation” on page 58 for installations with embedded Tomcat or “Testing your installation” on page 162 for installations using an existing application server.
To initialize the replica manually on UNIX1 As the UNIX user on the replica, change to $IDENTITYGUARD_HOME (usually
/opt/entrust/identityguard81).
2 From $IDENTITYGUARD_HOME, source the environment settings file by entering:
. ./env_settings.sh
(Include a space between the two periods in the command.)
3 Enter the following command to start the master user shell:
supersh
The copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.
4 Enter the following command:
init -replica
All three master users must enter their passwords.
To add a replica server on Microsoft Windows1 Copy the Entrust IdentityGuard installation package to the computer that will
host the replica (“Downloading Entrust IdentityGuard software” on page 21).
2 On an existing Entrust IdentityGuard Server, create a backup (for more information on creating a backup, see “Backing up your configuration” on page 247):
214 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
a If the Entrust IdentityGuard Configuration Panel is not open, click Start > All Programs > Entrust > IdentityGuard > Configuration Panel.
b Select Backup Entrust IdentityGuard Configuration from the Entrust IdentityGuard Configuration Panel.
The Backup Type page appears.
c Select Partial as the backup type. Partial backups contain enough information to configure a replica system.
d In the Backup File Location section, click Browse.
The backup utility create a file name in the File name field, which includes a date/time stamp.
e Click OK to save the backup under the file name with the date/time stamp. Alternatively, rename the file in the File name field and press OK.
f Click Save.
A message appears indicating whether the backup was saved or an error occurred.
3 Copy the backup onto the computer that will host the new Entrust IdentityGuard replica server.
215Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
4 Start the Entrust IdentityGuard installation procedure (“Installing Entrust IdentityGuard Server” on page 68) on the computer that will host the replica.
5 When the Entrust IdentityGuard Configuration Panel appears, select Replica as your system type.
6 Select Configure Entrust IdentityGuard.
The Entrust IdentityGuard Configuration wizard Welcome page appears.
7 Click Next to begin configuration.
The System Backup File page appears.
8 Click Browse to select your Entrust IdentityGuard backup file that you copied in Step 3.
9 Select Next.
The Service Settings page appears.
10 Complete “Selecting Entrust IdentityGuard service ports” on page 79 and “Selecting your system host name” on page 81.
11 On the Administration Controls page, select the administration state:
• Enabled. This option enables both the Administration service and interface controls on the replica system.
• Disabled. This option disables both the Administration service and interface controls on the replica system.
216 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
• Primary. This option disables the Administration service on the replica system and forwards all Administration interface requests to the primary system. The Administration interface is enabled on the replica.
12 Select Next.
The Configuration Summary page appears.
13 On the Configuration Summary page, click Confirm and Save if all the information in the summary list is complete and correct.
14 Click Finish to complete the configuration process.
The configuration file is extracted from the backup file and updated with the changes made in the Entrust IdentityGuard Configuration wizard. File-based repositories are disabled, as is the Administration service and interface controls (if you selected it to be disabled). A new application server SSL certificate is generated, and the primary server’s public key (SSL certificate) and the LDAP SSL certificate (it is exists) are imported to the new key store.
To initialize a replica server on Microsoft Windows1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking
Start > All Programs > Entrust > IdentityGuard > Configuration Panel.
2 On the main page of the Configuration Panel, select Replica as the system type.
3 Select Initialize Entrust IdentityGuard.
4 Each master user must enter their password when prompted.
217Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
5 Click Initialize.
A confirmation message appears.
218 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Configuring failover on the repository
Attention: This section applies only to installations of Entrust IdentityGuard with embedded Tomcat.
By configuring failover on the repository, you ensure that there are backup repositories in the event that the primary repository fails.
Topics in this section:
• “Configuring failover for a database” on page 218
• “Configuring failover for a directory” on page 219
Note: For instructions on configuring the Radius server failover, see “Configuring Radius server failover” on page 195.
Configuring failover for a databaseYou may have a mechanism that updates the DNS information so that the database host name points to the IP address of the new database when the original database fails. If so, you must make the following configuration changes to Entrust IdentityGuard so that it will use the IP address.
Configure failover for a database by modifying the default behavior of Entrust IdentityGuard to permanently cache the IP address of a DNS lookup. Complete the following procedure to change the DNS lookup to expire after a period of time, rather than permanently caching the IP address from a DNS lookup.
To configure failover for a database1 Locate and back up the java.security configuration file located:
• on UNIX, $IDENTITYGUARD_HOME/j2rel.4.2_09/lib/security
• on Microsoft Windows, <IG_INSTALL_DIR>\j2rel.4.2_09\lib\security
2 Edit the java.security file and search for the networkaddress.cache.ttl setting.
Read the comments surrounding this setting and ensure that any changes that you make to this setting comply with your company’s security policy.
3 Comment out the networkaddress.cache.ttl setting to set the IP address expiration time on the DNS lookup.
219Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
4 Specify a positive integer value to define how long, in seconds, the DNS lookup will be cached for.
Define an appropriate value for this setting based on your company’s failover requirements.
5 Restart the Entrust IdentityGuard Server. For instructions on restarting, see “Managing the Entrust IdentityGuard service” on page 62 for UNIX installations and “Managing the Entrust IdentityGuard service” on page 94 for Windows.
Configuring failover for a directoryFor LDAP directory failover, you can specify multiple URLs in the identityguard.ldap.url setting in the identityguard.properties file. Entrust IdentityGuard attempts to use each URL in turn, until a successful connection is made.
To configure failover for a directory1 As the Entrust IdentityGuard application owner, open the
identityguard.properties file in $IDENTITYGUARD_HOME/etc/ on UNIX or <INSTALL_DIR>\identityguard81\etc on Microsoft Windows.
2 Find the section of the properties file that identifies the LDAP URL, and specify multiple URLs.
For example:
identityguard.ldap.url=ldap://myldapserver1.com:389/ou=users,c=ca
ldap://myldapserver2.com:389/ou=users,c=ca
ldap://myldapserver3.com:389/ou=users,c=ca
Attention: Type these statements all on the same line separated by a space only.
3 If SSL is enabled, import the certificates of all listed directories into the trust store.
4 Save the file and restart Entrust IdentityGuard.
You now have configured failover for your directory.
Note: The LDAP credentials and principal specified must work for all directories listed.
220 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Storing unassigned cards and tokens Entrust IdentityGuard allows the production of cards prior to their association with individual users—called card preproduction. It also requires that you load the token information into the system before you can assign tokens to users.
Topics in this section:
• “Configuring the disk files for tokens and cards” on page 221
• “Configuring the database” on page 224
The type of repository you use (directory or database) determines where Entrust IdentityGuard stores the unassigned cards and tokens. If you are using a database, the unassigned cards and tokens are stored in the database. If you are using a directory, you have a choice of storing the unassigned cards and tokens in a local file or in a separate database.
During the installation and configuration you choose between a directory or database to store your user information.
When you configure:
• a directory for your user’s information, a file-based repository is automatically configured for your preproduced cards and unassigned tokens
You can change the defaults using the “Configuring the disk files for tokens and cards” on page 221 topic.
• a directory for your user’s information, and if you want to use a database repository, you must manually configure the database
For instructions, see “Configuring the database” on page 224.
Attention: If your organization plans to have a large deployment of 100,000 cards or tokens, it is recommended that you configure a database (instead of the file-based repository).
• a database for your user’s information, a database repository for preproduced cards and unassigned tokens is automatically configured
For more information on storing preproduced cards and unassigned tokens, see the Entrust IdentityGuard Administration Guide.
221Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
Configuring the disk files for tokens and cardsEntrust IdentityGuard allows you to use files to store preproduced card or unassigned token information, as this information cannot be stored in the directory itself (unlike a database). Once the card or token is assigned to a user, then the information is moved into the user entry in the repository.
To change a setting, add or edit the application property to the identityguard.properties file.
Note: Do not use a file-based repository on a replica system.
The card repository settings shown in Table 13 are configured when you are using an LDAP directory and choose to use file-based repository storage. Use the following information to override the defaults:
Table 13: Repository properties for preproduced cards
Property Description
identityguard.preproducedCardRepository.impl Provides the storage location of preproduced cards on the primary system. It is set automatically when you configure Entrust IdentityGuard.
When using a directory, it is set to: com.entrust.identityGuard.cardManagement.dataAccess.file.FilePreproducedCardRepository
When using a database, it is set to: com.entrust.identityGuard.cardManagement.dataAccess.jdbc.JdbcPreproducedCardRepository
Note: For any replica system, make sure it is set to: com.entrust.identityGuard.cardManagement.dataAccess.notImplemented.NotImplementedPreproducedCardRepository
222 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
The following token repository settings are configured when you are using an LDAP directory and choose to use file-based repository storage. Use the following information to override the defaults.
identityguard.preproducedCardRepository.file.name The base name of the files that store the preproduced cards.
The default is, $IDENTITYGUARD.HOME/etc/fpcr/fpcr.pcr on UNIX or
<IG_INSTALL_DIR>/identityguard81/etc/fpcr on Microsoft Windows
Note: Remove this setting for a replica system.
identityguard.preproducedCardRepository.file.maxsize The maximum number of cards in each component file of the file-based card preproduction repository.
If you deploy cards for over 100,000 users, and you still want to use LDAP file-based card preproduction, set this setting to a value higher than 200. The value should be the (approximate) number of cards, divided by 500. For example 150,000 cards divided by 500, equals 300.
Defaults to 200.
Note: The preproduced card repository needs approximately 0.5 KB of memory per card. Therefore, 100,000 cards use about 50 MB of memory.
Note: Remove this setting for a replica system.
Table 13: Repository properties for preproduced cards (continued)
Property Description
223Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
Table 14: File-based repository properties for unassigned tokens
Property Description
identityguard.tokenRepository.impl Provides the storage location of unassigned tokens on the primary system. It is set automatically when you configure Entrust IdentityGuard.
When using a directory, it is set to: com.entrust.identityGuard.cardManagement.dataAccess.file.FileTokenRepository
When using a database, it is set to: com.entrust.identityGuard.cardManagement.dataAccess.jdbc.JdbcTokenRepository
Note: For any replica system, make sure it is set to: com.entrust.identityGuard.cardManagement.dataAccess.notImplemented.NotImplementedTokenRepository
identityguard.tokenRepository.file.name Specifies the base file used for the file-based repository.
The default is,
$IDENTITYGUARD_HOME/etc/ftkr/ftkr.pcr on UNIX or <IG_INSTALL_DIR>/identityguard81/etc/ftkr/ftkr.pcr on Microsoft Windows
Applies to an LDAP repository only.
Note: Remove this setting for a replica system.
identityguard.tokenRepository.file.maxsize Sets the maximum number of tokens the file-based repository can store.
The default is 200.
Applies to an LDAP repository only.
Note: Remove this setting for a replica system.
224 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Configuring the database If you have configured an LDAP directory for user information and your organization plans to have a large deployment of 100,000 cards or tokens or more, it is recommended that you configure a database for storing the unassigned card and token information.
Entrust IdentityGuard requires a supported database to store the preproduced card and unassigned token information. Add the following properties for the database to the identityguard.properties file.
To configure database settings for card preproduction1 Load the Entrust IdentityGuard schema into your database. For instructions, see
the Entrust IdentityGuard Database Configuration Guide.
2 Add the following settings to the identityguard.properties file and enter the values for your database:
The values used for these database related configuration settings are similar to the settings used if Entrust IdentityGuard was installed with a database repository (instead of an LDAP repository). See the Entrust IdentityGuard Database Configuration Guide for example values for these settings.
3 If you have configured Entrust IdentityGuard to use an LDAP repository and you want to store the preproduced cards in the database instead of the file-based repository, complete the following step:
Note: If you are configuring a replica, do not manually set this setting. When you configure the replica, this setting is set automatically.
Change the value of identityguard.preproducedCardRepository.impl to the following:
com.entrust.identityGuard.cardManagement.dataAccess.jdbc.JdbcPrepr
oducedCardRepository
Property Description
identityguard.jdbc.driverClass= The name of the JDBC driver class.
identityguard.jdbc.url= The URL used to connect to the database server.
identityguard.jdbc.user= The ID of the database user.
&identityguard.jdbc.password=1
1. The ampersand (&) indicates this setting will be encrypted when Entrust IdentityGuard restarts.
The password of the database user.
identityguard.jdbc.schema= The database schema.
225Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
4 If you have configured Entrust IdentityGuard to use an LDAP repository and you want to store the unassigned tokens in the database instead of the file-based repository, complete the following step:
Note: If you are configuring a replica, do not manually set this setting. When you configure the replica, this setting is set automatically.
Change the value of identityguard.tokenRepository.impl to the following:
com.entrust.identityGuard.cardManagement.dataAccess.jdbc.JdbcToken
Repository
5 On UNIX install the driver of the database .jar files in $IDENTITYGUARD_HOME/lib/db and $CATALINA_HOME/common/lib.
On Microsoft Windows install the driver of the database .jar files in <IG_INSTALL_DIR>\identityguard81\lib\ and <IG_INSTALL_DIR>\jakarta-tomcat-5.0.28\common\lib
Attention: Ensure that you synchronize the backups of your LDAP directory or database repositories. Remember that any time you restore Entrust IdentityGuard from a backup, both the LDAP and database repositories must be restored as well.
226 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Configuring Syslog for remote logging on UNIX
Configure Syslog to enable remote logging of Entrust IdentityGuard messages.
For information on Windows logs, see the “Troubleshooting” chapter in the Entrust IdentityGuard Administration Guide.
To log Entrust IdentityGuard messages remotely on Linux1 As root, edit the file /etc/sysconfig/syslog by changing the entry
SYSLOGD_OPTIONS to SYSLOGD_OPTIONS="-m 0 -r".
2 As root, restart Syslog by running
service syslog restart
To configure Syslog on Linux1 As root, edit /etc/syslog.conf and make changes similar to the following:
old line:
# *.info;mail.none;authpriv.none;cron.none /var/log/messages
new line:
*.info;local1.*;local2.*;local3.*;mail.none;authpriv.none;cron.non
e /var/log/messages
2 As root, restart Syslog by running:
service syslog restart
To configure Syslog on Solaris1 As root, edit /etc/syslog.conf and add the following line:
local1.*;local2.* /var/adm/messages
2 As root, force Syslog to reread its configuration by running:
kill -HUP ‘cat /etc/syslog.pid‘
To configure Syslog on AIX1 As root, edit /etc/syslog.conf and add the following lines:
local1.debug /var/adm/messages
local2.debug /var/adm/messages
2 As root, either restart syslogd or run the following command:
227Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
kill -HUP <pid>
where <pid> is the process identifier of the syslogd process.
3 AIX Syslog will not log to a file unless it already exists. Run the following command:
touch /var/adm/messages
Ensure the resulting file has the proper file permissions.
228 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Disabling the non-SSL port on the Authentication service
Attention: This section applies only to installations of Entrust IdentityGuard with embedded Tomcat.
By default, the Entrust IdentityGuard Authentication service supports both non-SSL (default: 8080) and SSL (default: 8443) ports for communication between the Entrust IdentityGuard Server and the Authentication Web service.
To further secure your Entrust IdentityGuard Server, disable the non-SSL (HTTP) port.
To disable the non-SSL port1 If Entrust IdentityGuard is currently running, shut it down.
See “Managing the Entrust IdentityGuard service” on page 62 for UNIX instructions and “Managing the Entrust IdentityGuard service” on page 94 for Windows instructions.
2 Edit the server.xml file found at:
• on UNIX,
$CATALINA_HOME/conf
where $CATALINA_HOME is the install directory for Tomcat, for example, /opt/entrust/jakarta-tomcat-5.0.28.
• on Microsoft Windows,
<IG_INSTALL_DIR>\jakarta-tomcat-5.0.28\conf
3 Identify and comment out the following section:
<Connector port="8080"
maxThreads="150" minSpareThreads="25" maxSpareThreads="75"
enableLookups="false" redirectPort="8443"
acceptCount="100" debug="0" connectionTimeout="20000"
disableUploadTimeout="true" />
After adding comments, the section should appear as follows:
<!--
<Connector port="8080"
maxThreads="150" minSpareThreads="25" maxSpareThreads="75"
enableLookups="false" redirectPort="8443"
229Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
acceptCount="100" debug="0" connectionTimeout="20000"
disableUploadTimeout="true" />
-->
4 Save the server.xml file.
5 Update the identityguard.properties file to direct the sample application to the SSL port by modifying the identityguard.authservice.url property to:
https://<yourhostname>:<SSL_PORT>/IdentityGuardAuthService/service
s/AuthenticationServiceV2
For example, using the default port values, the value should appear after modification as:
identityguard.authservice.url=https://igserver.anycorp.com:8443/Id
entityGuardAuthService/services/AuthenticationServiceV2
6 Restart the Entrust IdentityGuard Server. For instructions on restarting, see “Managing the Entrust IdentityGuard service” on page 62 for UNIX and “Managing the Entrust IdentityGuard service” on page 94 for Windows.
Attention: Update Entrust IdentityGuard clients to use the SSL port for communication with the Authentication service. If clients attempt to access the Entrust IdentityGuard Authentication service at the non-SSL port, they will receive a “Connection Refused” error.
230 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Enabling the non-SSL port on the Administration service
Attention: This section applies only to installations of Entrust IdentityGuard with embedded Tomcat.
By default, the Entrust IdentityGuard Administration service runs on HTTPS (port 8444) to take advantage of better security. If necessary, complete the following steps to allow the Administration service to run on a non-SSL port.
Note: It is important that you understand that enabling the non-SSL port on the Administration service can seriously compromise the security of your system.
To enable the non-SSL port on the Administration service1 Open the server.xml file found at:
• on UNIX,
$CATALINA_HOME/conf
• on Microsoft Windows,
<IG_INSTALL_DIR>\jakarta-tomcat-5.0.28\conf
2 Add a new <Connector> element to the second <Service> element (which defines the Administration service).
This new <Connector> element should be the same as the first <Connector> element in the first <Service> element, except you must pick a new port (do not use 8080, 8443, 8444). The port number must be greater than 1024.
3 Open the web.xml file found at:
• on UNIX,
$IDENTITYGUARD_HOME/services/admin/IdentityGuardAdminService/WEB-INF/
• on Microsoft Windows,
<IG_INSTALL_DIR>\Identityguard81\services\admin\IdentityGuardAdminService\WEB-INF\
4 Remove the <security-constraint> element.
231Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
Disabling the SSL port on the Administration service
Attention: This section applies only to installations of Entrust IdentityGuard with embedded Tomcat.
If you have disabled the Administration service and the Administration interface, complete the following steps to disable the default HTTPS port (8444) on the Administration service.
After you have disabled this port, if you wish to enable either the Administration service or the Administration interface, you must enable the SSL port on the Administration service.
To disable the SSL port on UNIX1 If Entrust IdentityGuard is currently running, shut it down. See “Managing the
Entrust IdentityGuard service” on page 62 for instructions.
2 Run the command to disable the Administration interface, if it is still running:
identityguard.sh disable admininterface
3 Run the command to disable the Administration service, if it is still running:
identityguard.sh disable adminservice
4 Locate and make a backup copy of the server.xml file found at:
$CATALINA_HOME/conf/server.xml
5 Identify and comment out the code between <Service ..> and </Service> that contains <Connector port="8444">.
6 Save the server.xml file.
7 Restart the Entrust IdentityGuard Server. For instructions on restarting, see “Managing the Entrust IdentityGuard service” on page 62.
To disable the SSL port on Microsoft Windows1 If Entrust IdentityGuard is currently running, shut it down. See “Managing the
Entrust IdentityGuard service” on page 94 for instructions.
2 Locate and make a backup copy of the server.xml file found at:
<IG_INSTALL_DIR>\jakarta-tomcat-5.0.28\conf\server.xml
3 Identify and comment out the code between <Service ..> and </Service> that contains <Connector port="8444">.
4 Save the server.xml file.
232 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
5 Restart the Entrust IdentityGuard Server. For instructions on restarting, see “Managing the Entrust IdentityGuard service” on page 94.
233Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
Securing the LDAP connection with SSL During installation, if you chose not to use an SSL connection to the LDAP repository, you can reconfigure the connection without reinstalling and configuring Entrust IdentityGuard.
Topics in this section:
• “Creating self-signed certificates” on page 235
• “Importing CA-signed certificates” on page 236
• “Exporting the certificate to client applications” on page 238
• “Updating certificates” on page 238
To reconfigure the connection, update the Entrust IdentityGuard keystore, and then the identityguard.properties file. First ensure that you have:
• an LDAP repository that supports SSL
• a user with permissions to update the identityguard.properties file
• an SSL certificate for your LDAP server
• access to the Java keytool executable
There are two steps to this process:
• Import the LDAP server's SSL certificate into the Entrust IdentityGuard keystore so that Entrust IdentityGuard can communicate with the LDAP server. Entrust IdentityGuard uses this certificate (when establishing a connection) to verify the identity of the LDAP server.
• Edit the properties file so that Entrust IdentityGuard will connect to the LDAP server using SSL.
To import the LDAP SSL certificate1 Copy the LDAP server certificate onto the Entrust IdentityGuard Server.
2 From the command line on the Entrust IdentityGuard Server, issue the following command:
keytool -import -alias ldapssl -keystore <path_to_keystore> -file
<path_to_ldap_ssl_cert_file> -storepass <password>
Where:
• <path_to_keystore> is:
– for UNIX, $IDENTITYGUARD_HOME/etc/keystore– for Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\keystore
234 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Note: The path to the keystore for versions of Entrust IdentityGuard installed using an existing application server is the location of the trustStore.jks file.
• <path_to_ldap_ssl_cert_file> is the directory you chose to store the file when you exported the certificate.
3 When prompted to answer whether or not you trust the certificate, review the displayed details, and if they are correct, answer yes.
To update the Entrust IdentityGuard properties file1 As the Entrust IdentityGuard application owner, open the
identityguard.properties file in $IDENTITYGUARD_HOME/etc/
2 Find the section of the properties file that identifies the LDAP URL:
# URL that will be used to connect to the LDAP server.
identityguard.ldap.url=ldap://myldapserver:389/ou=users,
dc=myserver,dc=com
3 Change the URL to use the LDAP SSL port on your LDAP server. The default SSL port for LDAP servers is 636. Update the property with the value appropriate to your environment.
identityguard.ldap.url=ldap://myldapserver:636/ou=users,
dc=myserver,dc=com
4 Find the section of the properties file that identifies the LDAP SSL connections:
# Specify whether this will be a secure SSL connection to the
directory.
# If set to true, the identityguard.ldap.url must be directed to a
# secure ldap port (default: 636).
# This property can be true or false, or commented out entirely.
identityguard.ldap.sslEnabled=false
5 Change the property value to true:
identityguard.ldap.sslEnabled=true
6 Save the file and restart Entrust IdentityGuard.
You now have a secure SSL connection between Entrust IdentityGuard and your LDAP repository.
235Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
Changing the Entrust IdentityGuard certificate
Attention: This section applies only to installations of Entrust IdentityGuard with embedded Tomcat.
When engaged in an SSL-secured communication, Entrust IdentityGuard requires an SSL certificate. A client application uses the SSL certificate to identify the Entrust IdentityGuard Server.
Note: You can purchase or renew an SSL certificate by going to http://www.entrust.com/certificate_services/index.htm.
Note: The J2SE 1.4 installed with your Entrust IdentityGuard system includes the keytool application. Use it to manage the Java keystore containing private keys and SSL certificates (X.509 chains and public keys). For complete documentation on keytool, see http://java.sun.com/j2se/1.4.2/docs/tooldocs/solaris/keytool.html on Solaris, and http://java.sun.com/j2se/1.4.2/docs/tooldocs/windows/keytool.html on Windows.
Configure one of the two different types of certificates: self-signed certificate and CA-signed certificate.
The following topics provide procedural information for using SSL certificates:
• “Creating self-signed certificates” on page 235
• “Importing CA-signed certificates” on page 236
• “Exporting the certificate to client applications” on page 238
• “Updating certificates” on page 238
Creating self-signed certificatesA self-signed certificate is not guaranteed. Your client application must accept that the certificate is valid, and choose to import it. For a Java client, this means that you must add the self-signed certificate to the client keystore in order to communicate with Entrust IdentityGuard using SSL. To create a self-signed certificate for Entrust IdentityGuard, generate a new private key and certify it.
236 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
To create a self-signed certificate1 Delete the existing key if there is one:
keytool -delete -alias tomcat -storepass entrust -keystore
<path_to_keystore>
Where <path_to_keystore> is:
• for UNIX, $IDENTITYGUARD_HOME/etc/keystore
• for Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\keystore
2 Generate a new key pair:
keytool -genkey -alias tomcat -keyalg RSA -validity
<cert_lifetime_in_days> -keystore <path_to_keystore> -dname
"<subject_DN>" -keypass entrust -storepass entrust
Where:
• <path_to_keystore> is:
– for UNIX, $IDENTITYGUARD_HOME/etc/keystore– for Microsoft Windows, <IG_INSTALL_DIR>/identityguard81\etc\keystore
Importing CA-signed certificatesA CA-signed certificate has the following advantages:
• it is automatically recognized and accepted by major Web browsers
• it is automatically recognized and accepted by a Java client using a recent JRE
• it guarantees the identity of the owning organization
To import a CA-signed certificate1 Delete the existing key:
keytool -delete -alias tomcat -keystore <path_to_keystore>
-keypass entrust -storepass entrust
where <path_to_keystore> is:
• for UNIX, $IDENTITYGUARD_HOME/etc/keystore
• for Microsoft Windows, <IG_INSTALL_DIR>/identityguard81\etc\keystore
2 Before generating a certificate request, generate a public/private key pair for your server. To generate the necessary key pair, enter:
237Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
keytool -genkey -alias tomcat -dname "<required DN>"
-keyalg RSA -keysize <value> -keystore <path_to_keystore> -keypass
entrust -storepass entrust
Where:
• <required DN> depends on the CA that will process the certificate request.
– If you are using a certificate from, for example, the Entrust Certificate Service, you must enter a fully qualified DN.
– If you are using an Entrust CA with Entrust Authority Enrollment Server for Web to process the request, the DN must be "cn=<refnum>" where <refnum> is the reference number generated by the CA.
• <value> is the keysize value. Ensure the keysize value is secure, for example, 1024 or 2048.
• <path_to_keystore> is one of:
– for UNIX, $IDENTITYGUARD_HOME/etc/keystore– for Microsoft Windows, <IG_INSTALL_DIR>/identityguard81\etc\keystore
3 A Certificate Signing Request (CSR) is used by the CA to generate your SSL certificate. To create a CSR, enter:
keytool -certreq -alias tomcat -file <file to store request in>
-keystore <path_to_keystore> -keypass entrust -storepass entrust
Provide the file generated by this command to the CA. The CA takes the request file and creates a certificate.
4 Optionally, once you receive your SSL certificate from the CA, import a chain certificate (if the CA is not already included in the JRE Trusted CA list). To import a CA chain certificate, enter:
keytool -import -alias root -trustcacerts -file <file containing
CA certificate> -keystore <path_to_keystore> -keypass entrust
-storepass entrust
5 To import the SSL certificate that was generated by the CA, save the certificate file to a location on the Entrust IdentityGuard Server and enter:
keytool -import -alias tomcat -trustcacerts -file <SSL_cert_file>
-keystore <path_to_keystore> -keypass entrust -storepass entrust
238 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Exporting the certificate to client applicationsWhen you use SSL, you may be required to export the Entrust IdentityGuard Server certificate so that the client has access to it. Complete the following steps to export a server certificate that you manually created.
To export a certificate1 Enter the following command (on one line):
keytool -export -alias tomcat -file <path_to_file.cer> -keystore
<path_to_keystore> -keypass entrust
where <path_to_keystore> is:
• for UNIX, $IDENTITYGUARD_HOME/etc/keystore
• for Microsoft Windows, <IG_INSTALL_DIR>/identityguard81\etc\keystore
2 Enter the password when prompted.
Updating certificatesWhether you chose a self-signed certificate or a CA-signed certificate, the certificate will eventually expire. It is necessary to update the keystore with the new certificate before expiry.
As well, there are other reasons why you might want to replace the self-signed certificate that was created during installation. For example, you may need
• to modify the lifetime or key type
The default self-signed certificate is RSA-1024.
• a different DN in the certificate
The default self-signed certificate has a DN of cn=<hostname>, where <hostname> is the host name of the Entrust IdentityGuard Server. If the client applications connecting to the Entrust IdentityGuard services are not using this host name, you need a new self-signed certificate.
• additional security
To update the certificate1 If you are updating a self-signed certificate, use the Java keytool application to
issue the following command (on one line):
keytool -selfcert -alias tomcat -validity <number_of_days>
-keystore <path_to_keystore> -keypass entrust
where <path_to_keystore> is:
239Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
• for UNIX, $IDENTITYGUARD_HOME/etc/keystore
• for Microsoft Windows, <IG_INSTALL_DIR>/identityguard81\etc\keystore
You should not have to delete the original alias when creating a new self-signed certificate.
2 If Entrust IdentityGuard is using a CA-signed certificate, it is necessary to generate a new signing request and import the response. See “Importing CA-signed certificates” on page 236.
240 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Enabling system bindingAs a master user, you can bind the master keys to a specific machine through an update to the key protection file (.kpf). This is called system binding. You can also perform system unbinding of the master keys, making them portable.
Perform system binding on the master keys to:
• rebind master keys that were unbound
• rebind master keys after a hardware change, as required
• complete initializing of a replica or restoring from a backup
Note: When you initialize Entrust IdentityGuard for the first time, system binding occurs automatically.
Perform system unbinding on the master keys to copy a key protection file (.kpf) to another computer.
To bind the master keys1 On UNIX:
a As the UNIX user, change to $IDENTITYGUARD_HOME.
b From $IDENTITYGUARD_HOME, source the environment settings file by entering:
. ./env_settings.sh
(Include a space between the two periods in the command.)
c Enter the following command to start the master user shell:
supersh
2 On Windows, click Start > All Programs > Entrust > IdentityGuard > Master User Shell.
The copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.
3 Enter the following command:
system bind
You are prompted for a user name and password.
To unbind the master keys1 On UNIX:
a As the UNIX user, change to $IDENTITYGUARD_HOME.
241Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide
b From $IDENTITYGUARD_HOME, source the environment settings file by entering:
. ./env_settings.sh
(Include a space between the two periods in the command.)
c Enter the following command to start the master user shell:
supersh
2 On Windows, click Start > All Programs > Entrust > IdentityGuard > Master User Shell.
The copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.
3 Enter the following command:
system unbind
You are prompted for a user name and password.
242 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
243
Chapter 8
Backing up and restoring Entrust IdentityGuard Server
This chapter is intended for installers and administrators who are responsible for the backup and recovery of Entrust IdentityGuard. It provides guidelines for planning a backup strategy and steps for restoring Entrust IdentityGuard from a backup.
This chapter contains the following sections:
• “Planning a backup strategy” on page 244
• “Restoring Entrust IdentityGuard from a backup” on page 250
• “Restoring a file-based repository” on page 253
• “Reconfiguring the system or Entrust IdentityGuard serial number” on page 254
244 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Planning a backup strategyIt is strongly recommended that you have a backup strategy in place before you install or upgrade Entrust IdentityGuard.
Backing up provides insurance in case something unexpected happens (for example, a hardware failure) to the servers hosting Entrust IdentityGuard and your repository. You should consider a separate server or separate physical disk to host the backup files in case of a hard disk failure.
Topics in this section:
• “To plan a backup strategy on UNIX” on page 244
• “To plan a backup strategy on Microsoft Windows” on page 245
To plan a backup strategy on UNIXUse the following points to help you develop a backup strategy for Entrust IdentityGuard Server and your repository on UNIX.
• Back up the masterkeys.enc file.
• Entrust IdentityGuard does not back up your data repository.
Ensure that you back up your repository on a regular basis and before installing or upgrading Entrust IdentityGuard.
• If the data is split over two repositories, back up and restore both repositories together.
• Back up your logs on a regular basis.
If you chose to log to files when you installed Entrust IdentityGuard, the logs are stored in $IDENTITYGUARD_HOME/logs
• Decide on a backup type from the following two options:
– Full. Full backups contain all information required to restore the configuration, logs, and file-based repositories.
– Partial. Partial backups contain enough information to restore a replica system.
• The following Entrust IdentityGuard files are backed up during a full backup:
– $IDENTITYGUARD_HOME/etc/masterkeys.enc. This file changes whenever a master user changes a password and should be backed up again after such an operation.
– $IDENTITYGUARD_HOME/etc/keystore (installations with embedded Tomcat only). This file changes whenever a new SSL key-pair is generated or imported.
– $IDENTITYGUARD_HOME/etc/identityguard.properties– $CATALINA_HOME/conf/server.xml (installations with embedded
Tomcat only)
245Backing up and restoring Entrust IdentityGuard ServerFeedback on guide
– $IDENTITYGUARD_HOME/etc/igsample.properties – $IDENTITYGUARD_HOME/etc/igkrb5.conf
• Make sure you back up any files in the following directories:
– $IDENTITYGUARD_HOME/export/– $IDENTITYGUARD_HOME/etc/fpcr/– $IDENTITYGUARD_HOME/etc/ftkr/
• If you use a database repository, save the JDBC driver .jar files you used during installation.
• You can create a new keystore file but then you must also generate new SSL keys.
• You can run configure.sh again to recreate the identityguard.properties and server.xml files.
To plan a backup strategy on Microsoft WindowsUse the following points to help you develop a backup strategy for Entrust IdentityGuard Server and your repository on Microsoft Windows.
• Entrust IdentityGuard does not back up your data repository.
Ensure that you back up your repository on a regular basis and before installing or upgrading Entrust IdentityGuard.
• If the data is split over two repositories, back up and restore both repositories together.
• Back up your logs on a regular basis. The logs are stored in <IG_INSTALL_DIR>\identityguard81\logs
• Decide on a backup type from the following two options:
– Full. Full backups contain all information required to restore the configuration, logs, and file based repository.
– Partial. Partial backups contain enough information to set up a replica system.
• The following Entrust IdentityGuard files are backed up during a full backup.
– <IG_INSTALL_DIR>\identityguard81\etc\masterkeys.enc. This file changes whenever a master user changes their password and should be backed up again after such an operation.
– <IG_INSTALL_DIR>\identityguard81\etc\keystore. This file changes whenever a new SSL key-pair is generated or imported.
– <IG_INSTALL_DIR>\identityguard81\etc\identityguard.properties
– <IG_INSTALL_DIR>\jakarta-tomcat-5.0.28\conf\server.xml– <IG_INSTALL_DIR>\identityguard81\etc\igsample.properties – <IG_INSTALL_DIR>\identityguard81\etc\igkrb5.conf
246 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
• Make sure you back up any files in the following directories:
– <IG_INSTALL_DIR>\identityguard81\export\– <IG_INSTALL_DIR>\identityguard81\etc\fpcr\– <IG_INSTALL_DIR>\identityguard81\etc\ftkr\
• If you use a database repository, save copies of the JDBC driver .jar files you used during installation.
• You cannot recover the masterkeys.enc file.
• You can create a new keystore file but then you must also generate new SSL keys.
• You can use the Configuration wizard from the Entrust IdentityGuard Configuration Panel to recreate the identityguard.properties and server.xml files.
• Make sure you store your backup files on a separate machine from your Entrust IdentityGuard Server.
247Backing up and restoring Entrust IdentityGuard ServerFeedback on guide
Backing up your configurationBack up your Entrust IdentityGuard configuration as a precaution in case your system fails.
Attention: Ensure that you synchronize the backups of your LDAP directory or database repositories. Remember that any time you restore Entrust IdentityGuard from a backup, both the LDAP and database repositories must be restored as well.
This section contains the following procedures:
• “To back up your configuration on UNIX” on page 247
• “To back up your configuration on Microsoft Windows” on page 248
Attention: Backup files contain sensitive information, such as the masterkeys.enc file and export files. The igsample.properties file contains a clear text administrator password. As such, backup files should be stored carefully.
To back up your configuration on UNIX1 Log in as the UNIX user on the existing Entrust IdentityGuard Server.
2 Run the backup command:
igbackup.sh [-partial|-full]
This command creates a backup ZIP file and puts it in the default location, $IDENTITYGUARD_HOME/backups/. The default name includes the type of backup (partial or full), and the current date and time. For example, if you create a partial backup file created on February 24, 2006 at 3:00:45 P.M., the file name is: igpartialbackup_20060224150045.zip.
Optionally, you can you can specify a file name by including [-file <file name>] in the backup command. For example,
igbackup.sh -partial -file <file name>
where <file name> is the name you choose for the backup file. The default location is relative to your current working directory.
The partial backup ZIP file includes the following files for installations with embedded Tomcat:
• masterkeys.enc
• identityguard.properties
248 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
• igsample.properties file (if it exists)
• igkrb5.conf
• JDBC .jar files (if they exist)
• identityguard.cer (contains the SSL certificate of the primary server)
• LDAP SSL certificate (if the primary server has configured SSL to its LDAP repository)
The partial backup ZIP file includes the following files for installations using an existing application server:
• masterkeys.enc
• identityguard.properties
• igsample.properties file (if it exists)
• JDBC .jar files (if they exist)
The full backup ZIP file includes the following files (in addition to the files that are backed up in the partial backup):
• server.xml (installations with embedded Tomcat only)
• file-based repository files (both preproduced cards and unassigned tokens)
• keystore
• log files
• export files
Note: If you do not specify either -partial or -full with the igbackup.sh command, a full backup is created.
To back up your configuration on Microsoft Windows1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking
Start > All Programs > Entrust > IdentityGuard > Configuration Panel.
2 Select Backup Entrust IdentityGuard Configuration.
3 Select the backup type: Full or Partial.
4 In the Backup File Location section, click Browse.
A file name including a date/time stamp will automatically be created in the File name field. The default location is relative to your current working directory.
5 Click OK to save the backup under the file name with the date/time stamp. Alternatively, rename the file in the File name field and press OK.
249Backing up and restoring Entrust IdentityGuard ServerFeedback on guide
Note: If you are selecting your own file name, assure you can recognize which backup is the most recent file, as over time, more than one backup file may exist.
6 Click Save.
Your backup is saved as a ZIP file.
7 Click Close to exit the Configuration Backup utility.
Note: During the Windows uninstall process, Entrust IdentityGuard attempts to create a backup of your Entrust IdentityGuard configuration. If successful, it displays a message listing the location of the backup file. Click OK to continue the uninstall. This occurs only if Entrust IdentityGuard was correctly configured and initialized.
Note: You can also use the command line backup utility, igbackup.exe, located in <IG_INSTALL_DIR>\identityguard81\bin to back up your configuration on Microsoft Windows.
250 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Restoring Entrust IdentityGuard from a backup
The following steps describe how to restore Entrust IdentityGuard from a backup. These steps assume that you have already restored your repository.
Topics in this section:
• “To restore Entrust IdentityGuard from a backup on UNIX” on page 250
• “To restore Entrust IdentityGuard from a backup on Windows” on page 251
Attention: If your backup does not include the masterkeys.enc file, then you cannot restore your system.
To restore Entrust IdentityGuard from a backup on UNIX1 Copy the full backup ZIP file from your Entrust IdentityGuard Server to the
computer that you want to restore Entrust IdentityGuard on.
The default location for the file is $IDENTITYGUARD_HOME/backups.
Note: All files listed here should be readable and writable by the user and group selected during installation.
2 If the computer you are restoring to has a copy of the server.xml file, delete it before continuing with the restore.
3 Unzip the full backup ZIP file. For example, on UNIX,
unzip igfullbackup_20060324151505.zip
4 Open the files.txt file in a text editor.
This file contains a list of all the files copied into the backup ZIP file, and the location they were copied from.
5 Copy all the files back to their proper locations.
6 For database repositories:
• Copy the JDBC driver .jar files you used during the original installation to $CATALINA_HOME/common/lib (installations with embedded Tomcat only) and $IDENTITYGUARD_HOME/lib.
• Restore the JDBC .jar files to $CATALINA_HOME/common/lib (installations with embedded Tomcat only)
7 Open the manifest.txt file in a text editor and ensure you are using the correct version of the files.
251Backing up and restoring Entrust IdentityGuard ServerFeedback on guide
Backups between versions of Entrust IdentityGuard may not be compatible.
8 Open the master user shell.
a Log in as the UNIX user that belongs to the UNIX group and change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81).
b From $IDENTITYGUARD_HOME, source the environment settings file by entering:
. ./env_settings.sh
(Include a space between the two periods in the command.)
c Enter the following command to start the master user shell:
supersh
Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.
9 Enter the following in the master user shell to initialize the restored system:
init -replica
All three master users must enter their passwords.
10 It is recommended that you run the command system bind from the master user shell to enable system binding.
For more information on system binding, see “Enabling system binding” on page 240.
Entrust IdentityGuard is now restored from backup.
11 Redeploy the Entrust IdentityGuard services:
• see “Enabling and disabling individual Entrust IdentityGuard services” on page 64) for installations with embedded Tomcat
• see “Deploying Entrust IdentityGuard services on an existing application server” on page 127) for installations using an existing application server
To restore Entrust IdentityGuard from a backup on Windows1 Copy the full backup ZIP file from your Entrust IdentityGuard Server to the
computer that you want to restore Entrust IdentityGuard on.
The default location for the file is <IG_INSTALL_DIR>\identityguard81\backups
2 If the computer you are restoring to has a copy of the server.xml file, delete it before continuing with the restore.
3 Unzip the full backup ZIP file.
4 Open the files.txt file in a text editor.
This file contains a list of all the files copied into the backup ZIP file, and the location they were copied from.
252 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
5 Copy all the files back to their proper locations.
6 For database repositories, ensure that copies of the JDBC driver .jar files you used during installation are in these folders:
• <TOMCAT_INSTALL_DIR>\common\lib
• <IG_INSTALL_DIR>\identityguard81\lib.
7 Open the manifest.txt file in a text editor and ensure you are using the correct version of the files.
Backups between versions of Entrust IdentityGuard may not be compatible.
8 Click Start > All Programs > Entrust > IdentityGuard > Configuration Panel.
9 Select Initialize Entrust IdentityGuard on the Entrust IdentityGuard Configuration Panel to initialize the restored system.
For instructions, see “Running the Entrust IdentityGuard Initialization wizard” on page 84.
All three master users must enter their passwords.
Entrust IdentityGuard is now restored from backup.
Note: The backup file does not contain saved settings for Entrust IdentityGuard services. Check that the Administration service, Administration interface and the sample application are enabled or disabled, as applicable.
253Backing up and restoring Entrust IdentityGuard ServerFeedback on guide
Restoring a file-based repositoryA restore backs up the configuration files, including the .pcr and .idx files. Specific files in the fpcr and ftkr directories should be backed up or restored with the repository, so that they are consistent.
Topics in this section:
• “To restore a file-based card repository on UNIX” on page 253
• “To restore a file-based card repository on Windows” on page 253
To restore a file-based card repository on UNIX1 Back up the files that start with fpcr.pcr (for cards) located in:
$IDENTITYGUARD_HOME/etc/fpcr
You can override the base file for cards with the identityguard.properties setting:
identityguard.preproduced.cardRepository.file.name
2 Back up the files that start with ftkr.pcr (for tokens) located in:
$IDENTITYGUARD_HOME/etc/ftkr
You can override the base file for tokens with the identityguard.properties setting:
identityguard.tokenRepository.file.name
3 Ensure that the files are owned (and are readable and writable) by the user that owns Entrust IdentityGuard.
To restore a file-based card repository on Windows1 Back up the files that start with fpcr.pcr (for cards) located in:
<IG_INSTALL_DIR>\identityguard81\etc\fpcr
You can override the base file for cards with the identityguard.properties setting:
identityguard.preproduced.cardRepository.file.name
2 Back up the files that start with ftkr.pcr (for tokens) located in:
<IG_INSTALL_DIR>\identityguard81\etc\ftkr
You can override the base file for tokens with the identityguard.properties setting:
identityguard.tokenRepository.file.name
254 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Reconfiguring the system or Entrust IdentityGuard serial number
Reconfigure the next generated serial number after you restore your repository to an old backup. This prevents duplication of serial numbers for cards that were created and manufactured between the backup and the time the repository was restored.
To configure the card serial number1 Open the master user shell.
• on UNIX:
– Log in as the UNIX user that belongs to the UNIX group and change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81).
– From $IDENTITYGUARD_HOME, source the environment settings file by entering:
. ./env_settings.sh
(Include a space between the two periods in the command.)– Enter the following command to start the master user shell:supersh
Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.
• on Microsoft Windows:
– Click Start > All Programs > Entrust > IdentityGuard > Master User Shell.2 To display the next available serial number, at the command line, enter
system get
3 To update to a new serial number, enter
system set -sernum <value>
255
Appendix A
Configuring the Entrust IdentityGuard Server properties file
When you installed Entrust IdentityGuard, it created an identityguard.properties file in the following directory:
• on UNIX, $IDENTITYGUARD_HOME/etc/
• on Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\
Reconfigure your installation by editing or adding settings to the identityguard.properties file.
Note: With the exception of log settings, you must restart the Entrust IdentityGuard service for changes to Entrust IdentityGuard properties to take effect. See:“Managing the Entrust IdentityGuard service” on page 62 for installation using embedded Tomcat on UNIX,“Managing the Entrust IdentityGuard service” on page 166 for installations using existing application servers, or “Managing the Entrust IdentityGuard service” on page 94 for installation using embedded Tomcat on Microsoft Windows.
Topics in this section:
• “Editing property values” on page 257
• “Enabling the authentication success audit” on page 258
• “Enabling a WSDL query” on page 259
256 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
• “Configuring additional search bases” on page 260
• “Configuring LDAP directory properties” on page 261
• “Configuring database properties” on page 267
• “Enabling cached challenges” on page 270
• “Caching policies” on page 272
• “Changing log configuration” on page 273
• “Changing log locations on UNIX” on page 277
• “Configuring master user shell formatting” on page 278
• “Configuring license auditing” on page 281
• “Configuring the Entrust IdentityGuard Radius proxy properties” on page 282
• “Configuring external authentication properties” on page 293
• “Configuring token properties” on page 295
• “Configuring the Administration interface properties for bulk operations” on page 296
• “Configuring the Administration interface to control the output format” on page 297
257Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
Editing property valuesYou can change any value in the identityguard.properties file. Change these settings with caution, as mistakes can disrupt Entrust IdentityGuard functions:
• any setting that starts with log4j
• identityguard.MasterKeyFile
• identityguard.KeyProtectionFile
• identityguard.authservice.url
• identityguard.adminservice.url
• identityguard.webadmin.url
• identityguard.authservice.https.url
• identityguard.webadmin.bulk.maxFileSize
• identityguard.wedadmin.bulk.inMemoryThreshold
Encrypting property valuesSome values in the identityguard.properties file are encrypted, for example, the database or LDAP password, and the Radius shared secret values.
An encrypted property has an ampersand (&) in front of its name in the properties file (for example, &identityguard.jdbc.password).
To change an encrypted value, replace it with a new cleartext value. The next time you start Entrust IdentityGuard, it encrypts the value.
258 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Enabling the authentication success audit
By default, the Entrust IdentityGuard authentication success audit is disabled. Enable this setting if your organization wishes to audit successful authentications.
To enable the authentication success audit, in the Authentication Settings section of the identityguard.properties file, set identityguard.authentication.audit.success to true.
For information on audited events, see the “Troubleshooting” chapter in the Entrust IdentityGuard Administration Guide.
259Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
Enabling a WSDL queryBy default, the Entrust IdentityGuard WSDL query is disabled. Enable this setting to retrieve the WSDL definition for a service. For example, if you query the Entrust IdentityGuard Authentication service URL with ?wsdl —http://igserver:8080/IdentityGuardAuthService/services/AuthService?wsdl—and the WSDL query is enabled, the WSDL definition for the Authentication service is returned.
To enable the WSDL query, in the identityguard.properties file, set identityguard.service.wsdlquery.enable to true.
260 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Configuring additional search basesSearch bases allow administrators to search more quickly for users in the same domain or in cross-certified domains if you store user information in an LDAP-compliant directory. After you define search bases in the properties file, you can create groups and assign each group one or more search bases.
Search bases also allow the Entrust IdentityGuard repository to span multiple directory servers.
Note: In some cases, not all users will reside within a single search base or directory. The reference to the user attribute (uid) should be different for each additional search base added to Entrust IdentityGuard. For example, for the primary search base, the reference to the user attribute may be “uid,” and for an additional search base the reference may be “cn” or “upn.” For Active Directory, use sAMAccountName instead of uid for the first search base.
An example of a search base URL is: ldap://dirserver:389/ou=someunit,o=yourcompany,c=ca
Some of the characteristics of search bases are:
• They can divide a large domain into smaller domains, simplifying searches.
• Groups may be assigned one or more search bases.
• A search base can be shared by multiple groups. When the user is created, a check is performed to ensure that the user ID is unique within all search bases assigned to that user in the group.
• If a search base is not defined, the group will use the default search base.
Note: If you are using multiple search bases, each user ID and administrator ID must be unique within a search base.
Search bases are defined in the identityguard.properties configuration file. You must manually edit the identityguard.properties file to add, remove, or modify search base definitions. See the identityguard.ldap.searchbase setting description in Table 15 for instructions on editing search bases.
For further instructions, see the Entrust IdentityGuard Administration Guide.
261Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
Configuring LDAP directory propertiesTo change the way that the LDAP directory is used by the Entrust IdentityGuard server, go to the LDAP Server Settings section of identityguard.properties and add or edit the properties described in Table 15.
If you are using an LDAP repository, the properties marked Required in the table must have values defined in the identityguard.properties file. These values are added to the identityguard.properties file during the configuration that you completed during installation.
Note: Entrust IdentityGuard configuration automatically converts spaces in the LDAP base DN to %20. If you edit the LDAP base DN after installation in the identityguard.properties file, remember to replace spaces with %20.
Table 15: LDAP directory properties
Property Description
identityguard.ldap.url Required.
LDAP URL to use to find and connect to the LDAP directory. This can include the host name, the port number, and initial context prefix to bind to. All lookups are relative to the given context prefix.
For example:
ldap://myldaphost:389/ou=People, dc=AnyCorp,dc=com
binds to port 389 on the computer myldaphost, with ou=People,dc=AnyCorp,dc=com as the initial context prefix.
identityguard.ldap.principal Required.
Name of the entity binding to the LDAP directory, for example:
cn=Directory Manager
identityguard.ldap.credentials Required.
Password of the entity binding to the LDAP directory.
262 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
identityguard.ldap.connecttimeout Length of time in milliseconds that Entrust IdentityGuard waits when attempting to connect to the LDAP directory before giving up and returning an error.
Defaults to 30000 (30 seconds).
identityguard.ldap.useridattribute LDAP directory attribute that contains the unique user identifier.
Default is cn.
identityguard.ldap.policyentry Required.
Specifies the directory that stores policies. It must exist, and be named relative to the context prefix.
For example, if the URL is ldap://directory.AnyCorp.com/o=Entrust,c=ca, then the policy entry could be cn=Some Entry, ou=R and D to represent the DN cn=Some Entry,ou=R and D,o=Entrust,c=ca.
identityguard.ldap.sslEnabled Specifies if you are using a secure SSL connection to the directory. If set to true, you must direct the identityguard.ldap.url to a secure LDAP port.
For more information, see the section “To import the LDAP SSL certificate” on page 233.
identityguard.ldap.addUserObjectClass Indicates whether the Entrust IdentityGuard Server should add the user object class when setting up an Entrust IdentityGuard user, or if it is expected to already be present.
Set to false for Active Directory and to true for an LDAP directory.
identityguard.ldap.addAdminObjectClass Indicates whether the Entrust IdentityGuard Server should add the admin object class when setting up an Entrust IdentityGuard administrator, or if it is expected to already be present.
Set to false for Active Directory and to true for an LDAP directory.
Table 15: LDAP directory properties (continued)
Property Description
263Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
identityguard.ldap.addPolicyObjectClass Indicates whether the Entrust IdentityGuard Server should add the policy object class when setting up the Entrust IdentityGuard policy, or if it is expected to already be present.
Set to false for Active Directory and to true for an LDAP directory.
To edit the remaining LDAP properties in this table (listed below), you must first add them to the identityguard.properties file. If a property is not included in the file, Entrust IdentityGuard uses the default value for that property as given here.
Table 15: LDAP directory properties (continued)
Property Description
264 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
identityguard.ldap.searchbase Required. url.<name>=
Define one or more search bases where users can be located. See “Configuring additional search bases” on page 260.
For example, a search base called sbase1 looks like this:identityguard.ldap.searchbase.url.sbase1=ldap://mydirectoryhost:389/ou=People,dc=AnyCorp,dc=com
You cannot name a search base “default” because that is a reserved search base name. See the Entrust IdentityGuard Administration Guide for more details.
Note: Entrust IdentityGuard configuration automatically converts spaces in the LDAP base DN to %20. If you edit the LDAP base DN after installation in the identityguard.properties file, remember to replace spaces with %20.
Optional. The following settings are optional and may be configured for each search base:
• principal.<name>=
• credentials.<name>=
• connecttimeout.<name>=
• searchtimeout.<name>=
• sizelimit.<name>=
• sslEnabled.<name>=
• useridattribute.<name>=
• userObjectClass.<name>=
• useridcasesensitive.<name>=
• addUserObjectClass.<name>
• adminObjectClass.<name>=
• addAdminObjectClass.<name>=
• connectionpool.max.<name>=
• connectionpool.minIdleCloseTime.<name>=
• connectionpool.closeSchedule.<name>=
Table 15: LDAP directory properties (continued)
Property Description
265Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
identityguard.ldap.searchbase (continued)
The identityguard.ldap.searchbase.useridattribute.<name> property defaults to the default value for the identityguard.ldap.useridattribute.
The other optional settings default to the corresponding value of the default search base.
identityguard.ldap.searchtimeout Length of time in milliseconds that Entrust IdentityGuard waits when searching the LDAP directory before giving up and returning an error.
Default is 30000 (30 seconds).
identityguard.ldap.sizelimit Maximum number of entries to return in a single LDAP search.
Default is 1000.
identityguard.ldap.userObjectClass LDAP directory object class used to allow the user attributes to be added to an entry.
Default is entrustIGUser.
identityguard.ldap.adminObjectClass LDAP directory object class used to allow the administrator attributes to be added to an entry.
Default is entrustIGAdmin.
identityguard.ldap.policyObjectClass LDAP directory object class used to allow the policy attributes to be added to an entry.
Default is entrustIGPolicy.
identityguard.ldap.connectionpool.max The maximum number of connections that can be kept in the LDAP directory connection pool. An Entrust IdentityGuard service will not open more connections to the directory than this value.
Default is 10.
identityguard.ldap.connectionpool. minIdleCloseTime
The minimum number of milliseconds a connection to the LDAP directory can be idle for before being closed.
Default is 180000 (3 minutes).
Table 15: LDAP directory properties (continued)
Property Description
266 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
identityguard.ldap.connectionpool. closeSchedule
The number of milliseconds between each check for idle LDAP directory connections and closure of those idle longer than the value set in the minIdleCloseTime setting.
Set to 0 to disable closing idle connections.
Default is 180000 (3 minutes).
identityguard.ldap.GeneralizedTimeWithSubSecs
Some directories do not support generalized time attributes that contain subseconds, while other directories require them. If this value is set to true, generalized time is formatted with subseconds.
Default is true.
Note: This must be false when using a Novell eDirectory as your repository.
identityguard.ldap.useReplace Set this to true only if you use Oracle Internet Directory as your repository.
Table 15: LDAP directory properties (continued)
Property Description
267Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
Configuring database propertiesTo change the way the database is used by the Entrust IdentityGuard Server, go to the Database Server Settings section of the identityguard.properties file and add or edit the properties described in Table 16 on page 267.
If you are using a database, the properties marked Required in the table must have values defined in the identityguard.properties file. These values are added to the identityguard.properties file during the configuration that you completed during the installation.
Table 16: JDBC properties
Property Description
identityguard.jdbc.connectionpool.closeSchedule The number of milliseconds between each check for idle database connections and closure of those idle longer than the value set in the minIdleCloseTime setting.
Set to 0 to disable closing idle connections.
Default is 180000 (3 minutes).
identityguard.jdbc.connectionpool.max The maximum number of connections that can be kept in the database connection pool. An Entrust IdentityGuard service will not open more connections than this value.
If the database server cannot accept this number of connections, Entrust IdentityGuard may return errors when trying to open some of its connections.
Default is 10.
identityguard.jdbc.connectionpool.minIdleCloseTime
The minimum number of milliseconds a connection to the database can be idle before it is considered for closing.
Default is 180000 (3 minutes).
identityguard.jdbc.logintimeout Number of seconds that Entrust IdentityGuard will wait for the database login operation to complete.
Default is 30 seconds.
identityguard.jdbc.querytimeout Number of seconds that Entrust IdentityGuard will wait for the database to perform an operation. A value of 0 means that the connection will never time out.
Default is 0.
268 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
identityguard.jdbc.driverClass Required.
The class name of the JDBC driver. This value is entered during configuration.
identityguard.jdbc.password Required.
The password of the database user name entered during configuration.
identityguard.jdbc.schema Required.
The database schema name entered during configuration.
identityguard.jdbc.url Required.
The database URL entered during configuration.
identityguard.jdbc.user Required.
The database user name entered during configuration.
identityguard.jdbc.needsEscape Indicates whether Entrust IdentityGuard should use escape characters in an SQL Where clause. If you are using a MySQL database, set this to false.
Default is true.
identityguard.jdbc.timestampDataType Determines how timestamp expressions are formatted in an SQL Where clause. If you set this property to true, the SQL Where clause will include the TIMESTAMP datatype.
This setting should be true for Oracle and false for DB2 and SQL Server.
Default is true.
identityguard.jdbc.blobAccess If you are using SQL Server, set this to false.
Default is true.
Table 16: JDBC properties (continued)
Property Description
269Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
identityguard.jdbc.selectLock Defines what SQL syntax is used to lock the policy when it is updated. Different databases use different syntaxes. The supported values are:
• forupdate - Oracle
• withrr - DB2
• withupdlock - SQL Server
If not set or an invalid value is provided, it defaults to forupdate.
Table 16: JDBC properties (continued)
Property Description
270 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Enabling cached challengesBy default, Entrust IdentityGuard uses a persistent repository to store challenges in the time between the getChallenge request and the authenticate request. Improve performance of your Entrust IdentityGuard system by using a cache for the challenge repository. The cache repository holds the challenge in memory and writes the challenge to the persistent repository after a period of time. Normally, the authenticate request is received within that time period, then the challenge is removed from the repository.
Attention: If you enable cached challenges, you should not create replicas of the Entrust IdentityGuard Server since the cache is not shared between the replicas. Or, you must ensure “session stickiness” (that is, the entire session is completed by one Entrust IdentityGuard Server.
Attention: It is recommended that you back up the identityguard.properties file before you make changes to it. For instructions on backing up files, see “Planning a backup strategy” on page 244.
To enable cached challenges1 In identityguard.properties,change the following settings:
• for an LDAP repository, change
identityguard.challengerepository.impl=com.entrust.identityGuard.c
ardManagement.dataAccess.ldap.LdapChallengeRepository
to:
identityguard.challengerepository.impl=com.entrust.identityGuard.c
ardManagement.dataAccess.cache.CacheChallengeRepository
• for a database, change
identityguard.challengerepository.impl=com.entrust.identityGuard.c
ardManagement.dataAccess.jdbc.JdbcChallengeRepository
to:
identityguard.challengerepository.impl=com.entrust.identityGuard.c
ardManagement.dataAccess.cache.CacheChallengeRepository
2 Add the following setting:
• for an LDAP repository:
271Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
identityguard.challengerepository.cache.persistentrepository.impl=
com.entrust.identityGuard.cardManagement.dataAccess.ldap.LdapChall
engeRepository
• for a database:
identityguard.challengerepository.cache.persistentrepository.impl=
com.entrust.identityGuard.cardManagement.dataAccess.jdbc.JdbcChall
engeRepository
3 Optionally, add the following setting, which defines how long (in seconds) a challenge remains in the cache before it is written to the persistent repository. The default value is 180 (3 minutes):
identityguard.challengerepository.cache.timeout=180
4 Optionally, add the following setting, which controls the maximum size (in number of challenges) of the challenge cache. If the setting is not set, or is an invalid value or a non-positive number, the cache size defaults to infinite.
identityguard.challengerepository.cache.maxsize=1000
272 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Caching policiesEdit the identityguard.properties file to control the length of time a policy is cached (before the repository is checked for new policy definitions). The policy caching setting is
identityguard.policyRepository.cacheTimeout=<number of
milliseconds>
The default is 30000 milliseconds (30 seconds). Set the value to 0 to disable policy caching and enable the policy to be accessed from the repository on every operation.
Note: Disabling policy caching could delay performance.
273Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
Changing log configurationEdit the identityguard.properties file to change certain UNIX logging behaviors.
Note: Changes to log settings take effect almost immediately.
In the Logging Configuration Settings section of identityguard.properties, remove the comment marks before and after the logging settings to change the default value, if necessary.
Table 17 describes the settings you can edit.
Table 17: UNIX Logging configuration settings
Logging configuration setting Description
identityguard.refreshinterval Defines how frequently the configuration is checked for changes to the log settings.
Default is 10 seconds.
identityguard.log.maxstacksize Defines the number of stack frames that are logged for errors.
The default value, 0, means that no stack trace is logged.
log4j.rootLogger Defines the logging level of the root logger, and the destination of any messages logged by the root logger. The root logger may catch errors not specifically logged by Entrust IdentityGuard, but occur within the application server. The default setting is WARN, and the appender will depend on the choices made during installation.
Default is WARN, (other options are: SYSTEM_SYSLOG or SYSTEM_FILELOG).
log4j.logger.IG.AUDIT Defines the audit level of Entrust IdentityGuard and the destination of the logged audits. The default setting is ALL, and the appender will depend on the choices made during installation.
Default is ALL, (other options are: AUDIT_SYSLOG or AUDIT_FILELOG).
274 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
lo4j.logger.IG.SYSTEM By default, all system log levels WARN and above are logged.
• To reduce system logging, change WARN to ERROR or OFF.
• To increase system logging (for example, for troubleshooting) change WARN to INFO, DEBUG, or ALL.
Default is WARN.
log4j.additivity.IG.AUDIT Defines whether Entrust IdentityGuard audits should also be added to the root logger.
Leave this value set to the default, false.
log4j.additivity.IG.SYSTEM Defines whether Entrust IdentityGuard system logs should also be added to the root logger.
This value should remain set to the default, false.
log4j.appender.AUDIT_SYSLOG Defines the log4j appender to use for audit logs. This should not be changed.
This value should remain set to the default, org.apache.log4j.net.SyslogAppender.
log4j.appender.AUDIT_SYSLOG.SyslogHost Defines the Syslog host that logging information is sent to.
If using Syslog, the default is localhost. If using file logging, the default is $log_host}.
log4j.appender.AUDIT_SYSLOG.Facility Defines the Syslog facility that is used to audit logs.
Default is local1.
log4j.appender.AUDIT_SYSLOG.layout The log4j class that converts a logging event into a message string to be printed in the logs.
Default is org.apache.log4j.PatternLayout.
log4j.appender.AUDIT_SYSLOG.layout.ConversionPattern
The format of the converted logging event. See the log4j documentation for further information.
Default is [%t] [%-5p] [%c] %m%n.
Table 17: UNIX Logging configuration settings (continued)
Logging configuration setting Description
275Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
log4j.appender.SYSTEM_SYSLOG Defines the log4j appender to use for system logs. This should not be changed.
Default is org.apache.log4j.net.SyslogAppender.
log4j.appender.SYSTEM_SYSLOG.SyslogHost
Defines the Syslog host to which logging information is sent.
Default is localhost.
log4j.appender.SYSTEM_SYSLOG.Facility Defines the Syslog facility that is used by Entrust IdentityGuard system logs.
Default is local2.
log4j.appender.SYSTEM_SYSLOG.layout The log4j class that converts a logging event into a message string to be printed in the logs.
Default is org.apache.log4j.PatternLayout.
log4j.appender.SYSTEM_SYSLOG.layout.ConversionPattern
The format of the converted logging event. Please see the log4j documentation for further information.
Default is [%t] [%-5p] [%c] %m%n.
log4j.appender.AUDIT_FILELOG Defines the appender that is used if audit events are logged to files.
This value should remain set to the default, org.apache.log4j.RollingFileAppender.
log4j.appender.AUDIT_FILELOG.File Defines the location of the audit log.
Default is: $IDENTITYGUARD.HOME/etc/audit.log
log4j.appender.AUDIT_FILELOG.MaxFileSize Defines the maximum size of a log file before rolling over to a new empty file.
Default is 1000KB.
log4j.appender.AUDIT_FILELOG.MaxBackupIndex
Defines the number of previous log files to keep as a history.
Default is 10.
Table 17: UNIX Logging configuration settings (continued)
Logging configuration setting Description
276 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
log4j.appender.AUDIT_FILELOG.layout The log4j class that converts a logging event into a message string to be printed in the logs.
Default is org.apache.log4j.PatternLayout.
log4j.appender.AUDIT_FILELOG.layout.ConversionPattern
The format of the converted logging event. Please see the log4j documentation for further information.
Default is [%d] [%t] [%-5p] [%c] %m%n.
log4j.appender.SYSTEM_FILELOG Defines the appender that is used if audit events are logged to files.
This value should remain set to the default, org.apache.log4j.RollingFileAppender.
log4j.appender.SYSTEM_FILELOG.File Defines the location of the audit log.
Default is: $IDENTITYGUARD.HOME/etc/system.log
log4j.appender.SYSTEM_FILELOG.MaxFileSize
Defines the maximum size of a log file before rolling over to a new empty file.
Default is 1000KB.
log4j.appender.SYSTEM_FILELOG.MaxBackupIndex
Defines the number of previous log files to keep as a history.
Default is 5.
log4j.appender.SYSTEM_FILELOG.layout
The log4j class that converts a logging event into a message string to be printed in the logs.
Default is org.apache.log4j.PatternLayout.
log4j.appender.SYSTEM_FILELOG.layout.ConversionPattern
The format of the converted logging event. Please see the log4j documentation for further information.
Default is [%d] [%t] [%-5p] [%c] %m%n.
Table 17: UNIX Logging configuration settings (continued)
Logging configuration setting Description
277Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
Changing log locations on UNIXIf you chose to log to Syslog when you installed Entrust IdentityGuard, you can reconfigure to log to a file, or, if you chose to log to a file, you can reconfigure so as to log to Syslog.
To switch between a log file and Syslog, edit the following:
log4j.rootLogger=WARN, SYSTEM_<FILELOG> or <SYSLOG>
log4j.logger.IG.AUDIT=ALL, AUDIT_<FILELOG> or <SYSLOG>
log4j.logger.IG.SYSTEM=WARN, SYSTEM_<FILELOG> or <SYSLOG>
For example, to switch logging from files to Syslog, change log4j.rootLogger=WARN, SYSTEM_FILELOG to log4j.rootLogger=WARN, SYSTEM_SYSLOG.
If you are switching logging from files to Syslog, you will need to edit the following two entries in identityguard.properties and replace ${log_host} with the host name of your Syslog server. Use the value localhost if the Syslog server is running on the local host.
log4j.appender.AUDIT_SYSLOG.SyslogHost=${log_host}
log4j.appender.SYSTEM_SYSLOG.SyslogHost=${log_host}
For example, if the Syslog server is running on the localhost, change the two entries to:
log4j.appender.AUDIT_SYSLOG.SyslogHost=localhost
log4j.appender.SYSTEM_SYSLOG.SyslogHost=localhost
278 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Configuring master user shell formatting
Certain identityguard.properties file settings define the column widths (measured in characters) of the output displayed by any of the list commands (for example, user list, user card list, admin list, token list, and so on).
To change column width, add the following properties to identityguard.properties and change the numeric value associated with the fields in Table 18 through Table 22.
Table 18: User list column widths
Property Description
identityguard.supersh.userlist.width.userid Indicates the width of the user ID field.
Default is 14.
identityguard.supersh.userlist.width.haspin Indicates the width of the temporary PIN field.
Default is 9.
identityguard.supersh.userlist.width.numcards Indicates the width of the number of cards field.
Default is -1, meaning the remainder of the width of your screen.
Table 19: User card list column widths
Property Description
identityguard.supersh.usercardlist.width.userid Indicates the width of the user ID field.
Default is 14.
identityguard.supersh.usercardlist.width.sernum Indicates the width of the serial number field.
Default is 14.
identityguard.supersh.usercardlist.width.state Indicates the width of the state field.
Default is 9.
identityguard.supersh.usercardlist.width.create Indicates the width of the creation date field.
Default is 19.
279Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
identityguard.supersh.usercardlist.width.expire Indicates the width of the expiry date field.
Default is -1, meaning the remainder of the width of your screen.
Table 20: Preproduced cards column width
Property Description
identityguard.supersh.preproducedcardlist.width.sernum
Indicates the width of the preproduced card serial number field.
Default is 14.
identityguard.supersh.preproducedcardlist.width.create
Indicates the width of the preproduced card creation date field.
Default is -1, meaning the remainder of the width of your screen.
Table 21: Administrator list column width
Property Description
identityguard.supersh.adminlist.width.userid Indicates the width of the administrator ID field.
Default is 20.
identityguard.supersh.adminlist.width.state Indicates the width of the administrator state field.
Default is -1, meaning the remainder of the width of your screen.
Table 19: User card list column widths
Property Description
280 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Table 22: Token list column width
Property Description
identityguard.supersh.tokenlist.width.pinsupported
Indicates the width of the PIN Supported field.
Default is 12 for tokens that support token PINs; otherwise false.
281Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
Configuring license auditingEntrust IdentityGuard services performs a periodic license audit. The identityguard.properties file settings in Table 23 control the audit behavior.
License auditing helps you determine when to renew your license or when you are about to run out of user licenses. When you reach your license limits, contact Entrust for more licenses.
The audit is enabled on all replicas of the Entrust IdentityGuard Server. To prevent duplicate audits from being generated on replica Entrust IdentityGuard servers, use the identityguard.audit.integrity.enabled property is to disable the audit integrity check on all but one of the replicas.
The audit integrity check will only run for the first time after the interval has passed. This means that if the service is always restarted within that interval, the audit integrity is never executed.
Table 23: Audit settings
Property Description
identityguard.audit.integrity.enabled Enables the audit integrity check.
Default is true.
identityguard.audit.integrity.interval Number of hours between audit integrity checks.
Default is 24.
identityguard.audit.integrity.count_limit If set to a positive integer value, an audit is generated when the user count gets to within the given value of the license limit.
Default is 0. If the license has expired, the license expired audit is generated regardless of the count limit.
identityguard.audit.integrity.time_limit If set to a positive integer value, an audit is generated when the current date gets to within the given number of days of the license expiry.
Default is 0.
282 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Configuring the Entrust IdentityGuard Radius proxy properties
When you configure the Radius proxy, it sets many of the properties in the identityguard.properties file. However, you need to edit this file to customize the grid and token challenge strings and other features. Edit the properties described in the following table to modify behavior of the Entrust IdentityGuard Radius proxy.
Note: With the exception of log settings, you must restart the Radius proxy for property changes to take effect. See the section “Managing the Radius proxy” on page 196.
Note: When users see a challenge message through VPN, they must enter their response as one continuous string. There is no user interface form to separate and parse entries as people expect when using Entrust IdentityGuard. For example, if a user’s card cells A3, H4 and J1 have the numbers 4, 8, and 9, the response to this messageEnter a response to the challenge [A3] [H4] [J1] using a card with serial number 1952must be 489 with no spaces or punctuation.
Table 24: Radius proxy configuration settings
Property Description
identityguard.igradius.url Provides the URL of the Entrust IdentityGuard server.
If not specified, it defaults to http://localhost:8080/IdentityGuardAuthService/services/AuthenticationService.
If the default is used, Entrust IdentityGuard changes this to the value of identityguard.authservice.https.url during configuration.
283Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
identityguard.igradius.port Provides the port used by the Entrust IdentityGuard Radius proxy for first-factor authentication.
If not specified, it defaults to 1812.
If you use a Radius server for first-factor authentication and your VPN server recognizes different groups of users, use this property to specify a series of ports and direct those groups to different ports. For example, if you want requests for one group to be sent to port 1812 and requests for another group to be sent to port 1813, configure the property like this:
identityguard.igradius.port=1812 1813
No additional ports are needed for groups for other first-factor authentication methods.
Table 24: Radius proxy configuration settings (continued)
Property Description
284 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
identityguard.igradius.challengestring This property sets the contents of the default Radius proxy challenge message for grid authentication.
Note: This is one of six properties related to the challenge a user may see. At the very least, this property should be set as a default. Some or all of the other properties may be set to provide greater control over the challenges that apply to users with multiple cards and/or a PIN.
The content consists of a string and one to three placeholders. The placeholders are:
{0} = the challenge string
{1} = the serial number of the first card
{2} = the serial number of the second card.
The placeholders are filled in when the message appears. For example, this setting
Enter a response to the challenge {0} using cards with serial number {1} or {2}
would result in a message like this:
Enter a response to the challenge [A1] [B2] [C3] using cards with serial number 1234 or 2345.
Users never have more than two valid cards: the current card and the pending card. A user may have a PIN and no card, or a PIN with one or two cards.
If there is no challenge specified, this property defaults to: Enter the response for IdentityGuard challenge {0}. If there is no value for {0}, no challenge is sent.
Table 24: Radius proxy configuration settings (continued)
Property Description
285Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
identityguard.igradius.challengestring.twocardswithpin
This is one of six properties related to the challenge a grid user sees. It takes effect when the user has two cards and a valid PIN.
The format of the string is tailored to this scenario: “Enter a response to the challenge {0} using cards with serial number {1} or {2} or your temporary PIN.”
If not set, it defaults to the value of igradius.challengestring.
identityguard.igradius.challengestring.twocardsnopin
This is one of six properties related to the challenge a grid user sees. It takes effect when the user has two cards and no valid PIN.
The format of the string is tailored to this scenario: “Enter a response to the challenge {0} using cards with serial number {1} or {2}.”
If not set, it defaults to the value of igradius.challengestring.
identityguard.igradius.challengestring.onecardwithpin
This is one of six properties related to the challenge a grid user sees. It takes effect when the user has one card and a valid PIN.
The format of the string is tailored to this scenario: “Enter a response to the challenge {0} using a card with serial number {1} or your temporary PIN.”
If not set, it defaults to the value of igradius.challengestring.
identityguard.igradius.challengestring.onecardnopin
This is one of six properties related to the challenge a grid user sees. It takes effect when the user has one card but no valid PIN.
The format of the string is tailored to this scenario: “Enter a response to the challenge {0} using a card with serial number {1}.”
If not set, it defaults to the value of igradius.challengestring.
Table 24: Radius proxy configuration settings (continued)
Property Description
286 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
identityguard.igradius.challengestring.nocardwithpin
This is one of six properties related to the challenge a grid user sees. It takes effect when the user has no cards but has a valid PIN.
The format of the string is tailored to this scenario: “Enter a response to the challenge {0} using your temporary PIN.”
If not set, it defaults to the value of igradius.challengestring.
identityguard.igradius.tokenchallengestring This property sets the contents of the default Radius proxy challenge message for token authentication.
Note: This is one of eight properties related to the challenge a token user may see. At the very least, this property should be set as a default. Some or all of the properties may be set to provide greater control over the challenges that apply to token users.
The content consists of a string and one or two placeholders. The placeholders are:
{0} = the serial number of the first token
{1} = the serial number of the second token.
The placeholders are filled in when the message appears. For example, this setting
Enter the response to the token with serial number {0}.
would result in a message like this:
Enter the response to the token with serial number 92776.
Users never have more than two valid tokens: the current token and the pending token. A user may have a temporary PIN and no token, or a temporary PIN with one or two tokens.
If there is no challenge specified, this property defaults to: Enter the response from your Entrust IdentityGuard token.
Table 24: Radius proxy configuration settings (continued)
Property Description
287Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
identityguard.igradius.tokenchallengestring.twotokenswithpin
This is one of eight properties related to the challenge a token user sees. It takes effect when the user has two tokens and a valid temporary PIN.
The format of the string is tailored to this scenario: “Enter the response to the token with serial number {0} or {1} or your temporary PIN.”
If not set, it defaults to the value of igradius.tokenchallengestring.
identityguard.igradius.tokenchallengestring.twotokensnopin
This is one of six properties related to the challenge a token user sees. It takes effect when the user has two tokens and no valid temporary PIN.
The format of the string is tailored to this scenario: “Enter the response to the token with serial number {0} or {1}.”
If not set, it defaults to the value of igradius.tokenchallengestring.
identityguard.igradius.tokenchallengestring.onetokenswithpin
This is one of eight properties related to the challenge a token user sees. It takes effect when the user has one token and a valid temporary PIN.
The format of the string is tailored to this scenario: “Enter the response to the token with serial number {0} or your temporary PIN.”
If not set, it defaults to the value of igradius.tokenchallengestring.
identityguard.igradius.tokenchallengestring.onetokennopin
This is one of eight properties related to the challenge a token user sees. It takes effect when the user has one token and no valid temporary PIN.
The format of the string is tailored to this scenario: “Enter the response to the token with serial number {0}.”
If not set, it defaults to the value of igradius.tokenchallengestring.
Table 24: Radius proxy configuration settings (continued)
Property Description
288 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
identityguard.igradius.tokenchallengestring.notokenswithpin
This is one of eight properties related to the challenge a token user sees. It takes effect when the user has no token but has a valid temporary PIN.
The format of the string is tailored to this scenario: “Enter your temporary PIN.”
If not set, it defaults to the value of igradius.tokenchallengestring.
identityguard.igradius.tokenchallengestring.onetokenrequirespinupdate
This is one of eight properties related to the challenge a token user sees and applies only to tokens that support token PINs. Not needed for Entrust tokens.
Add this property if you want to alert the user that the static token PIN for a token needs an update. It takes effect when the user has just one token. The message is appended to the token challenge string message.
The format of the string is tailored to this scenario: “The static PIN for the token with serial number {0} needs to be updated.”
identityguard.igradius.tokenchallengestring.twotokensrequirespinupdate
This is one of eight properties related to the challenge a token user sees and applies only to tokens that support token PINs. Not needed for Entrust tokens.
Add this property if you want to alert the user that the static token PINs for the current and pending token need an update. The message is appended to the token challenge string message.
The format of the string is tailored to this scenario: “The static PINs for the tokens with serial number {0} and {1} need to be updated.”
Table 24: Radius proxy configuration settings (continued)
Property Description
289Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
identityguard.igradius.skipauth.noexist Specifies how to deal with users who do not exist in Entrust IdentityGuard.
If set to true, the user can log in without being prompted for Entrust IdentityGuard authentication.
If set to false, the user login attempt generates an error.
If not specified, it defaults to false.
identityguard.igradius.skipauth.noactive Sets how to deal with users who exist in Entrust IdentityGuard but who do not have an active card or a temporary PIN.
If set to true, the user can log in without being prompted for Entrust IdentityGuard authentication.
If set to false, the user login attempt generates an error.
If not specified, it defaults to false.
identityguard.igradius.msglog.enabled If set to true, Radius messages are logged to the file specified by the property identityguard.igradius.msglog.file (described below). Default is false.
identityguard.igradius.msglog.file Provides the name of the file that logs Radius messages. If the property does not provide an absolute path name, the file is created in: $IDENTITYGUARD_HOME/logs or <IG_INSTALL_DIR>\identityguard81\logs
If you enable logging on the property identityguard.igradius.msglog.enabled (described above) but this property is not set or is not a valid file name, it generates errors and sends them to the system log.
identityguard.igradius.vpnrequests Provides the size of the VPN state table, that is, the number of outstanding requests from the VPN.
If not specified, it defaults to 1000.
Table 24: Radius proxy configuration settings (continued)
Property Description
290 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
identityguard.igradius.vpnrequiremsgauth If this property is set to true, incoming messages from the VPN server must include the Message-Authenticator attribute. If the attribute is not found, the message is ignored.
If not specified, it defaults to false.
identityguard.igradius.vpntimeout Provides the number of seconds that the Radius proxy will wait for a response from the VPN server.
If not specified, it defaults to 180 seconds.
identityguard.igradius.radiustimeout Provides the number of seconds that the Radius proxy will wait for a response from the Radius server.
If not specified, it defaults to 10 seconds.
identityguard.igradius.radiusrequiremsgauth If this property is set to true, incoming messages from the Radius server must include the Message-Authenticator attribute. If the attribute is not found, the message is ignored.
If not specified, it defaults to false.
identityguard.igradius.vpnincludemsgauth This determines if outgoing messages to the VPN server include the Message-Authenticator attribute. Set this to false if the VPN server does not understand the attribute and rejects messages as a result.
If not specified, it defaults to true.
identityguard.igradius.radiusincludesmsgauth This determines if outgoing messages to the Radius server include the Message-Authenticator attribute. Set this to false if the Radius server does not understand the attribute and rejects messages as a result.
If not specified, it defaults to true.
identityguard.igradius.radius.{0}.address This is the Radius server address. It is set when you configure the Radius server. The {0} placeholder is replaced by the Radius server name.
Table 24: Radius proxy configuration settings (continued)
Property Description
291Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
identityguard.igradius.radius.{0}.secret This is the Radius server secret set when you configure the Radius server. The value is usually encrypted. The {0} placeholder is replaced by the Radius server name.
identityguard.igradius.vpn.{0}.charset This specifies the character set used to decode user names sent by the VPN server and encode messages sent back to the server. Allowed values are UTF-8 and ISO-8859-1.
If not specified, the Radius proxy expects UTF-8. The character set is only a concern when extended characters are part of the names. The {0} placeholder is replaced by the VPN server label.
identityguard.igradius.vpn.{0}.group This optional setting specifies the group the VPN server is associated with. The {0} placeholder is replaced by the VPN server label.
For information on using this and other VPN property options, see “Configuring the Radius proxy for groups” on page 175.
identityguard.igradius.vpn.{0}.host This is the host of the VPN server set when you configure the Radius server. The {0} placeholder is replaced by the VPN server label.
identityguard.igradius.vpn.{0}.igport This optional setting specifies the port the VPN server is associated with. The {0} placeholder is replaced by the VPN server label.
identityguard.igradius.vpn.{0}.processbackslash Converts group and user name pairs in the form “group\name” coming through the Radius proxy into the form “group/name.”
identityguard.igradius.vpn.{0}.processat Converts group and user name pairs in the form “name@group” coming through the Radius proxy into the form “group/name.”
identityguard.igradius.vpn.{0}.radius This specifies the Radius server associated with the VPN server. The {0} placeholder is replaced by the VPN server label.
identityguard.igradius.vpn.{0}.secret This is the VPN server secret set when you configure the Radius server. The value is usually encrypted. The {0} placeholder is replaced by the VPN server label.
Table 24: Radius proxy configuration settings (continued)
Property Description
292 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
identityguard.igradius.vpn.{0}.useradius This stores the results of the prompt for the type of first-factor authentication resource to use. When set to true, Radius is used. When set to false, an external authentication resource is used. The {0} placeholder is replaced by the VPN server label.
If not specified, it defaults to true.
Table 24: Radius proxy configuration settings (continued)
Property Description
293Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
Configuring external authentication properties
You can configure the Entrust IdentityGuard Radius proxy component to use an external authentication resource (Windows domain controller or an LDAP directory) for first-factor authentication instead of a Radius server. See “Using the Radius proxy with a domain controller or LDAP directory” on page 187. As part of that operation, you must enter and set properties in the identityguard.properties file, as described in the following table.
Table 25: Radius proxy configuration settings for external authentication
Property Description
identityguard.externalauth.impl
identityguard.externalauth.impl.<group>
This setting refers to the name of the Entrust IdentityGuard Java class used for external authentication. There are separate classes for a Windows domain controller and an LDAP directory.
When specified without a group name, it creates the global or default setting for users.
When specified with an Entrust IdentityGuard group name, it sets the authentication resource to use for members of that group. This way, you can direct different groups to different authentication resources.
If all entries for this property include a group name (that is, there is no entry without a group), this means there is no default and only the users in the specified groups can use external authentication.
identityguard.igradius.vpn.{0}.useradius This stores the results of the prompt for the type of first-factor authentication resource to use. When set to true, Radius is used. When set to false, an external authentication resource is used.
If not specified, it defaults to true.
294 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
identityguard.externalauth.kerberos.realm
identityguard.externalauth.kerberos.realm.<group>
If you are using a domain controller, specify the server acting as the Kerberos realm. Give the DNS name in uppercase.
When specified without a group name, it creates the global or default setting for users.
When specified with an Entrust IdentityGuard group name, it sets the realm to use for members of that group.
Note: When you specify this property, you also need to include the server information for the KDC server in igkrb5.conf file located:
• on UNIX, in $IDENTITYGUARD_HOME/etc/
• on Windows, in <IG_INSTALL_DIR>\etc\
For more information, see “Configuring Entrust IdentityGuard for external authentication” on page 202.
identityguard.externalauth.kerberos.kdc
identityguard.externalauth.kerberos.kdc.<group>
Obsolete.
Table 25: Radius proxy configuration settings for external authentication (continued)
Property Description
295Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
Configuring token propertiesEntrust IdentityGuard supports Entrust tokens and some third-party tokenstokens. For details on which tokens are supported, refer the Entrust TrustedCare Online Web site.
Note: Entrust IdentityGuard does not support ActivIdentity tokens.
Table 26: Token properties
Property Description
identityguard.token.impl Refers to the class name of the token library. For Entrust tokens, the property either does not exist or is blank. For Entrust tokens, there is an implied default of: com.entrust.identityGuard.common.token.activIdentity.ActiveIdentityTokenManager
For other token vendors, add this property and set it to the applicable class name.
identityguard.token.configfile Names the token configuration file, if used. Choose a name, such as token.conf, and place it:
• on UNIX, in $IDENTITYGUARD_HOME/etc/
• on Windows, in <IG_INSTALL_DIR>\etc\
296 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Configuring the Administration interface properties for bulk operations
It may take the Administration interface a significant period of time to process large bulk files, and processing may consume significant amounts of memory. Entrust IdentityGuard provides properties to manage resources used for bulk operations.
Table 27: Administration interface settings for bulk operations
Property Description
identityguard.webadmin.bulk.maxFileSize Limits the size of files imported for bulk operations. Enter a value in bytes. The default is 50 MB (52428800 bytes). If you attempt to load a bulk file that exceeds the set limit, the Administration interface cancels the operation and displays an error message.
identityguard.webadmin.bulk.inMemoryThreshold
Sets the maximum amount of memory used for bulk operations. Entrust IdentityGuard writes large bulk files to disk and caches them when they exceed the set size. Enter a value in bytes. The default is 1 MB (1048576 bytes).
identityguard.webadmin.url Contains the URL of the Administration interface. It is set during installation configuration.
297Configuring the Entrust IdentityGuard Server properties fileFeedback on guide
Configuring the Administration interface to control the output format
Entrust IdentityGuard provides properties to manage the output of export operations.
Table 28: Administration interface settings for export operations
Property Description
identityguard.export.csv By default, files exported through the Administration interface are in XML format. Set this to true to have all files exported in comma-separated-value (CSV) format. The default is false.
identityguard.export.dir This setting defines the directory on the Entrust IdentityGuard server to which the export files are written. The default setting is $IDENTITYGUARD_HOME/export.
298 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
299
Appendix B
Upgrading Entrust IdentityGuard Server on Linux
You can upgrade Entrust IdentityGuard Server on Linux from a previous installation of Entrust IdentityGuard version 7.2 or 8.0 installed on Linux.
Attention: To install an upgrade or patch, you must use the same account used to originally install Entrust IdentityGuard.
Note: When upgrading Entrust IdentityGuard Server from version 7.2, all existing administrators are assigned to the new default role and group in Entrust IdentityGuard 8.1. There were no roles or groups in 7.2.
Topics in this appendix:
• “Upgrading Entrust IdentityGuard Server 7.2 to 8.1” on page 299
• “Upgrading Entrust IdentityGuard Server from 8.0 to 8.1” on page 302
Upgrading Entrust IdentityGuard Server 7.2 to 8.1Complete the following steps to upgrade to Entrust IdentityGuard 8.1 directly from version 7.2.
To upgrade Entrust IdentityGuard Server 7.2 to 8.11 Update your LDIF or SQL schema to apply to Entrust IdentityGuard 8.1. Refer to
the specific schema configuration instructions for your directory or database in
300 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
either the Entrust IdentityGuard Directory Configuration Guide or the Entrust IdentityGuard Database Configuration Guide.
2 Download the Entrust IdentityGuard 8.1 software. To do so, complete the steps in “Downloading Entrust IdentityGuard software” on page 21.
3 Follow the instructions under“Installing Entrust IdentityGuard Server” on page 33.
4 The Entrust IdentityGuard installation detects version 7.2 and displays the following prompt:
Entrust IdentityGuard 7.2 is installed.
Do you wish to install Entrust IdentityGuard 8.1 and upgrade the
7.2 data? [yes or no]
Enter yes to continue with the upgrade. You are prompted to manually back up your configuration settings.
5 Manually back up your configuration settings if the master key file is not in the default location (default location, $IDENTITYGUARD_HOME/etc/masterkeys.enc).
When you upgrade Entrust IdentityGuard, a copy of the existing configuration is made (so you can restore it later in this installation procedure) only if this file is in the default location.
Attention: If you want to override the default configuration, do not store the configuration settings under $IDENTITYGUARD_HOME. During an upgrade, this directory is deleted and reinstalled.
6 The Java Runtime Environment is upgraded and you can reinstall the Application server.
Installing Java Runtime Environment...
Installing j2re-1_4_2_09-linux-i586.bin...
Installing Tomcat...
Tomcat has already been installed.
Do you wish to reinstall it? [yes or no]
7 The installation creates the Entrust IdentityGuard service and the Entrust IdentityGuard Radius service:
Creating igradius service...
8 The following prompt appears:
Do you want the Entrust IdentityGuard Radius proxy to start
automatically when the host starts after reboot? [yes or no]
301Upgrading Entrust IdentityGuard Server on LinuxFeedback on guide
If you answer no, you can enable automatic startup later.
If you wish to enable automatic startup in the future, run the
command "igsvcconfig.sh igradius reset" when logged on as root.
9 When the installation is complete, Entrust IdentityGuard prompts you to restore your existing configuration data.
Configuration data from the existing installation has been backed
up. If you wish, you can configure a new server or restore the
existing configuration data. If you don't restore the existing
configuration data, all existing data will be removed.
Do you wish to restore the existing configuration data? [yes or
no]
To retain your Entrust IdentityGuard data, answer yes. This message appears:
Configuration parameters restored.
To configure a new server, answer no. When you answer no, all of your previous configuration data is removed. You must complete the configuration and initialization procedures:
• “Configuring the primary Entrust IdentityGuard Server” on page 36
• “Initializing the primary Entrust IdentityGuard Server” on page 47
After initialization is complete, continue to Step 11 in this procedure.
10 You may be prompted to configure the Entrust IdentityGuard Radius proxy. Continue from Step 4 in “To configure the Radius proxy on UNIX” on page 180.
11 When you are finished, Entrust IdentityGuard displays:
PERFORMING UPGRADE
You are prompted to answer if you are upgrading a replica server:
Are you upgrading an Entrust IdentityGuard master or replica?
(PRIMARY or REPLICA):
To complete the upgrade of the first instance of Entrust IdentityGuard Server, answer PRIMARY. Answer REPLICA to upgrade the rest of your instances of Entrust IdentityGuard Server.
12 You are prompted to log in with your master user name and password to complete the upgrade.
A master user must login to complete the upgrade.
Userid:
Password:
When you have successfully logged in, the following message appears:
302 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Upgrade complete.
Note: If the upgrade fails, ensure that your repository schema was upgraded. After you upgrade the repository schema, you can continue with the Entrust IdentityGuard upgrade by running the master user shell (supersh) command system upgrade.
13 You are prompted to save a backup of your configuration data.
Do you wish to keep the backup copy of configuration data? [yes or
no]
If you answer yes, Entrust IdentityGuard displays the location of the saved configuration data.
Your upgrade is now installed.
You are prompted to set up the sample application. Proceed to “Configuring the sample application on UNIX” on page 51.
Upgrading Entrust IdentityGuard Server from 8.0 to 8.1Complete the following steps to upgrade from version 8.0 to 8.1.
To upgrade Entrust IdentityGuard Server 8.0 to 8.11 Update your LDIF or SQL schema to apply to Entrust IdentityGuard 8.1. Refer to
the specific schema configuration instructions for your directory or database in either the Entrust IdentityGuard Directory Configuration Guide or the Entrust IdentityGuard Database Configuration Guide.
2 Download the Entrust IdentityGuard 8.1 software. To do so, complete the steps in “Downloading Entrust IdentityGuard software” on page 21.
3 Follow the instructions under“Installing Entrust IdentityGuard Server” on page 33.
4 The Entrust IdentityGuard installation detects version 8.0 and displays the following prompt:
Entrust IdentityGuard 8.0 is installed.
Do you wish to install Entrust IdentityGuard 8.1 and upgrade the
8.0 data? [yes or no]
Enter yes to continue with the upgrade.
5 The Entrust IdentityGuard installation detects the Java Runtime Environment and displays the following prompt:
303Upgrading Entrust IdentityGuard Server on LinuxFeedback on guide
Installing Java Runtime Environment...
Java Runtime Environment has already been installed.
Do you wish to reinstall it? [yes or no]
6 The installation detects the Application server and displays the following prompt:
Installing Tomcat...
Tomcat has already been installed.
Do you wish to reinstall in? [yes or no]
7 The installation creates the Entrust IdentityGuard service and the Entrust IdentityGuard Radius service:
Creating igradius service...
8 The following prompt appears:
Do you want the Entrust IdentityGuard Radius proxy to start
automatically when the host starts after reboot? [yes or no]
If you answer no, you can enable automatic startup later (using chkconfig igradius reset, when logged as root).
9 When the installation is complete, Entrust IdentityGuard prompts you to restore your configuration data.
Installation complete.
Configuration data from the existing installation has been backed
up. If you wish, you can configure a new server or restore the
existing configuration data and upgrade it to 8.1. If you don’t
restore the existing configuration data, all existing data will be
removed.
Do you wish to restore the existing configuration data? [yes or
no] yes
10 To retain your Entrust IdentityGuard data, answer yes. This message appears:
Configuration parameters restored.
To configure a new server, answer no. When you answer no, all of your previous configuration data is removed. You must complete the configuration and initialization procedures:
• “Configuring the primary Entrust IdentityGuard Server” on page 36
• “Initializing the primary Entrust IdentityGuard Server” on page 47
After initialization is complete, continue to Step 12 in this procedure.
11 You may be prompted to configure the Entrust IdentityGuard Radius proxy. Continue from Step 4 in “To configure the Radius proxy on UNIX” on page 180.
304 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
12 When you are finished, Entrust IdentityGuard displays:
PERFORMING UPGRADE
You are prompted to answer if you are upgrading a replica server:
Are you upgrading an Entrust IdentityGuard master or replica?
(PRIMARY or REPLICA):
To complete the upgrade of the first instance of Entrust IdentityGuard Server, answer PRIMARY. Answer REPLICA to upgrade the rest of your instances of Entrust IdentityGuard Server.
13 You are prompted to log in with a master user name and password to complete the upgrade. For example, Master1.
A master user must login to complete the upgrade.
Userid:
Password:
When you have successfully logged in, the following message appears:
Upgrade complete.
Note: If the upgrade fails, ensure that your repository schema was upgraded. After you upgrade the repository schema, you can continue with the Entrust IdentityGuard upgrade by running the master user shell (supersh) command system upgrade.
14 You are prompted to save a backup of your configuration data.
Do you wish to keep the backup copy of the configuration data?
[yes or no]
If you answer yes, Entrust IdentityGuard displays the location and the file name of the saved configuration data.
Your upgrade is now installed.
305
Appendix C
Using the sample Web application
This appendix provides administrators with detailed instructions for using the Any Bank sample Web application. Assuming the role of a sample end user, you will register with the Any Bank Web site and perform the following tasks: request a card, activate a card, register a token, and log in using several authentication methods
Attention: This sample Web application simulates a Web site with Entrust IdentityGuard installed. The primary purpose of the application is to demonstrate some of the authentication methods used by Entrust IdentityGuard. The sample Web application is not intended to perform as a fully featured application.
Topics in this appendix:
• “Preparing to use the sample Web application” on page 306
• “Accessing the sample Web application” on page 307
• “Registering as a user” on page 308
• “Activating a card” on page 315
• “Registering a token” on page 317
• “Using machine authentication to log in” on page 321
• “Using generic authentication to log in” on page 325
• “Using step-up authentication” on page 327
• “Using temporary PIN authentication to log in” on page 329
• “Using one-step grid authentication to log in” on page 332
• “Using two-step grid authentication to log in” on page 333
306 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Preparing to use the sample Web application
Review the following information before configuring the sample Web application:
Table 29: Preconfiguration considerations for the Sample Web application
Creating a user group • During installation, the sample Web application creates a user group named “samplegroup.”
• The sample Web application assigns all users to the sample group.
Creating a policy • During installation, the sample Web application creates a policy named “samplepolicy.”
• The sample Web application must use samplepolicy. Modify samplepolicy using the master user shell. For information about modifying policy settings using the master user shell, see the Entrust IdentityGuard Administration Guide.
Loading token data • Load all token data before attempting any token-related operations. For information about loading token data, see the Entrust IdentityGuard Administration Guide.
Loading preproduced card data
• Load all preproduced card data before attempting any card-related operations. For information about loading token data, see the Entrust IdentityGuard Administration Guide.
Locating the sample admin ID and password
• The sample Web application installs with an admin ID and password for the administrator. Use only the admin ID and password.
• Locate the admin ID and password in igsample.properties in <IDENTITYGUARD_INSTALL>\etc\ or <IG_INSTALL_DIR>\identityguard81\etc
Using passwords • The password field and user name field simulate the primary authentication mechanism of the sample bank’s Web site. The password field in the sample Web application is for demonstration purposes only and is nonfunctional.
Modifying authentication-type settings using the master user shell
• To complete the procedures in this appendix, you must modify the samplepolicy’s generic and machine authentication-type settings. For information about modifying policy settings using the master user shell, see the Entrust IdentityGuard Administration Guide.
307Using the sample Web applicationFeedback on guide
Accessing the sample Web applicationConfigure the sample Web application before accessing it. Refer to the following instructions to configure the sample Web application:
• for embedded Tomcat server on UNIX instructions, see “Configuring the sample application on UNIX” on page 51
• for embedded Tomcat server on Windows instructions, see “Configuring the sample application on Microsoft Windows” on page 87
• for existing application server instructions, see “Configuring the sample application on an existing application server” on page 121
Access the configured sample Web application from a Web browser.
To access the sample Web application from a URLEnter one of the following URLs:
https://<FQDN>:<httpsport>/IdentityGuardSampleApp
–or–
http://<FQDN>:<httpport>/IdentityGuardSampleApp
where:
• <FQDN> is the fully qualified domain name for the Entrust IdentityGuard host.
• <httpsport> is the sample application HTTPS port (default 8443, if using the embedded Tomcat server).
• <httpport> is the sample application HTTP port (default 8080, if using the embedded Tomcat server).
For example:
https://igserver.mycompany.com:8443/IdentityGuardSampleApp
http://igserver.mycompany.com:8080/IdentityGuardSampleApp
To access the sample Web application from the Windows start menuClick Start > All Programs > Entrust > IdentityGuard > Sample Application.
The sample Web application opens in your default browser. By default, the interface opens at the User registration Sign in page.
308 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Registering as a user
Note: The sample Web application’s policy, “samplepolicy,” installs with the default settings of GRID QA OTP TOKENRO for both the generic and machine authentication-types. The sample Web application uses only the first authentication-type setting listed for both the generic and machine authentication-types. A master user can modify the default settings in the master user shell. For example, to register a sample end user to authenticate using tokens, the master user must modify the policy setting for generic authentication-type to appear as: TOKENRO GRID QA OTP.
To access the Any Bank Web site, a sample end user must register an account with Entrust IdentityGuard. The end user must register contact information, a personal image, and a personal caption for use in future authentication challenges.
Assuming the role of a sample end user:
• register your account with Any Bank
• have a card or token issued to you
• optionally, configure question-and-answer authentication secrets.
To register as a sample user1 Select User registration from the main page of the interface.
The Sign in page appears.
309Using the sample Web applicationFeedback on guide
2 Enter a user name and password.
3 Click Continue.
The Entrust IdentityGuard user creation page appears displaying your user name.
4 Optionally, enter a valid email address and phone number.
Note: The administrator or application uses this information to deliver a one-time password (OTP) to the end user. In a real-life scenario, a valid email address must be entered if the policy setting for generic type is set to OTP and email is used to deliver the OTP.
5 Click Continue.
The Entrust IdentityGuard image selection page appears.
310 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
6 Click Continue to select an image.
Optionally, click here to choose another image from the Entrust IdentityGuard image library or to upload an image.
The Entrust IdentityGuard image caption page appears.
The previous two pages demonstrate two types of organization authentication: image and message replay authentication. For more information on image and message replay authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.
7 Enter a caption for the image. For example, “hammer.”
Entrust IdentityGuard displays your image and caption at login.
8 Optionally, click Change to select a different image or upload an image.
9 Click Continue.
• If the policy setting for the generic authorization-type is set to GRID, go to “To register with GRID as the policy setting”
• If the policy setting for the generic authorization-type is set to QA, go to “To register with QA as the policy setting”
• If the policy setting for the generic authorization-type is set to OTP, go to“To register with OTP as the policy setting”
• If the policy setting for the generic authorization-type is set to TOKENRO, go to “To register with TOKENRO as the policy setting”
311Using the sample Web applicationFeedback on guide
To register with GRID as the policy setting
Note: The following procedure has generic authentication-type set to GRID in the samplepolicy. The setting appears as: GRID QA OTP TOKENRO.
1 The Entrust IdentityGuard card creation page appears.
This page allows the end user to request a card. Entrust IdentityGuard provides two models for card production—produce-and-assign and preproduction cards. For more information about card and grid production models, see the Entrust IdentityGuard Deployment Guide.
2 Click Request a card to make Entrust IdentityGuard create the grid for a produced-and-assign card. You can view this grid using the Administration interface or the master user shell.
You must activate the card before using the card to authenticate to Entrust IdentityGuard. For more information about card activation, see “Activating a card” on page 315.
A page appears stating that your user account was successfully registered.
3 Click I already have a card if you possess a preproduced card.
You must activate the card before using the card to authenticate to Entrust IdentityGuard. For more information about card activation, see “Activating a card” on page 315.
A page appears stating that your user account was successfully registered.
To register with QA as the policy setting
Note: The following procedure has generic authentication-type set to question and answer in the samplepolicy. The setting appears as: QA OTP TOKENRO GRID.
312 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
1 The Entrust IdentityGuard Questions page appears.
The user can create authentication secrets from a list of predefined questions. The sample Web application installs with six predefined questions; however, Entrust IdentityGuard allows organizations to select a number of authentication secrets for each user and to prompt for all answers or a subset of the answers.
For more information about knowledge-based authentication and creating good questions, see the Entrust IdentityGuard Deployment Guide.
2 Select a different question from each drop-down list. For example, “What was the name of your high school?”
3 Enter an answer to each question.
4 Click Continue.
A page appears stating that your user account was successfully registered.
313Using the sample Web applicationFeedback on guide
To register with OTP as the policy setting
Note: The following procedure has generic authentication-type set to question and answer in the samplepolicy. The setting appears as: OTP TOKENRO GRID QA.
A page appears stating that your user account has been successfully registered.
OTP authentication-type does not require any additional user set up or activation.
To register with TOKENRO as the policy setting
Note: The following procedure has generic authentication-type set to token in the samplepolicy. The setting appears as: TOKENRO GRID QA OTP.
The Entrust IdentityGuard token registration page appears.
The user can proceed with token registration or defer token registration. You can configure the policy for the sample Web application to support token PINs or to not support token PINs.
314 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
• For more information on token registration without token PIN support enabled, see “To register a token” on page 317.
• For more information on token registration with token PIN support enabled, see “To register a token with token PIN support enabled” on page 319.
315Using the sample Web applicationFeedback on guide
Activating a cardA sample end user of the Any Bank Web site must activate a card before accessing a bank account. When a sample end user requests a card, it is assigned to the end user in a hold-pending state.
Do not use a card in the hold-pending state to authenticate to Entrust IdentityGuard. An administrator must activate a card by changing the state of the card to current or pending. The end user can then use the card to authenticate to Entrust IdentityGuard.
Assuming the role of a sample end user, use the sample Web application to activate your card and access your Any Bank account.
Note: If required, use the Administration interface or the master user shell to access the grid information for a card.
To activate a user card1 Select Card activation from the main menu of the interface.
The Sign in page appears.
2 Enter your user name and password.
3 Click Continue to begin the card activation process.
316 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
The Entrust IdentityGuard card activation page appears.
4 Enter the serial number of either your preproduced or produced-and-assign card.
Optionally, click Request a card to have a produced-and-assign card deployed to you. For more information, see “To register as a sample user” on page 308.
5 Click Activate.
Another Entrust IdentityGuard card activation page appears displaying the serial number.
6 Enter the specified grid coordinates.
Grid authentication is a second-factor authentication method that challenges the end user to enter a set of grid coordinates on a printed card. For more information on grid authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.
7 Click Continue.
A message appears stating that your card has been activated.
317Using the sample Web applicationFeedback on guide
Registering a token
Attention: Before you can register a token, load the token data and assign the token data to the group, “samplegroup.” For more information on loading token data, see “Preparing to use the sample Web application” on page 306.
Note: The following procedure has generic authentication-type set to token in the samplepolicy. The setting appears as TOKENRO GRID QA OTP.
A sample end user of the Any Bank Web site may log in using token authentication, a second-factor authentication method that challenges a sample end user to respond using a token-generated dynamic password.
Entrust IdentityGuard can be configured to issue challenges requiring end users to respond using a dynamic password or to respond using a token PIN in conjunction with a dynamic password.
For more information about configuring token authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.
Assuming the role of a sample end user, register a token for use in future authentication requests to Entrust IdentityGuard.
• For tokens that do not support token PINs, see “To register a token” on page 317.
• For tokens that support token PINs, see “To register a token with token PIN support enabled” on page 319.
To register a token1 Select Token registration from the main menu of the interface.
318 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
The Sign in page appears.
2 Enter your user name and password.
3 Click Continue to begin the token registration process.
The Entrust IdentityGuard token registration page appears.
4 Enter the token serial number.
5 Click Register.
A token is assigned to a sample end user in a hold-pending state.
319Using the sample Web applicationFeedback on guide
The Entrust IdentityGuard token registration page appears.
6 Enter the token-generated dynamic password as the response.
7 Click Continue.
A message appears stating that your token has been successfully registered.
To register a token with token PIN support enabledThe Entrust IdentityGuard token registration page appears.
1 Enter the token serial number.
2 Click Register.
A token is assigned to a sample end user in a hold-pending state.
320 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
The Entrust IdentityGuard token registration page appears.
3 Choose and confirm a token PIN between four and eight digits in length.
For example, your token PIN could be 1234. This token PIN is used in combination with a dynamic password for future authentication challenges.
4 Click Continue.
The Entrust IdentityGuard token registration page appears requesting the input of a token response.
5 Enter the token PIN and the token-generated dynamic password.
For example, if the token PIN value is 1234, and the token-generated string is 567890, enter 1234567890 as the authentication challenge response.
6 Click Continue.
A message appears stating that your token has been successfully registered.
321Using the sample Web applicationFeedback on guide
Using machine authentication to log in
Note: The following procedure has machine authentication-type set to token in the samplepolicy. The setting appears as: TOKENRO GRID QA OTP.
A sample end user of the Any Bank Web site may log in using machine authentication. However, you can also use machine authentication with the other authentication methods. This method of second-factor authentication associates a sample end user with a particular computer through the use of a machine secret.
For more information on machine authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.
Assuming the role of a sample end user, use the sample Web application to establish machine authentication using the machine secrets gathered during Entrust IdentityGuard machine registration. Once machine authentication is established, second-factor authentication becomes transparent to the end user.
To establish machine authentication1 Select User sign in from the main page of the interface.
2 Enter your user name.
3 Be sure to check Remember me on this machine.
This initiates machine authentication.
4 Click Continue.
322 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
The Entrust IdentityGuard Machine registration page appears displaying the serial number of your token.
This page demonstrates a type of machine authentication that uses a token password and token PIN as the default method of authentication. The end user must enter a token PIN and a dynamic password in response to the authentication challenge.
If the primary method of authentication was grid, this page would display a grid authentication challenge.
For more information on machine authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.
5 Enter the token PIN and the dynamic password.
For example, if the token PIN value is 1234, and the dynamic password is 567890, you must enter 1234567890 as the authentication challenge response.
6 Click Continue.
323Using the sample Web applicationFeedback on guide
The Entrust IdentityGuard Application authentication page appears displaying your image and caption.
This page demonstrates image and message replay authentication, a method of organization authentication.
For more information on image and message replay authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.
7 Enter your password.
8 Click Login.
Your sample bank account page appears. You have established machine authentication. Future log in attempts will not require you to authenticate to Entrust IdentityGuard.
To log in with established machine authentication1 From a new browser window, select User sign in from the main page of the
interface.
324 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
The Sign in page appears displaying your user name.
2 Be sure to check Remember me on this machine.
3 Click Continue.
The Entrust IdentityGuard Application authentication page appears.
The sample Web application checked that your machine is registered with the Entrust IdentityGuard server. No authentication challenge was issued because your machine was identified as a registered machine.
4 Enter your password.
5 Click Login.
Your sample bank account page appears. Once machine authentication is established, second-factor authentication is transparent to the end user associated with a particular computer.
325Using the sample Web applicationFeedback on guide
Using generic authentication to log in
Note: The following procedure has generic authentication-type set to question and answer in the samplepolicy. The setting appears as: QA OTP TOKENRO GRID.
A registered end user can log in to the Any Bank Web site using generic authentication. For more information on generic authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.
Assuming the role of a sample end user, use generic authentication to log in to your bank account.
To log in using generic authentication1 Select User sign in from the main page of the interface.
2 Enter your user name.
3 Be sure to disable Remember me on this machine.
Uncheck the box to initialize the generic authentication challenge and remove any machine secrets.
4 Click Continue.
326 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
The Entrust IdentityGuard second-factor authentication page appears.
Entrust IdentityGuard randomly selects a series of questions.
5 Enter your predefined answers.
6 Click Continue.
Your sample bank account page appears.
327Using the sample Web applicationFeedback on guide
Using step-up authentication
Note: This procedure uses one-time password authentication as the setting for generic authentication-type. The policy setting appears as: OTP TOKENRO GRID QA.
For situations requiring an additional level of security, Entrust IdentityGuard provides second-factor authentication of transactions initiated by an authenticated end user of the Any Bank Web site.
Assuming the role of a sample end user, use step-up authentication to transfer funds from your bank account to another bank account.
To use step-up authentication1 Follow the procedure “To log in with established machine authentication” to
access your sample bank account page.
2 Click Transfer funds.
328 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
The Entrust IdentityGuard second-factor authentication page appears.
3 Enter your one-time password.
Note: The one-time password can be viewed using the Administration interface.
4 Click Continue.
The Transfer Funds page appears.
5 Enter the amount to be transferred and the account numbers.
6 Click Transfer.
A page appears stating that the funds were transferred successfully.
329Using the sample Web applicationFeedback on guide
Using temporary PIN authentication to log in
Note: Temporary PINs are only available for grid or token authentication. The following procedure has generic authentication-type set to GRID in the samplepolicy. The setting appears as: GRID QA OTP TOKENRO.
In certain situations, a sample end user of the Any Bank Web site may not have a card or token. An administrator can issue a temporary PIN, either for a specific number of uses or a limited period of time. Examples of this situation include lost cards or tokens, or a newly registered end user awaiting arrival of a card or token.
For more information about temporary PINs, see the Entrust IdentityGuard Deployment Guide.
Assuming the role of a sample end user, use the sample Web application to access your Any Bank account using a temporary PIN.
As an administrator, use the Administration interface to issue a temporary PIN. Temporary PINs are issued with limits on the number of uses and expiry dates to limit exposure to attacks.
To use temporary PINs1 Select User sign in from the main page of the interface.
2 Enter your user name.
3 Be sure to disable Remember me on this machine.
330 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Uncheck the box to initialize the generic authentication challenge and remove any machine secrets.
4 Click Continue.
The Entrust IdentityGuard second-factor authentication page appears.
5 Use the Administration interface to issue yourself a temporary PIN.
6 Click Having problems or lost your Entrust IdentityGuard Card?
Another Entrust IdentityGuard second-factor authentication page appears.
7 Enter the temporary PIN issued to you by email or get the PIN from the Administration interface or the master user shell.
In this example, a sample end user can call a customer support number and have a temporary PIN issued to them. The telephone number on this second-factor authentication page is for demonstration purposes only.
331Using the sample Web applicationFeedback on guide
8 Click Continue.
Your sample bank account page appears.
332 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Using one-step grid authentication to log in
A sample end user of the Any Bank Web site may log in using one-step grid authentication. This authentication method presents first-factor and second-factor authentication challenges to the end user at the same time. For more information on one-step grid authentication, see the Entrust IdentityGuard Deployment Guide.
Assuming the role of a sample end user, use the sample Web application to log in using one-step grid authentication.
To log in using one-step grid authentication1 Select One-step grid login from the main menu of the interface.
The One-step grid authentication page appears.
2 Enter your user name, password, and the specified grid coordinates.
This step demonstrates grid authentication. For more information on grid authentication, see the Entrust IdentityGuard Administration Guide.
3 Click Login.
Your sample bank account page appears.
333Using the sample Web applicationFeedback on guide
Using two-step grid authentication to log in
A sample end user of the Any Bank Web site may log in using two-step grid authentication. This method of authentication presents first-factor and second-factor authentication challenges to the end user consecutively. The end user is authenticated and verified using the first-factor authentication method before being challenged with second-factor authentication.
For more information on two-step grid authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.
Assuming the role of a sample end user, use the sample Web application to log in using two-step grid authentication.
To log in using two-step grid authentication1 Select Two-step grid sign in from the main page of the interface.
The Sign in page appears.
2 Enter your user name and password.
3 Click Continue.
334 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
The Entrust IdentityGuard second-factor authentication page appears displaying the serial number on your card.
This page demonstrates a type of organization authentication called serial number replay authentication. For more information on serial number replay authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.
4 Enter the specified grid coordinates.
This step demonstrates grid authentication. For more information on grid authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.
5 Click Continue.
Your sample bank account page appears.
335
Appendix D
Uninstalling Entrust IdentityGuard Server
This chapter provides instructions for uninstalling Entrust IdentityGuard Server from your system.
Topics in this section:
• “Uninstalling Entrust IdentityGuard Server with embedded Tomcat on UNIX” on page 336
• “Uninstalling Entrust IdentityGuard Server on Microsoft Windows” on page 337
• “Uninstalling Entrust IdentityGuard Server with an existing application server” on page 338
336 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Uninstalling Entrust IdentityGuard Server with embedded Tomcat on UNIX
Entrust IdentityGuard Server does not include an uninstall script. You will need to perform the following procedure to uninstall Entrust IdentityGuard.
Uninstalling the server also uninstalls the Radius proxy component, if configured.
To uninstall Entrust IdentityGuard on UNIX1 Stop the Entrust IdentityGuard service using the instructions in the topic
“Managing the Entrust IdentityGuard service” on page 62.
2 Optionally, as the application owner, back up the identityguard.properties file and the masterkeys.enc file (but not the masterkeys.kpf).
3 As root:
a In $IDENTITYGUARD_HOME/bin enter:
./igsvcconfig.sh igradius uninstall
b Still in $IDENTITYGUARD_HOME/bin enter:
./igsvcconfig.sh identityguard uninstall
4 Optionally, remove the Entrust IdentityGuard data from the repository.
• For a database, use the IG_81/sql/drop_v81_schema.sql file in the .tar install package (either IG_81_Linux.tar or the IG_81_Solaris.tar), to remove all Entrust IdentityGuard tables.
• For a directory, you will need to remove this data manually.
337Uninstalling Entrust IdentityGuard ServerFeedback on guide
Uninstalling Entrust IdentityGuard Server on Microsoft Windows
Complete the following procedure to uninstall the Entrust IdentityGuard Server on Microsoft Windows.
Uninstalling the server also uninstalls the Radius proxy component, if configured.
To uninstall Entrust IdentityGuard Server on Microsoft Windows1 Go to Add or Remove Programs located in your system’s Control Panel.
2 Select Entrust IdentityGuard Server 8.1 and click Remove.
3 Optionally, remove the Entrust IdentityGuard data from the repository on the repository server.
• For a database, use the IG_81/sql/drop_v81_schema.sql file in the .tar installation package to remove all Entrust IdentityGuard tables.
• For a directory, you will need to remove this data manually.
Note: During the Windows uninstall process, Entrust IdentityGuard attempts to create a backup of your Entrust IdentityGuard configuration. If successful, it displays a message listing the location of the backup file. Click OK to continue the uninstall. This occurs only if Entrust IdentityGuard was correctly configured and initialized.
338 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
Uninstalling Entrust IdentityGuard Server with an existing application server
Entrust IdentityGuard Server does not include an uninstall script. You will need to perform the following procedure to uninstall Entrust IdentityGuard.
Uninstalling the server also uninstalls the Radius proxy component, if configured.
Topics in this section:
• “Uninstalling Entrust IdentityGuard on WebLogic 8.1” on page 338
• “Uninstalling Entrust IdentityGuard on WebLogic 9.1” on page 340
• “Uninstalling Entrust IdentityGuard on WebSphere 6.0” on page 342
Uninstalling Entrust IdentityGuard on WebLogic 8.1To uninstall Entrust IdentityGuard on WebLogic 8.1 you must:
• Stop the Entrust IdentityGuard services.
• Delete the Entrust IdentityGuard services.
• Delete the Entrust IdentityGuard files.
To uninstall Entrust IdentityGuard on WebLogic 8.11 Stop the Entrust IdentityGuard services (see “Stopping Entrust IdentityGuard
Services on WebLogic 8.1” on page 167).
2 Delete the Entrust IdentityGuard services:
a From the WebLogic 8.1 main page, select Deployments > Web Application Modules.
The Deploy a Web Application Module page appears showing a list of all deployed Web applications.
339Uninstalling Entrust IdentityGuard ServerFeedback on guide
b Click the trash can to the right of the Entrust IdentityGuard service.
A warning page appears prompting you to confirm that you want to delete the Entrust IdentityGuard service.
c Click Yes.
A message appears confirming that the Entrust IdentityGuard service has been deleted.
d Click Continue.
You are returned to the page listing deployed applications.
e Repeat Step b to Step d to delete the remaining Entrust IdentityGuard services.
340 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
3 Optionally, as the application owner, back up the identityguard.properties file and the masterkeys.enc file (but not the masterkeys.kpf).
4 As root:
a in $IDENTITYGUARD_HOME/bin enter:
./igsvcconfig.sh igradius uninstall
b Delete the installation directory (by default /opt/entrust) by entering:
rm -f -r /opt/entrust
5 Optionally, remove the Entrust IdentityGuard data from the repository.
• For a database, use the IG_81/sql/drop_v81_schema.sql file in the .tar installation package to remove all Entrust IdentityGuard tables.
• For a directory, you will need to remove this data manually.
Uninstalling Entrust IdentityGuard on WebLogic 9.1To uninstall Entrust IdentityGuard on WebLogic 9.1 you must:
• Stop the Entrust IdentityGuard services.
• Delete the Entrust IdentityGuard services.
• Delete the Entrust IdentityGuard files.
To uninstall Entrust IdentityGuard on WebLogic 9.11 Stop the Entrust IdentityGuard services (see “Stopping Entrust IdentityGuard
Services on WebLogic 9.1” on page 168).
2 Delete the Entrust IdentityGuard services:
a Under Change Center on the WebLogic main page click Lock & Edit.
b Under Domain Structure on the left of the main page click Deployments.
The Deployment Summary Page appears with a list of Entrust IdentityGuard services.
341Uninstalling Entrust IdentityGuard ServerFeedback on guide
c Select the check box for the Entrust IdentityGuard Services.
d Click Delete.
The Delete Application Assistant page appears.
e Click Yes to delete the application(s).
You are returned to the Summary of Deployments page.
f Under Change Center on the WebLogic main page click Activate Changes.
342 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
3 Optionally, as the application owner, back up the identityguard.properties file and the masterkeys.enc file (but not the masterkeys.kpf).
4 As root:
a In $IDENTITYGUARD_HOME/bin enter:
./igsvcconfig.sh igradius uninstall
b Delete the installation directory (by default /opt/entrust) by entering:
rm -f -r /opt/entrust
5 Optionally, remove the Entrust IdentityGuard data from the repository.
• For a database, use the IG_81/sql/drop_v81_schema.sql file in the .tar installation package to remove all Entrust IdentityGuard tables.
• For a directory, you will need to remove this data manually.
Uninstalling Entrust IdentityGuard on WebSphere 6.0To uninstall Entrust IdentityGuard on WebLogic 8.1 you must:
• Stop the Entrust IdentityGuard services
• Delete the Entrust IdentityGuard services
• Delete the Entrust IdentityGuard files
To uninstall Entrust IdentityGuard on WebSphere 6.01 Stop the Entrust IdentityGuard services (see “Stopping Entrust IdentityGuard
Services on WebSphere 6.0” on page 169).
2 Delete the Entrust IdentityGuard services:
a From the WebSphere main menu click Applications > Enterprise Applications.
The Enterprise Applications page appears.
343Uninstalling Entrust IdentityGuard ServerFeedback on guide
b Select the service(s) to uninstall and then click Uninstall.
The Uninstall Application page appears.
c Click OK.
A message appears indicating that changes have been made to your local configuration.
d Click Save to accept the changes.
The Enterprise Applications Save page appears.
344 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
e Click Save.
The Entrust IdentityGuard services are uninstalled.
3 Optionally, as the application owner, back up the identityguard.properties file and the masterkeys.enc file (but not the masterkeys.kpf).
4 As root:
a In $IDENTITYGUARD_HOME/bin enter:
./igsvcconfig.sh igradius uninstall
b Delete the installation directory (by default /opt/entrust) by entering:
rm -f -r /opt/entrust
5 Optionally, remove the Entrust IdentityGuard data from the repository.
• For a database, use the IG_81/sql/drop_v81_schema.sql file in the .tar installation package to remove all Entrust IdentityGuard tables.
• For a directory, you will need to remove this data manually.
345
Glossary
active card or token The card or token that the end user is presently using for authentication.
Administration API The Java Platform or C# API that applications can use to integrate with the Administration service.
Administration interface The Web interface used by administrators to manage end users (see end user).
Administration service The Entrust IdentityGuard Web service responsible for managing administrators, users, cards, tokens, PINs, and so on.
Administration WSDL The WSDL definition for the Administration service.
administrator The Entrust IdentityGuard user who manages the day-to-day activity of end users using the Administration service (see end user).
administrator password attributes The policy attributes that determine the password rules for an administrator. For example, the password length, expiry date, and so on.
alias An additional unique name for an end user.
See also user name.
all grouplist A predefined grouplist that allows an administrator to manage every Entrust IdentityGuard group.
anonymous authentication See one-step authentication.
auditor role A predefined role that has read access to operations available through the Administration service.
authentication The process of proving your identity, and/or determining the validity of a set of credentials presented to the system.
Authentication API The Java Platform or C# API that applications can use to integrate with the Authentication service.
346 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
authentication secret The secrets shared between the organization and the user when organization authentication is configured.
Authentication service The Entrust IdentityGuard Web service used for retrieving challenge requests and authenticating user responses.
Also see Authentication API.
Authentication WSDL The WSDL definition for the Authentication service.
Canceled state The state associated with a card or token that a user can no longer use to authenticate.
card A physical grid that is printed and distributed to users.
cardspec attributes See card specification attributes.
card specification attributes The policy attributes that determine the characteristics of a grid for grid authentication. For example, the characters to use in a grid, its expiry based on duration or use, the number of rows and columns, and so on.
cell A row and column coordinate in a grid.
challenge generation algorithm An algorithm used to produce the challenge when using grid authentication. Entrust IdentityGuard has two challenge generation algorithms:
• least-used cell challenge generation algorithm
• random challenge generation algorithm
client application Any application that uses the Authentication API and/or the Administration API to access Entrust IdentityGuard’s administration and multifactor authentication capabilities on behalf of the end user.
client authentication The authentication process whereby users prove their identity to an application, using, for example, Entrust IdentityGuard Server.
Consumer deployment An Entrust IdentityGuard deployment where the end users are external to the organization (for example, they are customers or partners), and are authenticating to a Web-based application.
credentials A set of data (for example, a user name and password, grid, or dynamic password) that defines a user to the system.
Current state The state associated with a card or token that is currently in use.
default role A predefined role that has access to most operations available through the Administration service.
347GlossaryFeedback on guide
dynamic password The random number displayed by a token that changes automatically at regular intervals.
end user A user who authenticates to Entrust IdentityGuard using one of the available multifactor authentication methods.
Enterprise deployment A deployment of Entrust IdentityGuard where the end users are internal to the organization (for example, employees) and are authenticating to internal services.
Entrust IdentityGuard Server An Entrust product that provides multifactor authentication to increase the security of an online identity.
Entrust IdentityGuard Desktop for Microsoft Windows
An Entrust IdentityGuard client that adds second-factor authentication capabilities to the first-factor authentication performed by Microsoft Windows Winlogin and the RAS/IAS servers.
See also Entrust IdentityGuard Remote Access Plug-in for Microsoft Windows Servers.
Entrust IdentityGuard Radius proxy An Entrust IdentityGuard client that adds second-factor authentication capabilities to the first-factor authentication performed by a Radius server or using external authentication.
Entrust IdentityGuard Remote Access Plug-in for Microsoft Windows Servers
An Entrust IdentityGuard client that installs on the RAS and IAS servers to enable Entrust IdentityGuard second-factor authentication for remote Microsoft Windows users.
external authentication The first-factor authentication provided by Entrust IdentityGuard in a deployment where remote users connect through VPN and no external Radius server exists.
file-based repository A file containing preproduced cards or unassigned token information that is located on the primary Entrust IdentityGuard Server. Used only when your repository is an LDAP Directory.
first-factor authentication The first authentication challenge presented to the user. Usually user name and password authentication.
first-factor authentication application
The application which performs first-factor authentication and to which Entrust IdentityGuard is added as the second factor of authentication.
grid An assortment or table of characters listed in row and column format.
See also card.
348 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
grid authentication A second-factor authentication method that challenges a user for a set of grid coordinates or cells.
grid location replay authentication A type of organization authentication used with grid authentication that requires the organization to display the contents of certain coordinates in the grid once the user has authenticated.
group A means to organize end users, administrators, tokens, and cards to delegate administrative tasks and assign policy behavior (such as allowed authentication methods).
grouplist The set of user groups (see group) that an administrator can manage. A master user creates grouplists.
See all grouplist and own grouplist.
Hold state The state associated with an active card or token that an administrator has suspended (because, for example, the user lost the card). While in Hold, a user cannot use the card or token to authenticate.
See also Current state.
Hold_pending state The state associated with a card or token that an administrator has not yet activated. Unlike the Pending state, the end user cannot activate the card and use it for authentication.
identityguard.properties file The Java properties file containing all the configuration settings for a particular Entrust IdentityGuard Server.
image replay authentication See message or image replay authentication.
initialization A one-time process completed while setting up Entrust IdentityGuard that provides the system with the license keys and creates the master users, and the master key.
If repeated, re-initialization replaces the master key, overwrites policy data already stored in the repository, and renders existing user, preproduced card and unassigned token information unusable.
See master key.
knowledge-based authentication A second-factor authentication method that challenges a user for correct responses to a series of questions.
layered authentication An authentication process in which additional authentication challenges are presented for particular transactions that require stronger authentication than the user presently has.
349GlossaryFeedback on guide
least-used cell challenge generation algorithm
A challenge generation algorithm that uses a configured number of least-used coordinates (cells) when creating the challenge.
machine authentication An authentication process in which a user is associated with a particular computer through the use of a machine secret. After association, second-factor authentication is transparent for the user on that computer.
machine authentication type list A list of machine authentication methods assigned to a user, based on their policy.
machine secret One or more nonces and optional application-provided data that uniquely identify a particular computer.
master key The key that Entrust IdentityGuard uses to encrypt information stored in the repository.
master key protection file The file containing the obfuscation key used to access the master key.
master user The Entrust IdentityGuard user that configures how Entrust IdentityGuard will work in your system.
Entrust IdentityGuard has three master users.
See master user shell.
master user shell A command-line interface used by master users to configure Entrust IdentityGuard.
See master user.
message or image replay authentication
A type of organization authentication in which the organization displays a predefined message or image either before or after the user has authenticated.
multifactor authentication An authentication process in which two or more authentication methods are used consecutively to verify a user and often an organization.
mutual authentication An authentication process in which both the user and the organization verify themselves as legitimate.
See also organization authentication and user authentication.
nonce A random value generated for security purposes.
350 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
one-step authentication An authentication process in which first-factor and second-factor authentication challenges are presented to the end user at the same time. Also referred to as “anonymous authentication” as the system does not know the identity of the user.
Available only when using grid authentication.
See also two-step authentication.
one-time password A set of characters provided to a user out-of-band that can only be used once for authentication.
See also out-of-band authentication.
organization authentication An authentication process in which the organization verifies itself as authentic to the end user. Entrust IdentityGuard supports the following types:
• grid location replay authentication
• message or image replay authentication
• serial number replay authentication
OTP See one-time password.
out-of-band authentication A second-factor authentication method that challenges a user for a one-time password that is sent (for example) to their mobile phone when the challenge occurs.
own grouplist A predefined grouplist that allows an administrator to manage only the group to which they belong. It is the default grouplist.
passcode list A list of one-time transaction numbers (TANs) that are distributed to end users (sometimes on a physical card) and used with passcode list authentication.
passcode list authentication A second-factor authentication method that challenges a user for a passcode that matches a particular number in their passcode list. It is similar to grid authentication.
password attributes See administrator password attributes.
Pending state The state associated with a card or token that a user or administrator has not yet activated. Should an end user user a card or token in this state, it automatically changes to the Current state.
pinspec attributes See temporary PIN attributes.
351GlossaryFeedback on guide
policy A set of attributes that determines the characteristics for each member in a group. A policy is divided into four subsets:
• administrator password attributes
• user specification attributes
• card specification attributes
• temporary PIN attributes
preproduction model A method of creating cards in which they are created anonymously and assigned to users at a later date.
See also produce-and-assign model.
primary Entrust IdentityGuard Server
In a replicated system, this is the Entrust IdentityGuard Server on which the file-based repository is stored.
Therefore, it usually also is the Entrust IdentityGuard Server hosting the Administration service to which all instances of the Administration interface connect.
produce-and-assign model A method of creating cards in which a card is created and assigned to a user in one-step.
Also see preproduction model.
question and answer authentication See knowledge-based authentication.
Radius See Remote Authentication Dial-In User Service (Radius).
Radius proxy See Entrust IdentityGuard Radius proxy.
random challenge generation algorithm
A challenge generation algorithm that picks coordinates in a grid randomly when creating a challenge.
registration The process of adding new users to Entrust IdentityGuard by obtaining their information and setting required attributes such as group association and authentication method.
Remote Authentication Dial-In User Service (Radius)
Remote Authentication Dial-In User Service. An industry standard authentication protocol used to authenticate users with Radius clients.
A Radius client passes information about a user to a designated Radius server and then acts on the response that the Radius server returns. Transactions between the Radius client and the Radius server are authenticated through a server secret, which is never sent over the network.
352 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
repository The Entrust IdentityGuard information associated with users and administrators stored in a database or directory. A repository contains information such as:
• group association
• available authentication methods
• user name and aliases
• authentication information such as grids, token data, questions and answers, temporary PINs, one-time passwords, and so on
• preproduced cards and unassigned token data
replica Entrust IdentityGuard Server In a system with more than one Entrust IdentityGuard Server, any Entrust IdentityGuard Server that does not function as the primary Entrust IdentityGuard Server.
Replicas are usually identical to each other.
role Defines, for administrators (see administrator), what operations they can perform using the Administration service.
A master user creates roles. Entrust IdentityGuard installs with three roles:
• auditor role
• default role
• superuser role
sample application The client Web application installed with the Entrust IdentityGuard Server that demonstrates the various capabilities and authentication methods of Entrust IdentityGuard.
second-factor authentication The second authentication method in a system that uses two independent mechanisms of authentication. It ensures strong authenticity. See strong authentication.
serial number replay authentication A type of organization authentication used with grid authentication that requires the organization to display the card’s unique serial number to the user.
shared secret A name and value pair associated with an end user and used by a client application only (not Entrust IdentityGuard).
353GlossaryFeedback on guide
Simple Object Access Protocol (SOAP)
Simple Object Access Protocol. An XML protocol that governs the exchange of information in a distributed environment. SOAP provides a way for programs running in two different operating systems (such as Windows 2000 and Solaris) or written in different programming languages (such as Java Platform and C#) to exchange information, using HTTP and XML. Refer to http://www.w3.org/2000/xp/Group/.
single-factor authentication An authentication system in which the user is verified using only one authentication method (usually a user name and password).
See also second-factor authentication.
single-stage authentication See one-step authentication.
SOAP See Simple Object Access Protocol (SOAP).
state The lifecycle status that determines what a user can do with a card or token. Entrust IdentityGuard cards and tokens support the following states:
• Pending state
• Hold_pending state
• Current state
• Hold state
• Canceled state
static token PIN A numeric value that associates a user with their token. When a user receives a token challenge, they must prefix their response with the static token PIN, thereby enhancing the strength of the authentication.
Do not confuse with temporary PIN or dynamic password.
strong authentication A form of client authentication in which users prove their identity by logging in with credentials other than just user name and password (for example, a grid or token).
super shell See master user shell.
superuser role A predefined role that has access to all operations available through the Administration service.
supersh See master user shell.
TAN Transaction number. See passcode list authentication.
354 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
temporary PIN A character string assigned to a user for a brief period of time or usage duration to substitute for a temporarily unavailable card or token.
temporary PIN attributes The policy attributes that determine the characteristics of the temporary PIN. For example, the number of characters in the PIN, its expiry date, and so on.
token A battery-operated hardware device that provides a user with a dynamic password that changes periodically (for example, every minute).
token authentication A second-factor authentication method that challenges a user for a token-generated string. The response can include a static token PIN.
token PIN See static token PIN.
two-step authentication An authentication process in which first-factor and second-factor authentication challenges are presented to the end user consecutively. The end user is authenticated and verified using the first-factor authentication method before being challenged with second-factor authentication.
See also one-step authentication.
two-stage authentication. See two-step authentication.
user authentication An authentication process in which the end user is verified as authentic by the organization. Entrust IdentityGuard supports the following types:
• grid authentication
• token authentication
• knowledge-based authentication
• passcode list authentication
• out-of-band authentication
user name The name of the Entrust IdentityGuard user in their first-factor authentication system.
A user name must be unique within its group.
userspec attributes See user specification attributes.
user ID The globally unique name of an end user or administrator. It includes both the Entrust IdentityGuard group name and the user name of the user in the first-factor authentication system, written as group/username.
355GlossaryFeedback on guide
user specification attributes The policy attributes that determine the rules for an end user’s interaction with Entrust IdentityGuard. For example, the number of aliases a user can have, their authentication methods, and so on.
Web service A program that runs within an application server that communicates to other requesting components, often using the Simple Object Access Protocol (SOAP). Web services have two advantages:
• The SOAP protocol provides a standard way for the Web service and its clients to encode and decode (or "parse") the program data so that programmers don't have to write their own. The standard also means that programs written by different companies can communicate with the Web service.
• SOAP envelopes are typically sent within HTTP requests so you do not have to open additional ports in your firewall for clients to communicate with the Web service.
Entrust IdentityGuard has two Web services: Administration service and Authentication service.
WSDL Web Services Definition Language. An XML format for describing network services as a set of endpoints operating on messages. WSDL service definitions provide the technical details for describing a Web service that would be required for someone to actually invoke the service (for example, input parameters, output format, and so on).
356 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide
357
Index
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z- -.wsdl files 259
Aactive card
definition 345active token
definition 345Administration API
definition 345Administration interface
definition 345Administration service
definition 345Administration WSDL
definition 345administrator
definition 345administrator password attributes
definition 345algorithms 97, 99, 101alias
definition 345all grouplist
definition 345anonymous authentication. See one-step authenticationaudit integrity check 281auditor role
definition 345authentication
definition 345domain controller 172LDAP directory 172Radius 172strong
definition 353Authentication API
definition 345authentication secret
definition 346Authentication service
definition 346
Authentication WSDLdefinition 346
Bbackup
UNIX 211, 247Windows 213
backupsbackup strategy 244of LDAP Directory and database 225, 247restoring file-based card preproduction repository 253restoring IdentityGuard 250
Ccached challenges 270Canceled state
definition 346card
definition 346card preproduction
configuring 220database 224disk files 221
card specification attributesdefinition 346
cardspec. See card specification attributescell
definition 346certificate
exporting 238importing the SSL certificate 233updating 238
challenge cache 271challenge generation algorithm
definition 346client application
definition 346client authentication
definition 346
Index
358 IdentityGuard 8.1 Installation Guide Document issue: 3.0
B C D E F G H I J K L M N O P Q R S T U V W X Y Z- -A
commandssupersh 53, 56, 123, 126, 251, 254version 54, 124
configuration during installIdentityGuard 36, 109
Consumer deploymentdefinition 346
credentialsdefinition 346
cryptographypolicy files 96, 98, 100, 101
Current state
definition 346Customer support 16
Ddefault role
definition 346deployment, Consumer
definition 346deployment, Enterprise
definition 347dynamic password
definition 347
Eend user
definition 347Enterprise deployment
definition 347Entrust IdentityGuard Desktop for Microsoft Windows
definition 347Entrust IdentityGuard Radius proxy
definition 347Entrust IdentityGuard Remote Access Plug-in for Microsoft
Windows Serversdefinition 347
Entrust IdentityGuard Serverdefinition 347
external authentication 202definition 347groups 209
Ffailover
Radius 195repository 218
file-based preproduction card repositoryrestoring 253
file-based repositorydefinition 347
first-factor authenticationdefinition 347
first-factor authentication applicationdefinition 347
GGetting help
Technical Support 16grid
definition 347grid authentication
definition 348grid location replay authentication
definition 348group
definition 348grouplist
definition 348own
definition 350groups
external authentication 178, 209
HHold state
definition 348Hold_pending state
definition 348
IIdentityGuard
configuration during install 36, 109configuring to use cached challenges 270disabling 64, 65enabling 64, 65failed initialization 47, 118
359Index
B C D E F G H I J K L M N O P Q R S T U V W X Y Z- -A
initializing 47, 83, 118installing 33installing a replica server 210querying status 63, 64restarting 63, 64sample application 51starting 63, 64starting automatically 63, 166stopping 63, 64testing 58, 162uninstalling 336, 338upgrading 299WebLogic 8.1
installing 106WebLogic 9.1
installing 106WebSphere 6.0
installing 106identityguard.properties
audit.integrity 281externalauth 293externalauth.kerberos 294igradius.challengestring 284igradius.msglog 289igradius.port 283igradius.radius 290igradius.skipauth 289igradius.tokenchallengestring 286
tokenrequirespinupdate 288igradius.url 282igradius.vpn 290igradius.vpn.useradius 293jdbc.blobAccess 268jdbc.connectionpool 267jdbc.connectionpool.max 267jdbc.connectionpool.minIdleClose Time 267jdbc.driverClass 268jdbc.logintimeout 267jdbc.needsEscape 268jdbc.password 268jdbc.querytimeout 267jdbc.schema 268jdbc.selectLock 269jdbc.timestampDataType 268jdbc.url 268jdbc.user 268ldap.addAdminObjectClass 262ldap.addPolicyObjectClass 263
ldap.addUserObjectClass 262ldap.connectionpool.max 265ldap.connecttimeout 262ldap.credentials 261ldap.GeneralizedTime 266ldap.policyentry 262ldap.principal 261ldap.searchbase 264ldap.searchtimeout 265ldap.sizelimit 265ldap.sslEnabled 262ldap.url 261ldap.useridattribute 262log.maxstacksize 273refreshinterval 273supersh.adminlist 279supersh.preproducedcardlist 279supersh.tokenlist 280supersh.usercardlist 278supersh.userlist 278tokenRepository 221, 223webadmin
bulk 296export 297
identityguard.properties fileauthentication success audit 258caching policies 272changing log configuration 273changing log locations 277column width formatting 278configuring 255configuring to use cached challenges 270definition 348enabling cached challenges 270encrypted properties 257JDBC properties 267LDAP properties 261license audit 281properties for card preproduction 224search bases 260
identityguard.sh 52, 63, 64igkrb5.conf file 204image replay authentication
definition 348, 349initialization
definition 348initializing IdentityGuard 47, 83, 118
reasons for failure 47, 118
360 IdentityGuard 8.1 Installation Guide Document issue: 3.0
B C D E F G H I J K L M N O P Q R S T U V W X Y Z- -A
installing IdentityGuard 33, 106
JJava Development Kit 96, 98, 100
Kkeytool 235
documentation 235knowledge-based authentication
definition 348
Llayered authentication
definition 348least-used cell challenge generation algorithm
definition 349license audit 281
replica servers 281loadbalancing 210log locations
changing 277log4j properties 273logging
configuring 45, 116, 273to Syslog 45, 116, 277
Mmachine authentication
definition 349machine authentication type list
definition 349machine secret
definition 349master key
definition 349master key protection file
definition 349master user
definition 349master user shell 49, 119
configuring formatting 278definition 349
message replay authentication
definition 349multifactor authentication
definition 349mutual authentication 349
Nnative libraries 128, 134nonce
definition 349
Oone-step authentication
definition 350one-time password
definition 350organization authentication 350OTP. See one-time passwordout-of-band authentication
definition 350own grouplist
definition 350
Ppasscode list
definition 350passcode list authentication
definition 350password attributes. See administrator password attributesPending state
definition 350pinspec attributes. See temporary PIN attributespolicy
definition 351preproduction model
definition 351primary Entrust IdentityGuard Server
definition 351produce-and-assign model
definition 351Professional Services 17properties file
authentication success audit 258changing log configuration 273changing log location 277column width formatting 278
361Index
B C D E F G H I J K L M N O P Q R S T U V W X Y Z- -A
configuring to use cached challenges 270enabling cached challenges 270encrypted properties 257JDBC properties 267LDAP properties 261license audit 281
Qquestion and answer authentication. See knowledge-based
authentication
RRadius
definition 351Radius Proxy
automatic restart 35, 107Radius proxy 171
architecture 173configuring overview 172external 187overview 172with domain controller 187with LDAP server 187with Radius server 180
Radius proxy. See Entrust IdentityGuard Radius proxyrandom challenge generation algorithm
definition 351registration
definition 351replica
definition 352replica server
configuring 210initializing 210installing 210new SSL certificate 210
repositorydefinition 352preparing 22
restoring IdentityGuard from backup 250role
definition 352
Ssample application
configuring 51definition 352disabling 52
sample Web applicationenabling 52
second-factory authenticationdefinition 352
serial numberreconfiguring 254
serial number replay authenticationdefinition 352
shared secretdefinition 352
single-factor authenticationdefinition 353
single-page authentication. See one-step authenticationSOAP
definition 353SSL
creating a self-signed certificate 235exporting a certificate 238importing the SSL certificate 233ports 228securing the LDAP repository, after installation 233
stateCurrent
definition 346definition 353hold
definition 348Hold_pending
definition 348Pending
definition 350static token PIN
definition 353strong authentication
definition 353super shell. See master user shellsupersh. See master user shellsuperuser role
definition 353Syslog
configuring 226logging to 45, 116, 277
362 IdentityGuard 8.1 Installation Guide Document issue: 3.0
B C D E F G H I J K L M N O P Q R S T U V W X Y Z- -A
TTAN. See passcode list authenticationTechnical Integration Guides 22Technical Support 16temporary PIN
definition 354temporary PIN attributes
definition 354testing IdentityGuard 58, 162token
definition 354token authentication
definition 354token PIN. See static PINtokens
Entrust 30two-stage authentication. See two-step authenticationtwo-step authentication
definition 354typographic conventions 13
Uuninstalling IdentityGuard 336, 338UNIX group and user
creating 32UNIX service command
starting and stopping IdentityGuard 63upgrading
IdentityGuard 7.2 to 8.1 299user authentication
definition 354user ID
definition 354user name
definition 354user specification attributes
definition 355user, end
definition 347userspec attributes. See user specification attributes
Vversion command 54, 124VPN server
configure 193
WWeb service
definition 355WebLogic 8.1 96
configuring SSL 97deploying IdentityGuard services 128preparing for installation 96
WebLogic 9.1 98configuring SSL 98deploying IdentityGuard services 134preparing for installation 98
WebSphere 6.0 100configuring SSL 101deploying IdentityGuard services 142preparing for installation 100shared library settings 142
WSDLdefinition 355
363 IdentityGuard 8.1 Installation Guide Document issue: 3.0
B C D E F G H I J K L M N O P Q R S T U V W X Y Z- -A
364 IdentityGuard 8.1 Installation Guide Document issue: 3.0
B C D E F G H I J K L M N O P Q R S T U V W X Y Z- -A