364
Entrust® Entrust IdentityGuard 8.1 Installation Guide Document issue: 3.0 Date of Issue: April 2007

IG 81 Install Guide 3

  • Upload
    wsudy2

  • View
    171

  • Download
    4

Embed Size (px)

Citation preview

Page 1: IG 81 Install Guide 3

Entrust®

Entrust IdentityGuard 8.1

Installation Guide

Document issue: 3.0

Date of Issue: April 2007

Page 2: IG 81 Install Guide 3

2 Entrust IdentityGuard 8.1 Installation Guide

Copyright © 2007 Entrust. All rights reserved.

Entrust is a trademark or a registered trademark of Entrust, Inc. in certain countries. All Entrust product names and logos are trademarks or registered trademarks of Entrust, Inc. in certain countries. All other company and product names and logos are trademarks or registered trademarks of their respective owners in certain countries.

This information is subject to change as Entrust reserves the right to, without notice, make changes to its products as progress in engineering or manufacturing methods or circumstances may warrant.

Export and/or import of cryptographic products may be restricted by various regulations in various countries. Export and/or import permits may be required.

Page 3: IG 81 Install Guide 3

3Table of contents

Table of contents

About this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Revision information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Documentation conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Note and Attention text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Related documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Obtaining documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

Documentation feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

Obtaining technical assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Technical support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Telephone numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Email address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Professional Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

CHAPTER 1Preparing for installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Preinstallation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

Preinstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Downloading Entrust IdentityGuard software . . . . . . . . . . . . . . . . . . . . . . . . . 21

Preparing your repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

Preparing your VPN network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

Installation worksheet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Installing the token support patch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Reconfiguring for third-party tokens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

CHAPTER 2Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX . 31

Creating the UNIX group and user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Installing Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

Linux Red Hat Enterprise 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

Page 4: IG 81 Install Guide 3

4 IdentityGuard 8.1 Installation Guide Document issue: 3.0

Configuring the primary Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . 36

Starting the Entrust IdentityGuard configuration . . . . . . . . . . . . . . . . . . . . . . . 36

Adding Directory information to Entrust IdentityGuard . . . . . . . . . . . . . . . . . . 37

Adding Database information to Entrust IdentityGuard . . . . . . . . . . . . . . . . . . 42

Completing the Entrust IdentityGuard configuration . . . . . . . . . . . . . . . . . . . . 43

Initializing the primary Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . . 47

What initialization does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

If initialization fails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

Initializing the primary server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

Configuring the sample application on UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Running the scripts manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

Testing your installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

Managing the Entrust IdentityGuard service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

Starting and stopping Entrust IdentityGuard . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

Starting and stopping Entrust IdentityGuard with the UNIX service command . 63

Enabling and disabling individual Entrust IdentityGuard services . . . . . . . . . . . . 64

CHAPTER 3Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67

Installing Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Configuring the primary Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . 70

Using the Configuration Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

Starting the Entrust IdentityGuard Configuration wizard . . . . . . . . . . . . . . . . . 70

Selecting your repository settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

Selecting Entrust IdentityGuard service ports . . . . . . . . . . . . . . . . . . . . . . . . . . 79

Selecting your system host name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

Completing Entrust IdentityGuard configuration . . . . . . . . . . . . . . . . . . . . . . . 82

Initializing the primary Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . . 83

What initialization does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

If initialization fails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

Running the Entrust IdentityGuard Initialization wizard . . . . . . . . . . . . . . . . . . 84

Configuring the sample application on Microsoft Windows . . . . . . . . . . . . . . . . . . 87

Testing your installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

Installation troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

Page 5: IG 81 Install Guide 3

5Table of contents

Managing the Entrust IdentityGuard service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

CHAPTER 4Installing Entrust IdentityGuard Server with an existing application server . . 95

Preparing WebLogic for installation of IdentityGuard . . . . . . . . . . . . . . . . . . . . . . . 96

Preparing WebLogic 8.1 for installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

Configuring SSL for WebLogic 8.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

Configuring SSL for WebLogic 9.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

Preparing WebSphere for installation of Entrust IdentityGuard . . . . . . . . . . . . . . . 100

Configuring SSL for WebSphere 6.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

Installing Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

Configuring the primary Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . 109

Starting the Entrust IdentityGuard configuration . . . . . . . . . . . . . . . . . . . . . . 109

Adding Directory information to Entrust IdentityGuard . . . . . . . . . . . . . . . . . 110

Completing the Entrust IdentityGuard configuration . . . . . . . . . . . . . . . . . . . 115

Initializing the primary Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . 118

What initialization does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

If initialization fails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

Initializing the primary server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

Configuring the sample application on an existing application server . . . . . . . . . . 121

Running the scripts manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

CHAPTER 5Deploying Entrust IdentityGuard services on an existing application server . 127

Deploying Entrust IdentityGuard services on WebLogic . . . . . . . . . . . . . . . . . . . . 128

Deploying Entrust IdentityGuard services on WebLogic 8.1 application server 128

Deploying Entrust IdentityGuard services on WebLogic 9.1 application server 134

Deploying Entrust IdentityGuard services on WebSphere 6.0 application server . . 142

Defining and deploying shared library settings . . . . . . . . . . . . . . . . . . . . . . . . 142

Installing Entrust IdentityGuard services on WebSphere 6.0 . . . . . . . . . . . . . . 155

Testing your installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162

Page 6: IG 81 Install Guide 3

6 IdentityGuard 8.1 Installation Guide Document issue: 3.0

Managing the Entrust IdentityGuard service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166

Query the status of Entrust IdentityGuard service . . . . . . . . . . . . . . . . . . . . . . 166

Stopping Entrust IdentityGuard Services on WebLogic 8.1 . . . . . . . . . . . . . . . 167

Stopping Entrust IdentityGuard Services on WebLogic 9.1 . . . . . . . . . . . . . . . 168

Stopping Entrust IdentityGuard Services on WebSphere 6.0 . . . . . . . . . . . . . . 169

CHAPTER 6Configuring the Entrust IdentityGuard Radius proxy . . . . . . . . . . . . . . . . . .171

Radius proxy integration overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172

Configuring the Radius proxy for groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175

Using Entrust IdentityGuard groups with a VPN server . . . . . . . . . . . . . . . . . . 175

Radius server example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176

External authentication example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

Matching a group to a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

Using the Radius proxy with a Radius server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180

Using the Radius proxy with a domain controller or LDAP directory . . . . . . . . . . . 187

Configuring the VPN server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193

Configuring a Radius server for first-factor authentication . . . . . . . . . . . . . . . . . . 194

Configuring Radius server failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195

Managing the Radius proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196

Managing the Radius proxy on UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196

Managing the Radius proxy on Microsoft Windows . . . . . . . . . . . . . . . . . . . . 199

CHAPTER 7Postinstall configuration options for Entrust IdentityGuard Server . . . . . . . . .201

Configuring Entrust IdentityGuard for external authentication . . . . . . . . . . . . . . . 202

Configuring external authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202

Adding Entrust IdentityGuard replica servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

Configuring failover on the repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218

Configuring failover for a database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218

Configuring failover for a directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219

Storing unassigned cards and tokens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220

Configuring Syslog for remote logging on UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . 226

Disabling the non-SSL port on the Authentication service . . . . . . . . . . . . . . . . . . . 228

Enabling the non-SSL port on the Administration service . . . . . . . . . . . . . . . . . . . 230

Page 7: IG 81 Install Guide 3

7Table of contents

Disabling the SSL port on the Administration service . . . . . . . . . . . . . . . . . . . . . . 231

Securing the LDAP connection with SSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

Changing the Entrust IdentityGuard certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

Creating self-signed certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235

Importing CA-signed certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236

Exporting the certificate to client applications . . . . . . . . . . . . . . . . . . . . . . . . 238

Updating certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238

Enabling system binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240

CHAPTER 8Backing up and restoring Entrust IdentityGuard Server. . . . . . . . . . . . . . . . 243

Planning a backup strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244

Backing up your configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247

Restoring Entrust IdentityGuard from a backup . . . . . . . . . . . . . . . . . . . . . . . . . . 250

Restoring a file-based repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253

Reconfiguring the system or Entrust IdentityGuard serial number . . . . . . . . . . . . . 254

APPENDIX AConfiguring the Entrust IdentityGuard Server properties file . . . . . . . . . . . . 255

Editing property values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257

Encrypting property values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257

Enabling the authentication success audit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258

Enabling a WSDL query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259

Configuring additional search bases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260

Configuring LDAP directory properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

Configuring database properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

Enabling cached challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270

Caching policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272

Changing log configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273

Changing log locations on UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

Configuring master user shell formatting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278

Configuring license auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281

Configuring the Entrust IdentityGuard Radius proxy properties . . . . . . . . . . . . . . 282

Configuring external authentication properties . . . . . . . . . . . . . . . . . . . . . . . . . . . 293

Configuring token properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295

Page 8: IG 81 Install Guide 3

8 IdentityGuard 8.1 Installation Guide Document issue: 3.0

Configuring the Administration interface properties for bulk operations . . . . . . . . 296

Configuring the Administration interface to control the output format . . . . . . . . . 297

APPENDIX BUpgrading Entrust IdentityGuard Server on Linux . . . . . . . . . . . . . . . . . . . .299

Upgrading Entrust IdentityGuard Server 7.2 to 8.1 . . . . . . . . . . . . . . . . . . . . . 299

Upgrading Entrust IdentityGuard Server from 8.0 to 8.1 . . . . . . . . . . . . . . . . 302

APPENDIX CUsing the sample Web application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .305

Preparing to use the sample Web application . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306

Accessing the sample Web application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307

Registering as a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308

Activating a card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315

Registering a token . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317

Using machine authentication to log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321

Using generic authentication to log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325

Using step-up authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

Using temporary PIN authentication to log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329

Using one-step grid authentication to log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332

Using two-step grid authentication to log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333

APPENDIX DUninstalling Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . . . .335

Uninstalling Entrust IdentityGuard Server with embedded Tomcat on UNIX . . . . . 336

Uninstalling Entrust IdentityGuard Server on Microsoft Windows . . . . . . . . . . . . . 337

Uninstalling Entrust IdentityGuard Server with an existing application server . . . . 338

Uninstalling Entrust IdentityGuard on WebLogic 8.1 . . . . . . . . . . . . . . . . . . . 338

Uninstalling Entrust IdentityGuard on WebLogic 9.1 . . . . . . . . . . . . . . . . . . . 340

Uninstalling Entrust IdentityGuard on WebSphere 6.0 . . . . . . . . . . . . . . . . . . 342

Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .345

Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .357

Page 9: IG 81 Install Guide 3

9

About this guide

The Entrust IdentityGuard Installation Guide provides detailed information for administrators to plan, install, configure, and troubleshoot the Entrust IdentityGuard Server installation.

This guide contains the following sections:

• Chapter 1 “Preparing for installation” describes important preinstallation steps for installers as well as directory and database administrators.

• Chapter 2 “Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX” provides all the necessary steps for installing, configuring, initializing, and testing Entrust IdentityGuard.

• Chapter 3 “Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows” provides all the necessary steps for installing, configuring, initializing, and testing Entrust IdentityGuard.

• Chapter 4 “Installing Entrust IdentityGuard Server with an existing application server” provides all the necessary steps for installing, configuring, initializing, and testing Entrust IdentityGuard using WebLogic 8.1 or 9.1 and WebSphere 6.0 applications servers.

• Chapter 5 “Deploying Entrust IdentityGuard services on an existing application server” provides all the necessary steps to deploy Entrust IdentityGuard services using the WebLogic 8.1 or 9.1 or WebSphere 6.0 application servers.

• Chapter 6 “Configuring the Entrust IdentityGuard Radius proxy” provides all the necessary steps for configuring the Radius Proxy for VPN use and to manage the Radius Proxy.

• Chapter 7 “Postinstall configuration options for Entrust IdentityGuard Server” describes steps for configuring or reconfiguring Entrust IdentityGuard after installation.

• Chapter 8 “Backing up and restoring Entrust IdentityGuard Server” provides guidelines for planning a backup strategy and steps for restoring Entrust IdentityGuard from a backup.

Page 10: IG 81 Install Guide 3

10 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

• Appendix A “Configuring the Entrust IdentityGuard Server properties file” provides guidelines to reconfigure your installation by editing or adding settings to the identityguard.properties file.

• Appendix B “Upgrading Entrust IdentityGuard Server on Linux” describes steps to upgrade to Entrust IdentityGuard from a previous installation of IdentityGuard 7.2 or 8.0.

• Appendix C “Using the sample Web application” provides instructions for using the “Any Bank” sample Web application.

• Appendix D “Uninstalling Entrust IdentityGuard Server” provides instructions for uninstalling Entrust IdentityGuard from your system.

Page 11: IG 81 Install Guide 3

11About this guideFeedback on guide

Revision informationTable 1: Revisions in this document

Revision Section Description

Document issue 3.0 • “Preparing for installation” on page 19

Expands the chapter introduction to describe the various installation scenarios available to users.

• “Downloading Entrust IdentityGuard software” on page 21

Adds steps for downloading and extracting the token patch file.

• “Installing the token support patch” on page 30

Adds instructions for installing the patch that supports Entrust tokens.

• “Defining and deploying shared library settings” on page 142

Changes the instructions (Step 11) to include adding Entrust tokens to the WebSphere shared library.

• “Configuring the Radius proxy for groups” on page 175

• “Configuring the Entrust IdentityGuard Radius proxy properties” on page 282

Adds an explanation of how you can configure the Radius proxy to convert names with the form “name@group” or “group\name” to “group/name,” which is the form used by Entrust IdentityGuard.

• “Configuring external authentication” on page 202.

Describes a problem that can occur with the Kerberos protocol if LDAP user names are in mixed case.

• “Configuring token properties” on page 295

Adds a section that explains new token-related properties added to the identityguard.properties file.

Document Issue 2.0 • “Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX” on page 31

Adds a section on required preinstallation steps if using Linux Red Hat Enterprise 4.

Page 12: IG 81 Install Guide 3

12 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Document Issue 1.0, patch 108508

• “Preparing WebSphere for installation of Entrust IdentityGuard” on page 100

• “Deploying Entrust IdentityGuard services on WebSphere 6.0 application server” on page 142

• “Configuring the Radius proxy for groups” on page 175

• “Configuring Entrust IdentityGuard for external authentication” on page 202

Adds instructions on installing Entrust IdentityGuard on an AIX server with IBM WebSphere 6.0.

Modifies instructions for configuring external authentication with a domain controller. This patch removed the identityguard.externalauth.kerberos.kdc property and replaced it with a igkrb5.conf file instead.

For more information, see “External authentication example” on page 177.

Table 1: Revisions in this document

Revision Section Description

Page 13: IG 81 Install Guide 3

13About this guideFeedback on guide

Documentation conventionsFollowing are documentation conventions which appear in this guide:

Note and Attention textThroughout this guide, there are paragraphs set off by ruled lines above and below the text. These paragraphs provide key information with two levels of importance, as shown below.

Note: Information to help you maximize the benefits of your Entrust product.

Attention: Issues that, if ignored, may seriously affect performance, security, or the operation of your Entrust product.

Table 2: Typographic conventions

Convention Purpose Example

Bold text (other than headings)

Indicates graphical user interface elements and wizards

Click Next.

Italicized text Used for book or document titles

Entrust TruePass 7.0 Deployment Guide

Blue text Used for hyperlinks to other sections in the document

Entrust TruePass supports the use of many types of digital ID.

Underlined blue text

Used for Web links For more information, visit our Web site at www.entrust.com.

Courier type Indicates installation paths, file names, Windows registry keys, commands, and text you must enter

Use the entrust-configuration.xml file to change certain options for Verification Server.

Angle brackets

< >

Indicates variables (text you must replace with your organization’s correct values)

By default, the entrust.ini file is located in <install_path>/conf/security/entrust.ini.

Square brackets

[courier type]

Indicates optional parameters

dsa passwd [-ldap]

Page 14: IG 81 Install Guide 3

14 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Related documentationEntrust IdentityGuard is supported by a complete documentation suite:

• For instructions on installing and configuring Entrust IdentityGuard on UNIX and Microsoft Windows, see the Entrust IdentityGuard Installation Guide.

• For instructions on administering Entrust IdentityGuard users and groups, see the Entrust IdentityGuard Administration Guide.

• For information on deploying Entrust IdentityGuard, see the Entrust IdentityGuard Deployment Guide.

• For information on configuring Entrust IdentityGuard to work with a supported LDAP repository—Microsoft® Active Directory, Microsoft® Active Directory Application Mode, Critical Path InJoin Directory, IBM Tivoli Directory, Novell eDirectory, or Sun ONE Directory—see the Entrust IdentityGuard Directory Configuration Guide.

• For information on configuring Entrust IdentityGuard to work with a supported database—IBM DB2 Universal Database, Microsoft SQL Server, or Oracle Database—see the Entrust IdentityGuard Database Configuration Guide.

• For information on Entrust IdentityGuard error messages, see the Entrust IdentityGuard Error Messages.

• For information on new features, limitations and known issues in the latest release, see the Entrust IdentityGuard Release Notes.

• For information on integrating the authentication and administration processes of your applications with Entrust IdentityGuard, see the Entrust IdentityGuard Programming Guide that applies to your development platform (either Java Platform or C#).

• For Entrust IdentityGuard product information and a data sheet, go to http://www.entrust.com/strong-authentication/identityguard/index.htm

• For information on identity theft protection seminars, go to http://www.entrust.com/events/identityguard.htm

Page 15: IG 81 Install Guide 3

15About this guideFeedback on guide

Obtaining documentationEntrust product documentation, white papers, technical notes, and a comprehensive Knowledge Base are available through Entrust TrustedCare Online. If you are registered for our support programs, you can use our Web-based Entrust TrustedCare Online support services at:

https://www.entrust.com/trustedcare

Documentation feedbackYou can rate and provide feedback about Entrust product documentation by completing the online feedback form. You can access this form by

• clicking the Feedback on guide link located in the footer of Entrust’s PDF documents (see bottom of this page).

• following this link: http://sottwebdev2.entrust.com/products/feedback/index.cfm

Feedback concerning documentation can also be directed to the Customer Support email address.

[email protected]

Page 16: IG 81 Install Guide 3

16 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Obtaining technical assistanceEntrust recognizes the importance of providing quick and easy access to our support resources. The following subsections provide details about the technical support and professional services available to you.

Technical supportEntrust offers a variety of technical support programs to help you keep Entrust products up and running. To learn more about the full range of Entrust technical support services, visit our Web site at:

http://www.entrust.com/

If you are registered for our support programs, you can use our Web-based support services.

Entrust TrustedCare Online offers technical resources including Entrust product documentation, white papers and technical notes, and a comprehensive Knowledge Base at:

https://www.entrust.com/trustedcare

If you contact Entrust Customer Support, please provide as much of the following information as possible:

• Your contact information

• Product name, version, and operating system information

• Your deployment scenario

• Description of the problem

• Copy of log files containing error messages

• Description of conditions under which the error occurred

• Description of troubleshooting activities you have already performed

Telephone numbersFor support assistance by telephone call one of the numbers below:

• 1-877-754-7878 in North America

• 1-613-270-3700 outside North America

Email addressThe email address for Customer Support is:

[email protected]

Page 17: IG 81 Install Guide 3

17About this guideFeedback on guide

Professional ServicesThe Entrust team assists e-businesses around the world to deploy and maintain secure transactions and communications with their partners, customers, suppliers and employees. We offer a full range of professional services to deploy our e-business solutions successfully for wired and wireless networks, including planning and design, installation, system integration, deployment support, and custom software development.

Whether you choose to operate your Entrust solution in-house or subscribe to hosted services, Entrust Professional Services will design and implement the right solution for your e-business needs. For more information about Entrust Professional Services please visit our Web site at:

http://www.entrust.com

Page 18: IG 81 Install Guide 3

18 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Page 19: IG 81 Install Guide 3

19

Chapter 1

Preparing for installation

Use this chapter before you install Entrust IdentityGuard Server. It contains important preinstallation steps for installers, as well as for directory and database administrators.

• For a first-time installation of Entrust IdentityGuard, follow instructions in this guide related to a full install on your platform. Then install the latest patch.

• For an upgrade from an earlier version of Entrust IdentityGuard, see “Upgrading Entrust IdentityGuard Server on Linux” on page 299.

• To add support for tokens to an existing installation of Entrust IdentityGuard 8.1, install patch 129366 or a later patch (see “Installing the token support patch” on page 30). (Not available for AIX.)

Attention: Complete the steps in this chapter before you install Entrust IdentityGuard Server.

This chapter contains the following sections:

• “Preinstallation overview” on page 20

• “Preinstallation” on page 21

• “Installation worksheet” on page 25

• “Installing the token support patch” on page 30

Page 20: IG 81 Install Guide 3

20 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Preinstallation overviewThe following flowchart outlines the high level preinstallation steps you must complete before doing a full install of Entrust IdentityGuard Server, including an install on AIX.

Figure 1: Preinstallation overview

RadiusGather addresses and shared

secrets for your VPN and Radiusservers

Download the Entrust IdentityGuard software

Back up your repository

LDAP

Add attributes and object classes to LDAP directory

schemaGather configuration data

JDBC

Create database user and table spaces

Install schema fileInstall JDBC driver

Gather configuration data

Preparing your data repository

What method are you using for primary authentication?

Are you using a VPN server?

ExternalDecide if you will use a domain controller or LDAP directory for

primary authentication

VPNDetermine the group names to

use, if applicable

Create UNIX group and UNIX user (if you are installing on UNIX)

Page 21: IG 81 Install Guide 3

21Preparing for installationFeedback on guide

PreinstallationComplete the following procedures before you install Entrust IdentityGuard Server.

Topics in this section:

• “Downloading Entrust IdentityGuard software” on page 21

• “Preparing your repository” on page 22

• “Preparing your VPN network” on page 23

Note: Some versions of Solaris may not have ZIP. If required, download ZIP from Sun’s Web site at http://www.sun.com/software/solaris/freeware. You will need ZIP for some procedures later in this document.

Downloading Entrust IdentityGuard softwareDownload the Entrust IdentityGuard software package or patch from Entrust TrustedCare Online Web site. They include any schema files you need to set up your repository.

To download Entrust IdentityGuard software1 Browse to the Entrust IdentityGuard downloads page on the Entrust TrustedCare

Online Web site:

https://www.entrust.com/trustedcare

You should have an email from Entrust that includes:

• your user name and password for accessing the downloads page

• instructions on how to access the downloads page

• activation and installation keys required for the installer

2 For a full install, download one of the following files (depending on the operating system you are using) by clicking the Download link:

• IG_81_Linux.tar

• IG_81_Solaris.tar

• IG_81_Windows.zip

• IG_81_WebLogic_WebSphere.tar

• IG_81_WebSphere_AIX.tar

Save the .tar or .zip file to any directory on the computer you want to use to run Entrust IdentityGuard.

Page 22: IG 81 Install Guide 3

22 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

3 For the patch that adds support for Entrust tokens, download either IG_81_129366.zip (for Windows) or IG_81_129366.tar (for Linux or Solaris). If a newer patch is available, download it instead.

4 For a full install, extract the files to a temporary directory.

To do so:

• On UNIX, enter the command,

tar -xvf IG_81_<your_version>.tar

where <your_version> is the file you have downloaded for your specific installation.

• On Microsoft Windows, locate the IG_81_Windows.zip file and extract the files using a utility such as WinZip®.

Extracting the file for a full install creates a subdirectory called IG_81 that contains all the Entrust IdentityGuard files and subdirectories.

5 For patch 129366 or a later patch, extract the files to the existing Entrust IdentityGuard 8.1 root directory.

If an error occurs, try the download again. If the problem persists, contact Entrust Customer Support.

To install patch 129366 or a later patch, skip to “Installing the token support patch” on page 30.

For a full install (including an AIX install), continue with the preinstallation instructions in this chapter, and then follow the applicable installation instructions in later chapters.

Preparing your repositoryConfigure your repository to work with Entrust IdentityGuard before you begin the Entrust IdentityGuard Server installation. Entrust IdentityGuard supports the use of an Active Directory, LDAP directory, or a database as the data repository.

Whether you are upgrading Entrust IdentityGuard Server, or installing for the first time, you must apply the Entrust IdentityGuard schema changes by running the LDIF or SQL files.

To do so, follow the instructions in the Entrust IdentityGuard Directory Configuration Guide or Entrust IdentityGuard Database Configuration Guide.

For up-to-date and detailed information on configuring your repository, see the Technical Integration Guides.

These guides are available for download from Entrust TrustedCare Online at:

https://www.entrust.com/trustedcare

Page 23: IG 81 Install Guide 3

23Preparing for installationFeedback on guide

Preparing your VPN networkTo enable multifactor authentication for VPN connections, you can install and configure the Entrust IdentityGuard Radius proxy component with your full installation of Entrust IdentityGuard Server.

There are two ways you can set up the system to perform the required first-factor authentication before the second-factor authentication provided by Entrust IdentityGuard:

• Configure a separate Radius server that will perform the first-factor authentication, and use the Entrust IdentityGuard Radius proxy to communicate with Entrust IdentityGuard for second-factor authentication. For more information, see “Using the Radius proxy with a Radius server” on page 180.

• Configure the external authentication feature provided with Entrust IdentityGuard. This enables Entrust IdentityGuard to perform first-factor authentication using the Windows domain controller or the information from the LDAP directory. For more information, see “Configuring Entrust IdentityGuard for external authentication” on page 202.

If you are configuring Entrust IdentityGuard to add multifactor authentication to VPN connections, ensure that the following are already installed:

• an external Radius server installed using the instructions provided by the vendor, if you plan to use a Radius server for first-factor authentication

For details, see the Technical Integration Guide that applies to your VPN platform.

• a VPN client and server installed using the instructions provided by the vendor

Note: If you want to configure your VPN servers to recognize Entrust IdentityGuard groups, ensure that you create the groups (or at least know what you are going to name the groups) before installing and configuring the Entrust IdentityGuard Radius proxy. For more information, see “Configuring the Radius proxy for groups” on page 175.

The details of Radius use and implementation vary with the platform and provider. Entrust supports several authentication protocols with Radius for grid authentication:

• Challenge Handshake Authentication Protocol (CHAP)

• Microsoft Challenge Handshake Authentication Protocol versions 1 and 2 (MS-CHAP and MS-CHAPv2)

• Password Authentication Protocol (PAP)

For token authentication, Entrust IdentityGuard supports only PAP. If you configure the Radius proxy to use external authentication, you must use PAP.

Page 24: IG 81 Install Guide 3

24 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

PAP supports the cell replacement properties in the card specification attributes (cardspec) and temporary PIN attributes (pinspec) of the Entrust IdentityGuard policies; however, CHAP and MS-CHAP do not. This means that, for example, user entries are treated as case-sensitive in CHAP.

Page 25: IG 81 Install Guide 3

25Preparing for installationFeedback on guide

Installation worksheetFor a full install, ensure you have the following information before installing Entrust IdentityGuard.

Attention: If you choose to record passwords on this worksheet, remember to always keep passwords secure. Store this worksheet in a secure place.

Table 3: Installation worksheet

Required information Value

Which type of install of Entrust IdentityGuard?

• Entrust IdentityGuard Server with embedded Tomcat application server on UNIX

• Entrust IdentityGuard Server with embedded Tomcat application server on Microsoft Windows

• Entrust IdentityGuard Server with an existing application server on Solaris or AIX

Entrust IdentityGuard Server host name

UNIX user and group that owns Entrust IdentityGuard (on embedded Tomcat application server on UNIX install only)

Application server user and group that owns the application server (for installations with an existing application server only).

Group:

Name:

Password:

Complete “Creating the UNIX group and user” on page 32 (for installation with embedded Tomcat)

Entrust IdentityGuard installation directory. The default is: on UNIX /opt/entrust; on Windows c:\Program Files\Entrust\IdentityGuard)

Radius proxy required? yes or no

Complete “Radius proxy information” on page 28

Location of server trust store (installs with existing application server only)

Page 26: IG 81 Install Guide 3

26 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Location of Java directory (installs with existing application server only)

Database, Active Directory, or LDAP directory?

DB, AD, or LDAP

Complete “Database information” on page 27 or “Directory information” on page 27

Entrust IdentityGuard Authentication Web service port number (8080)

Entrust IdentityGuard Administration Web service port number (8443)

Installation key

Activation key

Master1 password

Master2 password

Master3 password

Enable sample application? yes or no

If yes, complete one of:

• “Configuring the sample application on Microsoft Windows” on page 87 if you are installing on Windows with the embedded Tomcat server

• “Configuring the sample application on UNIX” on page 51 if you are installing on UNIX with the embedded Tomcat server

• “Configuring the sample application on an existing application server” on page 121 if you are installing on an existing application server

Sample application administrator1 Name:

Password:

1. If you are using a Directory as your repository, you need to create this user in the Directory prior to installation.

Table 3: Installation worksheet (continued)

Required information Value

Page 27: IG 81 Install Guide 3

27Preparing for installationFeedback on guide

For a list of applicable .jar files for your database, the JDBC class name, and related details, see the Entrust IdentityGuard Database Configuration Guide.

For details related to your Directory type, see the Entrust IdentityGuard Directory Configuration Guide.

Table 4: Database information

Database required information Value

Database driver .jar files.

(Ensure they are copied to the Entrust IdentityGuard computer.)

Database driver class name

Database URL

Database user Name:

Password:

Schema name

Table 5: Directory information

Directory required information Value

Using the LDAP or LDAPS protocol?

LDAP or LDAPS

If using LDAPS, copy the certificate to the Entrust IdentityGuard computer.

LDAP host name

LDAP port number

LDAP base DN

LDAP user DN DN:

Password:

LDAP policy RDN

LDAP user ID attribute

Page 28: IG 81 Install Guide 3

28 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Table 6: Radius proxy information

Radius proxy required information

Value

Radius proxy ports

VPN server information Label:

Host name/IP address:

Port:

Shared secret:

Should VPN servers recognize Entrust IdentityGuard groups?

yes or no

Entrust IdentityGuard groups for VPN servers

Will the Radius proxy connect to a Radius server, domain controller or LDAP directory?

If the Radius proxy will use a Radius server, what is the unique Radius server name?

Unique name:

Host name/IP address:

Port:

Shared secret:

Table 7: External authentication information

Radius proxy required information

Value

Will Entrust IdentityGuard use an LDAP directory or Windows domain controller for first-factor authentication?

yes or no

If yes, answer one of the next two questions.

For a Windows domain controller, what server will host the Kerberos realm and the Kerberos Key Distribution Center (KDC)?

Kerberos realm server:

Kerberos KDC server:

Page 29: IG 81 Install Guide 3

29Preparing for installationFeedback on guide

For an LDAP directory, Entrust IdentityGuard must be configured to use an LDAP repository. Is that configuration complete?

yes or no

Table 7: External authentication information

Radius proxy required information

Value

Page 30: IG 81 Install Guide 3

30 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Installing the token support patchFollow these steps to install a patch that provides support for Entrust tokens on Linux or Windows.

1 Download either IG_81_129366.zip (for Windows) or IG_81_129366.tar (for Linux). See “Downloading Entrust IdentityGuard software” on page 21. If a newer patch is available, download it instead.

2 To install the patch:

• On Linux, run the patch install script install.sh.

• On Windows, run the patch installer file, for example IG_81_129366.msp.

3 Examine the instructions in the “Installation notes” section of the readme.txt file included with the download. It includes instructions that may be specific to your system or environment. For example, these instructions include:

• Deployment instructions for WebSphere and WebLogic.

• Fixing performance problems that can occur with preproduced cards stored in a database repository.

• Instructions on using Oracle Internet Directory as a repository.

The patch automatically sets properties in the identityguard.properties file related to tokens.

Reconfiguring for third-party tokensWhen you run this patch, it sets up Entrust IdentityGuard to use only Entrust tokens. If you are already using supported Vasco tokens, or plan to use them, you must add the following entry to the identityguard.properties file after you install this patch or a later patch:

identityguard.token.impl=

com.entrust.identityGuard.common.token.vasco.VascoTokenManager

To reset the property to use Entrust tokens, change the setting to this:

identityguard.token.impl=

com.entrust.identityGuard.common.token.activIdentity.ActivIdentity

TokenManager

Restart Entrust IdentityGuard for this setting to take effect.

You can configure Entrust IdentityGuard to use Entrust tokens or Vasco tokens, but not both.

Page 31: IG 81 Install Guide 3

31

Chapter 2

Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX

This chapter provides all the necessary steps to install Entrust IdentityGuard Server (with the Apache Tomcat application server embedded) on UNIX. Complete the instructions in this chapter to install, configure, initialize, and test a full install of the Entrust IdentityGuard Server. Once you complete the full installation, install the latest patch.

To install the patch that supports Entrust tokens, see “Installing the token support patch” on page 30.

This chapter contains the following sections:

• “Creating the UNIX group and user” on page 32

• “Installing Entrust IdentityGuard Server” on page 33

• “Configuring the primary Entrust IdentityGuard Server” on page 36

• “Initializing the primary Entrust IdentityGuard Server” on page 47

• “Configuring the sample application on UNIX” on page 51

• “Running the scripts manually” on page 53

• “Testing your installation” on page 58

• “Managing the Entrust IdentityGuard service” on page 62

Page 32: IG 81 Install Guide 3

32 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Creating the UNIX group and userBefore you install Entrust IdentityGuard Server on UNIX, create the UNIX group and user that will own the Entrust IdentityGuard installation. In a later step (Step 4 on page 34), you are asked to name the UNIX group and user that you create here.

Attention: Arrange to have a dedicated user account and group created on the servers that will host Entrust IdentityGuard. You must use the same account for any future upgrades and patches.

Note: On Solaris, use lowercase for creating groups and users. For example, use iggroup and iguser, instead of IGgroup and IGuser.

To create a new UNIX group and user1 As root, create a new UNIX group. For example, IGgroup:

• on Linux and Solaris,

groupadd iggroup

2 As root, create a new UNIX user. For example, IGuser. The user is a member of IGgroup and has a password:

• on Linux,

useradd -g iggroup -s /bin/bash -p password123 IGuser

• on Solaris if using c-shell,

– useradd -g iggroup -s /usr/bin/csh iguser

– passwd iguser

• on Solaris if using b-shell,

– useradd -g iggroup -s /usr/bin/bsh iguser

– passwd iguser

When you run passwd, enter your password at the prompt. For example, password123.

You have created a UNIX group and user.

Note: Ensure that the user and group that you create here have permissions to access the directory to which you extracted the IG_81_Linux.tar or the IG_81_Solaris.tar file.

Page 33: IG 81 Install Guide 3

33Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

Installing Entrust IdentityGuard ServerEntrust IdentityGuard Server runs on UNIX and should be installed on a dedicated machine. Other software products on the same machine can interfere with the operation of Entrust IdentityGuard.

To install and configure Entrust IdentityGuard, you must have an understanding of UNIX administration.

Attention: If you are installing Entrust IdentityGuard on Linux, the install requires the native library file, libstdc++.so.5. Linux Red Hat 4.0 does not provide this file by default. For further information on downloading this file, see the Entrust IdentityGuard Release notes.

Note: Before installing Entrust IdentityGuard, ensure that you have completed the tasks in “Preparing for installation” on page 19.

If you are upgrading your version of Linux, you should do so before installing Entrust IdentityGuard 8.1.

Linux Red Hat Enterprise 4When using Linux Red Hat Enterprise 4, you need to include libstdc++.so.5. You can add this during Linux installation by selecting the Legacy Software Development package.

If you have installed Linux Red Hat Enterprise 4 and have an X11 Window Manager such as KDE or Gnome, you can add the library after installation by doing the following:

1 Select Applications > System Settings > Add/Remove Applications.

2 On the Development tab, select Legacy Software Development.

You are prompted for your Linux installation CD.

If you have installed Linux Red Hat Enterprise 4 without access to an X11 Window Manager, and you are using the command line interface, you must install the most recent compat-libstdc++ package (for example, compat-libstdc++-33-3.2.3-47.3.i386.rpm).

1 Download the most recent package from the Red Hat Web site, www.redhat.com.

2 To install the package at the command line type

rpm -i <compat-libstdc++-33-3.2.3-47.3.i386.rpm>

Page 34: IG 81 Install Guide 3

34 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Note: Replace the file name with the one you downloaded from the Red Hat Web site.

To install Entrust IdentityGuard1 As root, change to the directory that you extracted the IG_81_Linux.tar or

IG_81_Solaris.tar file to (<download_dir>/IG_81), and run install.sh by entering:

./install.sh

Note: Cancel out of the script at any time by pressing Ctrl + C.

2 Read through the license carefully, pressing Enter until you reach the end. The following message appears:

Do you agree to the above license terms? [yes or no]

3 Type yes and press Enter to accept the terms. Otherwise, if you do not agree with the license, type no and press Enter. The installation will cancel. Contact Entrust (“Obtaining technical assistance” on page 16).

The following message appears:

Enter the UNIX user name that will own the installation:

4 Type the user name for the UNIX user you created in Step 2 of “Creating the UNIX group and user” on page 32 and press Enter.

Note: You cannot specify root as the owner.

The following message appears:

Enter the UNIX group name that will own the installation:

5 Enter the name for the UNIX group you created in Step 1 of “Creating the UNIX group and user” on page 32 and press Enter.

The following message appears:

Enter the install directory (default /opt/entrust):

6 Press Enter to accept the default, or type in another directory location.

Note: If you have a previous installation of Entrust IdentityGuard, the installation detects the older version and prompts you to upgrade. If you are installing an upgrade, see the section “Upgrading Entrust IdentityGuard Server on Linux” on page 299.

Page 35: IG 81 Install Guide 3

35Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

The Java Runtime license agreement appears.

7 Read through the license carefully, pressing Enter until you reach the end.

8 You are asked to accept the Java Runtime license agreement.

Do you agree to the above license terms? [yes or no]

Type yes and press Enter to accept the terms. Otherwise, if you do not agree with the license, type no and press Enter. The installation will cancel. Contact Entrust (“Obtaining technical assistance” on page 16).

The JRE, Java policy files, and the Application server are installed in the installation directory you entered in Step 6.

The identityguard.zip file is automatically extracted into the directory $IDENTITYGUARD_HOME, where $IDENTITYGUARD_HOME is usually /opt/entrust/identityguard81.

9 The installation creates the Entrust IdentityGuard Radius service.

Creating igradius service...

Do you want the Entrust IdentityGuard Radius proxy to start

automatically when the host starts after reboot? [yes or no]

If you answer no, you can enable automatic startup later.

If you wish to enable automatic startup in the future, run the

command "chkconfig igradius reset" when logged on as root.

Note: If you want to configure your VPN servers to recognize Entrust IdentityGuard groups, you must first install Entrust IdentityGuard and define the groups. In this case, enter no.

See “Configuring the Entrust IdentityGuard Radius proxy” on page 171 for further details.

10 When the initial install steps are complete, you are prompted to respond to the following message:

Installation complete.

Do you want to configure the application now? [yes or no]

• Answer yes and press Enter to start the configuration tasks. Proceed to “Configuring the primary Entrust IdentityGuard Server” on page 36.

• If you answer no, you must run the configure.sh script manually from the $IDENTITYGUARD_HOME/bin directory before you can use Entrust IdentityGuard. To do so, proceed to “To run the primary Entrust IdentityGuard Server configuration manually” on page 53.

Page 36: IG 81 Install Guide 3

36 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Configuring the primary Entrust IdentityGuard Server

As part of the installation procedure, you are prompted to configure and initialize Entrust IdentityGuard. You can choose to complete these configuration steps at the same time as the installation, or after.

Refer to your installation worksheet (“Installation worksheet” on page 25) when you complete this section.

Topics in this section:

• “Starting the Entrust IdentityGuard configuration” on page 36

• “Adding Directory information to Entrust IdentityGuard” on page 37

• “Adding Database information to Entrust IdentityGuard” on page 42

• “Completing the Entrust IdentityGuard configuration” on page 43

Starting the Entrust IdentityGuard configurationComplete the following steps to start configuring the primary Entrust IdentityGuard Server.

To start the Entrust IdentityGuard configuration1 Respond to the following prompt:

Are you configuring an Entrust IdentityGuard primary or replica

server? (PRIMARY or REPLICA):

• Primary. If this is your first Entrust IdentityGuard Server installation, answer primary and continue on with the steps in this procedure.

Note: There can only be one primary server.

• Replica. If you have already installed an Entrust IdentityGuard Server, and you want to install more instances, answer replica.

To configure and initialize a replica server, proceed to “Adding Entrust IdentityGuard replica servers” on page 210.

2 You are asked to indicate whether the user information is stored in an Active Directory (AD), LDAP, or database (DB) repository.

What type of repository will you use to store Entrust

IdentityGuard information?

Page 37: IG 81 Install Guide 3

37Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

AD - Microsoft(R) Active Directory or Microsoft Active Directory

in Application Mode

LDAP - LDAP-compliant Directory

DB - Database

(AD, LDAP or DB):

• If you are using an LDAP repository, proceed to “To add LDAP directory information to Entrust IdentityGuard” on page 37.

• If you are using an Active Directory or Active Directory Application Mode (ADAM) repository, proceed to “To add Active Directory (or ADAM) information to Entrust IdentityGuard” on page 39.

• If you are using a database repository, proceed to “To add Database information to Entrust IdentityGuard” on page 42.

Note: You can cancel the script at any time by pressing Ctrl + C.

Adding Directory information to Entrust IdentityGuardThe following steps sets up Entrust IdentityGuard to communicate with a directory repository.

The identityguard.properties file is created based on the values you enter.

Follow the appropriate steps:

• if you are adding a LDAP directory, proceed to “To add LDAP directory information to Entrust IdentityGuard”

• if you are adding Active Directory or Active Directory Application Mode, proceed to “To add Active Directory (or ADAM) information to Entrust IdentityGuard”

Note: For more information on LDAP and Active Directory configuration, see the Entrust IdentityGuard Directory Configuration Guide.

To add LDAP directory information to Entrust IdentityGuard1 Respond to the following prompt:

LDAP CONFIGURATION

Do you wish to use SSL to connect to the LDAP server? [yes or no]

Page 38: IG 81 Install Guide 3

38 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Type yes and press Enter to add the SSL certificate. If you answer no, proceed to Step 3 on page 38.

Note: You can enable LDAPS after installation. For instructions, see “Securing the LDAP connection with SSL” on page 233.

2 If you answered yes, complete the following steps:

a The following message appears:

In order to verify the SSL connection to the LDAP server,

Entrust IdentityGuard requires that the LDAP server's SSL

certificate or the certificate of the CA that issued it be

imported into its trust store. The Entrust IdentityGuard trust

store already contains several public root CA certificates. If

the server's certificate was not issued by a public root you

must import the certificate. If Entrust IdentityGuard cannot

trust the server's certificate, it will be unable to connect to

the LDAP server causing operations including initialization to

fail.

Do you wish to import the LDAP server's SSL certificate? [yes

or no]

Answer yes and press Enter to import the certificate.

For manual instructions on importing the certificate, see “To import the LDAP SSL certificate” on page 233.

The following message appears:

Enter the filename of the certificate:

b Enter the path and file name of the LDAPS certificate.

c The installer displays the details of the certificate. If they are correct, respond with yes to the prompt that asks if you wish to trust the certificate.

<certificate information>

Trust this certificate? [no]: yes

Certificate was added to keystore.

3 At the following prompt, enter the host name or IP address of the computer hosting the directory.

Enter the LDAP host (ex: identityguard.anycorp.com):

4 Enter the port number of the directory.

Page 39: IG 81 Install Guide 3

39Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

Enter the LDAP port number (default is 389):

The default port for LDAPS is 636.

5 Enter the LDAP base DN (the DN under which all Entrust IdentityGuard entries are found).

Enter the LDAP base DN (ex: dc=anycorp,dc=com):

Note: See the Entrust IdentityGuard Directory Configuration Guide for more information on directory configuration. It includes information on setting the DN, RDN, and LDAP user name for several popular directories.

6 Enter the LDAP user DN information at the following prompts. The LDAP user DN and password define the credentials used by Entrust IdentityGuard to connect to the repository.

Enter the LDAP user DN (ex: cn=Directory Manager):

This is an existing LDAP user DN.

Enter the LDAP password:

Confirm:

This is an existing LDAP password.

7 At the following prompt, enter the RDN of the entry that Entrust IdentityGuard should use to store its policy information.

The LDAP policy RDN defines the entry in the LDAP repository used

to store Entrust IdentityGuard policy information. The entry must

already exist. Enter the LDAP policy RDN (ex: uid=policy):

The RDN is the prefix that when joined with the base DN, comprises the full DN of the policy object.

8 At the following prompt, enter the attribute that uniquely identifies Entrust IdentityGuard users.

The LDAP user name is the attribute that uniquely identifies

Entrust IdentityGuard users. Entrust IdentityGuard uses this

attribute to find entries in the repository. Enter the LDAP user

name attribute (ex: uid):

Proceed to “To complete the configuration script” on page 43.

To add Active Directory (or ADAM) information to Entrust IdentityGuard1 Respond to the following prompt:

Page 40: IG 81 Install Guide 3

40 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

MICROSOFT ACTIVE DIRECTORY CONFIGURATION

Do you wish to use SSL to connect to the Microsoft Active

Directory server? [yes or no]

Type yes and press Enter to add the SSL certificate. If you answer no, proceed to Step 3 on page 40.

2 If you answered yes, complete the following steps:

The following message appears:

In order to verify the SSL connection to the Microsoft Active

Directory server, Entrust IdentityGuard requires that the

Microsoft Active Directory server's SSL certificate or the

certificate of the CA that issued it be imported into its trust

store. The Entrust IdentityGuard trust store already contains

several public root CA certificates. If the server's certificate

was not issued by a public root you must import the certificate.

If Entrust IdentityGuard cannot trust the server's certificate, it

will be unable to connect to the Microsoft Active Directory server

causing operations including initialization to fail.

Do you wish to import the Microsoft Active Directory server's SSL

certificate? [yes or no]

a Answer yes and press Enter to import the certificate.

The following message appears:

Enter the filename of the certificate:

b Enter the path and file name of the Active Directory certificate.

c The installer displays the details of the certificate. If they are correct, respond with yes to the prompt that asks if you wish to trust the certificate.

<certificate information>

Trust this certificate? [no]: yes

Certificate was added to keystore

3 At the following prompt, enter the host name or IP address of the computer hosting the directory.

Enter the Microsoft Active Directory host (ex:

identityguard.anycorp.com):

4 Enter the port number of the directory.

Enter the Microsoft Active Directory port number (default is 636):

Page 41: IG 81 Install Guide 3

41Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

5 Enter the Active Directory base DN (the DN under which all Entrust IdentityGuard entries are found).

Enter the Microsoft Active Directory base DN (ex:

dc=anycorp,dc=com):

Note: Entrust IdentityGuard configuration automatically converts spaces in the Active Directory base DN to %20. If you edit the Active Directory base DN after installation in the identityguard.properties file, remember to replace spaces with %20.

6 Enter the Active Directory user DN information at the following prompts. The Active Directory user DN and password define the credentials used by Entrust IdentityGuard to connect to the repository.

Enter the Microsoft Active Directory user DN (ex:

cn=Administrator,cn=Users,dc=anycorp,dc=com):

This is an existing Active Directory user DN.

Enter the Microsoft Active Directory password:

Confirm:

This is an existing Active Directory password.

7 At the following prompt, enter the RDN of the entry that Entrust IdentityGuard should use to store its policy information.

The policy RDN defines the entry in the Microsoft Active Directory

repository used to store Entrust IdentityGuard policy information.

The entry must already exist. Enter the Microsoft Active Directory

policy RDN (ex: cn=igpolicy,cn=Users):

The RDN is the prefix that when joined with the base DN, comprises the full DN of the policy object.

8 At the following prompt, enter the attribute that uniquely identifies Entrust IdentityGuard users.

The Microsoft Active Directory user name is the attribute that

identifies Entrust IdentityGuard users. Entrust IdentityGuard uses

this attribute to find entries in the repository. Enter the

Microsoft Active Directory user name attribute (ex:

sAMAccountName):

Proceed to “To complete the configuration script” on page 43.

Page 42: IG 81 Install Guide 3

42 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Note: Use sAMAccountName for Active Directory. Use CN (common name) or uid for ADAM. See the Entrust IdentityGuard Directory Configuration Guide for more information on Active Directory and Active Directory Application Mode configuration.

Adding Database information to Entrust IdentityGuardThe following steps sets up Entrust IdentityGuard to communicate with a database repository.

The identityguard.properties file is created based on the values you enter.

Note: For more information on database configuration, see the Entrust IdentityGuard Database Configuration Guide. It includes information on the drivers, classes, and database URLs used with three common databases.

To add Database information to Entrust IdentityGuard1 Respond to the following prompt:

DATABASE CONFIGURATION

Enter the database type (Oracle, DB2, SQLServer, Other):

Type the database you are using and press Enter.

The following message appears:

Enter the JDBC driver JAR file name:

2 Enter the path of the JDBC driver file (for example, /temp/ojdbc14.jar). Ensure the file permissions on this file allow the Entrust IdentityGuard user (“Creating the UNIX group and user” on page 32) to read and execute it.

Note: Some databases require multiple .jar files. You can add other files in a later step.

3 At the following prompt, enter the JDBC driver class that Entrust IdentityGuard should use, (for example, oracle.jdbc.driver.OracleDriver).

Enter the JDBC driver class name:

The following message appears:

Are there any other JDBC JAR files to be installed? [yes or no]

Page 43: IG 81 Install Guide 3

43Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

4 If your database requires multiple JDBC driver files, type yes and press Enter. You are prompted to enter more file names. If your database only requires one file, type no and press Enter to continue.

The following message appears:

Enter the DB URL:

5 Type the database URL Entrust IdentityGuard requires to connect to the database server and press Enter.

6 Provide Entrust IdentityGuard with the database administrator information. This database administrator was created to own the Entrust IdentityGuard database and schema.

a At the following prompt, type the database administrator user name:

Enter the DB user name:

b At the following prompts, type and confirm the database administrator password:

Enter the DB password:

Confirm:

The following message appears:

Enter the DB schema name:

7 Type the schema name for your database.

In some databases (for example, Oracle), the schema is automatically named with the user name associated with it. For these databases, type the database administrator user name.

Completing the Entrust IdentityGuard configurationThe following steps complete the initial configuration of Entrust IdentityGuard.

You are prompted for the ports that the Application server should use. Client applications—through the Authentication API—communicate with the Entrust IdentityGuard Authentication service to perform challenge retrieval and response validation. The API communicates with Entrust IdentityGuard using SOAP over HTTP/HTTPS. The following prompts define the ports that Entrust IdentityGuard services listens on.

To complete the configuration script1 Enter a value for each, or leave it blank and press Enter to accept the default value

at the prompts.

APPLICATION SERVER CONFIGURATION

Page 44: IG 81 Install Guide 3

44 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

a Enter the Authentication Service HTTP port number (default is 8080):

b Enter the Authentication Service HTTPS port number (default is 8443):

The Entrust IdentityGuard Authentication service and the Entrust IdentityGuard sample application are deployed at both the HTTP and HTTPS ports.

c Enter the Administration Service HTTPS port number (default is 8444):

This is the port that administration applications use to connect to the Administration service when using SSL (HTTPS). This port is only used for remote administration of Entrust IdentityGuard.

A self-signed SSL certificate and private key are created to protect the HTTPS connections to the Authentication service and Administration service. This certificate includes the host name of the Entrust IdentityGuard Server in its distinguished name (DN) and uses the RSA-1024 algorithm.

Optionally, you can replace this certificate after configuration. See the section “Changing the Entrust IdentityGuard certificate” on page 235 for instructions.

Note: Ensure the host name that you use in the service URLs matches the host name in the SSL certificate.

2 You are prompted to confirm the host name used in the service URLs and the SSL certificate:

Entrust IdentityGuard will create a self-signed certificate for

SSL communication.

The hostname to be used in the service URLs and the SSL

certificate is <hostname>.

Do you want to use this hostname? [yes or no]

3 Enter yes to use this host name or enter no to choose another host name.

a You are prompted to set the lifetime of the self-signed certificate:

Enter the lifetime in days of the certificate (default is 365):

Enter a new value, or leave it blank and press Enter to accept the default value of 365 days.

The location of the certificate appears after you press Enter. Entrust IdentityGuard automatically exports a copy of the self-signed certificate to a file. The name and location of the file appears after you press Enter. Within

Page 45: IG 81 Install Guide 3

45Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

the keystore, the self-signed certificate and private key are stored under the alias “tomcat.”

4 You are prompted to configure Entrust IdentityGuard logs:

LOG CONFIGURATION

a The following question appears:

Should Entrust IdentityGuard log to files or syslog [FILE or

SYSLOG]:

If you answer file, Entrust IdentityGuard displays the location of the files and configuration is complete.

b If you answer syslog, logs are logged to Syslog. Entrust IdentityGuard prompts you for the host name.

Enter the syslog host name (default is localhost):

Ensure that Syslog on this host is configured to accept Entrust IdentityGuard logs. For more information, see the section “Configuring Syslog for remote logging on UNIX” on page 226.

The following message appears:

Do you want to configure the Entrust IdentityGuard Radius

Proxy? [yes or no]

5 Do one of the following:

• If you plan to use a Radius server for first-factor authentication and are not using VPN groups, enter yes. Proceed to Step 4 in “To configure the Radius proxy on UNIX” on page 180.

• If you plan to use a Radius server for first-factor authentication and you want to configure your VPN servers to recognize Entrust IdentityGuard groups, you need to first complete the configuration and initialization of Entrust IdentityGuard and define the groups. In this case, enter no.

• If you plan to use a Windows domain controller or LDAP directory for first-factor authentication, enter yes. Follow the instructions under “Using Entrust IdentityGuard groups with a VPN server” on page 175.

• Otherwise, enter no.

6 When you finish the configuration procedure, respond to the following message:

Configuration complete.

Do you wish to initialize the primary system? [yes or no]

• Enter yes and press Enter to start the initialization tasks. Proceed to “Initializing the primary Entrust IdentityGuard Server” on page 47.

• If you enter no, you must run the init command in the supersh command shell from the $IDENTITYGUARD_HOME/bin directory before you can use

Page 46: IG 81 Install Guide 3

46 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Entrust IdentityGuard. Proceed to “To initialize the primary Entrust IdentityGuard Server manually” on page 53.

Page 47: IG 81 Install Guide 3

47Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

Initializing the primary Entrust IdentityGuard Server

Read this section for instructions on initializing the primary Entrust IdentityGuard Server in your system.

Topics in this section:

• “What initialization does” on page 47

• “If initialization fails” on page 47

• “Initializing the primary server” on page 48

What initialization doesInitialization creates master keys and the various policy structures. The identityguard.properties file specifies two files that are used to store the keys that protect the repository and the master users. The files that store this information are:

• Entrust IdentityGuard master keys file (masterkeys.enc)—a file containing the encryption keys that protect the repository.

• Entrust IdentityGuard key protection file (masterkeys.kpf)—a file containing an obfuscation key which is used to encrypt the three master user passwords that are stored in the file.

The contents of the master keys file can be unlocked by a master user. The contents of the key protection file provide access to the master user passwords. This access can then be used to unlock the master keys file.

If initialization failsThe most likely causes of an initialization failure are:

• The Entrust IdentityGuard properties file contains invalid values. To resolve this, go to $IDENTITYGUARD_HOME/etc/identityguard.properties and edit the file.

• Your repository is not configured correctly to work with Entrust IdentityGuard.

• The repository is not running.

For more information on Entrust IdentityGuard error messages, see Entrust IdentityGuard Error Messages included with your documentation package.

Page 48: IG 81 Install Guide 3

48 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Initializing the primary serverThis section provides the steps necessary to initialize the primary server.

Attention: As previously stated, if you are installing Entrust IdentityGuard on Linux, the install requires the native library file, libstdc++.so.5. Ensure that you have this file for initializing the system. Linux Red Hat 4.0 does not provide this file by default.

If you are initializing a replica server, see “Managing the Entrust IdentityGuard service” on page 62.

To initialize the primary Entrust IdentityGuard Server during installation1 Respond to the following message:

PRIMARY SYSTEM INITIALIZATION

If you are reinstalling Entrust IdentityGuard, the following prompt appears:

An existing system has been detected. Overwriting an existing

system will mean the existing data can no longer be accessed. Are

you sure you want to overwrite the existing system? (y/n) [n]:

Attention: If you are using an LDAP repository, and you run init -overwrite, you must first manually remove the fpcr folder located at $IDENTITYGUARD_HOME/etc/fpcr/ and the ftkr folder located at $IDENTITYGUARD_HOME/etc/ftkr.

Attention: If you reinitialize an Entrust IdentityGuard system by running init -overwrite, you must first replace any encrypted values in the identityguard.properties file with cleartext values because Entrust IdentityGuard cannot decrypt the old values once the reinitialization is performed. See the section “Editing property values” on page 257.

When you answer y, the command init -overwrite runs automatically.

The init command:

• generates a new master key and stores it in the master keys file

• generates the key protection file

• initializes default policy settings

Page 49: IG 81 Install Guide 3

49Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

If you answer n, or if initialization fails, you must run the init command in the master user shell (supersh) at a later time. For steps for initializing manually, see the section “To initialize the primary Entrust IdentityGuard Server manually” on page 53.

Note: Cancel out of the script at any time by pressing Ctrl + C.

The following messages appear:

Enter install key:

Enter activation key:

2 Enter the installation key and the activation key you received from Entrust. Once the activation key is validated, masters keys are then generated.

Attention: The two master keys files are created in $IDENTITYGUARD_HOME/etc. After initialization, back up masterkeys.enc. If this file is lost, the system cannot be recovered. See the system restore procedure in “Restoring Entrust IdentityGuard from a backup” on page 250.Do not back up the key protection file (masterkeys.kpf). The masterkeys.kpf file is unique to each server.

3 Type the three master user passwords for the user names—Master1, Master2, and Master3.

The passwords must meet the following criteria:

• be over eight characters in length

• contain upper and lowercase characters

• contain a numerical value

The following prompts are displayed:

Enter a new password for Master1.

Password:

Confirm:

Enter a new password for Master2.

Password:

Confirm:

Enter a new password for Master3.

Password:

Confirm:

4 When you have finished creating passwords, the following message appears:

Page 50: IG 81 Install Guide 3

50 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

System initialized.

Do you wish to setup the sample application [yes or no]

• Enter yes to configure the sample application. Proceed to “Configuring the sample application on UNIX” on page 51.

• If you enter no, you can optionally configure the sample application later. Proceed to “Testing your installation” on page 58.

Page 51: IG 81 Install Guide 3

51Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

Configuring the sample application on UNIX

Entrust IdentityGuard provides a sample application that includes user registration functionality as well as various authentication samples. This sample requires an administrator user name and password. If you are using a directory, you must create the administrator before configuring the sample application.

For more information on the sample application, see “Using the sample Web application” on page 305 or see the Entrust IdentityGuard Administration Guide.

Attention: The sample administrator password is stored in clear text in the file $IDENTITYGUARD_HOME/etc/igsample.properties. For security reasons, disable the sample application when you are not using it.

The configsample.sh script creates the following:

• a role called samplerole

• a policy called samplepolicy

• a group called samplegroup

• an administrator in the samplegroup (the administrator has access to the samplegroup)

• an igsample.properties file

If you are configuring the sample application manually, see “To enable the sample application manually” on page 52.

To configure the sample application1 You are prompted to enter the user name for the sample administrator:

Enter adminid for sample administrator:

2 You are prompted to enter and confirm a password:

Enter password for sample administrator:

Confirm:

The password must meet the following criteria:

• be over eight characters in length

• contain upper and lowercase characters

• contain a numerical value

3 Log in as a master user to complete the setup.

You are prompted for a master user name and password:

Page 52: IG 81 Install Guide 3

52 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Userid:

Password:

4 When you are finished setting up the sample, the following message appears:

Setup of Entrust IdentityGuard sample successful.

5 You are prompted to enable the sample.

Do you want to enable the sample service? [yes or no]

If you answer yes, the sample is enabled.

If you answer no, the sample is disabled. You can manually enable the sample later.

6 Once you have enabled the sample application, it is running and you can use it.

Proceed to “Using the sample Web application” on page 305 to start Entrust IdentityGuard and test your installation.

To enable the sample application manually1 From $IDENTITYGUARD_HOME, enter

. ./env_settings.sh

(Include a space between the two periods in the command.)

2 Enter

identityguard.sh enable sample

To disable the sample application manually1 From $IDENTITYGUARD_HOME, enter:

. ./env_settings.sh

(Include a space between the two periods in the command.)

2 Enter

identityguard.sh disable sample

Page 53: IG 81 Install Guide 3

53Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

Running the scripts manuallyIf you did not run the scripts during the installation procedure, you have the option to manually run the configuration and initialization scripts.

To run the primary Entrust IdentityGuard Server configuration manually1 Log in as the UNIX user that belongs to the UNIX group that was specified during

the installation. See “To install Entrust IdentityGuard” on page 34.

2 Change to $IDENTITYGUARD_HOME (default is /opt/entrust/identityguard81).

3 From $IDENTITYGUARD_HOME, source the environment settings file by entering:

. ./env_settings.sh

(Include a space between the two periods in the command.)

4 Run the configure.sh script.

If you have previously configured Entrust IdentityGuard, the following message appears:

An identityguard.properties file exists. If you continue, this

file will be overwritten.

Do you want to continue? [yes or no]

5 Type yes and continue from Step 1 of the “To start the Entrust IdentityGuard configuration” on page 36.

To initialize the primary Entrust IdentityGuard Server manually1 Log in as the UNIX user that belongs to the UNIX group that was specified during

the installation. See “To install Entrust IdentityGuard” on page 34.

2 Change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81).

3 From $IDENTITYGUARD_HOME, source the environment settings file by entering

. ./env_settings.sh

(Include a space between the two periods in the command.)

4 Enter the following command to start the master user shell:

supersh

Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.

Page 54: IG 81 Install Guide 3

54 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Note: You can view copyright and version information at any time by entering version at the command prompt.

5 Enter

init <optionalvalues>

where <optionalvalues> are listed in the table below:

6 Complete Step 2 and Step 3 on page 49.

7 Type exit to leave the command shell.

8 Check the log files for errors. If you chose to log to files when you installed Entrust IdentityGuard, the logs are stored in $IDENTITYGUARD_HOME/logs.

Values Description

-sernum To start card serial numbers at a specific number, enter:

init -sernum <num>

where <num> is a positive integer.

Defaults to 1 if not specified.

Use this option if you are adding additional cards to your system. For example, if you have previously loaded 350 cards, enter:

init -sernum 351

-overwrite If the system was initialized previously, this command overwrites the existing data.

You are prompted to confirm that you want existing data to be overwritten.

Attention: If you are using an LDAP repository, and you run init -overwrite, you must first manually remove the fpcr folder located at $IDENTITYGUARD_HOME/etc/fpcr/.

Attention: If you reinitialize an Entrust IdentityGuard system by running init -overwrite, you must first replace any encrypted values in the identityguard.properties file with cleartext values because Entrust IdentityGuard cannot decrypt the old values once the reinitialization is performed. See the section “Editing property values” on page 257.

-force If you use the -force option, you are not prompted for confirmation.

Page 55: IG 81 Install Guide 3

55Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

To configure the sample application1 Log in as the UNIX user that belongs to the UNIX group that was specified during

the installation. See “To install Entrust IdentityGuard” on page 34.

2 Change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81).

3 From $IDENTITYGUARD_HOME, source the environment settings file by entering:

. ./env_settings.sh

(Include a space between the two periods in the command.)

4 Run the configsample.sh script.

5 You are prompted to enter the user name for the sample administrator:

Enter adminid for sample administrator:

6 You are prompted to enter and confirm a password:

Enter password for sample administrator:

Confirm:

The password must meet the following criteria:

• be over eight characters in length

• contain upper and lowercase characters

• contain a numerical value

7 Log in as a master user to complete the setup.

You are prompted for a master user name and password:

Userid:

Password:

When you are finished setting up the sample, the following message appears:

Setup of Entrust IdentityGuard sample successful.

8 You are prompted to enable the sample.

Do you want to enable the sample service? [yes or no]

If you answer yes, the sample is enabled.

If you answer no, the sample is disabled. You can manually enable the sample later.

Once you have enabled the sample application, it is running and you can use it.

To make changes to the sample Web application configuration1 Log in as the UNIX user that belongs to the UNIX group that was specified during

the installation. See “To install Entrust IdentityGuard” on page 34.

Page 56: IG 81 Install Guide 3

56 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

2 Change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81).

3 From $IDENTITYGUARD_HOME, source the environment settings file by entering

. ./env_settings.sh

(Include a space between the two periods in the command.)

4 Enter the following command to start the master user shell:

supersh

Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.

5 Log in as a master user. For example,

Master1

6 If you have previously configured the sample, delete each of the following individually:

• sample administrator

• sample group

• sample role

• sample policy

To do so:

a Run the delete command for each. For example,

admin delete sample/SampleAdmin1

Note: Use the list command to list sample administrators, groups, roles, and policies, so that you can see which ones to delete. For example, use admin list to list all the sample administrators that have already been created. Use group list to list the sample groups that exist, and so on.

b Answer yes to confirm the delete.

Are you sure you wish to delete the admin? (y/n) [n]:

7 Type exit to exit the master user shell and return to the command-line.

8 Enter the following command to start configuring the sample:

configsample.sh

You are warned that the igsample.properties file already exists. For example:

/opt/entrust/identityguar81/etc/igsample.properties file already

exists. Do you wish to continue? [yes or no]

9 Answer yes.

Page 57: IG 81 Install Guide 3

57Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

10 Follow the steps in “To configure the sample application” on page 51.

Page 58: IG 81 Install Guide 3

58 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Testing your installationThis section provides testing steps that determine whether your installation is working properly. It assumes you have completed the installation, configuration, and initialization tasks.

To test your installation1 Check the log files for errors. If you chose to log to files when you installed

Entrust IdentityGuard, the logs are stored in $IDENTITYGUARD_HOME/logs.

2 Start the Entrust IdentityGuard Server as the Entrust IdentityGuard application owner. For instructions, see “Starting and stopping Entrust IdentityGuard” on page 62.

3 Check whether all Entrust IdentityGuard services are running as expected. Enter:

igservice.sh all status

The following is an example of the status report when all services are running:

Entrust IdentityGuard (pid 1247) is running...

Authentication V1 service at

http://<hostname>:8080/IdentityGuardAuthService/

services/AuthenticationService

is available.

Authentication V2 service at

http://<hostname>:8080/IdentityGuardAuthService/

services/AuthenticationServiceV2

is available.

Sample application is enabled.

Sample application at

https://<hostname>:8444/IdentityGuardSampleApp

is available.

Administration V1 service at

https://<hostname>:8444/IdentityGuardAdminService/

services/AdminService

is available.

Administration V2 service at

https://<hostname>:8444/IdentityGuardAdminService/

services/AdminServiceV2

Page 59: IG 81 Install Guide 3

59Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

is available.

Administration interface at

https://<hostname>:8444/IdentityGuardAdmin

is available.

Entrust IdentityGuard Radius (pid 1275) is running...

The following is an example of the output when there are no services running (only the sample application is enabled):

Entrust IdentityGuard (pid 13267) is not running...

Sample application is enabled.

Entrust IdentityGuard Radius (pid 1275) is not running...

4 Ensure that you can log in to the Administration webservice.

a Create an administrator account or use the sample administrator account, if you have configured the sample application.

For information on creating an administrator, see the Entrust IdentityGuard Administration Guide.

b Open a browser and enter the following URL:

https://<FQDN>:<port>/IdentityGuardAdmin

where:

– <FQDN> is the Entrust IdentityGuard host name.– <port> is the Administration webservice port (default 8444).

Note: If you cannot access the Entrust IdentityGuard services (administration or authentication), verify that firewall rules are not blocking the HTTPS ports (by default 8443 and 8444).

Page 60: IG 81 Install Guide 3

60 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

c At the login page, enter the administrator user name and password. Optionally, enter the group name, if the user does not belong to the default group.

d You are prompted to change the administrator password. (There will be no prompt if you are using an account that has already logged in, such as the sample account created earlier in “To configure the sample application” on page 51.)

e Follow the rules on the screen to change the administrator password.

Page 61: IG 81 Install Guide 3

61Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

The Entrust IdentityGuard Administration interface appears:

5 Optionally, test the sample application. To do so, follow the steps in “Using the sample Web application” on page 305.

You have completed testing of the Entrust IdentityGuard installation.

You can now:

• complete various advanced configuration tasks (“Postinstall configuration options for Entrust IdentityGuard Server” on page 201 and “Configuring the Entrust IdentityGuard Server properties file” on page 255) such as adding replica Entrust IdentityGuard Servers to your system

• set up Entrust IdentityGuard by adding policies, groups, users, authentication methods, and so on (see the Entrust IdentityGuard Administration Guide)

Page 62: IG 81 Install Guide 3

62 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Managing the Entrust IdentityGuard service

Complete the following steps to start, stop, check the status, or restart the Entrust IdentityGuard service. You have the option of using either the identityguard.sh command, or the UNIX service command.

Topics in this section:

• “Starting and stopping Entrust IdentityGuard” on page 62

• “Starting and stopping Entrust IdentityGuard with the UNIX service command” on page 63

• “Enabling and disabling individual Entrust IdentityGuard services” on page 64

Starting and stopping Entrust IdentityGuard The identityguard.sh command enables you to start, stop, restart, and query the status of the Entrust IdentityGuard service.

Note: If you are root, you cannot start Entrust IdentityGuard using identityguard.sh start, igradius.sh start, or the igservice start commands. To stop the Entrust IdentityGuard service, you must be the user who started the service.

To start and stop Entrust IdentityGuard using identityguard.sh1 Log in as the UNIX user that belongs to the UNIX group that was specified during

the installation. See “To install Entrust IdentityGuard” on page 34.

2 From $IDENTITYGUARD_HOME, enter

. ./env_settings.sh

3 To start, stop, restart, or query the status of the Entrust IdentityGuard service, enter

identityguard.sh

followed by one of the options in Table 8:

Page 63: IG 81 Install Guide 3

63Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

Note: Once IdentityGuard is installed, the service is started automatically when you reboot.

Starting and stopping Entrust IdentityGuard with the UNIX service commandYou can also start and stop the Entrust IdentityGuard services using the UNIX service command. If these commands are run as root, they start the service as the UNIX user ID that installed Entrust IdentityGuard.

To start and stop Entrust IdentityGuard with the Linux service command1 To start, stop, restart, or query the status of the Entrust IdentityGuard service,

enter

service identityguard

followed by one of the options shown in Table 9:

Table 8: Starting and stopping Entrust IdentityGuard

Command Description

start Starts the Entrust IdentityGuard service.

You can also start the Entrust IdentityGuard service by entering igstartup.sh

Entrust IdentityGuard generates audits that indicate if the services have started successfully or failed to start. You will not see an error message if the service fails to start.

stop Stops the Entrust IdentityGuard service.

You can also stop the Entrust IdentityGuard service by entering igservice.sh identityguard stop

status Tells you if the Entrust IdentityGuard service is running. If the service is running, the process ID number appears.

restart Stops and restarts the Entrust IdentityGuard service.

When you change some settings in the identityguard.properties file, you must restart the service so that the server recognizes the new settings.

Page 64: IG 81 Install Guide 3

64 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Enabling and disabling individual Entrust IdentityGuard servicesYou can use the manual command identityguard.sh to enable and disable the following Entrust IdentityGuard individual services:

• administration service

• Administration interface

• sample

To enable Entrust IdentityGuard manually using identityguard.sh1 From $IDENTITYGUARD_HOME, enter:

. ./env_settings.sh

(Include a space between the two periods in the command.)

2 Enter

identityguard.sh enable adminservice|admininterface|sample

For example, to enable the administration service, use the command

identityguard.sh enable adminservice

To disable the Entrust IdentityGuard manually using identityguard.sh1 From $IDENTITYGUARD_HOME, enter

Table 9: Linux service command

Command Description

start Starts the Entrust IdentityGuard service.

IdentityGuard generates audits that indicate if the services have started successfully or failed to start. You will not see an error message if the service fails to start.

stop Stops the Entrust IdentityGuard service.

status Tells you if the Entrust IdentityGuard service is running. If the service is running, the process ID number appears.

restart Stops and restarts the Entrust IdentityGuard service.

Changes to some settings in identityguard.properties require a restart so that the server recognizes the new settings.

Page 65: IG 81 Install Guide 3

65Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIXFeedback on guide

. ./env_settings.sh

(Include a space between the two periods in the command.)

2 Enter

identityguard.sh disable adminservice|admininterface|sample

For example, to disable the Administration interface, use the command

identityguard.sh disable admininterface

You can also use the Entrust IdentityGuard igsvcconfig.sh command to enable or disable Entrust identityGuard.

To enable Entrust IdentityGuard manually using igsvcconfig.sh • As root in $IDENTITYGUARD_HOME/bin enter

./igsvccongif.sh identityguard enable

To disable the Entrust IdentityGuard manually igsvcconfig.sh • As root in $IDENTITYGUARD_HOME/bin enter

./igsvccongif.sh identityguard disable

Page 66: IG 81 Install Guide 3

66 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Page 67: IG 81 Install Guide 3

67

Chapter 3

Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows

This chapter provides all the necessary steps to install Entrust IdentityGuard Server (with Apache Tomcat application server embedded) on Microsoft Windows. Complete the instructions in this chapter to unzip and run the Entrust IdentityGuard Installation wizard. Once you complete the full installation, install the latest patch.

To install the patch that supports Entrust tokens, see “Installing the token support patch” on page 30.

This chapter contains the following information:

• “Installing Entrust IdentityGuard Server” on page 68.

• “Configuring the primary Entrust IdentityGuard Server” on page 70

• “Initializing the primary Entrust IdentityGuard Server” on page 83

• “Configuring the sample application on Microsoft Windows” on page 87

• “Testing your installation” on page 89

• “Managing the Entrust IdentityGuard service” on page 94

Page 68: IG 81 Install Guide 3

68 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Installing Entrust IdentityGuard ServerInstall Entrust IdentityGuard Server on a dedicated machine. Other software products on the same machine can interfere with the operation of Entrust IdentityGuard.

Attention: Arrange to have a dedicated account and group created on the servers that will host Entrust IdentityGuard. You must use the same account for any future upgrades and patches.

Note: Before installing Entrust IdentityGuard, ensure that you have completed the tasks in “Preparing for installation” on page 19. Also, exit all Windows programs before running the Entrust IdentityGuard Installation wizard to prevent any conflicts in resources.

To install Entrust IdentityGuard Server1 Change to the directory in which you extracted the Entrust IdentityGuard Server

for Windows installation package.

2 Double-click the IG_81_Windows.msi installer.

The Entrust IdentityGuard Installation wizard opens.

3 Click Next on the Entrust IdentityGuard Installation wizard Welcome page to begin installation.

Note: If you are not prepared to install, click Cancel at any time to exit. Click Back to re-enter previous information.

4 Read the license agreement for Entrust IdentityGuard software carefully, select I accept the licence agreement, and then click Next.

If you do not agree with the license, select I do not accept the license agreement. The installation cannot continue. Contact Entrust (“Obtaining technical assistance” on page 16).

5 Read the licence agreement for Sun Microsystems, Inc. carefully, select I accept the licence agreement, and then click Next.

If you do not agree with the license, select I do not accept the license agreement. The installation cannot continue. Contact Entrust (“Obtaining technical assistance” on page 16).

6 Click Next to accept the default destination folder for the Entrust IdentityGuard installation (C:\Program Files\Entrust\IdentityGuard\). Alternatively,

Page 69: IG 81 Install Guide 3

69Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide

click Browse to select your own destination location and then click Next to accept it.

7 Click Next to install Entrust IdentityGuard.

8 Click Finish to exit the installation.

The Entrust IdentityGuard Configuration Panel appears. Proceed to “Configuring the primary Entrust IdentityGuard Server” on page 70.

Page 70: IG 81 Install Guide 3

70 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Configuring the primary Entrust IdentityGuard Server

As part of the installation procedure, you are prompted to configure and initialize Entrust IdentityGuard Server using the configuration panel.

Refer to your installation worksheet (“Installation worksheet” on page 25) when you complete this section.

Topics in this section:

• “Starting the Entrust IdentityGuard Configuration wizard” on page 70.

• “Selecting your repository settings” on page 72

• “Selecting Entrust IdentityGuard service ports” on page 79

• “Selecting your system host name” on page 81

• “Completing Entrust IdentityGuard configuration” on page 82

Using the Configuration PanelThe Configuration Panel includes the following features:

• The main page of the Configuration Panel contains help sections. Click Find Out More beside any option for helpful tips.

• You can maneuver through the options and buttons on the main page using the Tab key.

• Hot keys are available on the procedural pages. When you hold down the Alt key, one letter on each option or button displays an underline. With the Alt key still depressed, enter one of the underlined letters to navigate directly to that option or button.

• During any procedure, click Cancel at any time to exit. Click Back to re-enter any previous information.

Starting the Entrust IdentityGuard Configuration wizardTo configure Entrust IdentityGuard, use the Entrust IdentityGuard Configuration wizard.

The Entrust IdentityGuard Configuration wizard is located on the Entrust IdentityGuard Configuration Panel, which appears immediately after running the Entrust IdentityGuard Installation wizard.

Page 71: IG 81 Install Guide 3

71Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide

To start the Entrust IdentityGuard Configuration wizard1 Launch the Entrust IdentityGuard Configuration Panel, if it is not open.

Open the Configuration Panel by clicking Start > All Programs > Entrust > IdentityGuard > Configuration Panel.

2 From the Entrust IdentityGuard Configuration Panel, select Primary as your system type.

Attention: You can only have one primary Entrust IdentityGuard Server. If you are configuring another Entrust IdentityGuard Server as a replica, see “Adding Entrust IdentityGuard replica servers” on page 210.

3 Select Configure Entrust IdentityGuard to start the Entrust IdentityGuard Configuration wizard.

The Entrust IdentityGuard Configuration wizard Welcome page appears.

4 Click Next to begin your Entrust IdentityGuard configuration.

Page 72: IG 81 Install Guide 3

72 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Note: Click Back if you need to re-enter information on a previous page. No information will be lost. You may click Cancel or close the Entrust IdentityGuard Configuration wizard window at any time to exit the configuration process; however, all configurations will be lost.

Selecting your repository settingsSelect a repository to store and retrieve your Entrust IdentityGuard data.

To select your repository settings1 On the Repository Settings page, select the repository. There are three choices:

• Microsoft Active Directory. Proceed to “To use Active Directory as your repository” on page 73 for the configuration procedure. See the Entrust IdentityGuard Directory Configuration Guide before you begin this process. It contains detailed information on the DN, RDN, and user attribute.

• LDAP. Proceed to “To use an LDAP directory as your repository” on page 75 for the configuration procedure. See the Entrust IdentityGuard Directory Configuration Guide before you begin this process.

Page 73: IG 81 Install Guide 3

73Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide

• Database. Proceed to “To use a database as your repository” on page 77 for the configuration procedure. See the Entrust IdentityGuard Database Configuration Guide before you begin this process.

2 Click Next.

To use Active Directory as your repository 1 Under Microsoft Active Directory Server SSL Configuration, select Yes or No

depending on whether you want to secure Entrust IdentityGuard’s communications with your Active Directory server by using SSL.

• If you select Yes, click Browse to import your SSL certificate and then click Next.

Entrust IdentityGuard verifies your SSL connection to the Active Directory server by adding your imported certificate to its trust store. If the certificate cannot be trusted, Entrust IdentityGuard cannot connect to the directory.

• If you select No, click Next.

Page 74: IG 81 Install Guide 3

74 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

2 Under Microsoft Active Directory Server Connection Information, do the following:

a Enter the following information into the respective fields:

– Microsoft Active Directory host name – Microsoft Active Directory server port– Microsoft Active Directory user DN– Microsoft Active Directory password– Confirm passwordOnce you enter this information, click Test Connection. Entrust IdentityGuard performs a query and informs you if there is a successful connection to the repository.

Note: If the connection attempt fails, you can still proceed to the next step in the configuration process by clicking Next. However, all fields must be filled and passwords must match.

b Click Next to perform the host name validation check. If the host name cannot be validated, a warning message gives you the option to proceed with the configuration or enter the server connection information.

3 On the Microsoft Active Directory Server Settings page:

Page 75: IG 81 Install Guide 3

75Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide

a Enter the following information into the respective fields:

– Microsoft Active Directory base DN– Policy RDN– Microsoft Active Directory userid attributeSee the Entrust IdentityGuard Directory Configuration Guide for detailed information on the DN, RDN, and user attribute.

b Click Next.

4 Proceed to “Selecting Entrust IdentityGuard service ports” on page 79 to continue your Entrust IdentityGuard configuration.

To use an LDAP directory as your repository 1 Under LDAP Server SSL Configuration, select Yes or No depending on whether

you want to secure Entrust IdentityGuard’s communications with your LDAP server by using SSL.

• If you select Yes, click Browse to import your SSL certificate and then click Next.

Entrust IdentityGuard verifies your SSL connection to the LDAP server by adding your imported certificate to its trust store. If you select Yes when you browse for and select a certificate, a warning message displays the certificate details and prompts you to proceed.

Page 76: IG 81 Install Guide 3

76 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Note: If the certificate cannot be trusted, Entrust IdentityGuard cannot connect to the server.

• If you select No, click Next.

2 Under LDAP Server Connection Information (see the Entrust IdentityGuard Directory Configuration Guide for more information), do the following:

a Enter the following information into the respective fields:

– LDAP server host name – LDAP server port (SSL default 636, non-SSL default 389)– LDAP user DN– LDAP password– Confirm passwordOnce you enter this information, click Test Connection. Entrust IdentityGuard performs a query and informs you if there is a successful connection to the repository.

Note: If the connection attempt fails, you can still proceed to the next step in the configuration process by clicking Next. However, all fields must be filled and passwords must match.

Page 77: IG 81 Install Guide 3

77Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide

b Click Next to perform the host name validation check. If the host name cannot be validated, a warning message gives you the option to proceed with the configuration or enter the server connection information.

3 On the LDAP Server Settings page:

a Enter the following information into the respective fields:

– LDAP base DN– Policy RDN– LDAP userid attributeSee the Entrust IdentityGuard Directory Configuration Guide for detailed information on the DN, RDN, and user attribute.

b Click Next.

4 Proceed to “Selecting Entrust IdentityGuard service ports” on page 79 to continue your Entrust IdentityGuard configuration.

To use a database as your repository1 Under Database Settings, select your database from the drop-down list.

The choices are

• Oracle

• DB2

Page 78: IG 81 Install Guide 3

78 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

• SQL Server

• Other

Note: Use “Other” only if you are instructed to do so by Entrust Support.

2 Under JDBC Driver Information:

a Click Browse to import your JDBC driver .jar file.

b Enter your JDBC driver class name.

c Click Add to include any additional JDBC .jar files (optional). Alternatively, to remove any additional JDBC .jar files that you have added, highlight the .jar file in the Additional JDBC JAR files list, and click Remove.

If your JDBC driver does not require additional .jar files, leave this field blank.

3 Click Next.

4 Under Database Connection Information:

a Enter the following information into the respective fields:

– Database URL in driver-specific formatSee the vendor-specific driver documentation for additional details on URL format.

Page 79: IG 81 Install Guide 3

79Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide

– Database user name– Database password– Confirm database password– Database schema nameOnce you enter this information, click Test Connection. Entrust IdentityGuard performs a query and informs you if there is a successful connection to the database.

Note: If the connection test fails, you may still proceed to the next step in the configuration process by clicking Next; however, all fields on this page must be filled and passwords must match.

b Click Next.

5 Proceed to “Selecting Entrust IdentityGuard service ports” on page 79 to continue your Entrust IdentityGuard configuration.

Selecting Entrust IdentityGuard service portsSpecify the ports on which Entrust IdentityGuard services listen.

Page 80: IG 81 Install Guide 3

80 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Note: Ensure the ports for each Entrust IdentityGuard service are unique for that computer.

To select Entrust IdentityGuard service ports1 Under Authentication Service, enter a port number:

• in the Authentication Service HTTP port number field (default 8080)

• in the Authentication Service HTTPS port number field (default 8443)

Note: You can always disable the HTTP port later to enhance security. See “Disabling the non-SSL port on the Authentication service” on page 228.

2 Under Administration Service, enter a port number in the Administration service HTTPS port number field (default 8444).

3 Click Next.

4 Proceed to “Selecting your system host name” on page 81.

Page 81: IG 81 Install Guide 3

81Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide

Selecting your system host nameSelect a host name to generate the self-signed certificate and service URLs that are used by Entrust IdentityGuard.

To select your system host name1 From the System host name page,

a Validate the system host name in the Enter the host name to be used in the self-signed certificate and service URLs field.

The self-signed certificate secures outside communication with Entrust IdentityGuard’s services using HTTPS.

b Validate the certificate lifetime in the Self-signed SSL certificate lifetime (in days) field. Optionally, change the lifetime value. Default is 365.

Note: Optionally, you can choose to reconfigure the LDAP repository connection later. For instructions, see “To import the LDAP SSL certificate” on page 233

c Click Next.

2 Proceed to “Completing Entrust IdentityGuard configuration” on page 82.

Page 82: IG 81 Install Guide 3

82 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Completing Entrust IdentityGuard configurationThe Configuration Summary page contains a list of all information you have entered into the Entrust IdentityGuard Configuration wizard. Review this information carefully and record and store the information in a secure place, if necessary.

All text boxes in the Configuration Panel include basic, context-sensitive Windows menu commands. This lets you copy the contents of any text box. For example, you can copy the contents of the Configuration Summary page.

To copy contents of the Configuration Summary page1 Right-click in the content area of the Configuration Summary page.

2 Choose Select All from the menu.

3 Right-click again and select Copy from the menu.

4 Paste the copied text into a text file or other document.

To complete Entrust IdentityGuard Server configuration1 On the Configuration Summary page, click Confirm and Save if all the

information in the summary list is complete and correct.

Note: If you choose to cancel, all information will be lost.

Note: If the system has already been initialized, when you click Initialize Entrust IdentityGuard a warning message explains the consequences of reinitializing an existing system.

2 Click Finish to complete the configuration process.

You can now initialize the server. Go to “Initializing the primary Entrust IdentityGuard Server” on page 83.

Page 83: IG 81 Install Guide 3

83Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide

Initializing the primary Entrust IdentityGuard Server

Once you configure your Entrust IdentityGuard Server, initialize it using the Entrust IdentityGuard Initialization wizard. If you have not yet configured, see “Configuring the primary Entrust IdentityGuard Server” on page 70.

Attention: If you are reinitializing, all stored information (such as user accounts, cards, and groups) will be lost and all settings reset to their defaults.

Topics in this section:

• “What initialization does” on page 83

• “If initialization fails” on page 83

• “Running the Entrust IdentityGuard Initialization wizard” on page 84.

What initialization doesInitialization creates master keys and the various policy structures. The identityguard.properties file specifies two files used to store the keys that protect the repository and the master users. The files that store this information are:

• Entrust IdentityGuard master keys file (masterkeys.enc)—a file containing the encryption keys that protect the repository.

• Entrust IdentityGuard key protection file (masterkeys.kpf)—a file containing an obfuscation key which is used to encrypt the three master user passwords that are stored in the file.

The contents of the master keys file can be unlocked by a master user. The contents of the key protection file provide access to the master user passwords. This access can then be used to unlock the master keys file.

If initialization failsReview the sytem.log file to identify the cause of failure. The log file is in <IG_Install_Dir>\identityguard81\logs\system.log. By default <IG_Install_Dir> is C:\Program Files\Entrust\IdentityGuard.

Some possible causes of an initialization failure are:

• The Entrust IdentityGuard properties file contains invalid values. To resolve this, go to <IG_Install_Dir>\etc\identityguard.properties and edit the file.

Page 84: IG 81 Install Guide 3

84 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

• Your repository is not configured correctly.

• The repository is not running.

• Your Entrust IdentityGuard Server service is running. See, “To check the status of Entrust IdentityGuard” on page 94.

For more information on Entrust IdentityGuard error messages, see Entrust IdentityGuard Error Messages included with your documentation package.

Running the Entrust IdentityGuard Initialization wizardStart and run the Entrust IdentityGuard Initialization wizard by completing the following procedures.

To start the Entrust IdentityGuard Initialization wizard1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking

Start > All Programs > Entrust > IdentityGuard > Configuration Panel.

2 Select Primary as the system type.

3 Select Initialize Entrust IdentityGuard.

Page 85: IG 81 Install Guide 3

85Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide

The Primary System Initialization page appears.

Note: If you cancel at any time, all information will be lost.

4 Under License Information:

a Type your Entrust IdentityGuard installation key in the Entrust IdentityGuard Installation Key field.

b Type your Entrust IdentityGuard activation key in the Entrust IdentityGuard Activation Key field.

5 Click Validate.

The master user information fields are enabled as soon as the licence information is validated.

6 Under Master User Information, enter passwords for each one of the three master users (Master1, Master2, and Master3), and confirm each password.

The passwords must meet the following criteria:

• be over 8 characters in length

• contain upper and lowercase characters

Page 86: IG 81 Install Guide 3

86 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

• contain a numerical value

7 Click Initialize.

The Entrust IdentityGuard Server initializes.

8 Click OK.

You can now configure the sample application or test your installation. Go to one of:

• “Configuring the sample application on Microsoft Windows” on page 87

• “Testing your installation” on page 89

Page 87: IG 81 Install Guide 3

87Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide

Configuring the sample application on Microsoft Windows

This section details how you can configure and enable the Entrust IdentityGuard sample application.

The sample Web application demonstrates how Entrust IdentityGuard registers users and authenticates them. This sample requires an administrator user ID and password. If you are using a directory, create the user ID entry in the directory prior to installing the sample Web application.

For details on how to use the sample application, see “Using the sample Web application” on page 305.

For more information about authentication features shown in the sample application, see the Entrust IdentityGuard Administration Guide.

Note: You cannot configure the sample application on a replica Entrust IdentityGuard Server.

Attention: The sample administrator password is stored in clear text in the <IG_INSTALL_DIR>\identityguard81\ect\igsamples.properties file. For security reasons, disable the sample application when you are not using it.

If you have previously configured the sample, delete each of the following individually to reconfigure the sample:

• sample administrator

• sample group

• sample role

• sample policy

You can only disable or enable the sample application after initial configuration, using the Entrust IdentityGuard Web interface and Application Manager located on the Entrust IdentityGuard Configuration Panel.

To configure the sample application 1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking

Start > All Programs > Entrust > IdentityGuard > Configuration Panel.

2 Under Sample Application Setup, select Set Up the Sample Application to run the utility.

Page 88: IG 81 Install Guide 3

88 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

The Master User Login page appears.

3 Enter your master user name and master user password in the applicable fields. Use any one of the three master users set up in “Initializing the primary Entrust IdentityGuard Server” on page 83.

The Entrust IdentityGuard Sample Web Application Setup page appears.

4 Under Configure Web Sample Administrator, type the following information:

• Administrator user name. If you are using an LDAP or Active Directory repository, enter the ID of a user that already exists in the directory.

• Administrator password. The password must be over 8 characters in length, contain upper and lower case characters, and contain a numerical value.

• Confirm password. Re-enter the password entered in the field above.

5 Click Save to configure the sample application.

The sample application is configured and by default, enabled.

Page 89: IG 81 Install Guide 3

89Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide

Testing your installationThis section provides testing steps that determine whether your installation is working properly. It assumes you have completed the installation, primary configuration, and initialization tasks.

To test your installation1 Check the log files in <IG_INSTALL_DIR>\identityguard81\logs for

errors, where <IG_INSTALL_DIR> is C:\Program Files\Entrust\IdentityGuard, by default.

2 Start the Entrust IdentityGuard Server. For instructions, see “Managing the Entrust IdentityGuard service” on page 94.

3 Check the status of all services in Entrust IdentityGuard Web interface and Application Manager, accessible through the Entrust IdentityGuard Configuration Panel.

a Launch the Entrust IdentityGuard Configuration Panel and select Launch Web Service and Application Manager.

b On the Status tab, check the status of each service:

Page 90: IG 81 Install Guide 3

90 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

– Administration service– Authentication service– Administration interface– Sample Web applicationIf the status of any of these is offline, see “Installation troubleshooting” on page 92.

If the status of any of these is Error, ensure that the URLs correspond to valid svcs/apps in IdentityGuard.properties. To edit the URLs, go to <IG_Install_Dir>\etc\identityguard.properties.

4 Ensure that you can log in to the Administration Web interface.

a Create an administrator account or use the sample administrator account, if you have configured the sample application.

For information on creating an administrator, see the Entrust IdentityGuard Administration Guide.

b Once you have created an administrator, do one of the following:

– In Windows, click Start > All Programs > Entrust > IdentityGuard >Administration Interface. This opens the interface in your default browser.

– In a Web browser, enter the URL of your Administration interface.https://<hostname>:<port>/IdentityGuardAdmin

Where:<hostname> is the server host name you selected during configuration.<port> is the administration port you selected during configuration (default 8444).

Note: If you cannot access the Entrust IdentityGuard services (Administration or Authentication), verify that firewall rules are not blocking the HTTPS ports (by default 8443 and 8444).

Page 91: IG 81 Install Guide 3

91Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide

c At the login page, enter the administrator user name and password. Optionally, enter the group name, if the user does not belong to the default group.

The Entrust IdentityGuard Administration interface appears.

5 Optionally, test the sample application. To do so, follow the steps in “Using the sample Web application” on page 305.

You have now completed testing the Entrust IdentityGuard installation.

Page 92: IG 81 Install Guide 3

92 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

You can now:

• Complete various advanced configuration tasks (“Postinstall configuration options for Entrust IdentityGuard Server” on page 201 and “Configuring the Entrust IdentityGuard Server properties file” on page 255) such as adding replica Entrust IdentityGuard Servers to your system.

• Set up your Entrust IdentityGuard system by adding policies, groups, users, authentication methods, and so on (see the Entrust IdentityGuard Administration Guide).

Installation troubleshootingWhen you reinstall Entrust IdentityGuard, its Windows services may need to be restarted. If one or more services is marked as Offline on the Status tab of the Web Service and Application Manager page, restart the services. See “Managing the Entrust IdentityGuard service” on page 94.

If the Administration interface does not appear, but you know the services are running, you need to check if it is disabled.

To enable the Administration interface and service1 Select Launch Web Service and Application Manager on the Entrust

IdentityGuard Configuration Panel.

The Web Service and Application Manager page appears.

2 Click the Controls tab.

3 Under Administration Service, select Enabled.

4 Under Administration Interface, select Enabled.

5 Click Apply Changes.

The interface is enabled.

To enable the sample application 1 Select Launch Web Service and Application Manager on the Entrust

IdentityGuard Configuration Panel.

Page 93: IG 81 Install Guide 3

93Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft WindowsFeedback on guide

The Web Service and Application Manager page appears.

2 Click the Controls tab.

3 Under Sample Application, select Enabled.

4 Click Apply Changes.

The sample application is enabled and the IdentityGuard service is restarted.

To disable the sample application

Note: Only a configured sample application can be disabled.

1 Select Launch Web Service and Application Manager on the Entrust IdentityGuard Configuration Panel.

2 Click the Controls tab.

3 Under Sample Application, select Disabled.

4 Click Apply Changes.

The sample application is disabled.

Page 94: IG 81 Install Guide 3

94 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Managing the Entrust IdentityGuard service

Complete the following steps to start, stop, check the status, or restart the Entrust IdentityGuard service.

Starting and stopping events are logged in the Event Viewer.

Note: By default, Entrust IdentityGuard starts automatically whenever you reboot the computer.

The following commands allow you to start, stop, restart, and query the status of the Entrust IdentityGuard Server.

Changes to some settings in identityguard.properties require a restart so that the server recognizes the new settings.

To start, stop, and restart Entrust IdentityGuard 1 Go to Start > All Programs > Control Panel > Administrative Tools > Services.

The Services window appears.

2 To stop, start, or restart, the Entrust IdentityGuard Server (including the sample application), right-click Entrust IdentityGuard Server and select the appropriate command.

3 To start, stop, or restart the Entrust IdentityGuard Radius proxy, right-click Entrust IdentityGuard Radius Proxy and select the appropriate command.

To check the status of Entrust IdentityGuard1 Go to Start > All Programs > Control Panel > Administrative Tools > Services.

The Services window appears.

2 Locate Entrust IdentityGuard Server and check the status column to view the status.

The status tells you if the Entrust IdentityGuard Server is running.

Page 95: IG 81 Install Guide 3

95

Chapter 4

Installing Entrust IdentityGuard Server with an existing application server

This chapter provides all the necessary steps to install, configure, initialize, and test Entrust IdentityGuard Server on UNIX using a WebLogic 8.1 or 9.1 or a WebSphere 6.0 application server. Once you complete the full installation, install the latest patch.

To install the patch that supports Entrust tokens, see “Installing the token support patch” on page 30.

This chapter contains the following sections:

• “Preparing WebLogic for installation of IdentityGuard” on page 96

• “Preparing WebSphere for installation of Entrust IdentityGuard” on page 100

• “Installing Entrust IdentityGuard Server” on page 106

• “Configuring the primary Entrust IdentityGuard Server” on page 109

• “Initializing the primary Entrust IdentityGuard Server” on page 118

• “Configuring the sample application on an existing application server” on page 121

• “Running the scripts manually” on page 123

Page 96: IG 81 Install Guide 3

96 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Preparing WebLogic for installation of IdentityGuard

Complete the following tasks to prepare your WebLogic application server for Entrust IdentityGuard.

Topics in this section:

• “Preparing WebLogic 8.1 for installation” on page 96

• “Configuring SSL for WebLogic 8.1” on page 97

• “Preparing WebLogic 9.1 for install” on page 98

• “Configuring SSL for WebLogic 9.1” on page 98

Attention: Arrange to have a dedicated user account and group created on the servers that will host Entrust IdentityGuard. You must use the same account for any future upgrades and patches.

Preparing WebLogic 8.1 for installationComplete the following procedure to prepare WebLogic 8.1 server for the installation of Entrust IdentityGuard.

Note: The following steps use $WEBLOGIC as the directory in which the WebLogic server was installed, for example /usr/local/bea. $DOMAIN is the directory of the WebLogic domain where Entrust IdentityGuard is being installed, for example, /opt/bea/weblogic/samples/domains/wl_server.

To prepare for install1 Download and install the unlimited strength cryptography policy files for the Java

Development Kit (JDK) being used to run WebLogic from the Sun Java Web site http://java.sun.com/j2se/1.4.2/download.html, and depending on the JRE you are using, install them in $WEBLOGIC/<java>/jre/lib/security

where <java> is the directory for the Java version used by the application server.

Note: It is important that you install the policy files specific to your Java Development Kit (JDK).

2 Extract the policy files.

Page 97: IG 81 Install Guide 3

97Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide

The files are extracted to a new directory called jce. You must move the two .jar files from the jce directory to the security directory.

3 To move the jar files enter:

mv local_policy.jar $WEBLOGIC/<java>/jre/lib/security

mv US_export_policy.jar $WEBLOGIC/<java>/jre/lib/security

Note: It is recommended that you backup the existing versions of the policy files.

Configuring SSL for WebLogic 8.1You can configure SSL using public CA or self-signed certificates.

SSL configuration is straightforward if you are using certificates signed by a public Certification Authority (CA) such as Entrust Certificate Services (http://www.entrust.net/index.htm). If you are using a public CA you must:

• Ensure that the SSL protocol is set to SSLv3.

• Have a secure connection between administration services and Web administration—128+ bit strength algorithms are recommended.

If you want an SSL certificate from a public CA, use the Java keytool to create a certificate signing request (CSR). Then, follow the instructions on the public CA Web site to create a certificate. Once the certificate is created, import it and the CA certificate into your keystore using the Java keytool.

For detailed instructions on configuring SSL on WebLogic, refer to http://edocs.bea.com/wls/docs91/secmanage/ssl.html.

Additional steps are required if you are using a self-signed certificate. To set up a self-signed certificate you configure the Java Virtual Machine (JVM) property to javax.net.ssl.trustStore by following “To set up a self-signed certificate” on page 97 below.

To set up a self-signed certificate1 Edit $DOMAIN/startWebLogic.sh.

2 Move to the line where JAVA_OPTIONS are specified and set the argument

-Djavax.net.ssl.trustStore=<$TRUST_STORE>.JKS

<$TRUST_STORE>.JKS refers to the file that contains the trusted certificates.

Page 98: IG 81 Install Guide 3

98 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Preparing WebLogic 9.1 for installComplete the following procedure to prepare your WebLogic 9.1 server for installation of Entrust IdentityGuard.

Note: In the following, $WEBLOGIC is the directory in which the WebLogic server was installed, for example, /usr/local/bea.$DOMAIN is the directory of the WebLogic domain where Entrust IdentityGuard is being installed, for example /opt/bea/weblogic/samples/domains/wl_server.

To prepare for install1 Download the unlimited strength cryptography policy files for Java 1.5.0 from

the Sun Java Web site at http://java.sun.com/j2se/1.5.0/download.jsp, and depending on the JRE you are using, install them in $WEBLOGIC/<java>/jre/lib/security, where <java> is the directory for the Java version used by the application server.

Note: It is important that you install the policy files specific to your Java Development Kit (JDK).

2 Extract the policy files.

The files are extracted to a new directory called jce. You must move the two .jar files from the jce directory to the security directory:

3 To move the jar files enter:

mv local_policy.jar $WEBLOGIC/<java>/jre/lib/security

mv US_export_policy.jar $WEBLOGIC/<java>/jre/lib/security

where <java> is the directory for the Java version used by the application server.

Note: It is recommended that you back up the existing versions of the policy files.

Configuring SSL for WebLogic 9.1You can configure SSL using public CA or self-signed certificates.

SSL configuration is straightforward if you are using certificates signed by a public Certification Authority (CA) such as Entrust Certificate Services (http://www.entrust.net/index.htm). If you are using a public CA you must:

• Ensure that the SSL protocol is set to SSLv3.

Page 99: IG 81 Install Guide 3

99Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide

• Have a secure connection between administration services and Web administration—128+ bit strength algorithms are recommended.

If you want an SSL certificate from a public CA, use the Java keytool to create a certificate signing request (CSR). Then, follow the instructions on the public CA Web site to create a certificate. Once the certificate is created, import it and the CA certificate into your keystore using the Java keytool.

For detailed instructions on configuring SSL on WebLogic, refer to http://edocs.bea.com/wls/docs81/index.html.

Additional steps are required if you are using a self-signed certificate. You must update the command line options to start the domain.

To set up a self-signed certificate1 Edit $DOMAIN/setDomainEnv.sh.

2 Move to the line where JAVA_OPTIONS are specified and set the following argument:

-Djavax.net.ssl.trustStore=<$trustStore>.jks

where <$trustStore> refers to the file that contains the trusted certificates.

Page 100: IG 81 Install Guide 3

100 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Preparing WebSphere for installation of Entrust IdentityGuard

These instructions assume that you have already installed and tested your application server and enabled SSL. They also assume that you are using the default Java Virtual Machine (JVM) in $WEBSPHERE/AppServer/java.

Complete one of the following procedures, depending on your platform:

• “To prepare for installation on Solaris” on page 100

• “To prepare for installation on AIX” on page 100

To prepare for installation on Solaris1 Download and install the unlimited strength cryptography policy files for the Java

Development Kit (JDK) being used to run WebSphere from the Sun Java Web site http://java.sun.com/j2se/1.4.2/download.html, and depending on the JRE you are using, install them in $WEBSPHERE/<java>/jre/lib/security

where <java> is the directory for Java version used by the application server.

Note: It is important that you install the policy files specific to your Java Development Kit (JDK) if you are not using J2SE 1.4.2.

2 Extract the policy files.

The files are extracted to a new directory called jce. You must move the two jar files from the jce directory to the security directory.

3 To move the jar files to the security directory enter:

mv local_policy.jar $WEBSPHERE/<java>/jre/lib/security

mv US_export_policy.jar $WEBSPHERE/<java>/jre/lib/security

4 Repeat Step 2 and Step 3 for each JRE on your computer.

Note: It is recommended that you back up the existing versions of the policy files.

To prepare for installation on AIX1 Download the following RPMs from AIX Toolkit for Linux applications

(http://www-03.ibm.com/servers/aix/products/aixos/linux/download.html):

• bash

• unzip

Page 101: IG 81 Install Guide 3

101Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide

• zip

2 Install each package on your AIX server. To do so, run the following command as root:

rpm -i <package file>

3 Download and install the unlimited strength cryptography policy files for the Java Development Kit (JDK) being used to run WebSphere. You can download the policy files by browsing to https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=jcesdk and selecting “Unrestricted JCE Policy files for SDK 1.4.2”.

4 Install them in $WEBSPHERE/<java>/jre/lib/security, where <java> is the directory for Java version used by the application server. For example, $WEBSPHERE/AppServer/java/jre/lib/security.

For further instructions, refer to http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/topic/com.ibm.websphere.base.doc/info/aes/ae/tsec_egs.html.

Note: It is recommended that you back up the existing versions of the policy files.

Configuring SSL for WebSphere 6.0You can configure SSL using public CA or self-signed certificates.

SSL configuration is straightforward if you are using certificates signed by a public Certification Authority (CA) such as Entrust Certificate Services (http://www.entrust.net/index.htm). If you are using a public CA you must:

• Ensure that the SSL protocol is set to SSLv3.

• Have a secure connection between administration services and Web administration—128+ bit strength algorithms are recommended.

If you want an SSL certificate from a public CA, use the key management utility to create a certificate signing request (CSR). Then, follow the instructions on the public CA Web site to create a certificate. Once the certificate is created, import it and the CA certificate into your keystore using the key management utility.

For detailed instructions on configuring SSL on WebSphere, refer to http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm.websphere.base.doc/info/aes/ae/tsec_ssl.html.

Additional steps are required if you are using a self-signed certificate. To set up a self-signed certificate you can do one of the following:

• Import the self-signed certificate into the root store for the JRE, in $WEBSPHERE/AppServer/java/jre/lib/security/cacerts.

Page 102: IG 81 Install Guide 3

102 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

• Set the Java Virtual Machine (JVM) property to javax.net.ssl.trustStore by following “To set up a self-signed certificate by setting the JVM property” on page 102 below.

To set up a self-signed certificate by setting the JVM property1 Start your WebSphere server from $WEBSPHERE/AppServer/bin by entering

./startServer.sh <server_name>

where server_name is the name of the server you are starting.

2 Start the administration console for your server.

The default URL is http://localhost:9060/ibm/console.

3 Log in to your server.

The WebSphere main page appears.

4 From the WebSphere main page, select Servers > Application servers.

Page 103: IG 81 Install Guide 3

103Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide

The Application servers page appears.

5 Click the server name on which you want to deploy Entrust IdentityGuard services from the Application servers list.

The Server page appears.

Page 104: IG 81 Install Guide 3

104 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

6 Under Server Infrastructure, select Java and Process Management > Process Definition > Java Virtual machine > Custom Properties.

Page 105: IG 81 Install Guide 3

105Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide

The Custom Properties page appears.

7 Click New.

The Custom Properties configuration page appears.

8 Name the new property javax.net.ssl.trustStore and set the value to <$trustStore>.jks where <$trustStore> is the name of the file that contains the trusted certificates.

9 Click OK.

Page 106: IG 81 Install Guide 3

106 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Installing Entrust IdentityGuard ServerInstall Entrust IdentityGuard on a dedicated machine. Other software products on the same machine can interfere with the operation of Entrust identityGuard.

To install and configure Entrust IdentityGuard, you must have an understanding of UNIX administration.

Note: Before installing Entrust IdentityGuard, ensure that you have also completed the tasks in “Preparing for installation” on page 19.

To install Entrust IdentityGuard1 As root, change to the IG_81 directory. This directory was created when you

extracted the download package.

2 Run install.sh by entering:

./install.sh

Note: Cancel out of the script at any time by pressing Ctrl + C or Ctrl + @.

3 Read through the license carefully, pressing Enter until you reach the end. The following message appears:

Do you agree to the above license terms? [yes or no]

4 Enter yes to accept the terms. Otherwise, if you do not agree with the license, type no and press Enter. The installation will cancel. Contact Entrust (“Obtaining technical assistance” on page 16).

The following message appears:

Enter the UNIX user name that will own the installation:

5 Enter the user name already created for your WebLogic or WebSphere application server.

The following message appears:

Enter the UNIX group name that will own the installation:

6 Enter the name for the group already created for your WebLogic or WebSphere application server.

The following message appears:

Enter the install directory (default /opt/entrust):

Page 107: IG 81 Install Guide 3

107Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide

Note: The installer will create this directory. If someone has already created the installation directory, you must ensure that the directory permissions allow the installer to write to that directory.

7 Press Enter to accept the default, or type in another directory location.

After pressing Enter, the identityguard.zip file is automatically extracted into the directory $IDENTITYGUARD_HOME, where $IDENTITYGUARD_HOME is usually /opt/entrust/identityguard81.

To continue Java must already be installed. It is recommended that you use the version of Java installed on your application server.

The following message appears:

Enter the Java directory:

8 Enter the full directory path of the Java directory where the JCE policy files were installed.

The following message appears:

Entrust IdentityGuard uses the trust store of the application

server.

Enter the file name of the application server trust store:

9 Enter the full directory path and file name of the application server trust store. See “Configuring SSL for WebSphere 6.0” on page 101. This file sets environment variables needed to run Entrust IdentityGuard.

10 The installation creates the Entrust IdentityGuard Radius service:

Creating igradius service...

Do you wish the Entrust IdentityGuard Radius proxy to start

automatically when the host starts after reboot? [yes or no]

If you answer no, you can enable automatic startup later.

If you wish to enable automatic startup in the future, run the

command “igsvcconfig.sh igradius enable” when logged on as root.

Note: If you want to configure your VPN servers to recognize Entrust IdentityGuard groups, you must first install Entrust IdentityGuard and define the groups. In this case, enter no.

See “Configuring the Entrust IdentityGuard Radius proxy” on page 171 for further details.

11 When the initial installation steps are complete, you must respond to the following prompt:

Page 108: IG 81 Install Guide 3

108 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Installation complete.

Do you wish to configure the application now? [yes or no]

• Answer yes and press Enter to start the configuration tasks. Proceed to “Configuring the primary Entrust IdentityGuard Server” on page 109.

• If you answer no, you must run the configure.sh script manually from the $IDENTITYGUARD_HOME/bin directory before you can use Entrust IdentityGuard. To do so, proceed to “To run the primary Entrust IdentityGuard Server configuration manually” on page 123.

Page 109: IG 81 Install Guide 3

109Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide

Configuring the primary Entrust IdentityGuard Server

As part of the installation procedure, you are prompted to configure and initialize Entrust IdentityGuard. You can choose to complete these configuration steps at the same time as the installation or after.

Refer to your installation worksheet (“Installation worksheet” on page 25) when you complete this section as you use this information to answer the prompts during configuration.

Topics in this section:

• “Starting the Entrust IdentityGuard configuration” on page 109

• “Adding Directory information to Entrust IdentityGuard” on page 110

• “Adding Database information to Entrust IdentityGuard” on page 114

• “Completing the Entrust IdentityGuard configuration” on page 115

Starting the Entrust IdentityGuard configurationComplete the following steps to start configuring the primary Entrust IdentityGuard Server.

To start the Entrust IdentityGuard configuration1 Respond to the following prompt:

Are you configuring an Entrust IdentityGuard primary or replica

server? (PRIMARY or REPLICA):

• Primary. If this is your first Entrust IdentityGuard Server installation, answer primary and continue with the steps in this procedure.

Note: There can only be one primary server.

• Replica. If you have already installed an Entrust IdentityGuard Server, and you want to install more instances, answer replica.

To configure and initialize a replica server, proceed to“Adding Entrust IdentityGuard replica servers” on page 210.

2 You are asked to indicate whether the user information is stored in an Active Directory (AD), LDAP, or database (DB) repository.

Page 110: IG 81 Install Guide 3

110 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

What type of repository will you use to store Entrust

IdentityGuard information?

AD - Microsoft(R) Active Directory or Microsoft Active

Directory in Application Mode

LDAP - LDAP-compliant Directory

DB - Database

(AD, LDAP or DB):

• If you are using an LDAP repository, proceed to “To add LDAP Directory information to Entrust IdentityGuard” on page 110.

• If you are using an Active Directory or Active Directory Application Mode (ADAM) repository, proceed to “To add Active Directory (or ADAM) information to Entrust IdentityGuard” on page 112.

• If you are using a database repository, proceed to “To add Database information to Entrust IdentityGuard” on page 114.

Note: You can cancel the script at any time by pressing Ctrl + C.

Adding Directory information to Entrust IdentityGuardThe following steps sets up Entrust IdentityGuard to communicate with a directory repository. The steps create the identityguard.properties file based on the values you enter.

Follow the appropriate steps:

• if you are adding a LDAP Directory, proceed to “To add LDAP Directory information to Entrust IdentityGuard”

• if you are adding Active Directory or Active Directory Application Mode, proceed to “To add Active Directory (or ADAM) information to Entrust IdentityGuard”

Note: See the Entrust IdentityGuard Directory Configuration Guide for more information on LDAP and Active Directory configuration.

To add LDAP Directory information to Entrust IdentityGuard1 Respond to the following prompt:

LDAP CONFIGURATION

Page 111: IG 81 Install Guide 3

111Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide

Do you wish to use SSL to connect to the LDAP server? [yes or no]

Note: You can enable LDAPS after installation. For instructions, see “Securing the LDAP connection with SSL” on page 233.

2 If you answered yes, the following message appears:

Make sure that SSL certificate of the LDAP server is installed

into the application server trust store.

If you answer no, no further message appears.

3 At the following prompt, enter the host name or IP address of the computer hosting the Directory:

Enter the LDAP host (ex: identityguard.anycorp.com):

4 Enter the port number of the Directory:

Enter the LDAP port number (default is 389):

The default port for LDAPS is 636.

5 Enter the LDAP base DN (the DN under which all Entrust IdentityGuard entries are found):

Enter the LDAP base DN (ex: dc=anycorp,dc=com):

Note: Entrust IdentityGuard configuration automatically converts spaces in the Active Directory base DN to %20. If you edit the Active Directory base DN after installation in the identityguard.properties file, remember to replace spaces with %20.

6 Enter the LDAP user DN information at the following prompts. The LDAP user DN and password define the credentials used by Entrust IdentityGuard to connect to the repository.

Enter the LDAP user DN (ex: cn=Directory Manager):

This is an existing LDAP user DN.

Enter the LDAP password:

Confirm:

This is an existing LDAP password.

7 At the following prompt, enter the RDN of the entry that Entrust IdentityGuard should use to store its policy information:

Page 112: IG 81 Install Guide 3

112 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

The LDAP policy RDN defines the entry in the LDAP repository used

to store Entrust IdentityGuard policy information. The entry must

already exist. Enter the LDAP policy RDN (ex: uid=policy):

The RDN is the prefix that, when joined with the base DN, comprises the full DN of the policy object.

8 At the following prompt, enter the attribute that uniquely identifies Entrust IdentityGuard users:

The LDAP user name is the attribute that uniquely identifies

Entrust IdentityGuard users. Entrust IdentityGuard uses this

attribute to find entries in the repository. Enter the LDAP user

name attribute (ex: uid):

Proceed to “To complete the configuration script” on page 115.

To add Active Directory (or ADAM) information to Entrust IdentityGuard1 Respond to the following prompt:

MICROSOFT ACTIVE DIRECTORY CONFIGURATION

Do you wish to use SSL to connect to the Microsoft Active

Directory server? [yes or no]

2 If you answered yes, the following message appears:

Make sure that SSL certificate of the of the Microsoft Active

Directory server is installed into the application server trust

store.

If you answer no, no further message appears.

3 At the following prompt, enter the host name or IP address of the computer hosting the Directory:

Enter the Microsoft Active Directory host (ex:

identityguard.anycorp.com):

4 Enter the port number of the Directory:

Enter the Microsoft Active Directory port number (default is 636):

If you do not use SSL to connect to ADAM, the default port is 389.

5 Enter the Active Directory base DN (the DN under which all Entrust IdentityGuard entries are found):

Enter the Microsoft Active Directory base DN (ex:

dc=anycorp,dc=com):

Page 113: IG 81 Install Guide 3

113Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide

Note: Entrust IdentityGuard configuration automatically converts spaces in the Active Directory base DN to %20. If you edit the Active Directory base DN after installation in the identityguard.properties file, remember to replace spaces with %20.

6 Enter the Active Directory user DN information at the following prompts. The Active Directory user DN and password define the credentials used by Entrust IdentityGuard to connect to the repository.

Enter the Microsoft Active Directory user DN (ex:

cn=Administrator,cn=Users,dc=anycorp,dc=com):

This is an existing Active Directory user DN.

Enter the Microsoft Active Directory password:

Confirm:

This is an existing Active Directory password.

7 At the following prompt, enter the RDN of the entry that Entrust IdentityGuard should use to store its policy information:

The policy RDN defines the entry in the Microsoft Active Directory

repository used to store Entrust IdentityGuard policy information.

The entry must already exist. Enter the Microsoft Active Directory

policy RDN (ex: cn=igpolicy,cn=Users):

The RDN is the prefix that when joined with the base DN, comprises the full DN of the policy object.

8 At the following prompt, enter the attribute that uniquely identifies Entrust IdentityGuard users:

The Microsoft Active Directory user name is the attribute that

identifies Entrust IdentityGuard users. Entrust IdentityGuard uses

this attribute to find entries in the repository. Enter the

Microsoft Active Directory user name attribute (ex:

sAMAccountName):

Proceed to “To complete the configuration script” on page 115.

Page 114: IG 81 Install Guide 3

114 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Adding Database information to Entrust IdentityGuardThe following steps sets up Entrust IdentityGuard to communicate with a database repository. The steps create the identityguard.properties file based on the values you enter.

Note: See the Entrust IdentityGuard Database Configuration Guide for more information on database configuration.

To add Database information to Entrust IdentityGuard1 Respond to the following prompt:

DATABASE CONFIGURATION

Enter the database type (Oracle, DB2, SQLServer, Other):

Enter the type of database you are using.

The following message appears:

Enter the JDBC driver JAR file name:

2 Enter the path of the JDBC driver file (for example, /temp/ojdbc14.jar). Ensure that the file permissions on this file allow the Entrust IdentityGuard user to read and execute it.

Note: Some databases require multiple .jar files. You can add other files in a later step.

3 At the following prompt, enter the JDBC driver class that Entrust IdentityGuard should use. For example, oracle.jdbc.driver.OracleDriver.

Enter the JDBC driver class name:

The following message appears:

Are there any other JDBC JAR files to be installed? [yes or no]

Press Enter.

4 If your database requires multiple JDBC driver files, type yes and press Enter. You are prompted to enter more file names. If your database only requires one file, type no and press Enter to continue.

The following message appears:

Enter the DB URL:

5 Enter the database URL Entrust IdentityGuard requires to connect to the database server.

Page 115: IG 81 Install Guide 3

115Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide

6 Provide Entrust IdentityGuard with the database administrator information. This database administrator was created to own the Entrust IdentityGuard database and schema.

a At the following prompt, enter the database administrator user name:

Enter the DB userid:

b At the following prompts, enter and confirm the database administrator password:

Enter the DB password:

Confirm:

The following message appears:

Enter the DB schema name:

c Enter the schema name for your database.

In some databases (for example, Oracle), the schema is automatically named with the user name associated with it. For these databases, type the database administrator user name.

Completing the Entrust IdentityGuard configurationThe following steps complete the initial configuration of Entrust IdentityGuard.

Attention: It is important that you do not allow non-SSL access to the Administration Service. Allowing non-SSL access could severely compromise the security of your system.

To complete the configuration script1 You are prompted for the ports that the Application server should use.

Client applications—through the use of the IdentityGuardAuthAPI client toolkit—communicate with the Entrust IdentityGuard Authentication service to perform challenge retrieval and response validation. The client toolkit communicates with Entrust IdentityGuard using SOAP over HTTP/HTTPS. The following prompts define the ports that Entrust IdentityGuard services listen on.

Enter a value for each.

Note: The http and https ports should be the ones used by your application server.

APPLICATION SERVER CONFIGURATION

Page 116: IG 81 Install Guide 3

116 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

a Enter the Authentication Service HTTP port number:

b Enter the Authentication Service HTTPS port number:

The Entrust IdentityGuard Authentication service and the Entrust IdentityGuard sample application are deployed at both the HTTP and HTTPS ports.

c Enter the Administration Service HTTPS port number:

This is the port that administration applications use to connect to the Administration service when using SSL (HTTPS).

Note: The Authentication Service HTTPS and Administration Service HTTPS port numbers can be the same.

2 You are prompted to confirm the host name used in the service URLs.

The hostname to be used in the service URLs is <hostname>.

Do you want to use this hostname? [yes or no]

Enter yes to use this host name or enter no to choose another host name.

3 You are prompted to configure Entrust IdentityGuard logs:

LOG CONFIGURATION

a The following question appears:

Should Entrust IdentityGuard log to files or syslog? [FILE or

SYSLOG]:

If you answer file, Entrust IdentityGuard displays the location of the files and configuration is complete.

b If you answer syslog, logs are logged to Syslog. Entrust IdentityGuard prompts you for the host name.

Enter the syslog host name (default is localhost):

Ensure that Syslog on this host is configured to accept Entrust IdentityGuard logs. For more information, see the section “Configuring Syslog for remote logging on UNIX” on page 226.

4 The following message appears:

Do you want to configure the Entrust IdentityGuard Radius

Proxy? [yes or no]

Do one of the following:

• If you plan to use a Radius server for first-factor authentication and are not using VPN groups, enter yes. Proceed to Step 4 in “To configure the Radius proxy on UNIX” on page 180.

Page 117: IG 81 Install Guide 3

117Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide

• If you plan to use a Radius server for first-factor authentication and you want to configure your VPN servers to recognize Entrust IdentityGuard groups, you need to first complete the configuration and initialization of Entrust IdentityGuard and define the groups. In this case, enter no.

• If you plan to use a Windows domain controller or LDAP directory for first-factor authentication, enter yes. Follow the instructions under “Using Entrust IdentityGuard groups with a VPN server” on page 175.

• Otherwise, enter no.

5 When you finish the configuration procedure, this message appears:

Configuration complete.

Do you wish to initialize the primary system? [yes or no]

• Enter yes to start the initialization tasks. Proceed to “Initializing the primary Entrust IdentityGuard Server” on page 118.

• If you enter no you must run the init command in the supersh command shell from the $IDENTITYGUARD_HOME/bin directory before you can use Entrust IdentityGuard. Proceed to “To initialize the primary Entrust IdentityGuard Server manually” on page 123.

Page 118: IG 81 Install Guide 3

118 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Initializing the primary Entrust IdentityGuard Server

Complete the following procedure to initialize the primary Entrust IdentityGuard Server on your system.

Topics in this section:

• “What initialization does” on page 118

• “If initialization fails” on page 118

• “Initializing the primary server” on page 119

What initialization doesInitialization creates master keys and the various policy structures. The identityguard.properties file specifies two files that are used to store the keys that protect the repository and the master users. The files that store this information are:

• Entrust IdentityGuard master keys file (masterkeys.enc)—a file containing the encryption keys that protect the repository.

• Entrust IdentityGuard key protection file (masterkeys.kpf)—a file containing an obfuscation key which is used to encrypt the three master user passwords that are stored in the file.

The contents of the master keys file can be unlocked by a master user. The contents of the key protection file provide access to the master user passwords. This access can then be used to unlock the master keys file.

If initialization failsThe most likely causes of an initialization failure are:

• The Entrust IdentityGuard properties file contains invalid values. To resolve this, go to $IDENTITYGUARD_HOME/etc/identityguard.properties and edit the file.

• Your repository is not configured correctly to work with Entrust IdentityGuard.

• The repository is not running.

For more information on Entrust IdentityGuard error messages, see Entrust IdentityGuard Error Messages included with your documentation package.

Page 119: IG 81 Install Guide 3

119Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide

Initializing the primary serverThis section provides the steps necessary to initialize the primary server.

To initialize the primary Entrust IdentityGuard Server during installation1 Respond to the following prompt:

PRIMARY SYSTEM INITIALIZATION

If you are reinstalling Entrust IdentityGuard, the following prompt appears:

An existing system has been detected. Overwriting an existing

system will mean the existing data can no longer be accessed. Are

you sure you want to overwrite the existing system? (y/n) [n]:

Attention: If you are using an LDAP repository, and you run init -overwrite, you must first manually remove the fpcr directory located at $IDENTITYGUARD_HOME/etc/fpcr/ as well as the ftkr directory located at $IDENTITYGUARD_HOME/etc/ftkr.

Attention: If you reinitialize an Entrust IdentityGuard system by running init -overwrite, you must first replace any encrypted values in the identityguard.properties file with cleartext values because Entrust IdentityGuard cannot decrypt the old values once the reinitialization is performed. See the section “Editing property values” on page 257.

When you answer y, the command init -overwrite runs automatically. The init command:

• generates a new master key and stores it in the master keys file

• generates the key protection file

• initializes default policy settings

If you answer n or if initialization fails, you must run the init command in the master user shell (supersh) at a later time. For steps for initializing manually, see the section “To initialize the primary Entrust IdentityGuard Server manually” on page 123.

Note: You can cancel the script at any time by pressing Ctrl + C.

The following messages appear:

Enter install key:

Page 120: IG 81 Install Guide 3

120 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Enter activation key:

2 Enter the installation key and the activation key you received from Entrust. Once the activation key is validated, master keys are then generated.

Attention: The two master keys files are created in $IDENTITYGUARD_HOME/etc. After initialization, back up masterkeys.enc. If this file is lost, the system cannot be recovered. See the system restore procedure in “Restoring Entrust IdentityGuard from a backup” on page 250.

Do not back up the key protection file (masterkeys.kpf). The masterkeys.kpf file is unique to each server.

3 Type the three master user passwords for the user names—Master1, Master2, and Master3.

The passwords must meet the following criteria:

• be over eight characters in length

• contain upper and lowercase characters

• contain a numerical value

The following prompts are displayed:

Enter a new password for Master1.

Password:

Confirm:

Enter a new password for Master2.

Password:

Confirm:

Enter a new password for Master3.

Password:

Confirm:

4 When you have finished creating passwords, the following message is displayed:

System initialized.

Do you wish to setup the sample application [yes or no]

• Enter yes to configure the sample application. Proceed to “Configuring the sample application on an existing application server” on page 121.

• If you enter no you can optionally configure the sample application later. Proceed to “Deploying Entrust IdentityGuard services on an existing application server” on page 127.

Page 121: IG 81 Install Guide 3

121Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide

Configuring the sample application on an existing application server

Entrust IdentityGuard provides a sample Web application that includes user registration functionality as well as various authentication samples. This sample requires an administrator user name and password. If you are using a directory you must create the administrator before configuring the sample application.

For more information on the sample application, see the Entrust IdentityGuard Administration Guide.

Attention: The sample administrator password is stored in clear text in the file $IDENTITYGUARD_HOME/etc/igsample.properties. For security reasons, disable the sample application when you are not using it.

The configsample.sh script creates the following:

• a role called samplerole

• a policy called samplepolicy

• a group called samplegroup

• an administrator in the samplegroup (the administrator has access to the samplegroup)

• an igsample.properties file

If you are configuring the sample application manually, refer to “To configure the Entrust IdentityGuard Server sample application manually” on page 125.

To configure the sample application1 You are prompted to enter the user name for the sample administrator.

Enter adminid for sample administrator:

2 You are prompted to enter and confirm a password:

Enter password for sample administrator:

Confirm:

The password must meet the following criteria:

• be over eight characters in length

• contain upper and lowercase characters

• contain a numerical value

3 Log in as a master user to complete the setup.

You are prompted for a master user name and password:

Page 122: IG 81 Install Guide 3

122 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Userid:

Password:

4 When you are finished setting up the sample, the following message appears:

Setup of Entrust IdentityGuard sample successful.

You can now deploy the sample Web application from your application server (see “Deploying Entrust IdentityGuard services on an existing application server” on page 127).

Page 123: IG 81 Install Guide 3

123Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide

Running the scripts manuallyIf you did not run the scripts during the installation procedure, you have the option to manually run the configuration and initialization scripts.

To run the primary Entrust IdentityGuard Server configuration manually1 Log in as the UNIX user that belongs to the UNIX group that was specified during

the installation. See “To install Entrust IdentityGuard” on page 106.

2 Change to $IDENTITYGUARD_HOME (default is /opt/entrust/identityguard81).

3 From $IDENTITYGUARD_HOME, source the environment settings file by entering

. ./env_settings.sh

(Include a space between the two periods in the command.)

4 Run the configure.sh script.

If you have previously configured Entrust IdentityGuard, the following message appears:

An identityguard.properties file exists. If you continue, this

file will be overwritten.

Do you want to continue? [yes or no]

5 Enter yes and continue from Step 1 of the “To start the Entrust IdentityGuard configuration” on page 109.

To initialize the primary Entrust IdentityGuard Server manually1 Log in as the UNIX user that belongs to the UNIX group that was specified during

the installation. See “To install Entrust IdentityGuard” on page 106.

2 Go to $IDENTITYGUARD_HOME.

3 From $IDENTITYGUARD_HOME, source the environment settings file by entering

. ./env_settings.sh

(Include a space between the two periods in the command.)

4 Enter the following command to start the master user shell:

supersh

Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.

Page 124: IG 81 Install Guide 3

124 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Note: You can view copyright and version information at any time by entering version at the command prompt.

5 Enter

init <optionalvalues>

where <optionalvalues> are listed in Table 10:

6 Complete Step 2 and Step 3 on page 120.

7 Type exit to leave the command shell.

Table 10: Initialization optional values

Values Description

-sernum To start card serial numbers at a specific number, enter init -sernum <num> where <num> is a positive integer.

Defaults to 1 if not specified.

Use this option if you are adding additional cards to your system. For example, if you have previously loaded 350 cards, enter:

init -sernum 351

-overwrite If the system was initialized previously, this command overwrites the existing data.

You are prompted to confirm that you want existing data to be overwritten.

Attention: If you are using an LDAP repository, and you run init -overwrite, you must first manually remove the fpcr folder located at $IDENTITYGUARD_HOME/etc/fpcr/.

Attention: If you reinitialize an Entrust IdentityGuard system by running init -overwrite, you must first replace any encrypted values in the identityguard.properties file with cleartext values because Entrust IdentityGuard cannot decrypt the old values once the reinitialization has been performed. See the section “Editing property values” on page 257.

-force If you use the -force option, you are not prompted for confirmation.

Page 125: IG 81 Install Guide 3

125Installing Entrust IdentityGuard Server with an existing application serverFeedback on guide

8 Check the log files for errors. If you chose to log to files when you installed Entrust IdentityGuard, the logs are stored in $IDENTITYGUARD_HOME/logs.

To configure the Entrust IdentityGuard Server sample application manually1 Log in as the UNIX user that belongs to the UNIX group that was specified during

the installation. See “To install Entrust IdentityGuard” on page 106.

2 Change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81).

3 From $IDENTITYGUARD_HOME, source the environment settings file by entering

. ./env_settings.sh

(Include a space between the two periods in the command.)

4 Run the configsample.sh script.

5 You are prompted to enter the user name for the sample administrator.

Enter adminid for sample administrator:

6 You are prompted to enter and confirm a password:

Enter password for sample administrator:

Confirm:

The password must meet the following criteria:

• be over eight characters in length

• contain upper and lowercase characters

• contain a numerical value

7 Log in as a master user to complete the setup.

You are prompted for a master user name and password:

Userid:

Password:

8 When you are finished setting up the sample, the following message is displayed:

Setup of Entrust IdentityGuard sample successful.

To make changes to the sample Web application configuration1 Log in as the UNIX user that belongs to the UNIX group that was specified during

the installation. See “To install Entrust IdentityGuard” on page 106.

2 Change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81).

3 From $IDENTITYGUARD_HOME, source the environment settings file by entering

Page 126: IG 81 Install Guide 3

126 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

. ./env_settings.sh

(Include a space between the two periods in the command.)

4 Enter the following command to start the master user shell:

supersh

Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.

5 Log in as a master user. For example,

Master1

6 If you have previously configured the sample, delete each of the following individually:

• sample administrator

• sample group

• sample role

• sample policy

To do so:

a Run the delete command for each. For example,

admin delete sample/SampleAdmin1

Note: Use the list command to list sample administrators, groups, roles, and policies, so that you can see which ones to delete. For example, use admin list to list all the sample administrators that have already been created. Use group list, to list the sample groups that exist, and so on.

b Answer yes to confirm the delete.

Are you sure you wish to delete the admin? (y/n) [n]:

7 Type exit to exit the master user shell and return to the command-line.

8 Enter the following command to start configuring the sample:

configsample.sh

9 You are warned that the igsample.properties file already exists. For example:

/opt/entrust/identityguar81/etc/igsample.properties file already

exists. Do you wish to continue? [yes or no]

Answer yes.

10 Follow the steps in “To configure the sample application” on page 121.

Page 127: IG 81 Install Guide 3

127

Chapter 5

Deploying Entrust IdentityGuard services on an existing application server

This chapter provides all the necessary steps to deploy Entrust IdentityGuard services using the WebLogic 8.1 or 9.1 or WebSphere 6.0 application servers.

This chapter contains the following sections:

• “Deploying Entrust IdentityGuard services on WebLogic” on page 128.

• “Deploying Entrust IdentityGuard services on WebSphere 6.0 application server” on page 142

• “Testing your installation” on page 162

• “Managing the Entrust IdentityGuard service” on page 166

Page 128: IG 81 Install Guide 3

128 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Deploying Entrust IdentityGuard services on WebLogic

Once you have installed Entrust IdentityGuard on a WebLogic 8.1 or 9.1 application server, you must install and deploy the Entrust IdentityGuard services. The process is different depending on the version of WebLogic you are using.

Topics in this section:

• “Deploying Entrust IdentityGuard services on WebLogic 8.1 application server” on page 128

• “Deploying Entrust IdentityGuard services on WebLogic 9.1 application server” on page 134

Deploying Entrust IdentityGuard services on WebLogic 8.1 application serverTo deploy Entrust IdentityGuard services on a WebLogic 8.1 application server you must:

• extract and install the Entrust IdentityGuard service files

• deploy the Entrust IdentityGuard services

Note: In the following, $WEBLOGIC is the directory in which the WebLogic server was installed. $DOMAIN is the directory of the WebLogic domain where Entrust IdentityGuard is being installed, for example /bea/weblogic81/samples/domains/wl_server.

To install Entrust IdentityGuard services1 Install the native libraries libaal2sdk.so and libualjni.so required by

Entrust IdentityGuard to one of the directories listed in the LD_LIBRARY_PATH environment variable.

The native libraries are located in $IDENTITYGUARD_HOME/lib/solaris. Enter at the command line:

LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/opt/entrust/identityguard81/lib/

solaris/;export LD_LIBRARY_PATH

Note: Substitute the correct installation directory if it is different from the default /opt/entrust.

Page 129: IG 81 Install Guide 3

129Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

2 Edit the domain startup script $DOMAIN/startWebLogic.sh and add enttoolkit.jar, log4j-1.2.14.jar and any database driver .jar files to the line that sets the CLASSPATH environment variable.

3 Still in $DOMAIN/startWebLogic.sh, move to the line where it sets JAVA_OPTIONS, and at the end add

-Didentityguard.home=/opt/entrust/identityguard81

Note: Substitute the correct install directory if it is different from the default /opt/entrust and add the line if there is currently no setting of JAVA_OPTIONS.

4 At the command line, go to (cd) to $IDENTITYGUARD_HOME/services/auth.

5 Create a directory named IdentityGuardAuthService.

6 Go to (cd) to the IdentityGuardAuthService directory.

7 Using the jar tool from the WebLogic JDK ($WEBLOGIC/jdk_141_05/bin/jar), extract the file IdentityGuardAuthService.war by entering the following at the command line:

jar xvf ../IdentityGuardAuthService.war

A new directory called WEB-INF is created.

8 Go to (cd) to the WEB-INF directory, and create a file named weblogic.xml and give it the following content:

Note: The file name is case-sensitive.

<!DOCTYPE weblogic-web-app PUBLIC "-//BEA Systems, Inc.//DTD Web

Application 8.1//EN" "http://www.bea.com/servers/wls810/

dtd/weblogic810-web-jar.dtd">

<weblogic-web-app>

<container-descriptor>

<prefer-web-inf-classes>true</prefer-web-inf-classes>

</container-descriptor>

</weblogic-web-app>

9 In $IDENTITYGUARD_HOME/services/admin create a directory named IdentityGuardAdmin.

10 Go to the IdentityGuardAdmin directory.

Page 130: IG 81 Install Guide 3

130 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

11 Extract IdentityGuardAdmin.war by entering the following at the command line:

jar xvf ../IdentityGuardAdmin.war

12 Repeat Step 8.

13 In $IDENTITYGUARD_HOME/services/admin, create a directory named IdentityGuardAdminService.

14 Change to the IdentityGuardAdminService directory.

15 Extract IdentityGuardAdminService.war by entering the following at the command line:

jar xvf ../IdentityGuardAdminService.war

16 Repeat Step 8.

17 Optionally, deploy the sample application:

a In $IDENTITYGUARD_HOME/services/auth, create a directory named IdentityGuardSampleApp.

b Change to the IdentityGuardSampleApp directory.

c Extract IdentityGuardSampleApp.war by entering the following at the command line:

jar xvf ../IdentityGuardSampleApp.war

d Repeat Step 8.

To deploy Entrust IdentityGuard services1 Start your WebLogic domain from $DOMAIN by entering

./startWeblogic.sh

2 Start the administration console for your server (default URL http://localhost:7001/console) and log in.

The WebLogic 8.1 main page appears.

Page 131: IG 81 Install Guide 3

131Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

3 From the WebLogic 8.1 main page, select Deployments > Web Application Modules.

The Deploy a Web Application Module page appears.

Page 132: IG 81 Install Guide 3

132 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

4 Click the Deploy a New Web Application link.

The Select the archive for this Web application module page appears.

5 Browse through the location link to locate the directory where authentication service WAR file, was extracted.

The directory is $IDENTITYGUARD_HOME/services/auth/IdentityGuardAuthService

The Select the archive for this Web application module page appears.

Page 133: IG 81 Install Guide 3

133Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

6 Click the radio button to the left of the directory IdentityGuardAuthService and then click Target Module.

The Review your choices and deploy page appears.

7 After reviewing your choices, click Deploy.

A deployment status page appears showing the status of the Web application deployment.

8 Repeat Step 3 through Step 7 to install the Administration service from $IDENTITYGUARD_HOME/services/admin/IdentityGuardAdminService

Page 134: IG 81 Install Guide 3

134 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

9 Repeat Step 3 through Step 7 to install the Administration interface from $IDENTITYGUARD_HOME/services/admin/IdentityGuardAdmin

10 Optionally, repeat Step 3 through Step 7 to enable the sample application from $IDENTITYGUARD_HOME/services/auth/IdentityGuardSampleApp.

Deploying Entrust IdentityGuard services on WebLogic 9.1 application serverTo deploy Entrust IdentityGuard services on a WebLogic 9.1 application server you must:

• extract and install the entrust IdentityGuard service files

• deploy the Entrust IdentityGuard services

Note: In the following, $WEBLOGIC is the directory in which the WebLogic server was installed, and $DOMAIN is the directory of the WebLogic domain where Entrust IdentityGuard is being installed, for example /opt/bea/weblogic91/samples/domains/wl_server.

To install and deploy Entrust IdentityGuard services1 Install the native libraries libaal2sdk.so and libualjni.so required by

Entrust IdentityGuard to one of the directories listed in the LD_LIBRARY_PATH environment variable.

The native libraries are located in $IDENTITYGUARD_HOME/lib/solaris. Install them by entering at the command line:

LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/opt/entrust/identityguard81/lib/

solaris/;export LD_LIBRARY_PATH

Note: Substitute the correct installation directory if it is different than the default /opt/entrust.

2 Copy enttoolkit.jar, log4j-1.2.14.jar found in $IDENTITYGUARD_HOME/lib and any database driver .jar files to $DOMAIN/lib.

All .jar files in this directory are added to the Classpath environment when the server starts.

3 Edit the domain startup script that sets the environment variables, $DOMAIN/bin/setDomainEnv.sh. Move to the line that sets JAVA_OPTIONS

Page 135: IG 81 Install Guide 3

135Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

and add -Didentityguard.home=/opt/entrust/identityguard81 to the end of the line.

Note: Your installation directory may be different.

4 Start your WebLogic server from $DOMAIN/bin by typing:

./startWebLogic.sh

5 Start the administration console for your server (the default URL is http://localhost:7001/console) and log in.

The WebLogic main page appears.

6 Under Change Center click Lock & Edit.

Page 136: IG 81 Install Guide 3

136 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

7 Under Domain Configurations, click Deployments.

The Summary of Deployments page appears.

8 Click Install.

The Install Applications Assistant page appears.

9 Click Upload your file(s) located in the Note paragraph.

The Install Application Assistant appears prompting you to upload a deployment to the administration server.

Page 137: IG 81 Install Guide 3

137Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

10 Click Browse to the right of Deployment Archive to locate the authentication service WAR file, IdentityGuardAuthService.war and click Open.

The file is located in

$IDENTITYGUARD_HOME/services/auth/IdentityGuardAuthService.war

11 Click Next on the Install Applications Assistant page to upload a deployment to the administration server.

The Install Applications Assistant page updates so that you can locate the deployment to install and prepare for deployment.

Page 138: IG 81 Install Guide 3

138 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

12 Click the radio button to the left of the file name IdentityGuardAuthService.war to locate the deployment to install and prepare for deployment.

13 Click Next.

The Install Applications Assistant page updates and prompts you to choose a targeting style.

14 Select Install this deployment as an application, and then click Next.

The Install Applications Assistant page updates with optional settings.

Page 139: IG 81 Install Guide 3

139Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

15 Accept the default optional settings and click Next.

The Install Applications Assistant page updates to enable you to review your choices.

Page 140: IG 81 Install Guide 3

140 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

16 Review the choices, and click Finish.

The Settings for IdentityGuardAuthService page appears.

17 Under Change Center in the top left of the page, click Activate Changes to accept the changes.

18 Repeat Step 6 through Step 17 to install the Administration service ($IDENTITYGUARD_HOME/services/admin/IdentityGuardAdminService.war).

19 Repeat Step 6 through Step 17 to install the Administration interface ($IDENTITYGUARD_HOME/services/admin/IdentityGuardAdmin.war).

20 Optionally, repeat Step 6 through Step 17 to enable the sample application ($IDENTITYGUARD_HOME1/services/auth/IdentityGuardSampleApp.war).

21 Under Domain Structure on the main page, click Deployments.

Page 141: IG 81 Install Guide 3

141Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

The IdentityGuard deployments display in a prepared state, but they are not running yet.

22 Select the checkbox for each Entrust IdentityGuard application.

23 Click the Start drop-down menu.

24 Select Start servicing all requests.

The Start Application Assistant page appears.

25 Click Yes to start deployments. Entrust IdentityGuard is now up and running.

Page 142: IG 81 Install Guide 3

142 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Deploying Entrust IdentityGuard services on WebSphere 6.0 application server

After completing installation of Entrust IdentityGuard server, you must deploy IdentityGuard services on a WebSphere application server.

Topics in this section:

• “Defining and deploying shared library settings” on page 142

• “Installing Entrust IdentityGuard services on WebSphere 6.0” on page 155

Defining and deploying shared library settingsYou must define the shared library settings for the Security Toolkit for Java Platform, your Entrust tokens (if applicable), and the database driver.

To define shared library settings1 Start your WebSphere server from $WEBSPHERE/AppServer/bin by entering

./startServer.sh <server_name>

where server_name is the name of the server you are starting.

2 Start the administration console for your server.

The default URL is http://localhost:9060/ibm/console.

3 Log in to your server.

The WebSphere main page appears.

Page 143: IG 81 Install Guide 3

143Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

4 From the WebSphere main page, click Environment > Shared Libraries.

The Shared Libraries page appears.

Page 144: IG 81 Install Guide 3

144 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

5 Click the Node scope for the library and click Apply.

6 Under Preferences, click New.

The New Shared Libraries page appears prompting you to define the settings for the shared library. These are the settings for the Security Toolkit for Java Platform.

Page 145: IG 81 Install Guide 3

145Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

7 Define the Shared Library settings:

a In the Name field, type Security Toolkit for Java Platform

b Leave the Description field blank.

c Set the Classpath to the enttoolkit.jar file to/opt/entrust/identityguard81/lib/enttoolkit.jar

d If the log4j-1.2.14.jar file is not already a shared library, also add /opt/entrust/identityguard81/lib/log4j-1.2.14.jar

e Set the Native library path to /opt/entrust/identityguard81/lib/solaris or /opt/entrust/identityguard81/lib/aix

8 Click OK.

You are returned to the Shared Libraries page. Security Toolkit for Java Platform appears in the preferences list and a message displays indicating that changes have been made to your local configuration and that the server may need to be restarted for the changes to take place.

Page 146: IG 81 Install Guide 3

146 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

9 Click Save to save the changes, but do not restart the server at this time.

The Shared Libraries Save page appears prompting you to click Save to update the master repository with changes.

Page 147: IG 81 Install Guide 3

147Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

10 Click Save to return to the Shared Libraries page.

11 If your installation will uses Vasco tokens, repeat Step 6 to Step 10 to define a shared token library.

• Add a Classpath for each of the following:

/opt/entrust/identityguard81/lib/aal2wrap.jar

• The library path is /opt/entrust/identityguard81/lib/solaris

12 If using a database, repeat Step 6 to Step 10 to define the database driver library file.

13 Click Save.

To deploy shared libraries1 From the WebSphere server main page, click Servers > Application Servers.

The Application servers page appears.

2 Click the server name on which you want to deploy Entrust IdentityGuard services from the Application servers list.

Page 148: IG 81 Install Guide 3

148 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

The Server page appears.

3 Under Server Infrastructure, click Java and Process Management > Class loader.

Page 149: IG 81 Install Guide 3

149Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

The Application servers Class Loader page appears.

4 Select the class loader from the list.

If there are no class loaders defined:

a Click New to create a new class.

The Class loader configuration page appears.

b Select Class loader mode Parent First.

c Click OK.

You are returned to the Server page and a Class Loader appears in the preferences list.

d Select the Class loader.

The Class loader configuration page appears.

Page 150: IG 81 Install Guide 3

150 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

5 Under Additional Properties, select Libraries.

The Application servers Library Reference page appears.

6 Click Add.

The Application server Library Reference General Properties page appears.

Page 151: IG 81 Install Guide 3

151Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

7 Under Library name, select Security Toolkit for Java Platform.

8 Click OK.

The Library Reference page updates with Security Toolkit for Java Platform listed in the preferences list.

9 Repeat Step 6 to Step 8 for the Entrust token library and, optionally, the database driver library.

10 Return to the server page from Step 2. You can do this by clicking the server name from the Library Reference page.

11 From the server page, click Java and Process Management > Process Definition > Java Virtual Machine > Custom Properties.

The Custom Properties page appears.

Page 152: IG 81 Install Guide 3

152 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

12 Click New.

The Custom Properties configuration page appears.

13 Name the new property identityguard.home.

14 Set the value to the install directory of Entrust IdentityGuard to /opt/entrust/identityguard81

15 Click OK.

Page 153: IG 81 Install Guide 3

153Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

Note: When using the default JDK on Solaris, applications running in WebSphere do not understand the HTTPS protocol. To resolve this issue, you must define another custom property with the name java.protocol.handler.pkgs and value com.ibm.net.ssl.www.protocol.

16 Click Save followed by Save on the Custom Properties Save page.

17 Repeat Step 12 to Step 16 to define the java.protocol.handler.pkgs custom property.

Note: Ensure that you have also set up the javax.net.ssl.trustStore custom property if you are using self-signed certificates (see “Configuring SSL for WebSphere 6.0” on page 101).

18 If you are using AIX, complete this step. On Solaris, proceed to Step 19 on page 155.

a Return to the server page from Step 2.

b From the server page, click Java and Process Management > Environment Entries.

The Application server Custom Properties page opens.

c Click New. The General Properties page opens.

Page 154: IG 81 Install Guide 3

154 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

d Set Name to LIBPATH (all caps) and Value to the path of the native libraries. For example, /opt/entrust/identityguard81/lib/aix.

Page 155: IG 81 Install Guide 3

155Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

e Click Apply. You are returned to the Custom Properties page.

f Click Save followed by Save.

19 Restart the server.

Installing Entrust IdentityGuard services on WebSphere 6.0After setting the shared libraries you can deploy the Entrust identityGuard authentication and administration services.

To install Entrust IdentityGuard services1 From the WebSphere main page, select Applications > Install New Application.

Page 156: IG 81 Install Guide 3

156 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

The Preparing for the application installation page appears.

2 Click Browse under Specify path to locate the authentication service WAR file, IdentityGuardAuthService.war, which is most likely in /opt/entrust/identityguard81/services/auth/.

3 Type /IdentityGuardAuthService in the Context Root text box.

4 Click Next.

The Preparing for the application installation page updates prompting you to choose to generate default bindings and mappings.

5 Select Generate Default Bindings and click Next.

Page 157: IG 81 Install Guide 3

157Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

An Application Security Warnings page appears warning about contents of the was.policy file.

6 Accept the warning and click Continue.

The Install New Application page updates prompting you to select your installation options.

Page 158: IG 81 Install Guide 3

158 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

7 Select the installation options.

You can select to keep the default settings or, optionally in the Directory to install application text box, specify an installation directory and remove _war from the Application name.

8 Click Next.

The Map modules to servers page appears.

Page 159: IG 81 Install Guide 3

159Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

9 On the Map Modules to Servers page, select the server(s) on which to deploy the Entrust IdentityGuard authentication service.

Note: You must select at least one server.

10 Click Next.

The Map virtual hosts for Web modules page appears.

11 On the Map Virtual Hosts for Web Modules page, select the virtual host to deploy the Entrust IdentityGuard authentication service.

12 Click Next.

The Summary page appears.

Page 160: IG 81 Install Guide 3

160 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

13 Review the details on the Summary page, and click Finish.

WebSphere attempts to load the Entrust IdentityGuard authentication service. If this fails, consult the WebSphere logs for the domain to see why.

When installation completes the following message appears:

Application IdentityGuardAuthServices installed successfully.

To start the application, first save changes to the master

configuration.

14 Click Save to Master Configuration.

The Save page appears.

15 Click Save.

16 Repeat Step 1 through Step 15 to install the administration service from /opt/entrust/identityguard81/services/admin/IdentityGuardAdminService.war

17 Repeat Step 1 through Step 15 to install the Web interface from /opt/entrust/identityguard81/services/admin/IdentityGuardAdmin.war.

18 Optionally, repeat Step 1 through Step 15 to install the sample applicationfrom

opt/entrust/identityguard81/services/auth/IdentityGuardSampleApp.war.

Page 161: IG 81 Install Guide 3

161Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

To start Entrust IdentityGuard services1 From the WebSphere main menu, select Applications > Enterprise Applications.

The Enterprise Applications page appears.

2 Select the box next to Entrust IdentityGuard service(s), and then click Start.

A message appears indicating that the services have started successfully.

Note: You can select to start multiple services simultaneously.

Page 162: IG 81 Install Guide 3

162 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Testing your installationThis section provides testing steps that determine if your installation is working properly. It assumes that you have completed the installation, configuration, and initialization tasks.

To test your installation1 Check the log files for errors. If you chose to log to files when you installed

Entrust IdentityGuard, the logs are stored in $IDENTITYGUARD_HOME/logs.

2 Start the Entrust IdentityGuard Server as the Entrust IdentityGuard application owner. For instructions, see “Query the status of Entrust IdentityGuard service” on page 166.

3 Check whether all Entrust IdentityGuard services are running as expected.

a Source env_settings.sh by entering:

. ./env_settings.sh

b Enter

igservice.sh all status

The following shows part of the status report generated when all services are running:

Authentication V1 service at

http://<hostname>/IdentityGuardAuthService/services/Authenticat

ionService is available.

Authentication V1 service at

https://<hostname>/IdentityGuardAuthService/services/Authentica

tionService is available.

Authentication V2 service at

http://<hostname>/IdentityGuardAuthService/services/Authenticat

ionServiceV2 is available.

Authentication V2 service at

https://<hostname>/IdentityGuardAuthService/services/Authentica

tionServiceV2 is available.

Sample application at http://<hostname>/IdentityGuardSampleApp

is available.

Page 163: IG 81 Install Guide 3

163Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

Administration V1 service at

https://<hostname>/IdentityGuardAdminService/services/AdminServ

ice is available.

Administration V2 service at

https://<hostname>/IdentityGuardAdminService/services/AdminServ

iceV2 is available.

Administration interface at

https://<hostname>/IdentityGuardAdmin is available.

4 Ensure that you can log in to the Administration Web interface.

a Create an administrator account or use the sample administrator account, if you have configured the sample application.

For information on creating an administrator, refer to the Entrust IdentityGuard Administration Guide.

b Open a browser and enter the following URL:

https://<FQDN>:<port>/IdentityGuardAdmin

where:

– <FQDN> is the Entrust IdentityGuard host name.– <port> is the Administration interface service port.

Note: If you cannot access the Entrust IdentityGuard services (administration or authentication), verify that firewall rules are not blocking the HTTP and HTTPS ports.

Page 164: IG 81 Install Guide 3

164 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

c At the login page, enter the administrator user name and password. Optionally, enter the group name, if the user does not belong to the default group.

d You are prompted to change the administrator password.

e Follow the rules on the screen to change the administrator password.

The Entrust IdentityGuard Administration interface appears:

Page 165: IG 81 Install Guide 3

165Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

5 Optionally, test the sample application. To do so, follow the steps in “Using the sample Web application” on page 305.

You have now completed testing of the Entrust IdentityGuard installation.

You can now:

• complete various advanced configuration tasks (“Postinstall configuration options for Entrust IdentityGuard Server” on page 201 and “Configuring the Entrust IdentityGuard Server properties file” on page 255) such as adding replica Entrust IdentityGuard Servers to your system

• set up Entrust IdentityGuard by adding policies, groups, users, authentication methods, and so on (see the Entrust IdentityGuard Administration Guide)

Page 166: IG 81 Install Guide 3

166 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Managing the Entrust IdentityGuard service

Complete the following steps to check the status of the Entrust IdentityGuard service. You have the option of using either the identityguard.sh command, or the UNIX output command.

Topics in this section:

• “Query the status of Entrust IdentityGuard service” on page 166

• “Stopping Entrust IdentityGuard Services on WebLogic 8.1” on page 167

• “Stopping Entrust IdentityGuard Services on WebLogic 9.1” on page 168

• “Stopping Entrust IdentityGuard Services on WebSphere 6.0” on page 169

Query the status of Entrust IdentityGuard serviceThe following command allows you to query the status of the Entrust IdentityGuard service.

Note: If you are root, you cannot start Entrust IdentityGuard Radius service using the igradius.sh start command. Also, to stop the Entrust IdentityGuard service, you must be the user who started the service.

To query the status of Entrust IdentityGuard 1 Log in as the UNIX user that belongs to the UNIX group that was specified during

the installation.

2 From $IDENTITYGUARD_HOME, enter

. ./env_settings.sh

3 To query the status of the Entrust IdentityGuard service, enter

identityguard.sh status

Note: Once Entrust IdentityGuard is installed, the service is started automatically when you reboot.

Page 167: IG 81 Install Guide 3

167Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

Stopping Entrust IdentityGuard Services on WebLogic 8.1Complete the following procedure to stop Entrust IdentityGuard on WebLogic 8.1.

To stop Entrust IdentityGuard Services1 From the WebLogic 8.1 main page, select Deployments > Web Application

Modules.

The Deploy a Web Application Module page appears showing a list of all deployed Web applications.

2 Click the application name, for example, IdentityGuardAdmin.

The Deployment status page appears.

3 Click Stop.

Page 168: IG 81 Install Guide 3

168 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

4 Repeat Step 1 to Step 3 for each Entrust IdentityGuard service you want to stop.

Stopping Entrust IdentityGuard Services on WebLogic 9.1You can stop Entrust IdentityGuard Services using one of the following three options:

• When work completes. Specifies that WebLogic Server wait for the application to finish its work and for all currently connected users to disconnect.

• Force stop now. Specifies that WebLogic Server stop the application immediately, regardless of the work that is being performed and the users that are connected.

• Stop, but continue servicing administrative requests. Specifies that WebLogic Server stops the application once all its work has finished, but to then puts the application in Administrative Mode so it can be accessed for administrative purposes.

To stop Entrust IdentityGuard Services1 Under Domain Structure on the left of the main page click Deployments.

The Deployment Summary Page appears with a list of Entrust IdentityGuard services.

Page 169: IG 81 Install Guide 3

169Deploying Entrust IdentityGuard services on an existing application serverFeedback on guide

2 Select the checkbox for the service(s) you want to stop.

3 From the Stop drop-down menu select the desired stop option.

The Stop Application Assistant page appear.

4 Click Yes to stop the application.

You are returned to the Summary of Deployments page.

Stopping Entrust IdentityGuard Services on WebSphere 6.0Complete the following procedure to stop Entrust IdentityGuard on WebSphere 6.0.

To stop Entrust IdentityGuard services1 From the WebSphere main page click Applications > Enterprise Applications.

Page 170: IG 81 Install Guide 3

170 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

The Enterprise Applications page appears.

2 Select the service(s) you want to stop.

3 Click Stop.

A message appears indicating that the service was stopped successfully.

Page 171: IG 81 Install Guide 3

171

Chapter 6

Configuring the Entrust IdentityGuard Radius proxy

This chapter provides all the necessary steps for configuring the Entrust IdentityGuard Radius proxy component for use with your VPN servers, and for managing the Radius proxy after installation. You can configure the Entrust IdentityGuard Radius proxy during installation of Entrust IdentityGuard Server or afterwards.

This chapter includes the following sections:

• “Radius proxy integration overview” on page 172

• “Configuring the Radius proxy for groups” on page 175

• “Matching a group to a user” on page 179

• “Using the Radius proxy with a Radius server” on page 180

• “Using the Radius proxy with a domain controller or LDAP directory” on page 187

• “Configuring the VPN server” on page 193

• “Configuring a Radius server for first-factor authentication” on page 194

• “Configuring Radius server failover” on page 195

• “Managing the Radius proxy” on page 196

Page 172: IG 81 Install Guide 3

172 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Radius proxy integration overviewEntrust IdentityGuard provides a way to use the Radius authentication protocol with a VPN server and optionally, an actual Radius server.

During configuration of the Radius proxy, you are asked to choose between a Radius server or an external authentication resource for first-factor authentication. Regardless of your choice, the VPN server still believes it is communicating with a Radius server. It is actually communicating with the Entrust IdentityGuard Radius proxy.

In a normal VPN and Radius implementation, the VPN server communicates with the VPN client and with the Radius server, while the Radius server communicates directly with the VPN server. When you integrate with Entrust IdentityGuard, the Entrust IdentityGuard Radius proxy intercepts messages between the VPN server and the first-factor authentication resource, as shown in Figure 2 on page 173. That resource may be one of a:

• Radius server

• Windows domain controller

• LDAP directory

Once your VPN server uses the Radius proxy for first-factor authentication, you can configure Entrust IdentityGuard to add the grid, token, or temporary PIN multifactor authentication methods to the first-factor authentication performed by the Radius proxy.

You can configure some VPN servers to use a Radius server and some to use a different first-factor authentication resource.

You can take advantage of the Entrust IdentityGuard groups feature to organize users into different groups for authentication purposes. This way you can direct the users of some groups to one first-factor authentication resource and other users to other resources. For details, see “Configuring the Radius proxy for groups” on page 175.

Note: When you configure the Entrust IdentityGuard Radius proxy, the program stores the results in the identityguard.properties file. You can edit this file to change settings or to add additional VPN servers and their first-factor authentication method later. For information on the property settings, see section “Configuring the Entrust IdentityGuard Radius proxy properties” on page 282.

Page 173: IG 81 Install Guide 3

173Configuring the Entrust IdentityGuard Radius proxyFeedback on guide

Figure 2: Radius proxy integrated with a VPN and Radius server

Note: In the above diagram and the next, the Entrust IdentityGuard Radius proxy is shown as a separate physical entity just for illustration. In reality, it is a component that resides on the Entrust IdentityGuard Server.

VPN authentication through the Entrust IdentityGuard Radius proxy follows these steps:

1 A user enters a user name and password using a VPN client.

2 The VPN server passes this information to the Entrust IdentityGuard Radius proxy.

3 The Entrust IdentityGuard Radius proxy forwards the request to the first-factor authentication resource to verify the user.

4 The first-factor authentication resource responds with an accept or reject message to the Entrust IdentityGuard Radius proxy.

If the Radius proxy receives a reject message, the Radius proxy forwards it unchanged to the VPN server.

5 If the Radius proxy receives an accept message, it requests either a grid or token challenge from Entrust IdentityGuard and sends it to the VPN server.

6 The VPN server forwards this to the VPN client.

The challenge requires a temporary PIN or a response from a user’s card or token.

7 The VPN server sends the user’s response to the challenge back to the Entrust IdentityGuard Radius proxy.

8 The Radius proxy forwards the response to Entrust IdentityGuard.

9 Entrust IdentityGuard checks the response and the Radius proxy sends an accept or reject message to the VPN server.

`

VPN server

VPN client Entrust IdentityGuard Server

Entrust IdentityGuard Radius proxy Radius server

Page 174: IG 81 Install Guide 3

174 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

10 An accept message indicates that the user has passed second-factor authentication.

Figure 3: Radius proxy integrated with a VPN and external authentication

Authentication using a Windows domain controller or LDAP directory follows these steps:

1 A user enters a user name and password in the VPN client. The VPN server passes the data to the Entrust IdentityGuard Radius proxy.

2 The Radius proxy forwards the request to the Entrust IdentityGuard Server to verify the user.

3 Entrust IdentityGuard checks the first-factor authentication resource to verify the user.

4 Entrust IdentityGuard sends a success or fail message to the Radius proxy.

5 If the Radius proxy receives a fail message, the Radius proxy generates a reject message and sends it to the VPN server.

6 If the Radius proxy receives a success message, it requests a challenge from Entrust IdentityGuard and sends the challenge to the VPN server.

7 The VPN server forwards this to the VPN client. The challenge requires a temporary PIN or a response from a user’s card or token.

8 The VPN server sends the response to the Radius proxy.

9 The Radius proxy forwards the information to Entrust IdentityGuard for authentication.

10 Entrust IdentityGuard authenticates the response (or not) and the Radius proxy sends an accept or reject message to the VPN server.

11 An accept message indicates the user has now passed second-factor authentication.

`

VPN server

VPN client Entrust IdentityGuard Server

Entrust IdentityGuard Radius proxy

First-factor authentication resource: domain controller or LDAP

directory

Page 175: IG 81 Install Guide 3

175Configuring the Entrust IdentityGuard Radius proxyFeedback on guide

Configuring the Radius proxy for groups

Your VPN server must already be configured to recognize specific user groups. The group names used by your VPN server do not have to be the same as those you created in Entrust IdentityGuard.

Note: While VPN groups can be specifically paired with Entrust IdentityGuard groups during configuration of the Radius proxy, this pairing is optional if the names of users are unique in your system. In this case, Entrust IdentityGuard determines the correct group. See “Matching a group to a user” on page 179 for an explanation.

Entrust IdentityGuard expects group and user name pairs to be in the form “group/name.” You can configure the Radius proxy to convert names with the form “name@group” or “group\name” to “group/name.” See the processbackslash and processat Radius proxy properties in the section “Configuring the Entrust IdentityGuard Radius proxy properties” starting on page 282.

Using Entrust IdentityGuard groups with a VPN serverThis section applies if you want to associate groups of VPN users with Entrust IdentityGuard groups.

You need to define a VPN server entry for each VPN group you wish to pair with an Entrust IdentityGuard group. You can use the same VPN server for multiple groups or you can use different servers for different groups.

During configuration of the Radius proxy, you are asked to respond to prompts in UNIX or to choose options in Windows. Your answers to several of those prompts or options determine how the VPN and Entrust IdentityGuard groups are paired. The key prompts related to groups are:

1 When asked to enter a list of Radius ports, enter one port number for each VPN group.

2 When asked to enter a unique VPN server host, specify either a DNS or IP address.

If you plan to associate several groups with the same VPN server, enter the same IP each time you run through the Radius proxy configuration. Enter a different IP for another VPN server.

3 You are asked to enter the Radius port used by the VPN server.

Page 176: IG 81 Install Guide 3

176 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

The default is all the ports you entered in Step 1. Enter a specific port only when you want the current VPN configuration to apply to a predefined group.

4 When asked to enter the VPN server secret, enter the applicable secret for the VPN server.

5 You are asked for the Entrust IdentityGuard group name.

Enter the group you plan to associate with the port number entered above in Step 3.

6 You are asked to select Radius or external authentication.

For a Radius server, enter RADIUS; otherwise, enter EXTERNAL.

7 If you choose Radius in Step 6, you are asked to enter the Radius server name. You can use the same Radius server for all VPN servers or use different servers.

Once you complete the configuration for one VPN server, the installation program prompts you to define an additional VPN server. Answer yes at the prompt to complete a configuration for another group. Alternatively, you can edit the identityguard.properties file to add values for the properties related to the prompts listed above.

Radius server exampleAssume you want to set up one Radius server to provide first-factor authentication for two VPN groups (on a single VPN server) named SalesVPN and MarketingVPN. These groups are paired with two Entrust IdentityGuard user groups, IGSales and IGMarketing. In this scenario, the relevant settings in the identityguard.properties file would look like this:

# IdentityGuard Radius ports

identityguard.igradius.port=1812 1813

# VPN sales

identityguard.igradius.vpn.salesVPN.igport=1812

identityguard.igradius.vpn.salesVPN.radius=radius1

identityguard.igradius.vpn.salesVPN.host=10.12.1.1

identityguard.igradius.vpn.salesVPN.secret=xyz

identityguard.igradius.vpn.salesVPN.group=IGSales

identityguard.igradius.vpn.salesVPN.useradius=true

# VPN marketing

identityguard.igradius.vpn.marketingVPN.igport=1813

identityguard.igradius.vpn.marketingVPN.radius=radius1

identityguard.igradius.vpn.marketingVPN.host=10.12.1.1

Page 177: IG 81 Install Guide 3

177Configuring the Entrust IdentityGuard Radius proxyFeedback on guide

identityguard.igradius.vpn.marketingVPN.secret=xyz

identityguard.igradius.vpn.marketingVPN.group=IGMarketing

identityguard.igradius.vpn.marketingVPN.useradius=true

You can follow the prompts in the Radius proxy configuration script twice to achieve these results or you can edit the identityguard.properties file directly.

External authentication exampleIn this example, assume you want to set up an LDAP directory to provide first-factor authentication for the same two VPN groups, SalesVPN and MarketingVPN. These groups are paired with two Entrust IdentityGuard user groups, IGSales and IGMarketing. In this scenario, the relevant settings in the identityguard.properties file would look like this:

# IdentityGuard Radius ports

identityguard.igradius.port=1812 1813

# VPN sales

identityguard.igradius.vpn.salesVPN.igport=1812

identityguard.igradius.vpn.salesVPN.host=10.12.1.1

identityguard.igradius.vpn.salesVPN.secret=xyz

identityguard.igradius.vpn.salesVPN.group=IGSales

identityguard.igradius.vpn.salesVPN.useradius=false

# VPN marketing

identityguard.igradius.vpn.marketingVPN.igport=1813

identityguard.igradius.vpn.marketingVPN.host=10.12.1.1

identityguard.igradius.vpn.marketingVPN.secret=xyz

identityguard.igradius.vpn.marketingVPN.group=IGMarketing

identityguard.igradius.vpn.marketingVPN.useradius=false

# external authentication

identityguard.externalauth.impl=com.entrust.identityGuard.authenticationManagement.external.ldap.LdapAuthentication

If you use a domain controller as an external authentication resource, the last section would look like this:

# external authentication

identityguard.externalauth.impl=com.entrust.identityGuard.authenticationManagement.external.kerberos.KerberosAuthentication

Page 178: IG 81 Install Guide 3

178 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

identityguard.externalauth.kerberos.realm=ENTRUST.COM

Also, if you are using a domain controller, you will need to map each realm to its KDC in the igkrb5.conf file. For more information, see “To set the external authentication properties for a domain controller” on page 203.

Note: This patch removes the identityguard.externalauth.kerberos.kdc property that existed in previous Entrust IdentityGuard releases and replaces it with the igkrb5.conf file.

You can follow the prompts in the Radius proxy configuration script twice to achieve these results or you can edit the identityguard.properties file directly. The identityguard.externalauth.impl and Kerberos-related properties must always be added manually.

The identityguard.externalauth.impl property can include a group name. When it does not, as in the above example, the property creates a default entry for all users. When you include an Entrust IdentityGuard group name in the identityguard.externalauth.impl property, it limits the authentication resource to just members of that group. For more details, see “Using groups with external authentication” on page 209.

Also see “Configuring Entrust IdentityGuard for external authentication” on page 202 for more information on the identityguard.externalauth.impl and Kerberos-related properties.

Page 179: IG 81 Install Guide 3

179Configuring the Entrust IdentityGuard Radius proxyFeedback on guide

Matching a group to a userYou do not need to include group names as part of a user identification if your system contains only unique user names.

When Entrust IdentityGuard needs to verify a user and that user is not specifically identified with a group, Entrust IdentityGuard tries to match the user with the correct group following these rules:

• First search the repository for all users with the given user name.

For an LDAP directory, look in all search bases.

• If no matching user name is found, return an error.

• If one unique user entry is found, use that entry.

• If multiple entries are found with the same user name, return an error.

Page 180: IG 81 Install Guide 3

180 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Using the Radius proxy with a Radius server

You can configure the Entrust IdentityGuard Radius proxy to use a Radius server for first-factor authentication by completing one of the following procedures:

• “To configure the Radius proxy on UNIX” on page 180

• “To configure the Radius proxy on Microsoft Windows” on page 182

If you intend to associate specific predefined VPN group names with existing Entrust IdentityGuard group names, read “Configuring the Radius proxy for groups” on page 175 before you begin to configure the Radius proxy.

Attention: Entrust IdentityGuard rejects any VPN server configuration that creates an explicit or implied duplicate VPN server/port combination. An explicit duplicate occurs when you specify the same port more than once for the same VPN server. An implied duplicate occurs if you select the default port (any port in Unix or All in Windows) more than once for the same VPN server.

To configure the Radius proxy on UNIX1 Log in as the UNIX user that belongs to the UNIX group that was specified during

the installation.

2 Navigate to the $IDENTITYGUARD_HOME (/opt/entrust/identityguard81) directory and enter:

. ./env_settings.sh

3 Navigate to the $IDENTITYGUARD_HOME directory and enter:

configradius.sh

4 At the prompt, enter a list of Radius ports for the Radius proxy or accept the default:

Enter a space-separated list of ports used by IdentityGuard Radius

(default: 1812):

Each port value must be an integer between 1024 and 65535.

Note: If you plan to associate different VPN server groups with separate Radius proxy ports, enter all applicable ports separated by spaces. There can be only one VPN server defined for each port.

5 At the next prompt, define a VPN server.

Do you wish to define a VPN server? [yes or no]

Page 181: IG 81 Install Guide 3

181Configuring the Entrust IdentityGuard Radius proxyFeedback on guide

If you answer yes, continue with these configuration steps.

If you answer no, the configuration will stop. You are asked whether you want to initialize the system. Proceed to “Initializing the primary server” on page 48.

6 At the next prompt, type a unique VPN server name. This provides a unique string that is used by Entrust IdentityGuard to reference this server.

Note: A VPN server name must not include the equals sign (=).

Enter a unique label for the VPN server:

7 At the next prompt, enter a unique VPN server host, using either a DNS or IP address:

Enter the VPN server host name (or IP address):

Entrust IdentityGuard Radius proxy identifies a VPN server by its host name and the Radius port to which it sends messages. If you do not specify a port in the next step, the Radius proxy treats all requests as coming from the same VPN server regardless of which port receives them.

8 At the next prompt, type the Entrust IdentityGuard Radius port used by the VPN server:

Enter the Entrust IdentityGuard Radius port used by the VPN

server:

The default is the ports you set in Step 4. If you enter a specific port, then any communication from this VPN server uses that port only. Enter a specific port if you want the current VPN configuration to apply to an Entrust IdentityGuard group.

9 At the next prompt, type and confirm the VPN server secret. The secret you use for Entrust IdentityGuard Radius proxy must match the server secret already set for the VPN server:

Enter the VPN server shared secret:

Confirm:

10 If you have already defined Entrust IdentityGuard user groups, you can set a specific Entrust IdentityGuard group for use with the current VPN server. If you do, the group is included with the user ID when VPN sends requests to Entrust IdentityGuard.

Enter the Entrust IdentityGuard group for the VPN server:

Note: You do not need to enter a group name if the names of users are unique in your system. Entrust IdentityGuard will determine the correct group. See “Matching a group to a user” on page 179 for an explanation.

Page 182: IG 81 Install Guide 3

182 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

11 If you want the Radius proxy to use a Radius server for first-factor authentication, enter RADIUS at the next prompt:

Do you want to use External or Radius authentication? (EXTERNAL or

RADIUS):

Enter RADIUS and continue with these configuration steps.

(If you enter EXTERNAL, the configuration will stop. Proceed to “Configuring Entrust IdentityGuard for external authentication” on page 202.)

12 Each VPN server needs a corresponding Radius server that performs the first-factor authentication. At the next prompt, enter the server name:

Enter the label of the Radius server for this VPN server:

13 If no Radius server configuration exists for the name you chose in Step 12, enter it at this prompt:

No Radius server is defined with the label <your server name>

Do you wish to define a new Radius server? [yes or no]

a If you enter no, the configradius.sh script prompts you for another Radius server name.

b If you enter yes, the configradius.sh script prompts you for the Radius server host name and port:

Enter the Radius server host name (or IP address):

Enter the Radius server port (default: 1812):

This provides the address of the Radius server where the Radius proxy sends Radius requests.

14 At the next prompt, enter and confirm the Radius server secret:

Enter the Radius server shared secret:

Confirm:

The server secret is the password value the Radius client uses to protect the message. The secret you enter must match the server secret set for the Radius server.

The Entrust IdentityGuard Radius proxy is now configured for this VPN server and your Radius server. Answer yes to configure another server or no to exit.

To configure the Radius proxy on Microsoft Windows1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking

Start > All Programs > Entrust > IdentityGuard > Configuration Panel.

2 Select Set Up the Radius Proxy to run the Entrust IdentityGuard Radius Proxy Setup.

The Entrust IdentityGuard Radius Proxy Configuration page appears.

Page 183: IG 81 Install Guide 3

183Configuring the Entrust IdentityGuard Radius proxyFeedback on guide

3 In the Ports used by the Entrust IdentityGuard Radius Proxy field, specify the ports that the Entrust IdentityGuard Radius Proxy will listen on.

Use commas to separate your various ports. Each port value must be an integer between 1 and 65535. The port value entered must be unique to the system.

4 If you are using a Radius server for first-factor authentication, in the Radius Authentication Servers section, click Add. Alternatively, you can select an existing server definition and click Change to modify it or Remove to remove it.

The Add/Change Radius Server page appears.

Page 184: IG 81 Install Guide 3

184 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

5 On the Add/Change Radius Server page, enter the connection details for a Radius server.

Note: If you plan to use external authentication, skip this step.

• Radius server label. Enter a unique string that is used by Entrust IdentityGuard to reference this server. Once a label is saved it cannot be changed.

• Radius server host name. Type a unique Radius server host, using either a DNS or IP address.

• Radius server port. Type the port on the Radius server where the Radius proxy sends messages. This is the same port that the VPN server uses.

• Radius server shared secret. Type the shared secret value the client uses to protect the message. The secret you enter must match the shared secret set on the Radius server.

• Confirm shared secret. Type the shared secret again.

• Click OK.

6 In the VPN Servers section, click Add to map your VPN Server to your first-factor Authentication Server. Alternatively, you can select an existing server definition and click Change to modify it or Remove to remove it.

The Add/Change VPN Server page appears.

Page 185: IG 81 Install Guide 3

185Configuring the Entrust IdentityGuard Radius proxyFeedback on guide

7 On the Add/Change VPN Server page, enter the connection details for a VPN server:

• VPN server label. This provides a unique string that is used by Entrust IdentityGuard to reference this server. Once the label is saved it cannot be changed.

• VPN server host name. Enter a VPN server host, using either a FQDN, hostname, or IP address.

• VPN server shared secret. Enter the VPN server secret. This secret you use for Entrust IdentityGuard Radius proxy must match the server secret already set for the VPN server

• Confirm shared secret. Enter the VPN server secret again.

• Entrust IdentityGuard group (optional). If you have already defined Entrust IdentityGuard user groups, you can set a specific Entrust IdentityGuard group for use with the current VPN server.

Note: You do not need to enter a group name if the names of users are unique in your system. Entrust IdentityGuard determines the correct group. See “Matching a group to a user” on page 179 for an explanation.

• Radius Proxy port. This drop-down list contains:

Page 186: IG 81 Install Guide 3

186 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

– all port numbers you entered earlier in the Ports used by the Entrust IdentityGuard Radius Proxy field

– as well as, the all option If you enter a specific port, then any communication from this VPN server uses that port only.

Enter a specific port if you want the current VPN configuration to apply to an Entrust IdentityGuard group. Select all if the port used is not important. The Server hostname and Radius proxy port number must be unique.

• First-factor authentication server. This drop-down list contains the names of all Radius servers you defined on the Add/Change Radius Server page. Select the server to use with this VPN server.

• Click OK.

8 Click Save.

A pop-up box appears validating your configuration.

The Entrust IdentityGuard Radius proxy is now configured for this VPN server and your Radius server. You can configure additional VPN and Radius servers.

Page 187: IG 81 Install Guide 3

187Configuring the Entrust IdentityGuard Radius proxyFeedback on guide

Using the Radius proxy with a domain controller or LDAP directory

Configure the Entrust IdentityGuard Radius proxy to use an external authentication resource completing these steps.

Topics in this section:

• “To configure Radius proxy on UNIX” on page 187

• “To configure the Radius proxy on Microsoft Windows” on page 189

Note: When you configure Entrust IdentityGuard Radius proxy, the program stores the results in the identityguard.properties file. You can edit this file to change settings or to add additional VPN servers and their first-factor authentication method later. For information on the property settings, see section “Configuring the Entrust IdentityGuard Radius proxy properties” on page 282.

If you intend to associate specific predefined VPN group names with existing Entrust IdentityGuard group names, read “Configuring the Radius proxy for groups” on page 175 before you begin to configure the Radius proxy.

Attention: Entrust IdentityGuard rejects any VPN server configuration that creates an explicit or implied duplicate VPN server/port combination. An explicit duplicate occurs when you specify the same port more than once for the same VPN server. An implied duplicate occurs if you select the port default (any port in UNIX or All in Windows) more than once for the same VPN server.

To configure Radius proxy on UNIX1 Log in as the UNIX user that belongs to the UNIX group that was specified during

the installation. See “Installing Entrust IdentityGuard Server” on page 33 for installations with embedded Tomcat or “Installing Entrust IdentityGuard Server” on page 106 for installation using an existing application server.

2 Navigate to the $IDENTITYGUARD_HOME (/opt/entrust/identityguard81) directory and enter:

. ./env_settings.sh

3 Navigate to the $IDENTITYGUARD_HOME directory and enter:

configradius.sh

4 At the prompt, enter a list of Radius ports for the Radius proxy or accept the default:

Page 188: IG 81 Install Guide 3

188 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Enter a space-separated list of ports used by IdentityGuard Radius

(default: 1812):

Each port value must be an integer between 1024 and 65535.

Note: If you plan to associate different VPN server groups with separate Radius proxy ports, enter all applicable ports separated by spaces. There can be only one VPN server defined for each port.

5 At the next prompt, confirm that you want to use a VPN server.

Do you wish to define a VPN server? [yes or no]

If you type no, the configuration stops. You are asked whether you want to initialize the system. Proceed to “Initializing the primary server” on page 48 for installations with embedded Tomcat or “Initializing the primary Entrust IdentityGuard Server” on page 118 for installations using an existing application server.

6 At the next prompt, enter a unique VPN server name. This provides a unique string that is used by Entrust IdentityGuard to reference this server.

Note: A VPN server name must not include the equal sign (=).

Enter a unique label for the VPN server:

7 At the next prompt, enter a unique VPN server host, using either a DNS or IP address:

Enter the VPN server host name (or IP address):

The Entrust IdentityGuard Radius proxy identifies a VPN server by its host name, and the port to which it sends messages. If you do not specify a port in the next step, the Radius proxy treats all requests as coming from the same VPN server regardless of which port receives them.

8 At the next prompt, enter the Entrust IdentityGuard port used by the VPN server:

Enter the Entrust IdentityGuard Radius port used by the VPN

server:

The default is the ports you set in Step 4. If you enter a specific port, then any communication from this VPN server uses that port only. Enter a specific port if you want the current VPN configuration to apply to an Entrust IdentityGuard group.

9 At the next prompt, enter and confirm the VPN server secret. This secret you use for Entrust IdentityGuard Radius proxy must match the server secret already set for the VPN server:

Enter the VPN server shared secret:

Page 189: IG 81 Install Guide 3

189Configuring the Entrust IdentityGuard Radius proxyFeedback on guide

Confirm:

10 If you have already defined Entrust IdentityGuard user groups, you can set a specific Entrust IdentityGuard group for use with the current VPN server.

Enter the Entrust IdentityGuard group for the VPN server:

Note: You do not need to enter a group name if the names of users are unique in your system. Entrust IdentityGuard determines the correct group. See “Matching a group to a user” on page 179 for an explanation.

11 If you want the Radius proxy to use a domain controller or LDAP directory for first-factor authentication, enter EXTERNAL at the next prompt:

Do you want to use External or Radius authentication? (EXTERNAL or

RADIUS):

(If you enter RADIUS, the configuration continues. Proceed to “To configure the Radius proxy on UNIX” on page 180.) When you enter EXTERNAL, the configuration script stop and you see the following message:

Make sure that the Entrust IdentityGuard Server is configured so

that External authentication is enabled.

Answer yes to configure another VPN server or no to exit.

Go to “Configuring Entrust IdentityGuard for external authentication” on page 202 to finish this configuration.

To configure the Radius proxy on Microsoft Windows1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking

Start > All Programs > Entrust > IdentityGuard > Configuration Panel.

2 Select Set Up the Radius Proxy to run the Entrust IdentityGuard Radius proxy setup program.

The Entrust IdentityGuard Radius Proxy Configuration page appears.

Page 190: IG 81 Install Guide 3

190 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

3 In the Ports used by the Entrust IdentityGuard Radius Proxy field, enter a list of Radius ports for the Radius proxy or accept the default.

Use commas to separate the port numbers. The port value entered must be unique to the system.

4 Skip the Radius Authentication Servers section if you plan to use external authentication.

5 In the VPN Servers section, click Add to configure a VPN server for use with Entrust IdentityGuard. Alternatively, you can select an existing server definition and click Change to modify it or Remove to remove it.

Page 191: IG 81 Install Guide 3

191Configuring the Entrust IdentityGuard Radius proxyFeedback on guide

The Add/Change VPN Server page appears.

6 On the Add/Change VPN Server page, enter the connection details for a VPN server:

• VPN server label. This provides a unique string that is used by Entrust IdentityGuard to reference this server.

• VPN server host name. Enter a unique VPN server host, using either a FQDB, hostname, or IP address. The hostname and Radius proxy port combination must be unique for each VPN server entry.

• VPN server shared secret. Enter the VPN server secret. This secret you use for Entrust IdentityGuard Radius proxy must match the server secret already set for the VPN server

• Confirm shared secret. Enter the VPN server secret again.

• Entrust IdentityGuard group (optional). If you have already defined Entrust IdentityGuard user groups, you can set a specific Entrust IdentityGuard group for use with the current VPN server.

Note: You do not need to enter a group name if the names of users are unique in your system. Entrust IdentityGuard will determine the correct group. See “Matching a group to a user” on page 179 for an explanation.

• Radius Proxy port. This drop-down list contains all port numbers you entered earlier in the Ports used by the Entrust IdentityGuard Radius Proxy field plus

Page 192: IG 81 Install Guide 3

192 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

the all option (the default). If you enter a specific port, then any communication from this VPN server uses that port only. It makes sense to enter a specific port if you want the current VPN configuration to apply to an Entrust IdentityGuard group. Select all if the port used is not important.

• First-factor authentication server. To use external authentication, select IdentityGuard External.

• Click OK.

7 Click Save.

A pop-up box appears validating your configuration.

The Entrust IdentityGuard Radius proxy is now configured for this VPN server. Add as many VPN servers as required.

Go to “Configuring Entrust IdentityGuard for external authentication” on page 202 to finish this configuration for external authentication.

Page 193: IG 81 Install Guide 3

193Configuring the Entrust IdentityGuard Radius proxyFeedback on guide

Configuring the VPN server Follow these general steps to configure your VPN server to communicate with the Entrust IdentityGuard Radius proxy. The interface details vary depending on your platform and the interface tool you use.

For detailed integration instructions specific to your platform, see the Technical Integration Guide that applies to your VPN server.

To configure the VPN server1 Log in to the VPN server as administrator.

2 If applicable, select a VPN user group.

You may have more than one choice here if your VPN recognizes different groups of users.

3 Select Radius as the server used for authentication.

(Select Radius even if you plan to use a Windows domain controller or an LDAP directory with the Entrust IdentityGuard Radius proxy.)

4 For the authentication server, set the IP address to that of the Entrust IdentityGuard Radius proxy instead of a Radius server.

5 If you are using groups, for the server port, enter the port assigned to the VPN group selected in Step 10 on page 181 (UNIX) or Step 7 on page 185. (Windows).

The default Entrust IdentityGuard Radius proxy port is 1812. (See also “Configuring the Radius proxy for groups” above.)

6 For the server secret (configured in Step 4 on page 176 in UNIX and Step 7 on page 185 in Windows), enter a value that matches the value known to Entrust IdentityGuard.

7 Save your settings.

Page 194: IG 81 Install Guide 3

194 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Configuring a Radius server for first-factor authentication

Remote Authentication Dial-In User Service (Radius) is an industry standard authentication protocol.

Radius authenticates users through a series of communications between Radius clients and the Radius server. A Radius client passes information about a user to a designated Radius server and then acts on the response that the Radius server returns. Transactions between the Radius client and the Radius server are authenticated through a shared secret, which is never sent over the network. Many networks use Radius to centralize and coordinate VPN authentication.

If you configure your remote VPN access gateway (IPSec or SSL) to use an existing Radius server for configuration, the Entrust IdentityGuard Radius proxy lets you add Entrust IdentityGuard for second-factor authentication. The Radius proxy sends the authentication request to the Radius server to perform first-factor authentication and then it adds an Entrust IdentityGuard authentication step. Users that do not exist in Entrust IdentityGuard are authenticated by the first-factor authentication mechanism only.

If you plan to use a Radius server for first-factor authentication, follow these general steps to configure the Radius server to communicate with the Entrust IdentityGuard Radius proxy. The interface details will vary depending on your platform and the interface tool you use.

To configure the Radius server for first-factor authentication1 Log in to the Radius server as administrator.

2 For the Radius client address, change the IP address from the VPN server to that of the Entrust IdentityGuard Radius proxy.

3 For the server secret, enter a value that matches the value known to Entrust IdentityGuard.

4 Save your settings.

Page 195: IG 81 Install Guide 3

195Configuring the Entrust IdentityGuard Radius proxyFeedback on guide

Configuring Radius server failover By configuring Radius server failover on the Entrust IdentityGuard Radius proxy, you ensure that there are backup Radius servers if the primary system fails. When failover is configured, if a timeout occurs while waiting for a response from the Radius server, Entrust IdentityGuard Radius proxy uses the next IP address in the list (for the next request that it receives). The current request times out. When Entrust IdentityGuard Radius proxy reaches the end of the list of IP addresses, it restarts at the beginning of the list.

Complete the following steps to add the list of Radius server IP addresses to the identityguard.properties file.

For more information on high availability and disaster recovery, see the Entrust IdentityGuard Deployment Guide.

To configure the Radius server for failover1 Open the $IDENTITYGUARD_HOME/etc/identityguard.properties file.

2 Edit the file to include the multiple Radius servers in the Radius server address property.

For example,

identityguard.igradius.radius.{0}.address=radius_server1:1812

radius_server2:1812 radius_server3:1813

where the {0} placeholder is replaced by the Radius server name.

Use a space to separate each of radius servers in the list.

Note: All the Radius servers should use the same secret.

Page 196: IG 81 Install Guide 3

196 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Managing the Radius proxyYou can set the Entrust IdentityGuard Radius proxy to start automatically when you reboot, or you can start and stop it manually.

Topics in this section:

• “Managing the Radius proxy on UNIX” on page 196

• “Managing the Radius proxy on Microsoft Windows” on page 199

Managing the Radius proxy on UNIXComplete one of the following procedures to manage the Radius proxy:

• “To enable/disable automatic restart of the Radius proxy” on page 196

• “To start and stop the Radius proxy” on page 196

• “To start and stop Entrust IdentityGuard and the Radius proxy together” on page 197

• “To start and stop the Radius proxy with the Linux service command” on page 198

To enable/disable automatic restart of the Radius proxy• As root in $IDENTITYGUARD_HOME/bin, enable automatic restart by

entering:

./igsvvconfig.sh igradius enable

The Entrust IdentityGuard Radius proxy will start every time the computer reboots.

• As root in $IDENTITYGUARD_HOME/bin disable automatic restart by entering:

./igsvvconfig.sh igradius disable

You must start the Entrust IdentityGuard Radius proxy manually.

To start and stop the Radius proxy1 Log in as the UNIX user that belongs to the UNIX group that was specified during

the installation. See “Installing Entrust IdentityGuard Server” on page 33 for installations with embedded Tomcat or “Installing Entrust IdentityGuard Server” on page 106 for installation using an existing application server.

2 Navigate to the $IDENTITYGUARD_HOME directory and enter:

. ./env_settings.sh

3 Enter the following command at the command prompt followed by one of the options in Table 11:

Page 197: IG 81 Install Guide 3

197Configuring the Entrust IdentityGuard Radius proxyFeedback on guide

igradius.sh

Note: When the Entrust IdentityGuard Radius proxy starts, it checks that at least one VPN client and one resource (external authentication or Radius server) are defined and that each server referred to by a client exists. If that is not the case, it issues an error to the logs and the Radius proxy exits.

To start and stop Entrust IdentityGuard and the Radius proxy together1 Log in as the UNIX user that belongs to the UNIX group that was specified during

the installation.

See “Installing Entrust IdentityGuard Server” on page 33 for installations with embedded Tomcat or “Installing Entrust IdentityGuard Server” on page 106 for installations using an existing application server.

2 Navigate to $IDENTITYGUARD_HOME directory and enter:

. ./env_settings.sh

3 Enter one of these commands at the command prompt followed by one of the options in Table 12:

igservice.sh identityguard

igservice.sh igradius

igservice.sh all

Table 11: Managing the Radius proxy

Command Description

start Starts the Radius proxy.

Entrust IdentityGuard generates audits that you can use to determine if the services started successfully or failed to start. You will not see an error message if the service fails to start.

stop Stops the Radius proxy.

status Tells you if the Radius proxy is running. If it is running, Entrust IdentityGuard displays the process ID number.

restart Stops and restarts the Radius proxy.

Page 198: IG 81 Install Guide 3

198 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

For example, to restart Entrust IdentityGuard and the Radius proxy on installations of Entrust IdentityGuard with embedded Tomcat, enter:

igservice.sh all restart

Note: In versions of Entrust IdentityGuard installed on an existing application service, you can use any of these commands for the Radius proxy; however, only the status command is available for Entrust IdentityGuard.

To start and stop the Radius proxy with the Linux service commandYou can also use the Linux service command to start and stop the Entrust IdentityGuard Radius proxy.

1 Enter this command at the command prompt followed by one of the options in the table below:

service igradius

Table 12: Managing the Radius proxy service

Command Description

start Starts the specified service.

Entrust IdentityGuard does not display an error message if the service fails to start. Check the logs to determine if startup failed.

stop Stops the specified service.

status Tells you if the specified service is running.

restart Stops and restarts the specified service.

Command Description

start Starts the specified services.

Entrust IdentityGuard does not display an error message if the service fails to start. Check the logs to determine if startup failed.

stop Stops the specified service.

status Tells you if the specified service is running.

restart Stops and restarts the specified service.

Page 199: IG 81 Install Guide 3

199Configuring the Entrust IdentityGuard Radius proxyFeedback on guide

If you run the service igradius command as root, the service automatically switches to the UNIX user ID originally used to install Entrust IdentityGuard.

Managing the Radius proxy on Microsoft WindowsYou can set the Entrust IdentityGuard Radius proxy to start automatically when you reboot, or you can start and stop it manually.

Note: You must log in as administrator to install Entrust IdentityGuard. You then select a user/group that will own the installation. That user (or any member of the group) can then start or stop the services as described below.

To enable automatic restart of the Radius proxy1 Log in as a user that belongs to the group that was specified during the

installation as the owner of the installation.

2 Go to Start > Control Panel > Administrative Tools > Services.

The Services window appears.

3 Right-click Entrust IdentityGuard Radius Proxy and select Properties.

4 In the Startup type drop-down menu, select Automatic.

To disable automatic restart of the Radius proxy1 Log in as a user that belongs to the group that was specified during the

installation as the owner of the installation.

2 Go to Control Panel > Administrative Tools > Services.

The Services window appears.

3 Right-click Entrust IdentityGuard Radius Proxy and select Properties.

4 In the Startup type drop-down menu, select Disabled. (Select Manual if you want to start this Radius proxy service manually.)

To start and stop the Radius proxy1 Log in as a user that belongs to the group that was specified during the

installation as the owner of the installation.

2 Go to Control Panel > Administrative Tools > Services.

The Services window appears.

3 Right-click Entrust IdentityGuard Radius Proxy and select Properties.

Page 200: IG 81 Install Guide 3

200 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

4 In the Service status section, click either Start or Stop depending on your requirements.

Note: When the Entrust IdentityGuard Radius proxy starts, it checks that at least one VPN client and one service (external authentication or Radius server) are defined and that each server referred to by a client exists. If that is not the case, it issues an error and the Radius proxy exits.

Page 201: IG 81 Install Guide 3

201

Chapter 7

Postinstall configuration options for Entrust IdentityGuard Server

Use this chapter to configure or reconfigure Entrust IdentityGuard Server after installation.

This chapter contains the following sections:

• “Configuring Entrust IdentityGuard for external authentication” on page 202

• “Adding Entrust IdentityGuard replica servers” on page 210

• “Configuring failover on the repository” on page 218

• “Storing unassigned cards and tokens” on page 220

• “Configuring Syslog for remote logging on UNIX” on page 226

• *“Disabling the non-SSL port on the Authentication service” on page 228

• *“Enabling the non-SSL port on the Administration service” on page 230

• *“Disabling the SSL port on the Administration service” on page 231

• “Securing the LDAP connection with SSL” on page 233

• *“Changing the Entrust IdentityGuard certificate” on page 235

• “Enabling system binding” on page 240

Attention: *These sections only apply to versions of Entrust IdentityGuard that use embedded Tomcat.

Page 202: IG 81 Install Guide 3

202 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Configuring Entrust IdentityGuard for external authentication

The external authentication feature provided with Entrust IdentityGuard lets you use Entrust IdentityGuard to manage first-factor authentication using the Windows domain controller or LDAP directory information as authentication sources. Typically, you would use external authentication as the first layer of a multifactor Entrust IdentityGuard authentication regime.

To configure Entrust IdentityGuard for external authentication, you need to do the following:

• Add external authentication as an authentication option for the users in each applicable Entrust IdentityGuard group. Use the master user shell to add the External option to the applicable policies like this:

policy userspec set -genericauthtype GRID EXTERNAL

policy userspec set -machineauthtype GRID EXTERNAL

Note: This example shows how to add grid and External authentication options. Add all the authentication options that you want to use with this command.

For more information, see “Modifying, exporting and importing the user specification attributes for a policy” in the Entrust IdentityGuard Administration Guide.

• Edit the identityguard.properties file to set the external authentication properties, as explained:

– If you store Entrust IdentityGuard user information in Active Directory, ADAM, or other supported LDAP repository, proceed to “To set the external authentication properties for an LDAP directory” on page 203.

– If you want to use the Windows domain controller for first-factor authentication, proceed to “To set the external authentication properties for a domain controller” on page 203.

When you configure external authentication, it applies to all deployment types managed by Entrust IdentityGuard, whether the user is accessing your application through VPN, a Web application, or other method.

Configuring external authenticationIn the following procedures, when you make changes to the identityguard.properties file, ensure that you restart Entrust IdentityGuard Server. For instructions on restarting, see “Managing the Entrust IdentityGuard service” on page 62 for installations with embedded Tomcat, “Managing the Entrust

Page 203: IG 81 Install Guide 3

203Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

IdentityGuard service” on page 166 for installations using an existing application server, or “Managing the Entrust IdentityGuard service” on page 94 for Windows.

To set the external authentication properties for an LDAP directory1 Open the identityguard.properties file located:

• on UNIX, $IDENTITYGUARD_HOME/etc/

• on Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\

2 Add the identityguard.externalauth.impl property to the file.

3 Set the property to the correct Java class for an LDAP directory. The entry appears as follows:

identityguard.externalauth.impl=com.entrust.identityGuard.authenti

cationManagement.external.ldap.LdapAuthentication

This example creates a global or default setting for all users. This property can also include an Entrust IdentityGuard group name, such as IGSales in this example:

identityguard.externalauth.impl.IGSales=com.entrust.identityGuard.

authenticationManagement.external.ldap.LdapAuthentication

See “Using groups with external authentication” on page 209 for more information using groups with external authentication.

During LDAP directory authentication, Entrust IdentityGuard attempts to bind to the user’s LDAP entry. If the bind succeeds, the user is authenticated.

Note: The directory used for external authentication must be the same one used as the Entrust IdentityGuard repository.

The Kerberos protocol used for authentication through a domain controller is case-sensitive. If the user enters an ID that does not match the case Kerberos expects, the authentication fails. If you use a Directory repository and user names are stored in mixed case, make sure the user names entered in Entrust IdentityGuard use exactly the same case for all letters.

Entrust IdentityGuard and LDAP do not care about the case of user names. They can be uppercase, lowercase or mixed case. While you can specify that Kerberos convert names to uppercase or lowercase, this is no solution for mixed case user names.

To set the external authentication properties for a domain controller1 Open the identityguard.properties file located:

• on UNIX, $IDENTITYGUARD_HOME/etc/

• on Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\

Page 204: IG 81 Install Guide 3

204 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

2 Add the identityguard.externalauth.impl property to the file.

3 Set the property to the correct Java class for a domain controller. The entry looks like this:

• if you are not using groups:

identityguard.externalauth.impl=com.entrust.identityGuard.authenti

cationManagement.external.kerberos.KerberosAuthentication

The above example creates a global or default setting for all users.

• If you are using groups, for example IGSales:

identityguard.externalauth.impl.IGSales=com.entrust.identityGuard.

authenticationManagement.external.kerberos.KerberosAuthentication

4 Domain controller authentication uses the Kerberos protocol. You must add a property to specify the server acting as the Kerberos realm. For example:

identityguard.externalauth.kerberos.realm=ENTRUST.COM

The realm provides the name the domain controller. Make sure to enter the realm name in uppercase characters.

5 Kerberos authentication is case-sensitive. If the user enters an ID that does not match the case Kerberos expects, the authentication fails. Use this property to convert the user ID to upper or lowercase, for example:

identityguard.externalauth.kerberos.caseconvert=lower

Valid entries are upper or lower. If this property is absent or contains another value, Entrust IdentityGuard does not change the entered user ID.

The case should always be set to lower when using a domain controller for external authentication.

The Kerberos properties can also include an Entrust IdentityGuard group name, such as IGSales in this example:

identityguard.externalauth.kerberos.realm.IGSales=ENTRUST.COM

identityguard.externalauth.kerberos.caseconvert.IGSales=lower

When specified without a group name, they create a global or default setting for users. When specified with an Entrust IdentityGuard group name, they set the realm, KDC and user ID case to use for members of that group.

See “Using groups with external authentication” on page 209 for more information using groups with external authentication.

6 Save your changes.

7 Open igkrb5.conf in a text editor, located:

• on UNIX, $IDENTITYGUARD_HOME/etc/

• on Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\

Page 205: IG 81 Install Guide 3

205Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

8 Using Kerberos syntax, map each realm to the server hosting the corresponding Kerberos Key Distribution Center (KDC). For example:

[realms]

IG1.ENTRUST.COM = {

kdc = ig1.entrust.com

}

IG2.ENTRUST.COM = {

kdc = ig2.entrust.com

}

Make sure to enter the realm name in uppercase characters. For an example, see the igkrb5.sample file stored in the same location.

9 Add other Kerberos-related settings as required. For example, you may want to change the default encryption key type. For more information on syntax, refer to http://web.mit.edu/kerberos/krb5-1.5/krb5-1.5.1/doc/krb5-admin/krb5.conf.html.

10 Save your changes.

If you are not using WebSphere, you have finished setting up external authentication properties for a domain controller. If you are using WebSphere, complete the following procedure (“To finish setting up external authentication for a domain controller on WebSphere”).

To finish setting up external authentication for a domain controller on WebSphere1 Start the administration console for your WebSphere server.

The default URL is http://localhost:9060/ibm/console.

2 Select Security > Global Security > JAAS Configuration.

3 In the JAAS Configuration page, click Application Logins.

4 Click New.

Page 206: IG 81 Install Guide 3

206 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

5 Set the Alias value to IGKerberos.

Page 207: IG 81 Install Guide 3

207Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

6 Click Apply. The JAAS login modules link under Additional Properties becomes available.

7 Click JAAS login modules.

Page 208: IG 81 Install Guide 3

208 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

8 Set the Module class name to com.ibm.security.auth.module.Krb5LoginModule.

9 Click Apply.

10 Click Save followed by Save.

Page 209: IG 81 Install Guide 3

209Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

Using groups with external authenticationWhen you include an Entrust IdentityGuard group name in one of the identityguard.externalauth.impl property entries, it limits the authentication resource to just members of that group. This way, you can direct users in different groups to different authentication resources or exclude some groups from an authentication resource.

You can have multiple entries for the identityguard.externalauth.impl property as long as each is unique. For example, you can have one default entry with no group name, and several entries each with a different group name.

If all entries for this property include a group name (that is, there is no entry without a group), this means there is no default and only the users in the specified groups can use external authentication.

You do not need to include external authentication groups unless you intend to direct certain groups of users to specific external authentication resources.

See “Using the Radius proxy with a domain controller or LDAP directory” on page 187 for details on configuring a VPN server to use the Radius proxy for external authentication.

Page 210: IG 81 Install Guide 3

210 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Adding Entrust IdentityGuard replica servers

Replica systems help decrease the load on the primary Entrust IdentityGuard Server. Add replica servers to set up a loadbalanced or failover environment when you are administering very large numbers of users. You may add any number of replica servers.

Note: For information on repository failover, see “Configuring failover on the repository” on page 218. For information on high availability and disaster recovery, see the Entrust IdentityGuard Deployment Guide.

You must have a existing Entrust IdentityGuard Server before attempting to create a replica system.

When adding a replica, consider the following:

• Do not enable a file-based repository on a replica server.

The replica configuration enables a file-based repository by default. For more details, see “Storing unassigned cards and tokens” on page 220.

Note: If you are using a file-based repository, ensure that administrators and master users log in to the primary Entrust IdentityGuard Server when assigning tokens or cards to users.

• The repository is not copied when you add a replica.

The replica uses the same repository that the primary Entrust IdentityGuard Server uses.

• With Entrust IdentityGuard Server installations with embedded Tomcat only, a new self-signed certificate with the proper host name is created during the replica configuration.

If you create a new SSL certificate for the replica server, ensure the host name in the SSL certificate is the same as the host name used by the server.

For details on creating an SSL certificate, after completing this procedure, see the section “Changing the Entrust IdentityGuard certificate” on page 235.

• If you make any configuration changes to the primary Entrust IdentityGuard Server, you must manually propagate the changes to any replicas.

For example, if you update the certificates or change the identityguard.properties file, you must also update the replicas.

Page 211: IG 81 Install Guide 3

211Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

Note: All files being added should be readable and writable by the user and group selected during installation.

Follow the appropriate procedures in this section depending on what type of system you are using to run Entrust IdentityGuard Server:

• for UNIX, proceed to “To add a replica server on UNIX” on page 211

• for Microsoft Windows, proceed to “To add a replica server on Microsoft Windows” on page 213

To add a replica server on UNIX1 As the UNIX user on the existing Entrust IdentityGuard Server, run the partial

backup command:

igbackup.sh -partial

For instructions and options (such as creating a partial or full backup file, and naming a backup file), see “Backing up your configuration” on page 247.

2 Copy the backup onto the computer that will host the new Entrust IdentityGuard replica server. The default location for the backup ZIP file is $IDENTITYGUARD_HOME/backups.

3 Complete the following preinstallation tasks on the computer that will host the replica:

a Create a UNIX group and user for Entrust IdentityGuard (“Creating the UNIX group and user” on page 32) or use the UNIX group already created for your application server.

b Copy the Entrust IdentityGuard installation package (“Downloading Entrust IdentityGuard software” on page 21).

4 Start the Entrust IdentityGuard installation procedure (“Installing Entrust IdentityGuard Server” on page 33 for installations with embedded Tomcat or “Installing Entrust IdentityGuard Server” on page 106 for installations using an existing application server) on the computer that will host the replica until you see the message:

Installation complete

Do you wish to configure the application now? [yes or no]

Answer yes.

5 The following message appears:

Are you configuring an Entrust IdentityGuard primary or replica

server?(PRIMARY or REPLICA):

Answer replica.

6 You are prompted to enter the backup file name.

Page 212: IG 81 Install Guide 3

212 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Enter the name of the configuration backup file:

Type the name of the partial (or full) configuration backup file that you copied in in Step 2 in this procedure.

For example, igpartialbackup_20060224150045.zip.

7 You are prompted to select the mode of the Administration service:

How should the administration services be setup? (ENABLED,

DISABLED, or PRIMARY)?

Choose one of the three modes:

• ENABLED enables the Administration service, which the Administration interface uses.

The sample will use the local services.

• DISABLED disables the Administration service and the Administration interface.

The sample is also disabled since it uses the local Administration service.

• PRIMARY disables the Administration service on the replica server and enables it on the primary server.

Note: If you are using file-based repositories, select either disabled or primary.

The Administration interface is enabled on the replica server.

In this mode, the SSL certificate of the primary must be installed in the local key store. This is done automatically with installations of Entrust IdentityGuard with embedded Tomcat, but you must complete this manually if your installation of Entrust IdentityGuard uses an existing application server.

8 You are prompted for the ports that the Application server should use.

APPLICATION SERVER CONFIGURATION

Complete Step 2 to Step 4 on page 45 for installations with embedded Tomcat or Step 1 on page 115 to Step 3 on page 116 for installations using an existing application server.

9 You are prompted to initialize the replica.

Do you wish to initialize the replica system? [yes or no]

Answer yes, to initialize the replica.

REPLICA SYSTEM INITIALIZATION

If you want to initialize the system manually later, follow the steps below “To initialize the replica manually on UNIX” on page 213.

10 All three master users must enter their passwords.

Page 213: IG 81 Install Guide 3

213Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

The following message appears:

Replica initialized.

11 If you are using a directory, remove the file-based repository settings. See “Storing unassigned cards and tokens” on page 220.

12 Optionally, if you want to enable system binding on the replica, from the master user shell, run the command system bind to enable system binding.

For more information on system binding, see “Enabling system binding”.

13 To configure and enable the sample application, proceed to the procedure on “Configuring the sample application on UNIX” on page 51 for installations with embedded Tomcat or “Configuring the sample application on an existing application server” on page 121 for installations using an existing application server.

Your replica server is now installed, configured, and initialized. Proceed to “Testing your installation” on page 58 for installations with embedded Tomcat or “Testing your installation” on page 162 for installations using an existing application server.

To initialize the replica manually on UNIX1 As the UNIX user on the replica, change to $IDENTITYGUARD_HOME (usually

/opt/entrust/identityguard81).

2 From $IDENTITYGUARD_HOME, source the environment settings file by entering:

. ./env_settings.sh

(Include a space between the two periods in the command.)

3 Enter the following command to start the master user shell:

supersh

The copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.

4 Enter the following command:

init -replica

All three master users must enter their passwords.

To add a replica server on Microsoft Windows1 Copy the Entrust IdentityGuard installation package to the computer that will

host the replica (“Downloading Entrust IdentityGuard software” on page 21).

2 On an existing Entrust IdentityGuard Server, create a backup (for more information on creating a backup, see “Backing up your configuration” on page 247):

Page 214: IG 81 Install Guide 3

214 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

a If the Entrust IdentityGuard Configuration Panel is not open, click Start > All Programs > Entrust > IdentityGuard > Configuration Panel.

b Select Backup Entrust IdentityGuard Configuration from the Entrust IdentityGuard Configuration Panel.

The Backup Type page appears.

c Select Partial as the backup type. Partial backups contain enough information to configure a replica system.

d In the Backup File Location section, click Browse.

The backup utility create a file name in the File name field, which includes a date/time stamp.

e Click OK to save the backup under the file name with the date/time stamp. Alternatively, rename the file in the File name field and press OK.

f Click Save.

A message appears indicating whether the backup was saved or an error occurred.

3 Copy the backup onto the computer that will host the new Entrust IdentityGuard replica server.

Page 215: IG 81 Install Guide 3

215Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

4 Start the Entrust IdentityGuard installation procedure (“Installing Entrust IdentityGuard Server” on page 68) on the computer that will host the replica.

5 When the Entrust IdentityGuard Configuration Panel appears, select Replica as your system type.

6 Select Configure Entrust IdentityGuard.

The Entrust IdentityGuard Configuration wizard Welcome page appears.

7 Click Next to begin configuration.

The System Backup File page appears.

8 Click Browse to select your Entrust IdentityGuard backup file that you copied in Step 3.

9 Select Next.

The Service Settings page appears.

10 Complete “Selecting Entrust IdentityGuard service ports” on page 79 and “Selecting your system host name” on page 81.

11 On the Administration Controls page, select the administration state:

• Enabled. This option enables both the Administration service and interface controls on the replica system.

• Disabled. This option disables both the Administration service and interface controls on the replica system.

Page 216: IG 81 Install Guide 3

216 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

• Primary. This option disables the Administration service on the replica system and forwards all Administration interface requests to the primary system. The Administration interface is enabled on the replica.

12 Select Next.

The Configuration Summary page appears.

13 On the Configuration Summary page, click Confirm and Save if all the information in the summary list is complete and correct.

14 Click Finish to complete the configuration process.

The configuration file is extracted from the backup file and updated with the changes made in the Entrust IdentityGuard Configuration wizard. File-based repositories are disabled, as is the Administration service and interface controls (if you selected it to be disabled). A new application server SSL certificate is generated, and the primary server’s public key (SSL certificate) and the LDAP SSL certificate (it is exists) are imported to the new key store.

To initialize a replica server on Microsoft Windows1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking

Start > All Programs > Entrust > IdentityGuard > Configuration Panel.

2 On the main page of the Configuration Panel, select Replica as the system type.

3 Select Initialize Entrust IdentityGuard.

4 Each master user must enter their password when prompted.

Page 217: IG 81 Install Guide 3

217Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

5 Click Initialize.

A confirmation message appears.

Page 218: IG 81 Install Guide 3

218 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Configuring failover on the repository

Attention: This section applies only to installations of Entrust IdentityGuard with embedded Tomcat.

By configuring failover on the repository, you ensure that there are backup repositories in the event that the primary repository fails.

Topics in this section:

• “Configuring failover for a database” on page 218

• “Configuring failover for a directory” on page 219

Note: For instructions on configuring the Radius server failover, see “Configuring Radius server failover” on page 195.

Configuring failover for a databaseYou may have a mechanism that updates the DNS information so that the database host name points to the IP address of the new database when the original database fails. If so, you must make the following configuration changes to Entrust IdentityGuard so that it will use the IP address.

Configure failover for a database by modifying the default behavior of Entrust IdentityGuard to permanently cache the IP address of a DNS lookup. Complete the following procedure to change the DNS lookup to expire after a period of time, rather than permanently caching the IP address from a DNS lookup.

To configure failover for a database1 Locate and back up the java.security configuration file located:

• on UNIX, $IDENTITYGUARD_HOME/j2rel.4.2_09/lib/security

• on Microsoft Windows, <IG_INSTALL_DIR>\j2rel.4.2_09\lib\security

2 Edit the java.security file and search for the networkaddress.cache.ttl setting.

Read the comments surrounding this setting and ensure that any changes that you make to this setting comply with your company’s security policy.

3 Comment out the networkaddress.cache.ttl setting to set the IP address expiration time on the DNS lookup.

Page 219: IG 81 Install Guide 3

219Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

4 Specify a positive integer value to define how long, in seconds, the DNS lookup will be cached for.

Define an appropriate value for this setting based on your company’s failover requirements.

5 Restart the Entrust IdentityGuard Server. For instructions on restarting, see “Managing the Entrust IdentityGuard service” on page 62 for UNIX installations and “Managing the Entrust IdentityGuard service” on page 94 for Windows.

Configuring failover for a directoryFor LDAP directory failover, you can specify multiple URLs in the identityguard.ldap.url setting in the identityguard.properties file. Entrust IdentityGuard attempts to use each URL in turn, until a successful connection is made.

To configure failover for a directory1 As the Entrust IdentityGuard application owner, open the

identityguard.properties file in $IDENTITYGUARD_HOME/etc/ on UNIX or <INSTALL_DIR>\identityguard81\etc on Microsoft Windows.

2 Find the section of the properties file that identifies the LDAP URL, and specify multiple URLs.

For example:

identityguard.ldap.url=ldap://myldapserver1.com:389/ou=users,c=ca

ldap://myldapserver2.com:389/ou=users,c=ca

ldap://myldapserver3.com:389/ou=users,c=ca

Attention: Type these statements all on the same line separated by a space only.

3 If SSL is enabled, import the certificates of all listed directories into the trust store.

4 Save the file and restart Entrust IdentityGuard.

You now have configured failover for your directory.

Note: The LDAP credentials and principal specified must work for all directories listed.

Page 220: IG 81 Install Guide 3

220 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Storing unassigned cards and tokens Entrust IdentityGuard allows the production of cards prior to their association with individual users—called card preproduction. It also requires that you load the token information into the system before you can assign tokens to users.

Topics in this section:

• “Configuring the disk files for tokens and cards” on page 221

• “Configuring the database” on page 224

The type of repository you use (directory or database) determines where Entrust IdentityGuard stores the unassigned cards and tokens. If you are using a database, the unassigned cards and tokens are stored in the database. If you are using a directory, you have a choice of storing the unassigned cards and tokens in a local file or in a separate database.

During the installation and configuration you choose between a directory or database to store your user information.

When you configure:

• a directory for your user’s information, a file-based repository is automatically configured for your preproduced cards and unassigned tokens

You can change the defaults using the “Configuring the disk files for tokens and cards” on page 221 topic.

• a directory for your user’s information, and if you want to use a database repository, you must manually configure the database

For instructions, see “Configuring the database” on page 224.

Attention: If your organization plans to have a large deployment of 100,000 cards or tokens, it is recommended that you configure a database (instead of the file-based repository).

• a database for your user’s information, a database repository for preproduced cards and unassigned tokens is automatically configured

For more information on storing preproduced cards and unassigned tokens, see the Entrust IdentityGuard Administration Guide.

Page 221: IG 81 Install Guide 3

221Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

Configuring the disk files for tokens and cardsEntrust IdentityGuard allows you to use files to store preproduced card or unassigned token information, as this information cannot be stored in the directory itself (unlike a database). Once the card or token is assigned to a user, then the information is moved into the user entry in the repository.

To change a setting, add or edit the application property to the identityguard.properties file.

Note: Do not use a file-based repository on a replica system.

The card repository settings shown in Table 13 are configured when you are using an LDAP directory and choose to use file-based repository storage. Use the following information to override the defaults:

Table 13: Repository properties for preproduced cards

Property Description

identityguard.preproducedCardRepository.impl Provides the storage location of preproduced cards on the primary system. It is set automatically when you configure Entrust IdentityGuard.

When using a directory, it is set to: com.entrust.identityGuard.cardManagement.dataAccess.file.FilePreproducedCardRepository

When using a database, it is set to: com.entrust.identityGuard.cardManagement.dataAccess.jdbc.JdbcPreproducedCardRepository

Note: For any replica system, make sure it is set to: com.entrust.identityGuard.cardManagement.dataAccess.notImplemented.NotImplementedPreproducedCardRepository

Page 222: IG 81 Install Guide 3

222 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

The following token repository settings are configured when you are using an LDAP directory and choose to use file-based repository storage. Use the following information to override the defaults.

identityguard.preproducedCardRepository.file.name The base name of the files that store the preproduced cards.

The default is, $IDENTITYGUARD.HOME/etc/fpcr/fpcr.pcr on UNIX or

<IG_INSTALL_DIR>/identityguard81/etc/fpcr on Microsoft Windows

Note: Remove this setting for a replica system.

identityguard.preproducedCardRepository.file.maxsize The maximum number of cards in each component file of the file-based card preproduction repository.

If you deploy cards for over 100,000 users, and you still want to use LDAP file-based card preproduction, set this setting to a value higher than 200. The value should be the (approximate) number of cards, divided by 500. For example 150,000 cards divided by 500, equals 300.

Defaults to 200.

Note: The preproduced card repository needs approximately 0.5 KB of memory per card. Therefore, 100,000 cards use about 50 MB of memory.

Note: Remove this setting for a replica system.

Table 13: Repository properties for preproduced cards (continued)

Property Description

Page 223: IG 81 Install Guide 3

223Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

Table 14: File-based repository properties for unassigned tokens

Property Description

identityguard.tokenRepository.impl Provides the storage location of unassigned tokens on the primary system. It is set automatically when you configure Entrust IdentityGuard.

When using a directory, it is set to: com.entrust.identityGuard.cardManagement.dataAccess.file.FileTokenRepository

When using a database, it is set to: com.entrust.identityGuard.cardManagement.dataAccess.jdbc.JdbcTokenRepository

Note: For any replica system, make sure it is set to: com.entrust.identityGuard.cardManagement.dataAccess.notImplemented.NotImplementedTokenRepository

identityguard.tokenRepository.file.name Specifies the base file used for the file-based repository.

The default is,

$IDENTITYGUARD_HOME/etc/ftkr/ftkr.pcr on UNIX or <IG_INSTALL_DIR>/identityguard81/etc/ftkr/ftkr.pcr on Microsoft Windows

Applies to an LDAP repository only.

Note: Remove this setting for a replica system.

identityguard.tokenRepository.file.maxsize Sets the maximum number of tokens the file-based repository can store.

The default is 200.

Applies to an LDAP repository only.

Note: Remove this setting for a replica system.

Page 224: IG 81 Install Guide 3

224 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Configuring the database If you have configured an LDAP directory for user information and your organization plans to have a large deployment of 100,000 cards or tokens or more, it is recommended that you configure a database for storing the unassigned card and token information.

Entrust IdentityGuard requires a supported database to store the preproduced card and unassigned token information. Add the following properties for the database to the identityguard.properties file.

To configure database settings for card preproduction1 Load the Entrust IdentityGuard schema into your database. For instructions, see

the Entrust IdentityGuard Database Configuration Guide.

2 Add the following settings to the identityguard.properties file and enter the values for your database:

The values used for these database related configuration settings are similar to the settings used if Entrust IdentityGuard was installed with a database repository (instead of an LDAP repository). See the Entrust IdentityGuard Database Configuration Guide for example values for these settings.

3 If you have configured Entrust IdentityGuard to use an LDAP repository and you want to store the preproduced cards in the database instead of the file-based repository, complete the following step:

Note: If you are configuring a replica, do not manually set this setting. When you configure the replica, this setting is set automatically.

Change the value of identityguard.preproducedCardRepository.impl to the following:

com.entrust.identityGuard.cardManagement.dataAccess.jdbc.JdbcPrepr

oducedCardRepository

Property Description

identityguard.jdbc.driverClass= The name of the JDBC driver class.

identityguard.jdbc.url= The URL used to connect to the database server.

identityguard.jdbc.user= The ID of the database user.

&identityguard.jdbc.password=1

1. The ampersand (&) indicates this setting will be encrypted when Entrust IdentityGuard restarts.

The password of the database user.

identityguard.jdbc.schema= The database schema.

Page 225: IG 81 Install Guide 3

225Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

4 If you have configured Entrust IdentityGuard to use an LDAP repository and you want to store the unassigned tokens in the database instead of the file-based repository, complete the following step:

Note: If you are configuring a replica, do not manually set this setting. When you configure the replica, this setting is set automatically.

Change the value of identityguard.tokenRepository.impl to the following:

com.entrust.identityGuard.cardManagement.dataAccess.jdbc.JdbcToken

Repository

5 On UNIX install the driver of the database .jar files in $IDENTITYGUARD_HOME/lib/db and $CATALINA_HOME/common/lib.

On Microsoft Windows install the driver of the database .jar files in <IG_INSTALL_DIR>\identityguard81\lib\ and <IG_INSTALL_DIR>\jakarta-tomcat-5.0.28\common\lib

Attention: Ensure that you synchronize the backups of your LDAP directory or database repositories. Remember that any time you restore Entrust IdentityGuard from a backup, both the LDAP and database repositories must be restored as well.

Page 226: IG 81 Install Guide 3

226 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Configuring Syslog for remote logging on UNIX

Configure Syslog to enable remote logging of Entrust IdentityGuard messages.

For information on Windows logs, see the “Troubleshooting” chapter in the Entrust IdentityGuard Administration Guide.

To log Entrust IdentityGuard messages remotely on Linux1 As root, edit the file /etc/sysconfig/syslog by changing the entry

SYSLOGD_OPTIONS to SYSLOGD_OPTIONS="-m 0 -r".

2 As root, restart Syslog by running

service syslog restart

To configure Syslog on Linux1 As root, edit /etc/syslog.conf and make changes similar to the following:

old line:

# *.info;mail.none;authpriv.none;cron.none /var/log/messages

new line:

*.info;local1.*;local2.*;local3.*;mail.none;authpriv.none;cron.non

e /var/log/messages

2 As root, restart Syslog by running:

service syslog restart

To configure Syslog on Solaris1 As root, edit /etc/syslog.conf and add the following line:

local1.*;local2.* /var/adm/messages

2 As root, force Syslog to reread its configuration by running:

kill -HUP ‘cat /etc/syslog.pid‘

To configure Syslog on AIX1 As root, edit /etc/syslog.conf and add the following lines:

local1.debug /var/adm/messages

local2.debug /var/adm/messages

2 As root, either restart syslogd or run the following command:

Page 227: IG 81 Install Guide 3

227Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

kill -HUP <pid>

where <pid> is the process identifier of the syslogd process.

3 AIX Syslog will not log to a file unless it already exists. Run the following command:

touch /var/adm/messages

Ensure the resulting file has the proper file permissions.

Page 228: IG 81 Install Guide 3

228 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Disabling the non-SSL port on the Authentication service

Attention: This section applies only to installations of Entrust IdentityGuard with embedded Tomcat.

By default, the Entrust IdentityGuard Authentication service supports both non-SSL (default: 8080) and SSL (default: 8443) ports for communication between the Entrust IdentityGuard Server and the Authentication Web service.

To further secure your Entrust IdentityGuard Server, disable the non-SSL (HTTP) port.

To disable the non-SSL port1 If Entrust IdentityGuard is currently running, shut it down.

See “Managing the Entrust IdentityGuard service” on page 62 for UNIX instructions and “Managing the Entrust IdentityGuard service” on page 94 for Windows instructions.

2 Edit the server.xml file found at:

• on UNIX,

$CATALINA_HOME/conf

where $CATALINA_HOME is the install directory for Tomcat, for example, /opt/entrust/jakarta-tomcat-5.0.28.

• on Microsoft Windows,

<IG_INSTALL_DIR>\jakarta-tomcat-5.0.28\conf

3 Identify and comment out the following section:

<Connector port="8080"

maxThreads="150" minSpareThreads="25" maxSpareThreads="75"

enableLookups="false" redirectPort="8443"

acceptCount="100" debug="0" connectionTimeout="20000"

disableUploadTimeout="true" />

After adding comments, the section should appear as follows:

<!--

<Connector port="8080"

maxThreads="150" minSpareThreads="25" maxSpareThreads="75"

enableLookups="false" redirectPort="8443"

Page 229: IG 81 Install Guide 3

229Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

acceptCount="100" debug="0" connectionTimeout="20000"

disableUploadTimeout="true" />

-->

4 Save the server.xml file.

5 Update the identityguard.properties file to direct the sample application to the SSL port by modifying the identityguard.authservice.url property to:

https://<yourhostname>:<SSL_PORT>/IdentityGuardAuthService/service

s/AuthenticationServiceV2

For example, using the default port values, the value should appear after modification as:

identityguard.authservice.url=https://igserver.anycorp.com:8443/Id

entityGuardAuthService/services/AuthenticationServiceV2

6 Restart the Entrust IdentityGuard Server. For instructions on restarting, see “Managing the Entrust IdentityGuard service” on page 62 for UNIX and “Managing the Entrust IdentityGuard service” on page 94 for Windows.

Attention: Update Entrust IdentityGuard clients to use the SSL port for communication with the Authentication service. If clients attempt to access the Entrust IdentityGuard Authentication service at the non-SSL port, they will receive a “Connection Refused” error.

Page 230: IG 81 Install Guide 3

230 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Enabling the non-SSL port on the Administration service

Attention: This section applies only to installations of Entrust IdentityGuard with embedded Tomcat.

By default, the Entrust IdentityGuard Administration service runs on HTTPS (port 8444) to take advantage of better security. If necessary, complete the following steps to allow the Administration service to run on a non-SSL port.

Note: It is important that you understand that enabling the non-SSL port on the Administration service can seriously compromise the security of your system.

To enable the non-SSL port on the Administration service1 Open the server.xml file found at:

• on UNIX,

$CATALINA_HOME/conf

• on Microsoft Windows,

<IG_INSTALL_DIR>\jakarta-tomcat-5.0.28\conf

2 Add a new <Connector> element to the second <Service> element (which defines the Administration service).

This new <Connector> element should be the same as the first <Connector> element in the first <Service> element, except you must pick a new port (do not use 8080, 8443, 8444). The port number must be greater than 1024.

3 Open the web.xml file found at:

• on UNIX,

$IDENTITYGUARD_HOME/services/admin/IdentityGuardAdminService/WEB-INF/

• on Microsoft Windows,

<IG_INSTALL_DIR>\Identityguard81\services\admin\IdentityGuardAdminService\WEB-INF\

4 Remove the <security-constraint> element.

Page 231: IG 81 Install Guide 3

231Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

Disabling the SSL port on the Administration service

Attention: This section applies only to installations of Entrust IdentityGuard with embedded Tomcat.

If you have disabled the Administration service and the Administration interface, complete the following steps to disable the default HTTPS port (8444) on the Administration service.

After you have disabled this port, if you wish to enable either the Administration service or the Administration interface, you must enable the SSL port on the Administration service.

To disable the SSL port on UNIX1 If Entrust IdentityGuard is currently running, shut it down. See “Managing the

Entrust IdentityGuard service” on page 62 for instructions.

2 Run the command to disable the Administration interface, if it is still running:

identityguard.sh disable admininterface

3 Run the command to disable the Administration service, if it is still running:

identityguard.sh disable adminservice

4 Locate and make a backup copy of the server.xml file found at:

$CATALINA_HOME/conf/server.xml

5 Identify and comment out the code between <Service ..> and </Service> that contains <Connector port="8444">.

6 Save the server.xml file.

7 Restart the Entrust IdentityGuard Server. For instructions on restarting, see “Managing the Entrust IdentityGuard service” on page 62.

To disable the SSL port on Microsoft Windows1 If Entrust IdentityGuard is currently running, shut it down. See “Managing the

Entrust IdentityGuard service” on page 94 for instructions.

2 Locate and make a backup copy of the server.xml file found at:

<IG_INSTALL_DIR>\jakarta-tomcat-5.0.28\conf\server.xml

3 Identify and comment out the code between <Service ..> and </Service> that contains <Connector port="8444">.

4 Save the server.xml file.

Page 232: IG 81 Install Guide 3

232 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

5 Restart the Entrust IdentityGuard Server. For instructions on restarting, see “Managing the Entrust IdentityGuard service” on page 94.

Page 233: IG 81 Install Guide 3

233Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

Securing the LDAP connection with SSL During installation, if you chose not to use an SSL connection to the LDAP repository, you can reconfigure the connection without reinstalling and configuring Entrust IdentityGuard.

Topics in this section:

• “Creating self-signed certificates” on page 235

• “Importing CA-signed certificates” on page 236

• “Exporting the certificate to client applications” on page 238

• “Updating certificates” on page 238

To reconfigure the connection, update the Entrust IdentityGuard keystore, and then the identityguard.properties file. First ensure that you have:

• an LDAP repository that supports SSL

• a user with permissions to update the identityguard.properties file

• an SSL certificate for your LDAP server

• access to the Java keytool executable

There are two steps to this process:

• Import the LDAP server's SSL certificate into the Entrust IdentityGuard keystore so that Entrust IdentityGuard can communicate with the LDAP server. Entrust IdentityGuard uses this certificate (when establishing a connection) to verify the identity of the LDAP server.

• Edit the properties file so that Entrust IdentityGuard will connect to the LDAP server using SSL.

To import the LDAP SSL certificate1 Copy the LDAP server certificate onto the Entrust IdentityGuard Server.

2 From the command line on the Entrust IdentityGuard Server, issue the following command:

keytool -import -alias ldapssl -keystore <path_to_keystore> -file

<path_to_ldap_ssl_cert_file> -storepass <password>

Where:

• <path_to_keystore> is:

– for UNIX, $IDENTITYGUARD_HOME/etc/keystore– for Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\keystore

Page 234: IG 81 Install Guide 3

234 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Note: The path to the keystore for versions of Entrust IdentityGuard installed using an existing application server is the location of the trustStore.jks file.

• <path_to_ldap_ssl_cert_file> is the directory you chose to store the file when you exported the certificate.

3 When prompted to answer whether or not you trust the certificate, review the displayed details, and if they are correct, answer yes.

To update the Entrust IdentityGuard properties file1 As the Entrust IdentityGuard application owner, open the

identityguard.properties file in $IDENTITYGUARD_HOME/etc/

2 Find the section of the properties file that identifies the LDAP URL:

# URL that will be used to connect to the LDAP server.

identityguard.ldap.url=ldap://myldapserver:389/ou=users,

dc=myserver,dc=com

3 Change the URL to use the LDAP SSL port on your LDAP server. The default SSL port for LDAP servers is 636. Update the property with the value appropriate to your environment.

identityguard.ldap.url=ldap://myldapserver:636/ou=users,

dc=myserver,dc=com

4 Find the section of the properties file that identifies the LDAP SSL connections:

# Specify whether this will be a secure SSL connection to the

directory.

# If set to true, the identityguard.ldap.url must be directed to a

# secure ldap port (default: 636).

# This property can be true or false, or commented out entirely.

identityguard.ldap.sslEnabled=false

5 Change the property value to true:

identityguard.ldap.sslEnabled=true

6 Save the file and restart Entrust IdentityGuard.

You now have a secure SSL connection between Entrust IdentityGuard and your LDAP repository.

Page 235: IG 81 Install Guide 3

235Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

Changing the Entrust IdentityGuard certificate

Attention: This section applies only to installations of Entrust IdentityGuard with embedded Tomcat.

When engaged in an SSL-secured communication, Entrust IdentityGuard requires an SSL certificate. A client application uses the SSL certificate to identify the Entrust IdentityGuard Server.

Note: You can purchase or renew an SSL certificate by going to http://www.entrust.com/certificate_services/index.htm.

Note: The J2SE 1.4 installed with your Entrust IdentityGuard system includes the keytool application. Use it to manage the Java keystore containing private keys and SSL certificates (X.509 chains and public keys). For complete documentation on keytool, see http://java.sun.com/j2se/1.4.2/docs/tooldocs/solaris/keytool.html on Solaris, and http://java.sun.com/j2se/1.4.2/docs/tooldocs/windows/keytool.html on Windows.

Configure one of the two different types of certificates: self-signed certificate and CA-signed certificate.

The following topics provide procedural information for using SSL certificates:

• “Creating self-signed certificates” on page 235

• “Importing CA-signed certificates” on page 236

• “Exporting the certificate to client applications” on page 238

• “Updating certificates” on page 238

Creating self-signed certificatesA self-signed certificate is not guaranteed. Your client application must accept that the certificate is valid, and choose to import it. For a Java client, this means that you must add the self-signed certificate to the client keystore in order to communicate with Entrust IdentityGuard using SSL. To create a self-signed certificate for Entrust IdentityGuard, generate a new private key and certify it.

Page 236: IG 81 Install Guide 3

236 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

To create a self-signed certificate1 Delete the existing key if there is one:

keytool -delete -alias tomcat -storepass entrust -keystore

<path_to_keystore>

Where <path_to_keystore> is:

• for UNIX, $IDENTITYGUARD_HOME/etc/keystore

• for Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\keystore

2 Generate a new key pair:

keytool -genkey -alias tomcat -keyalg RSA -validity

<cert_lifetime_in_days> -keystore <path_to_keystore> -dname

"<subject_DN>" -keypass entrust -storepass entrust

Where:

• <path_to_keystore> is:

– for UNIX, $IDENTITYGUARD_HOME/etc/keystore– for Microsoft Windows, <IG_INSTALL_DIR>/identityguard81\etc\keystore

Importing CA-signed certificatesA CA-signed certificate has the following advantages:

• it is automatically recognized and accepted by major Web browsers

• it is automatically recognized and accepted by a Java client using a recent JRE

• it guarantees the identity of the owning organization

To import a CA-signed certificate1 Delete the existing key:

keytool -delete -alias tomcat -keystore <path_to_keystore>

-keypass entrust -storepass entrust

where <path_to_keystore> is:

• for UNIX, $IDENTITYGUARD_HOME/etc/keystore

• for Microsoft Windows, <IG_INSTALL_DIR>/identityguard81\etc\keystore

2 Before generating a certificate request, generate a public/private key pair for your server. To generate the necessary key pair, enter:

Page 237: IG 81 Install Guide 3

237Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

keytool -genkey -alias tomcat -dname "<required DN>"

-keyalg RSA -keysize <value> -keystore <path_to_keystore> -keypass

entrust -storepass entrust

Where:

• <required DN> depends on the CA that will process the certificate request.

– If you are using a certificate from, for example, the Entrust Certificate Service, you must enter a fully qualified DN.

– If you are using an Entrust CA with Entrust Authority Enrollment Server for Web to process the request, the DN must be "cn=<refnum>" where <refnum> is the reference number generated by the CA.

• <value> is the keysize value. Ensure the keysize value is secure, for example, 1024 or 2048.

• <path_to_keystore> is one of:

– for UNIX, $IDENTITYGUARD_HOME/etc/keystore– for Microsoft Windows, <IG_INSTALL_DIR>/identityguard81\etc\keystore

3 A Certificate Signing Request (CSR) is used by the CA to generate your SSL certificate. To create a CSR, enter:

keytool -certreq -alias tomcat -file <file to store request in>

-keystore <path_to_keystore> -keypass entrust -storepass entrust

Provide the file generated by this command to the CA. The CA takes the request file and creates a certificate.

4 Optionally, once you receive your SSL certificate from the CA, import a chain certificate (if the CA is not already included in the JRE Trusted CA list). To import a CA chain certificate, enter:

keytool -import -alias root -trustcacerts -file <file containing

CA certificate> -keystore <path_to_keystore> -keypass entrust

-storepass entrust

5 To import the SSL certificate that was generated by the CA, save the certificate file to a location on the Entrust IdentityGuard Server and enter:

keytool -import -alias tomcat -trustcacerts -file <SSL_cert_file>

-keystore <path_to_keystore> -keypass entrust -storepass entrust

Page 238: IG 81 Install Guide 3

238 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Exporting the certificate to client applicationsWhen you use SSL, you may be required to export the Entrust IdentityGuard Server certificate so that the client has access to it. Complete the following steps to export a server certificate that you manually created.

To export a certificate1 Enter the following command (on one line):

keytool -export -alias tomcat -file <path_to_file.cer> -keystore

<path_to_keystore> -keypass entrust

where <path_to_keystore> is:

• for UNIX, $IDENTITYGUARD_HOME/etc/keystore

• for Microsoft Windows, <IG_INSTALL_DIR>/identityguard81\etc\keystore

2 Enter the password when prompted.

Updating certificatesWhether you chose a self-signed certificate or a CA-signed certificate, the certificate will eventually expire. It is necessary to update the keystore with the new certificate before expiry.

As well, there are other reasons why you might want to replace the self-signed certificate that was created during installation. For example, you may need

• to modify the lifetime or key type

The default self-signed certificate is RSA-1024.

• a different DN in the certificate

The default self-signed certificate has a DN of cn=<hostname>, where <hostname> is the host name of the Entrust IdentityGuard Server. If the client applications connecting to the Entrust IdentityGuard services are not using this host name, you need a new self-signed certificate.

• additional security

To update the certificate1 If you are updating a self-signed certificate, use the Java keytool application to

issue the following command (on one line):

keytool -selfcert -alias tomcat -validity <number_of_days>

-keystore <path_to_keystore> -keypass entrust

where <path_to_keystore> is:

Page 239: IG 81 Install Guide 3

239Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

• for UNIX, $IDENTITYGUARD_HOME/etc/keystore

• for Microsoft Windows, <IG_INSTALL_DIR>/identityguard81\etc\keystore

You should not have to delete the original alias when creating a new self-signed certificate.

2 If Entrust IdentityGuard is using a CA-signed certificate, it is necessary to generate a new signing request and import the response. See “Importing CA-signed certificates” on page 236.

Page 240: IG 81 Install Guide 3

240 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Enabling system bindingAs a master user, you can bind the master keys to a specific machine through an update to the key protection file (.kpf). This is called system binding. You can also perform system unbinding of the master keys, making them portable.

Perform system binding on the master keys to:

• rebind master keys that were unbound

• rebind master keys after a hardware change, as required

• complete initializing of a replica or restoring from a backup

Note: When you initialize Entrust IdentityGuard for the first time, system binding occurs automatically.

Perform system unbinding on the master keys to copy a key protection file (.kpf) to another computer.

To bind the master keys1 On UNIX:

a As the UNIX user, change to $IDENTITYGUARD_HOME.

b From $IDENTITYGUARD_HOME, source the environment settings file by entering:

. ./env_settings.sh

(Include a space between the two periods in the command.)

c Enter the following command to start the master user shell:

supersh

2 On Windows, click Start > All Programs > Entrust > IdentityGuard > Master User Shell.

The copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.

3 Enter the following command:

system bind

You are prompted for a user name and password.

To unbind the master keys1 On UNIX:

a As the UNIX user, change to $IDENTITYGUARD_HOME.

Page 241: IG 81 Install Guide 3

241Postinstall configuration options for Entrust IdentityGuard ServerFeedback on guide

b From $IDENTITYGUARD_HOME, source the environment settings file by entering:

. ./env_settings.sh

(Include a space between the two periods in the command.)

c Enter the following command to start the master user shell:

supersh

2 On Windows, click Start > All Programs > Entrust > IdentityGuard > Master User Shell.

The copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.

3 Enter the following command:

system unbind

You are prompted for a user name and password.

Page 242: IG 81 Install Guide 3

242 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Page 243: IG 81 Install Guide 3

243

Chapter 8

Backing up and restoring Entrust IdentityGuard Server

This chapter is intended for installers and administrators who are responsible for the backup and recovery of Entrust IdentityGuard. It provides guidelines for planning a backup strategy and steps for restoring Entrust IdentityGuard from a backup.

This chapter contains the following sections:

• “Planning a backup strategy” on page 244

• “Restoring Entrust IdentityGuard from a backup” on page 250

• “Restoring a file-based repository” on page 253

• “Reconfiguring the system or Entrust IdentityGuard serial number” on page 254

Page 244: IG 81 Install Guide 3

244 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Planning a backup strategyIt is strongly recommended that you have a backup strategy in place before you install or upgrade Entrust IdentityGuard.

Backing up provides insurance in case something unexpected happens (for example, a hardware failure) to the servers hosting Entrust IdentityGuard and your repository. You should consider a separate server or separate physical disk to host the backup files in case of a hard disk failure.

Topics in this section:

• “To plan a backup strategy on UNIX” on page 244

• “To plan a backup strategy on Microsoft Windows” on page 245

To plan a backup strategy on UNIXUse the following points to help you develop a backup strategy for Entrust IdentityGuard Server and your repository on UNIX.

• Back up the masterkeys.enc file.

• Entrust IdentityGuard does not back up your data repository.

Ensure that you back up your repository on a regular basis and before installing or upgrading Entrust IdentityGuard.

• If the data is split over two repositories, back up and restore both repositories together.

• Back up your logs on a regular basis.

If you chose to log to files when you installed Entrust IdentityGuard, the logs are stored in $IDENTITYGUARD_HOME/logs

• Decide on a backup type from the following two options:

– Full. Full backups contain all information required to restore the configuration, logs, and file-based repositories.

– Partial. Partial backups contain enough information to restore a replica system.

• The following Entrust IdentityGuard files are backed up during a full backup:

– $IDENTITYGUARD_HOME/etc/masterkeys.enc. This file changes whenever a master user changes a password and should be backed up again after such an operation.

– $IDENTITYGUARD_HOME/etc/keystore (installations with embedded Tomcat only). This file changes whenever a new SSL key-pair is generated or imported.

– $IDENTITYGUARD_HOME/etc/identityguard.properties– $CATALINA_HOME/conf/server.xml (installations with embedded

Tomcat only)

Page 245: IG 81 Install Guide 3

245Backing up and restoring Entrust IdentityGuard ServerFeedback on guide

– $IDENTITYGUARD_HOME/etc/igsample.properties – $IDENTITYGUARD_HOME/etc/igkrb5.conf

• Make sure you back up any files in the following directories:

– $IDENTITYGUARD_HOME/export/– $IDENTITYGUARD_HOME/etc/fpcr/– $IDENTITYGUARD_HOME/etc/ftkr/

• If you use a database repository, save the JDBC driver .jar files you used during installation.

• You can create a new keystore file but then you must also generate new SSL keys.

• You can run configure.sh again to recreate the identityguard.properties and server.xml files.

To plan a backup strategy on Microsoft WindowsUse the following points to help you develop a backup strategy for Entrust IdentityGuard Server and your repository on Microsoft Windows.

• Entrust IdentityGuard does not back up your data repository.

Ensure that you back up your repository on a regular basis and before installing or upgrading Entrust IdentityGuard.

• If the data is split over two repositories, back up and restore both repositories together.

• Back up your logs on a regular basis. The logs are stored in <IG_INSTALL_DIR>\identityguard81\logs

• Decide on a backup type from the following two options:

– Full. Full backups contain all information required to restore the configuration, logs, and file based repository.

– Partial. Partial backups contain enough information to set up a replica system.

• The following Entrust IdentityGuard files are backed up during a full backup.

– <IG_INSTALL_DIR>\identityguard81\etc\masterkeys.enc. This file changes whenever a master user changes their password and should be backed up again after such an operation.

– <IG_INSTALL_DIR>\identityguard81\etc\keystore. This file changes whenever a new SSL key-pair is generated or imported.

– <IG_INSTALL_DIR>\identityguard81\etc\identityguard.properties

– <IG_INSTALL_DIR>\jakarta-tomcat-5.0.28\conf\server.xml– <IG_INSTALL_DIR>\identityguard81\etc\igsample.properties – <IG_INSTALL_DIR>\identityguard81\etc\igkrb5.conf

Page 246: IG 81 Install Guide 3

246 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

• Make sure you back up any files in the following directories:

– <IG_INSTALL_DIR>\identityguard81\export\– <IG_INSTALL_DIR>\identityguard81\etc\fpcr\– <IG_INSTALL_DIR>\identityguard81\etc\ftkr\

• If you use a database repository, save copies of the JDBC driver .jar files you used during installation.

• You cannot recover the masterkeys.enc file.

• You can create a new keystore file but then you must also generate new SSL keys.

• You can use the Configuration wizard from the Entrust IdentityGuard Configuration Panel to recreate the identityguard.properties and server.xml files.

• Make sure you store your backup files on a separate machine from your Entrust IdentityGuard Server.

Page 247: IG 81 Install Guide 3

247Backing up and restoring Entrust IdentityGuard ServerFeedback on guide

Backing up your configurationBack up your Entrust IdentityGuard configuration as a precaution in case your system fails.

Attention: Ensure that you synchronize the backups of your LDAP directory or database repositories. Remember that any time you restore Entrust IdentityGuard from a backup, both the LDAP and database repositories must be restored as well.

This section contains the following procedures:

• “To back up your configuration on UNIX” on page 247

• “To back up your configuration on Microsoft Windows” on page 248

Attention: Backup files contain sensitive information, such as the masterkeys.enc file and export files. The igsample.properties file contains a clear text administrator password. As such, backup files should be stored carefully.

To back up your configuration on UNIX1 Log in as the UNIX user on the existing Entrust IdentityGuard Server.

2 Run the backup command:

igbackup.sh [-partial|-full]

This command creates a backup ZIP file and puts it in the default location, $IDENTITYGUARD_HOME/backups/. The default name includes the type of backup (partial or full), and the current date and time. For example, if you create a partial backup file created on February 24, 2006 at 3:00:45 P.M., the file name is: igpartialbackup_20060224150045.zip.

Optionally, you can you can specify a file name by including [-file <file name>] in the backup command. For example,

igbackup.sh -partial -file <file name>

where <file name> is the name you choose for the backup file. The default location is relative to your current working directory.

The partial backup ZIP file includes the following files for installations with embedded Tomcat:

• masterkeys.enc

• identityguard.properties

Page 248: IG 81 Install Guide 3

248 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

• igsample.properties file (if it exists)

• igkrb5.conf

• JDBC .jar files (if they exist)

• identityguard.cer (contains the SSL certificate of the primary server)

• LDAP SSL certificate (if the primary server has configured SSL to its LDAP repository)

The partial backup ZIP file includes the following files for installations using an existing application server:

• masterkeys.enc

• identityguard.properties

• igsample.properties file (if it exists)

• JDBC .jar files (if they exist)

The full backup ZIP file includes the following files (in addition to the files that are backed up in the partial backup):

• server.xml (installations with embedded Tomcat only)

• file-based repository files (both preproduced cards and unassigned tokens)

• keystore

• log files

• export files

Note: If you do not specify either -partial or -full with the igbackup.sh command, a full backup is created.

To back up your configuration on Microsoft Windows1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking

Start > All Programs > Entrust > IdentityGuard > Configuration Panel.

2 Select Backup Entrust IdentityGuard Configuration.

3 Select the backup type: Full or Partial.

4 In the Backup File Location section, click Browse.

A file name including a date/time stamp will automatically be created in the File name field. The default location is relative to your current working directory.

5 Click OK to save the backup under the file name with the date/time stamp. Alternatively, rename the file in the File name field and press OK.

Page 249: IG 81 Install Guide 3

249Backing up and restoring Entrust IdentityGuard ServerFeedback on guide

Note: If you are selecting your own file name, assure you can recognize which backup is the most recent file, as over time, more than one backup file may exist.

6 Click Save.

Your backup is saved as a ZIP file.

7 Click Close to exit the Configuration Backup utility.

Note: During the Windows uninstall process, Entrust IdentityGuard attempts to create a backup of your Entrust IdentityGuard configuration. If successful, it displays a message listing the location of the backup file. Click OK to continue the uninstall. This occurs only if Entrust IdentityGuard was correctly configured and initialized.

Note: You can also use the command line backup utility, igbackup.exe, located in <IG_INSTALL_DIR>\identityguard81\bin to back up your configuration on Microsoft Windows.

Page 250: IG 81 Install Guide 3

250 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Restoring Entrust IdentityGuard from a backup

The following steps describe how to restore Entrust IdentityGuard from a backup. These steps assume that you have already restored your repository.

Topics in this section:

• “To restore Entrust IdentityGuard from a backup on UNIX” on page 250

• “To restore Entrust IdentityGuard from a backup on Windows” on page 251

Attention: If your backup does not include the masterkeys.enc file, then you cannot restore your system.

To restore Entrust IdentityGuard from a backup on UNIX1 Copy the full backup ZIP file from your Entrust IdentityGuard Server to the

computer that you want to restore Entrust IdentityGuard on.

The default location for the file is $IDENTITYGUARD_HOME/backups.

Note: All files listed here should be readable and writable by the user and group selected during installation.

2 If the computer you are restoring to has a copy of the server.xml file, delete it before continuing with the restore.

3 Unzip the full backup ZIP file. For example, on UNIX,

unzip igfullbackup_20060324151505.zip

4 Open the files.txt file in a text editor.

This file contains a list of all the files copied into the backup ZIP file, and the location they were copied from.

5 Copy all the files back to their proper locations.

6 For database repositories:

• Copy the JDBC driver .jar files you used during the original installation to $CATALINA_HOME/common/lib (installations with embedded Tomcat only) and $IDENTITYGUARD_HOME/lib.

• Restore the JDBC .jar files to $CATALINA_HOME/common/lib (installations with embedded Tomcat only)

7 Open the manifest.txt file in a text editor and ensure you are using the correct version of the files.

Page 251: IG 81 Install Guide 3

251Backing up and restoring Entrust IdentityGuard ServerFeedback on guide

Backups between versions of Entrust IdentityGuard may not be compatible.

8 Open the master user shell.

a Log in as the UNIX user that belongs to the UNIX group and change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81).

b From $IDENTITYGUARD_HOME, source the environment settings file by entering:

. ./env_settings.sh

(Include a space between the two periods in the command.)

c Enter the following command to start the master user shell:

supersh

Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.

9 Enter the following in the master user shell to initialize the restored system:

init -replica

All three master users must enter their passwords.

10 It is recommended that you run the command system bind from the master user shell to enable system binding.

For more information on system binding, see “Enabling system binding” on page 240.

Entrust IdentityGuard is now restored from backup.

11 Redeploy the Entrust IdentityGuard services:

• see “Enabling and disabling individual Entrust IdentityGuard services” on page 64) for installations with embedded Tomcat

• see “Deploying Entrust IdentityGuard services on an existing application server” on page 127) for installations using an existing application server

To restore Entrust IdentityGuard from a backup on Windows1 Copy the full backup ZIP file from your Entrust IdentityGuard Server to the

computer that you want to restore Entrust IdentityGuard on.

The default location for the file is <IG_INSTALL_DIR>\identityguard81\backups

2 If the computer you are restoring to has a copy of the server.xml file, delete it before continuing with the restore.

3 Unzip the full backup ZIP file.

4 Open the files.txt file in a text editor.

This file contains a list of all the files copied into the backup ZIP file, and the location they were copied from.

Page 252: IG 81 Install Guide 3

252 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

5 Copy all the files back to their proper locations.

6 For database repositories, ensure that copies of the JDBC driver .jar files you used during installation are in these folders:

• <TOMCAT_INSTALL_DIR>\common\lib

• <IG_INSTALL_DIR>\identityguard81\lib.

7 Open the manifest.txt file in a text editor and ensure you are using the correct version of the files.

Backups between versions of Entrust IdentityGuard may not be compatible.

8 Click Start > All Programs > Entrust > IdentityGuard > Configuration Panel.

9 Select Initialize Entrust IdentityGuard on the Entrust IdentityGuard Configuration Panel to initialize the restored system.

For instructions, see “Running the Entrust IdentityGuard Initialization wizard” on page 84.

All three master users must enter their passwords.

Entrust IdentityGuard is now restored from backup.

Note: The backup file does not contain saved settings for Entrust IdentityGuard services. Check that the Administration service, Administration interface and the sample application are enabled or disabled, as applicable.

Page 253: IG 81 Install Guide 3

253Backing up and restoring Entrust IdentityGuard ServerFeedback on guide

Restoring a file-based repositoryA restore backs up the configuration files, including the .pcr and .idx files. Specific files in the fpcr and ftkr directories should be backed up or restored with the repository, so that they are consistent.

Topics in this section:

• “To restore a file-based card repository on UNIX” on page 253

• “To restore a file-based card repository on Windows” on page 253

To restore a file-based card repository on UNIX1 Back up the files that start with fpcr.pcr (for cards) located in:

$IDENTITYGUARD_HOME/etc/fpcr

You can override the base file for cards with the identityguard.properties setting:

identityguard.preproduced.cardRepository.file.name

2 Back up the files that start with ftkr.pcr (for tokens) located in:

$IDENTITYGUARD_HOME/etc/ftkr

You can override the base file for tokens with the identityguard.properties setting:

identityguard.tokenRepository.file.name

3 Ensure that the files are owned (and are readable and writable) by the user that owns Entrust IdentityGuard.

To restore a file-based card repository on Windows1 Back up the files that start with fpcr.pcr (for cards) located in:

<IG_INSTALL_DIR>\identityguard81\etc\fpcr

You can override the base file for cards with the identityguard.properties setting:

identityguard.preproduced.cardRepository.file.name

2 Back up the files that start with ftkr.pcr (for tokens) located in:

<IG_INSTALL_DIR>\identityguard81\etc\ftkr

You can override the base file for tokens with the identityguard.properties setting:

identityguard.tokenRepository.file.name

Page 254: IG 81 Install Guide 3

254 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Reconfiguring the system or Entrust IdentityGuard serial number

Reconfigure the next generated serial number after you restore your repository to an old backup. This prevents duplication of serial numbers for cards that were created and manufactured between the backup and the time the repository was restored.

To configure the card serial number1 Open the master user shell.

• on UNIX:

– Log in as the UNIX user that belongs to the UNIX group and change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81).

– From $IDENTITYGUARD_HOME, source the environment settings file by entering:

. ./env_settings.sh

(Include a space between the two periods in the command.)– Enter the following command to start the master user shell:supersh

Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt.

• on Microsoft Windows:

– Click Start > All Programs > Entrust > IdentityGuard > Master User Shell.2 To display the next available serial number, at the command line, enter

system get

3 To update to a new serial number, enter

system set -sernum <value>

Page 255: IG 81 Install Guide 3

255

Appendix A

Configuring the Entrust IdentityGuard Server properties file

When you installed Entrust IdentityGuard, it created an identityguard.properties file in the following directory:

• on UNIX, $IDENTITYGUARD_HOME/etc/

• on Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\

Reconfigure your installation by editing or adding settings to the identityguard.properties file.

Note: With the exception of log settings, you must restart the Entrust IdentityGuard service for changes to Entrust IdentityGuard properties to take effect. See:“Managing the Entrust IdentityGuard service” on page 62 for installation using embedded Tomcat on UNIX,“Managing the Entrust IdentityGuard service” on page 166 for installations using existing application servers, or “Managing the Entrust IdentityGuard service” on page 94 for installation using embedded Tomcat on Microsoft Windows.

Topics in this section:

• “Editing property values” on page 257

• “Enabling the authentication success audit” on page 258

• “Enabling a WSDL query” on page 259

Page 256: IG 81 Install Guide 3

256 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

• “Configuring additional search bases” on page 260

• “Configuring LDAP directory properties” on page 261

• “Configuring database properties” on page 267

• “Enabling cached challenges” on page 270

• “Caching policies” on page 272

• “Changing log configuration” on page 273

• “Changing log locations on UNIX” on page 277

• “Configuring master user shell formatting” on page 278

• “Configuring license auditing” on page 281

• “Configuring the Entrust IdentityGuard Radius proxy properties” on page 282

• “Configuring external authentication properties” on page 293

• “Configuring token properties” on page 295

• “Configuring the Administration interface properties for bulk operations” on page 296

• “Configuring the Administration interface to control the output format” on page 297

Page 257: IG 81 Install Guide 3

257Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

Editing property valuesYou can change any value in the identityguard.properties file. Change these settings with caution, as mistakes can disrupt Entrust IdentityGuard functions:

• any setting that starts with log4j

• identityguard.MasterKeyFile

• identityguard.KeyProtectionFile

• identityguard.authservice.url

• identityguard.adminservice.url

• identityguard.webadmin.url

• identityguard.authservice.https.url

• identityguard.webadmin.bulk.maxFileSize

• identityguard.wedadmin.bulk.inMemoryThreshold

Encrypting property valuesSome values in the identityguard.properties file are encrypted, for example, the database or LDAP password, and the Radius shared secret values.

An encrypted property has an ampersand (&) in front of its name in the properties file (for example, &identityguard.jdbc.password).

To change an encrypted value, replace it with a new cleartext value. The next time you start Entrust IdentityGuard, it encrypts the value.

Page 258: IG 81 Install Guide 3

258 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Enabling the authentication success audit

By default, the Entrust IdentityGuard authentication success audit is disabled. Enable this setting if your organization wishes to audit successful authentications.

To enable the authentication success audit, in the Authentication Settings section of the identityguard.properties file, set identityguard.authentication.audit.success to true.

For information on audited events, see the “Troubleshooting” chapter in the Entrust IdentityGuard Administration Guide.

Page 259: IG 81 Install Guide 3

259Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

Enabling a WSDL queryBy default, the Entrust IdentityGuard WSDL query is disabled. Enable this setting to retrieve the WSDL definition for a service. For example, if you query the Entrust IdentityGuard Authentication service URL with ?wsdl —http://igserver:8080/IdentityGuardAuthService/services/AuthService?wsdl—and the WSDL query is enabled, the WSDL definition for the Authentication service is returned.

To enable the WSDL query, in the identityguard.properties file, set identityguard.service.wsdlquery.enable to true.

Page 260: IG 81 Install Guide 3

260 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Configuring additional search basesSearch bases allow administrators to search more quickly for users in the same domain or in cross-certified domains if you store user information in an LDAP-compliant directory. After you define search bases in the properties file, you can create groups and assign each group one or more search bases.

Search bases also allow the Entrust IdentityGuard repository to span multiple directory servers.

Note: In some cases, not all users will reside within a single search base or directory. The reference to the user attribute (uid) should be different for each additional search base added to Entrust IdentityGuard. For example, for the primary search base, the reference to the user attribute may be “uid,” and for an additional search base the reference may be “cn” or “upn.” For Active Directory, use sAMAccountName instead of uid for the first search base.

An example of a search base URL is: ldap://dirserver:389/ou=someunit,o=yourcompany,c=ca

Some of the characteristics of search bases are:

• They can divide a large domain into smaller domains, simplifying searches.

• Groups may be assigned one or more search bases.

• A search base can be shared by multiple groups. When the user is created, a check is performed to ensure that the user ID is unique within all search bases assigned to that user in the group.

• If a search base is not defined, the group will use the default search base.

Note: If you are using multiple search bases, each user ID and administrator ID must be unique within a search base.

Search bases are defined in the identityguard.properties configuration file. You must manually edit the identityguard.properties file to add, remove, or modify search base definitions. See the identityguard.ldap.searchbase setting description in Table 15 for instructions on editing search bases.

For further instructions, see the Entrust IdentityGuard Administration Guide.

Page 261: IG 81 Install Guide 3

261Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

Configuring LDAP directory propertiesTo change the way that the LDAP directory is used by the Entrust IdentityGuard server, go to the LDAP Server Settings section of identityguard.properties and add or edit the properties described in Table 15.

If you are using an LDAP repository, the properties marked Required in the table must have values defined in the identityguard.properties file. These values are added to the identityguard.properties file during the configuration that you completed during installation.

Note: Entrust IdentityGuard configuration automatically converts spaces in the LDAP base DN to %20. If you edit the LDAP base DN after installation in the identityguard.properties file, remember to replace spaces with %20.

Table 15: LDAP directory properties

Property Description

identityguard.ldap.url Required.

LDAP URL to use to find and connect to the LDAP directory. This can include the host name, the port number, and initial context prefix to bind to. All lookups are relative to the given context prefix.

For example:

ldap://myldaphost:389/ou=People, dc=AnyCorp,dc=com

binds to port 389 on the computer myldaphost, with ou=People,dc=AnyCorp,dc=com as the initial context prefix.

identityguard.ldap.principal Required.

Name of the entity binding to the LDAP directory, for example:

cn=Directory Manager

identityguard.ldap.credentials Required.

Password of the entity binding to the LDAP directory.

Page 262: IG 81 Install Guide 3

262 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

identityguard.ldap.connecttimeout Length of time in milliseconds that Entrust IdentityGuard waits when attempting to connect to the LDAP directory before giving up and returning an error.

Defaults to 30000 (30 seconds).

identityguard.ldap.useridattribute LDAP directory attribute that contains the unique user identifier.

Default is cn.

identityguard.ldap.policyentry Required.

Specifies the directory that stores policies. It must exist, and be named relative to the context prefix.

For example, if the URL is ldap://directory.AnyCorp.com/o=Entrust,c=ca, then the policy entry could be cn=Some Entry, ou=R and D to represent the DN cn=Some Entry,ou=R and D,o=Entrust,c=ca.

identityguard.ldap.sslEnabled Specifies if you are using a secure SSL connection to the directory. If set to true, you must direct the identityguard.ldap.url to a secure LDAP port.

For more information, see the section “To import the LDAP SSL certificate” on page 233.

identityguard.ldap.addUserObjectClass Indicates whether the Entrust IdentityGuard Server should add the user object class when setting up an Entrust IdentityGuard user, or if it is expected to already be present.

Set to false for Active Directory and to true for an LDAP directory.

identityguard.ldap.addAdminObjectClass Indicates whether the Entrust IdentityGuard Server should add the admin object class when setting up an Entrust IdentityGuard administrator, or if it is expected to already be present.

Set to false for Active Directory and to true for an LDAP directory.

Table 15: LDAP directory properties (continued)

Property Description

Page 263: IG 81 Install Guide 3

263Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

identityguard.ldap.addPolicyObjectClass Indicates whether the Entrust IdentityGuard Server should add the policy object class when setting up the Entrust IdentityGuard policy, or if it is expected to already be present.

Set to false for Active Directory and to true for an LDAP directory.

To edit the remaining LDAP properties in this table (listed below), you must first add them to the identityguard.properties file. If a property is not included in the file, Entrust IdentityGuard uses the default value for that property as given here.

Table 15: LDAP directory properties (continued)

Property Description

Page 264: IG 81 Install Guide 3

264 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

identityguard.ldap.searchbase Required. url.<name>=

Define one or more search bases where users can be located. See “Configuring additional search bases” on page 260.

For example, a search base called sbase1 looks like this:identityguard.ldap.searchbase.url.sbase1=ldap://mydirectoryhost:389/ou=People,dc=AnyCorp,dc=com

You cannot name a search base “default” because that is a reserved search base name. See the Entrust IdentityGuard Administration Guide for more details.

Note: Entrust IdentityGuard configuration automatically converts spaces in the LDAP base DN to %20. If you edit the LDAP base DN after installation in the identityguard.properties file, remember to replace spaces with %20.

Optional. The following settings are optional and may be configured for each search base:

• principal.<name>=

• credentials.<name>=

• connecttimeout.<name>=

• searchtimeout.<name>=

• sizelimit.<name>=

• sslEnabled.<name>=

• useridattribute.<name>=

• userObjectClass.<name>=

• useridcasesensitive.<name>=

• addUserObjectClass.<name>

• adminObjectClass.<name>=

• addAdminObjectClass.<name>=

• connectionpool.max.<name>=

• connectionpool.minIdleCloseTime.<name>=

• connectionpool.closeSchedule.<name>=

Table 15: LDAP directory properties (continued)

Property Description

Page 265: IG 81 Install Guide 3

265Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

identityguard.ldap.searchbase (continued)

The identityguard.ldap.searchbase.useridattribute.<name> property defaults to the default value for the identityguard.ldap.useridattribute.

The other optional settings default to the corresponding value of the default search base.

identityguard.ldap.searchtimeout Length of time in milliseconds that Entrust IdentityGuard waits when searching the LDAP directory before giving up and returning an error.

Default is 30000 (30 seconds).

identityguard.ldap.sizelimit Maximum number of entries to return in a single LDAP search.

Default is 1000.

identityguard.ldap.userObjectClass LDAP directory object class used to allow the user attributes to be added to an entry.

Default is entrustIGUser.

identityguard.ldap.adminObjectClass LDAP directory object class used to allow the administrator attributes to be added to an entry.

Default is entrustIGAdmin.

identityguard.ldap.policyObjectClass LDAP directory object class used to allow the policy attributes to be added to an entry.

Default is entrustIGPolicy.

identityguard.ldap.connectionpool.max The maximum number of connections that can be kept in the LDAP directory connection pool. An Entrust IdentityGuard service will not open more connections to the directory than this value.

Default is 10.

identityguard.ldap.connectionpool. minIdleCloseTime

The minimum number of milliseconds a connection to the LDAP directory can be idle for before being closed.

Default is 180000 (3 minutes).

Table 15: LDAP directory properties (continued)

Property Description

Page 266: IG 81 Install Guide 3

266 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

identityguard.ldap.connectionpool. closeSchedule

The number of milliseconds between each check for idle LDAP directory connections and closure of those idle longer than the value set in the minIdleCloseTime setting.

Set to 0 to disable closing idle connections.

Default is 180000 (3 minutes).

identityguard.ldap.GeneralizedTimeWithSubSecs

Some directories do not support generalized time attributes that contain subseconds, while other directories require them. If this value is set to true, generalized time is formatted with subseconds.

Default is true.

Note: This must be false when using a Novell eDirectory as your repository.

identityguard.ldap.useReplace Set this to true only if you use Oracle Internet Directory as your repository.

Table 15: LDAP directory properties (continued)

Property Description

Page 267: IG 81 Install Guide 3

267Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

Configuring database propertiesTo change the way the database is used by the Entrust IdentityGuard Server, go to the Database Server Settings section of the identityguard.properties file and add or edit the properties described in Table 16 on page 267.

If you are using a database, the properties marked Required in the table must have values defined in the identityguard.properties file. These values are added to the identityguard.properties file during the configuration that you completed during the installation.

Table 16: JDBC properties

Property Description

identityguard.jdbc.connectionpool.closeSchedule The number of milliseconds between each check for idle database connections and closure of those idle longer than the value set in the minIdleCloseTime setting.

Set to 0 to disable closing idle connections.

Default is 180000 (3 minutes).

identityguard.jdbc.connectionpool.max The maximum number of connections that can be kept in the database connection pool. An Entrust IdentityGuard service will not open more connections than this value.

If the database server cannot accept this number of connections, Entrust IdentityGuard may return errors when trying to open some of its connections.

Default is 10.

identityguard.jdbc.connectionpool.minIdleCloseTime

The minimum number of milliseconds a connection to the database can be idle before it is considered for closing.

Default is 180000 (3 minutes).

identityguard.jdbc.logintimeout Number of seconds that Entrust IdentityGuard will wait for the database login operation to complete.

Default is 30 seconds.

identityguard.jdbc.querytimeout Number of seconds that Entrust IdentityGuard will wait for the database to perform an operation. A value of 0 means that the connection will never time out.

Default is 0.

Page 268: IG 81 Install Guide 3

268 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

identityguard.jdbc.driverClass Required.

The class name of the JDBC driver. This value is entered during configuration.

identityguard.jdbc.password Required.

The password of the database user name entered during configuration.

identityguard.jdbc.schema Required.

The database schema name entered during configuration.

identityguard.jdbc.url Required.

The database URL entered during configuration.

identityguard.jdbc.user Required.

The database user name entered during configuration.

identityguard.jdbc.needsEscape Indicates whether Entrust IdentityGuard should use escape characters in an SQL Where clause. If you are using a MySQL database, set this to false.

Default is true.

identityguard.jdbc.timestampDataType Determines how timestamp expressions are formatted in an SQL Where clause. If you set this property to true, the SQL Where clause will include the TIMESTAMP datatype.

This setting should be true for Oracle and false for DB2 and SQL Server.

Default is true.

identityguard.jdbc.blobAccess If you are using SQL Server, set this to false.

Default is true.

Table 16: JDBC properties (continued)

Property Description

Page 269: IG 81 Install Guide 3

269Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

identityguard.jdbc.selectLock Defines what SQL syntax is used to lock the policy when it is updated. Different databases use different syntaxes. The supported values are:

• forupdate - Oracle

• withrr - DB2

• withupdlock - SQL Server

If not set or an invalid value is provided, it defaults to forupdate.

Table 16: JDBC properties (continued)

Property Description

Page 270: IG 81 Install Guide 3

270 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Enabling cached challengesBy default, Entrust IdentityGuard uses a persistent repository to store challenges in the time between the getChallenge request and the authenticate request. Improve performance of your Entrust IdentityGuard system by using a cache for the challenge repository. The cache repository holds the challenge in memory and writes the challenge to the persistent repository after a period of time. Normally, the authenticate request is received within that time period, then the challenge is removed from the repository.

Attention: If you enable cached challenges, you should not create replicas of the Entrust IdentityGuard Server since the cache is not shared between the replicas. Or, you must ensure “session stickiness” (that is, the entire session is completed by one Entrust IdentityGuard Server.

Attention: It is recommended that you back up the identityguard.properties file before you make changes to it. For instructions on backing up files, see “Planning a backup strategy” on page 244.

To enable cached challenges1 In identityguard.properties,change the following settings:

• for an LDAP repository, change

identityguard.challengerepository.impl=com.entrust.identityGuard.c

ardManagement.dataAccess.ldap.LdapChallengeRepository

to:

identityguard.challengerepository.impl=com.entrust.identityGuard.c

ardManagement.dataAccess.cache.CacheChallengeRepository

• for a database, change

identityguard.challengerepository.impl=com.entrust.identityGuard.c

ardManagement.dataAccess.jdbc.JdbcChallengeRepository

to:

identityguard.challengerepository.impl=com.entrust.identityGuard.c

ardManagement.dataAccess.cache.CacheChallengeRepository

2 Add the following setting:

• for an LDAP repository:

Page 271: IG 81 Install Guide 3

271Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

identityguard.challengerepository.cache.persistentrepository.impl=

com.entrust.identityGuard.cardManagement.dataAccess.ldap.LdapChall

engeRepository

• for a database:

identityguard.challengerepository.cache.persistentrepository.impl=

com.entrust.identityGuard.cardManagement.dataAccess.jdbc.JdbcChall

engeRepository

3 Optionally, add the following setting, which defines how long (in seconds) a challenge remains in the cache before it is written to the persistent repository. The default value is 180 (3 minutes):

identityguard.challengerepository.cache.timeout=180

4 Optionally, add the following setting, which controls the maximum size (in number of challenges) of the challenge cache. If the setting is not set, or is an invalid value or a non-positive number, the cache size defaults to infinite.

identityguard.challengerepository.cache.maxsize=1000

Page 272: IG 81 Install Guide 3

272 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Caching policiesEdit the identityguard.properties file to control the length of time a policy is cached (before the repository is checked for new policy definitions). The policy caching setting is

identityguard.policyRepository.cacheTimeout=<number of

milliseconds>

The default is 30000 milliseconds (30 seconds). Set the value to 0 to disable policy caching and enable the policy to be accessed from the repository on every operation.

Note: Disabling policy caching could delay performance.

Page 273: IG 81 Install Guide 3

273Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

Changing log configurationEdit the identityguard.properties file to change certain UNIX logging behaviors.

Note: Changes to log settings take effect almost immediately.

In the Logging Configuration Settings section of identityguard.properties, remove the comment marks before and after the logging settings to change the default value, if necessary.

Table 17 describes the settings you can edit.

Table 17: UNIX Logging configuration settings

Logging configuration setting Description

identityguard.refreshinterval Defines how frequently the configuration is checked for changes to the log settings.

Default is 10 seconds.

identityguard.log.maxstacksize Defines the number of stack frames that are logged for errors.

The default value, 0, means that no stack trace is logged.

log4j.rootLogger Defines the logging level of the root logger, and the destination of any messages logged by the root logger. The root logger may catch errors not specifically logged by Entrust IdentityGuard, but occur within the application server. The default setting is WARN, and the appender will depend on the choices made during installation.

Default is WARN, (other options are: SYSTEM_SYSLOG or SYSTEM_FILELOG).

log4j.logger.IG.AUDIT Defines the audit level of Entrust IdentityGuard and the destination of the logged audits. The default setting is ALL, and the appender will depend on the choices made during installation.

Default is ALL, (other options are: AUDIT_SYSLOG or AUDIT_FILELOG).

Page 274: IG 81 Install Guide 3

274 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

lo4j.logger.IG.SYSTEM By default, all system log levels WARN and above are logged.

• To reduce system logging, change WARN to ERROR or OFF.

• To increase system logging (for example, for troubleshooting) change WARN to INFO, DEBUG, or ALL.

Default is WARN.

log4j.additivity.IG.AUDIT Defines whether Entrust IdentityGuard audits should also be added to the root logger.

Leave this value set to the default, false.

log4j.additivity.IG.SYSTEM Defines whether Entrust IdentityGuard system logs should also be added to the root logger.

This value should remain set to the default, false.

log4j.appender.AUDIT_SYSLOG Defines the log4j appender to use for audit logs. This should not be changed.

This value should remain set to the default, org.apache.log4j.net.SyslogAppender.

log4j.appender.AUDIT_SYSLOG.SyslogHost Defines the Syslog host that logging information is sent to.

If using Syslog, the default is localhost. If using file logging, the default is $log_host}.

log4j.appender.AUDIT_SYSLOG.Facility Defines the Syslog facility that is used to audit logs.

Default is local1.

log4j.appender.AUDIT_SYSLOG.layout The log4j class that converts a logging event into a message string to be printed in the logs.

Default is org.apache.log4j.PatternLayout.

log4j.appender.AUDIT_SYSLOG.layout.ConversionPattern

The format of the converted logging event. See the log4j documentation for further information.

Default is [%t] [%-5p] [%c] %m%n.

Table 17: UNIX Logging configuration settings (continued)

Logging configuration setting Description

Page 275: IG 81 Install Guide 3

275Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

log4j.appender.SYSTEM_SYSLOG Defines the log4j appender to use for system logs. This should not be changed.

Default is org.apache.log4j.net.SyslogAppender.

log4j.appender.SYSTEM_SYSLOG.SyslogHost

Defines the Syslog host to which logging information is sent.

Default is localhost.

log4j.appender.SYSTEM_SYSLOG.Facility Defines the Syslog facility that is used by Entrust IdentityGuard system logs.

Default is local2.

log4j.appender.SYSTEM_SYSLOG.layout The log4j class that converts a logging event into a message string to be printed in the logs.

Default is org.apache.log4j.PatternLayout.

log4j.appender.SYSTEM_SYSLOG.layout.ConversionPattern

The format of the converted logging event. Please see the log4j documentation for further information.

Default is [%t] [%-5p] [%c] %m%n.

log4j.appender.AUDIT_FILELOG Defines the appender that is used if audit events are logged to files.

This value should remain set to the default, org.apache.log4j.RollingFileAppender.

log4j.appender.AUDIT_FILELOG.File Defines the location of the audit log.

Default is: $IDENTITYGUARD.HOME/etc/audit.log

log4j.appender.AUDIT_FILELOG.MaxFileSize Defines the maximum size of a log file before rolling over to a new empty file.

Default is 1000KB.

log4j.appender.AUDIT_FILELOG.MaxBackupIndex

Defines the number of previous log files to keep as a history.

Default is 10.

Table 17: UNIX Logging configuration settings (continued)

Logging configuration setting Description

Page 276: IG 81 Install Guide 3

276 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

log4j.appender.AUDIT_FILELOG.layout The log4j class that converts a logging event into a message string to be printed in the logs.

Default is org.apache.log4j.PatternLayout.

log4j.appender.AUDIT_FILELOG.layout.ConversionPattern

The format of the converted logging event. Please see the log4j documentation for further information.

Default is [%d] [%t] [%-5p] [%c] %m%n.

log4j.appender.SYSTEM_FILELOG Defines the appender that is used if audit events are logged to files.

This value should remain set to the default, org.apache.log4j.RollingFileAppender.

log4j.appender.SYSTEM_FILELOG.File Defines the location of the audit log.

Default is: $IDENTITYGUARD.HOME/etc/system.log

log4j.appender.SYSTEM_FILELOG.MaxFileSize

Defines the maximum size of a log file before rolling over to a new empty file.

Default is 1000KB.

log4j.appender.SYSTEM_FILELOG.MaxBackupIndex

Defines the number of previous log files to keep as a history.

Default is 5.

log4j.appender.SYSTEM_FILELOG.layout

The log4j class that converts a logging event into a message string to be printed in the logs.

Default is org.apache.log4j.PatternLayout.

log4j.appender.SYSTEM_FILELOG.layout.ConversionPattern

The format of the converted logging event. Please see the log4j documentation for further information.

Default is [%d] [%t] [%-5p] [%c] %m%n.

Table 17: UNIX Logging configuration settings (continued)

Logging configuration setting Description

Page 277: IG 81 Install Guide 3

277Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

Changing log locations on UNIXIf you chose to log to Syslog when you installed Entrust IdentityGuard, you can reconfigure to log to a file, or, if you chose to log to a file, you can reconfigure so as to log to Syslog.

To switch between a log file and Syslog, edit the following:

log4j.rootLogger=WARN, SYSTEM_<FILELOG> or <SYSLOG>

log4j.logger.IG.AUDIT=ALL, AUDIT_<FILELOG> or <SYSLOG>

log4j.logger.IG.SYSTEM=WARN, SYSTEM_<FILELOG> or <SYSLOG>

For example, to switch logging from files to Syslog, change log4j.rootLogger=WARN, SYSTEM_FILELOG to log4j.rootLogger=WARN, SYSTEM_SYSLOG.

If you are switching logging from files to Syslog, you will need to edit the following two entries in identityguard.properties and replace ${log_host} with the host name of your Syslog server. Use the value localhost if the Syslog server is running on the local host.

log4j.appender.AUDIT_SYSLOG.SyslogHost=${log_host}

log4j.appender.SYSTEM_SYSLOG.SyslogHost=${log_host}

For example, if the Syslog server is running on the localhost, change the two entries to:

log4j.appender.AUDIT_SYSLOG.SyslogHost=localhost

log4j.appender.SYSTEM_SYSLOG.SyslogHost=localhost

Page 278: IG 81 Install Guide 3

278 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Configuring master user shell formatting

Certain identityguard.properties file settings define the column widths (measured in characters) of the output displayed by any of the list commands (for example, user list, user card list, admin list, token list, and so on).

To change column width, add the following properties to identityguard.properties and change the numeric value associated with the fields in Table 18 through Table 22.

Table 18: User list column widths

Property Description

identityguard.supersh.userlist.width.userid Indicates the width of the user ID field.

Default is 14.

identityguard.supersh.userlist.width.haspin Indicates the width of the temporary PIN field.

Default is 9.

identityguard.supersh.userlist.width.numcards Indicates the width of the number of cards field.

Default is -1, meaning the remainder of the width of your screen.

Table 19: User card list column widths

Property Description

identityguard.supersh.usercardlist.width.userid Indicates the width of the user ID field.

Default is 14.

identityguard.supersh.usercardlist.width.sernum Indicates the width of the serial number field.

Default is 14.

identityguard.supersh.usercardlist.width.state Indicates the width of the state field.

Default is 9.

identityguard.supersh.usercardlist.width.create Indicates the width of the creation date field.

Default is 19.

Page 279: IG 81 Install Guide 3

279Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

identityguard.supersh.usercardlist.width.expire Indicates the width of the expiry date field.

Default is -1, meaning the remainder of the width of your screen.

Table 20: Preproduced cards column width

Property Description

identityguard.supersh.preproducedcardlist.width.sernum

Indicates the width of the preproduced card serial number field.

Default is 14.

identityguard.supersh.preproducedcardlist.width.create

Indicates the width of the preproduced card creation date field.

Default is -1, meaning the remainder of the width of your screen.

Table 21: Administrator list column width

Property Description

identityguard.supersh.adminlist.width.userid Indicates the width of the administrator ID field.

Default is 20.

identityguard.supersh.adminlist.width.state Indicates the width of the administrator state field.

Default is -1, meaning the remainder of the width of your screen.

Table 19: User card list column widths

Property Description

Page 280: IG 81 Install Guide 3

280 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Table 22: Token list column width

Property Description

identityguard.supersh.tokenlist.width.pinsupported

Indicates the width of the PIN Supported field.

Default is 12 for tokens that support token PINs; otherwise false.

Page 281: IG 81 Install Guide 3

281Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

Configuring license auditingEntrust IdentityGuard services performs a periodic license audit. The identityguard.properties file settings in Table 23 control the audit behavior.

License auditing helps you determine when to renew your license or when you are about to run out of user licenses. When you reach your license limits, contact Entrust for more licenses.

The audit is enabled on all replicas of the Entrust IdentityGuard Server. To prevent duplicate audits from being generated on replica Entrust IdentityGuard servers, use the identityguard.audit.integrity.enabled property is to disable the audit integrity check on all but one of the replicas.

The audit integrity check will only run for the first time after the interval has passed. This means that if the service is always restarted within that interval, the audit integrity is never executed.

Table 23: Audit settings

Property Description

identityguard.audit.integrity.enabled Enables the audit integrity check.

Default is true.

identityguard.audit.integrity.interval Number of hours between audit integrity checks.

Default is 24.

identityguard.audit.integrity.count_limit If set to a positive integer value, an audit is generated when the user count gets to within the given value of the license limit.

Default is 0. If the license has expired, the license expired audit is generated regardless of the count limit.

identityguard.audit.integrity.time_limit If set to a positive integer value, an audit is generated when the current date gets to within the given number of days of the license expiry.

Default is 0.

Page 282: IG 81 Install Guide 3

282 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Configuring the Entrust IdentityGuard Radius proxy properties

When you configure the Radius proxy, it sets many of the properties in the identityguard.properties file. However, you need to edit this file to customize the grid and token challenge strings and other features. Edit the properties described in the following table to modify behavior of the Entrust IdentityGuard Radius proxy.

Note: With the exception of log settings, you must restart the Radius proxy for property changes to take effect. See the section “Managing the Radius proxy” on page 196.

Note: When users see a challenge message through VPN, they must enter their response as one continuous string. There is no user interface form to separate and parse entries as people expect when using Entrust IdentityGuard. For example, if a user’s card cells A3, H4 and J1 have the numbers 4, 8, and 9, the response to this messageEnter a response to the challenge [A3] [H4] [J1] using a card with serial number 1952must be 489 with no spaces or punctuation.

Table 24: Radius proxy configuration settings

Property Description

identityguard.igradius.url Provides the URL of the Entrust IdentityGuard server.

If not specified, it defaults to http://localhost:8080/IdentityGuardAuthService/services/AuthenticationService.

If the default is used, Entrust IdentityGuard changes this to the value of identityguard.authservice.https.url during configuration.

Page 283: IG 81 Install Guide 3

283Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

identityguard.igradius.port Provides the port used by the Entrust IdentityGuard Radius proxy for first-factor authentication.

If not specified, it defaults to 1812.

If you use a Radius server for first-factor authentication and your VPN server recognizes different groups of users, use this property to specify a series of ports and direct those groups to different ports. For example, if you want requests for one group to be sent to port 1812 and requests for another group to be sent to port 1813, configure the property like this:

identityguard.igradius.port=1812 1813

No additional ports are needed for groups for other first-factor authentication methods.

Table 24: Radius proxy configuration settings (continued)

Property Description

Page 284: IG 81 Install Guide 3

284 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

identityguard.igradius.challengestring This property sets the contents of the default Radius proxy challenge message for grid authentication.

Note: This is one of six properties related to the challenge a user may see. At the very least, this property should be set as a default. Some or all of the other properties may be set to provide greater control over the challenges that apply to users with multiple cards and/or a PIN.

The content consists of a string and one to three placeholders. The placeholders are:

{0} = the challenge string

{1} = the serial number of the first card

{2} = the serial number of the second card.

The placeholders are filled in when the message appears. For example, this setting

Enter a response to the challenge {0} using cards with serial number {1} or {2}

would result in a message like this:

Enter a response to the challenge [A1] [B2] [C3] using cards with serial number 1234 or 2345.

Users never have more than two valid cards: the current card and the pending card. A user may have a PIN and no card, or a PIN with one or two cards.

If there is no challenge specified, this property defaults to: Enter the response for IdentityGuard challenge {0}. If there is no value for {0}, no challenge is sent.

Table 24: Radius proxy configuration settings (continued)

Property Description

Page 285: IG 81 Install Guide 3

285Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

identityguard.igradius.challengestring.twocardswithpin

This is one of six properties related to the challenge a grid user sees. It takes effect when the user has two cards and a valid PIN.

The format of the string is tailored to this scenario: “Enter a response to the challenge {0} using cards with serial number {1} or {2} or your temporary PIN.”

If not set, it defaults to the value of igradius.challengestring.

identityguard.igradius.challengestring.twocardsnopin

This is one of six properties related to the challenge a grid user sees. It takes effect when the user has two cards and no valid PIN.

The format of the string is tailored to this scenario: “Enter a response to the challenge {0} using cards with serial number {1} or {2}.”

If not set, it defaults to the value of igradius.challengestring.

identityguard.igradius.challengestring.onecardwithpin

This is one of six properties related to the challenge a grid user sees. It takes effect when the user has one card and a valid PIN.

The format of the string is tailored to this scenario: “Enter a response to the challenge {0} using a card with serial number {1} or your temporary PIN.”

If not set, it defaults to the value of igradius.challengestring.

identityguard.igradius.challengestring.onecardnopin

This is one of six properties related to the challenge a grid user sees. It takes effect when the user has one card but no valid PIN.

The format of the string is tailored to this scenario: “Enter a response to the challenge {0} using a card with serial number {1}.”

If not set, it defaults to the value of igradius.challengestring.

Table 24: Radius proxy configuration settings (continued)

Property Description

Page 286: IG 81 Install Guide 3

286 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

identityguard.igradius.challengestring.nocardwithpin

This is one of six properties related to the challenge a grid user sees. It takes effect when the user has no cards but has a valid PIN.

The format of the string is tailored to this scenario: “Enter a response to the challenge {0} using your temporary PIN.”

If not set, it defaults to the value of igradius.challengestring.

identityguard.igradius.tokenchallengestring This property sets the contents of the default Radius proxy challenge message for token authentication.

Note: This is one of eight properties related to the challenge a token user may see. At the very least, this property should be set as a default. Some or all of the properties may be set to provide greater control over the challenges that apply to token users.

The content consists of a string and one or two placeholders. The placeholders are:

{0} = the serial number of the first token

{1} = the serial number of the second token.

The placeholders are filled in when the message appears. For example, this setting

Enter the response to the token with serial number {0}.

would result in a message like this:

Enter the response to the token with serial number 92776.

Users never have more than two valid tokens: the current token and the pending token. A user may have a temporary PIN and no token, or a temporary PIN with one or two tokens.

If there is no challenge specified, this property defaults to: Enter the response from your Entrust IdentityGuard token.

Table 24: Radius proxy configuration settings (continued)

Property Description

Page 287: IG 81 Install Guide 3

287Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

identityguard.igradius.tokenchallengestring.twotokenswithpin

This is one of eight properties related to the challenge a token user sees. It takes effect when the user has two tokens and a valid temporary PIN.

The format of the string is tailored to this scenario: “Enter the response to the token with serial number {0} or {1} or your temporary PIN.”

If not set, it defaults to the value of igradius.tokenchallengestring.

identityguard.igradius.tokenchallengestring.twotokensnopin

This is one of six properties related to the challenge a token user sees. It takes effect when the user has two tokens and no valid temporary PIN.

The format of the string is tailored to this scenario: “Enter the response to the token with serial number {0} or {1}.”

If not set, it defaults to the value of igradius.tokenchallengestring.

identityguard.igradius.tokenchallengestring.onetokenswithpin

This is one of eight properties related to the challenge a token user sees. It takes effect when the user has one token and a valid temporary PIN.

The format of the string is tailored to this scenario: “Enter the response to the token with serial number {0} or your temporary PIN.”

If not set, it defaults to the value of igradius.tokenchallengestring.

identityguard.igradius.tokenchallengestring.onetokennopin

This is one of eight properties related to the challenge a token user sees. It takes effect when the user has one token and no valid temporary PIN.

The format of the string is tailored to this scenario: “Enter the response to the token with serial number {0}.”

If not set, it defaults to the value of igradius.tokenchallengestring.

Table 24: Radius proxy configuration settings (continued)

Property Description

Page 288: IG 81 Install Guide 3

288 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

identityguard.igradius.tokenchallengestring.notokenswithpin

This is one of eight properties related to the challenge a token user sees. It takes effect when the user has no token but has a valid temporary PIN.

The format of the string is tailored to this scenario: “Enter your temporary PIN.”

If not set, it defaults to the value of igradius.tokenchallengestring.

identityguard.igradius.tokenchallengestring.onetokenrequirespinupdate

This is one of eight properties related to the challenge a token user sees and applies only to tokens that support token PINs. Not needed for Entrust tokens.

Add this property if you want to alert the user that the static token PIN for a token needs an update. It takes effect when the user has just one token. The message is appended to the token challenge string message.

The format of the string is tailored to this scenario: “The static PIN for the token with serial number {0} needs to be updated.”

identityguard.igradius.tokenchallengestring.twotokensrequirespinupdate

This is one of eight properties related to the challenge a token user sees and applies only to tokens that support token PINs. Not needed for Entrust tokens.

Add this property if you want to alert the user that the static token PINs for the current and pending token need an update. The message is appended to the token challenge string message.

The format of the string is tailored to this scenario: “The static PINs for the tokens with serial number {0} and {1} need to be updated.”

Table 24: Radius proxy configuration settings (continued)

Property Description

Page 289: IG 81 Install Guide 3

289Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

identityguard.igradius.skipauth.noexist Specifies how to deal with users who do not exist in Entrust IdentityGuard.

If set to true, the user can log in without being prompted for Entrust IdentityGuard authentication.

If set to false, the user login attempt generates an error.

If not specified, it defaults to false.

identityguard.igradius.skipauth.noactive Sets how to deal with users who exist in Entrust IdentityGuard but who do not have an active card or a temporary PIN.

If set to true, the user can log in without being prompted for Entrust IdentityGuard authentication.

If set to false, the user login attempt generates an error.

If not specified, it defaults to false.

identityguard.igradius.msglog.enabled If set to true, Radius messages are logged to the file specified by the property identityguard.igradius.msglog.file (described below). Default is false.

identityguard.igradius.msglog.file Provides the name of the file that logs Radius messages. If the property does not provide an absolute path name, the file is created in: $IDENTITYGUARD_HOME/logs or <IG_INSTALL_DIR>\identityguard81\logs

If you enable logging on the property identityguard.igradius.msglog.enabled (described above) but this property is not set or is not a valid file name, it generates errors and sends them to the system log.

identityguard.igradius.vpnrequests Provides the size of the VPN state table, that is, the number of outstanding requests from the VPN.

If not specified, it defaults to 1000.

Table 24: Radius proxy configuration settings (continued)

Property Description

Page 290: IG 81 Install Guide 3

290 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

identityguard.igradius.vpnrequiremsgauth If this property is set to true, incoming messages from the VPN server must include the Message-Authenticator attribute. If the attribute is not found, the message is ignored.

If not specified, it defaults to false.

identityguard.igradius.vpntimeout Provides the number of seconds that the Radius proxy will wait for a response from the VPN server.

If not specified, it defaults to 180 seconds.

identityguard.igradius.radiustimeout Provides the number of seconds that the Radius proxy will wait for a response from the Radius server.

If not specified, it defaults to 10 seconds.

identityguard.igradius.radiusrequiremsgauth If this property is set to true, incoming messages from the Radius server must include the Message-Authenticator attribute. If the attribute is not found, the message is ignored.

If not specified, it defaults to false.

identityguard.igradius.vpnincludemsgauth This determines if outgoing messages to the VPN server include the Message-Authenticator attribute. Set this to false if the VPN server does not understand the attribute and rejects messages as a result.

If not specified, it defaults to true.

identityguard.igradius.radiusincludesmsgauth This determines if outgoing messages to the Radius server include the Message-Authenticator attribute. Set this to false if the Radius server does not understand the attribute and rejects messages as a result.

If not specified, it defaults to true.

identityguard.igradius.radius.{0}.address This is the Radius server address. It is set when you configure the Radius server. The {0} placeholder is replaced by the Radius server name.

Table 24: Radius proxy configuration settings (continued)

Property Description

Page 291: IG 81 Install Guide 3

291Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

identityguard.igradius.radius.{0}.secret This is the Radius server secret set when you configure the Radius server. The value is usually encrypted. The {0} placeholder is replaced by the Radius server name.

identityguard.igradius.vpn.{0}.charset This specifies the character set used to decode user names sent by the VPN server and encode messages sent back to the server. Allowed values are UTF-8 and ISO-8859-1.

If not specified, the Radius proxy expects UTF-8. The character set is only a concern when extended characters are part of the names. The {0} placeholder is replaced by the VPN server label.

identityguard.igradius.vpn.{0}.group This optional setting specifies the group the VPN server is associated with. The {0} placeholder is replaced by the VPN server label.

For information on using this and other VPN property options, see “Configuring the Radius proxy for groups” on page 175.

identityguard.igradius.vpn.{0}.host This is the host of the VPN server set when you configure the Radius server. The {0} placeholder is replaced by the VPN server label.

identityguard.igradius.vpn.{0}.igport This optional setting specifies the port the VPN server is associated with. The {0} placeholder is replaced by the VPN server label.

identityguard.igradius.vpn.{0}.processbackslash Converts group and user name pairs in the form “group\name” coming through the Radius proxy into the form “group/name.”

identityguard.igradius.vpn.{0}.processat Converts group and user name pairs in the form “name@group” coming through the Radius proxy into the form “group/name.”

identityguard.igradius.vpn.{0}.radius This specifies the Radius server associated with the VPN server. The {0} placeholder is replaced by the VPN server label.

identityguard.igradius.vpn.{0}.secret This is the VPN server secret set when you configure the Radius server. The value is usually encrypted. The {0} placeholder is replaced by the VPN server label.

Table 24: Radius proxy configuration settings (continued)

Property Description

Page 292: IG 81 Install Guide 3

292 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

identityguard.igradius.vpn.{0}.useradius This stores the results of the prompt for the type of first-factor authentication resource to use. When set to true, Radius is used. When set to false, an external authentication resource is used. The {0} placeholder is replaced by the VPN server label.

If not specified, it defaults to true.

Table 24: Radius proxy configuration settings (continued)

Property Description

Page 293: IG 81 Install Guide 3

293Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

Configuring external authentication properties

You can configure the Entrust IdentityGuard Radius proxy component to use an external authentication resource (Windows domain controller or an LDAP directory) for first-factor authentication instead of a Radius server. See “Using the Radius proxy with a domain controller or LDAP directory” on page 187. As part of that operation, you must enter and set properties in the identityguard.properties file, as described in the following table.

Table 25: Radius proxy configuration settings for external authentication

Property Description

identityguard.externalauth.impl

identityguard.externalauth.impl.<group>

This setting refers to the name of the Entrust IdentityGuard Java class used for external authentication. There are separate classes for a Windows domain controller and an LDAP directory.

When specified without a group name, it creates the global or default setting for users.

When specified with an Entrust IdentityGuard group name, it sets the authentication resource to use for members of that group. This way, you can direct different groups to different authentication resources.

If all entries for this property include a group name (that is, there is no entry without a group), this means there is no default and only the users in the specified groups can use external authentication.

identityguard.igradius.vpn.{0}.useradius This stores the results of the prompt for the type of first-factor authentication resource to use. When set to true, Radius is used. When set to false, an external authentication resource is used.

If not specified, it defaults to true.

Page 294: IG 81 Install Guide 3

294 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

identityguard.externalauth.kerberos.realm

identityguard.externalauth.kerberos.realm.<group>

If you are using a domain controller, specify the server acting as the Kerberos realm. Give the DNS name in uppercase.

When specified without a group name, it creates the global or default setting for users.

When specified with an Entrust IdentityGuard group name, it sets the realm to use for members of that group.

Note: When you specify this property, you also need to include the server information for the KDC server in igkrb5.conf file located:

• on UNIX, in $IDENTITYGUARD_HOME/etc/

• on Windows, in <IG_INSTALL_DIR>\etc\

For more information, see “Configuring Entrust IdentityGuard for external authentication” on page 202.

identityguard.externalauth.kerberos.kdc

identityguard.externalauth.kerberos.kdc.<group>

Obsolete.

Table 25: Radius proxy configuration settings for external authentication (continued)

Property Description

Page 295: IG 81 Install Guide 3

295Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

Configuring token propertiesEntrust IdentityGuard supports Entrust tokens and some third-party tokenstokens. For details on which tokens are supported, refer the Entrust TrustedCare Online Web site.

Note: Entrust IdentityGuard does not support ActivIdentity tokens.

Table 26: Token properties

Property Description

identityguard.token.impl Refers to the class name of the token library. For Entrust tokens, the property either does not exist or is blank. For Entrust tokens, there is an implied default of: com.entrust.identityGuard.common.token.activIdentity.ActiveIdentityTokenManager

For other token vendors, add this property and set it to the applicable class name.

identityguard.token.configfile Names the token configuration file, if used. Choose a name, such as token.conf, and place it:

• on UNIX, in $IDENTITYGUARD_HOME/etc/

• on Windows, in <IG_INSTALL_DIR>\etc\

Page 296: IG 81 Install Guide 3

296 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Configuring the Administration interface properties for bulk operations

It may take the Administration interface a significant period of time to process large bulk files, and processing may consume significant amounts of memory. Entrust IdentityGuard provides properties to manage resources used for bulk operations.

Table 27: Administration interface settings for bulk operations

Property Description

identityguard.webadmin.bulk.maxFileSize Limits the size of files imported for bulk operations. Enter a value in bytes. The default is 50 MB (52428800 bytes). If you attempt to load a bulk file that exceeds the set limit, the Administration interface cancels the operation and displays an error message.

identityguard.webadmin.bulk.inMemoryThreshold

Sets the maximum amount of memory used for bulk operations. Entrust IdentityGuard writes large bulk files to disk and caches them when they exceed the set size. Enter a value in bytes. The default is 1 MB (1048576 bytes).

identityguard.webadmin.url Contains the URL of the Administration interface. It is set during installation configuration.

Page 297: IG 81 Install Guide 3

297Configuring the Entrust IdentityGuard Server properties fileFeedback on guide

Configuring the Administration interface to control the output format

Entrust IdentityGuard provides properties to manage the output of export operations.

Table 28: Administration interface settings for export operations

Property Description

identityguard.export.csv By default, files exported through the Administration interface are in XML format. Set this to true to have all files exported in comma-separated-value (CSV) format. The default is false.

identityguard.export.dir This setting defines the directory on the Entrust IdentityGuard server to which the export files are written. The default setting is $IDENTITYGUARD_HOME/export.

Page 298: IG 81 Install Guide 3

298 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Page 299: IG 81 Install Guide 3

299

Appendix B

Upgrading Entrust IdentityGuard Server on Linux

You can upgrade Entrust IdentityGuard Server on Linux from a previous installation of Entrust IdentityGuard version 7.2 or 8.0 installed on Linux.

Attention: To install an upgrade or patch, you must use the same account used to originally install Entrust IdentityGuard.

Note: When upgrading Entrust IdentityGuard Server from version 7.2, all existing administrators are assigned to the new default role and group in Entrust IdentityGuard 8.1. There were no roles or groups in 7.2.

Topics in this appendix:

• “Upgrading Entrust IdentityGuard Server 7.2 to 8.1” on page 299

• “Upgrading Entrust IdentityGuard Server from 8.0 to 8.1” on page 302

Upgrading Entrust IdentityGuard Server 7.2 to 8.1Complete the following steps to upgrade to Entrust IdentityGuard 8.1 directly from version 7.2.

To upgrade Entrust IdentityGuard Server 7.2 to 8.11 Update your LDIF or SQL schema to apply to Entrust IdentityGuard 8.1. Refer to

the specific schema configuration instructions for your directory or database in

Page 300: IG 81 Install Guide 3

300 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

either the Entrust IdentityGuard Directory Configuration Guide or the Entrust IdentityGuard Database Configuration Guide.

2 Download the Entrust IdentityGuard 8.1 software. To do so, complete the steps in “Downloading Entrust IdentityGuard software” on page 21.

3 Follow the instructions under“Installing Entrust IdentityGuard Server” on page 33.

4 The Entrust IdentityGuard installation detects version 7.2 and displays the following prompt:

Entrust IdentityGuard 7.2 is installed.

Do you wish to install Entrust IdentityGuard 8.1 and upgrade the

7.2 data? [yes or no]

Enter yes to continue with the upgrade. You are prompted to manually back up your configuration settings.

5 Manually back up your configuration settings if the master key file is not in the default location (default location, $IDENTITYGUARD_HOME/etc/masterkeys.enc).

When you upgrade Entrust IdentityGuard, a copy of the existing configuration is made (so you can restore it later in this installation procedure) only if this file is in the default location.

Attention: If you want to override the default configuration, do not store the configuration settings under $IDENTITYGUARD_HOME. During an upgrade, this directory is deleted and reinstalled.

6 The Java Runtime Environment is upgraded and you can reinstall the Application server.

Installing Java Runtime Environment...

Installing j2re-1_4_2_09-linux-i586.bin...

Installing Tomcat...

Tomcat has already been installed.

Do you wish to reinstall it? [yes or no]

7 The installation creates the Entrust IdentityGuard service and the Entrust IdentityGuard Radius service:

Creating igradius service...

8 The following prompt appears:

Do you want the Entrust IdentityGuard Radius proxy to start

automatically when the host starts after reboot? [yes or no]

Page 301: IG 81 Install Guide 3

301Upgrading Entrust IdentityGuard Server on LinuxFeedback on guide

If you answer no, you can enable automatic startup later.

If you wish to enable automatic startup in the future, run the

command "igsvcconfig.sh igradius reset" when logged on as root.

9 When the installation is complete, Entrust IdentityGuard prompts you to restore your existing configuration data.

Configuration data from the existing installation has been backed

up. If you wish, you can configure a new server or restore the

existing configuration data. If you don't restore the existing

configuration data, all existing data will be removed.

Do you wish to restore the existing configuration data? [yes or

no]

To retain your Entrust IdentityGuard data, answer yes. This message appears:

Configuration parameters restored.

To configure a new server, answer no. When you answer no, all of your previous configuration data is removed. You must complete the configuration and initialization procedures:

• “Configuring the primary Entrust IdentityGuard Server” on page 36

• “Initializing the primary Entrust IdentityGuard Server” on page 47

After initialization is complete, continue to Step 11 in this procedure.

10 You may be prompted to configure the Entrust IdentityGuard Radius proxy. Continue from Step 4 in “To configure the Radius proxy on UNIX” on page 180.

11 When you are finished, Entrust IdentityGuard displays:

PERFORMING UPGRADE

You are prompted to answer if you are upgrading a replica server:

Are you upgrading an Entrust IdentityGuard master or replica?

(PRIMARY or REPLICA):

To complete the upgrade of the first instance of Entrust IdentityGuard Server, answer PRIMARY. Answer REPLICA to upgrade the rest of your instances of Entrust IdentityGuard Server.

12 You are prompted to log in with your master user name and password to complete the upgrade.

A master user must login to complete the upgrade.

Userid:

Password:

When you have successfully logged in, the following message appears:

Page 302: IG 81 Install Guide 3

302 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Upgrade complete.

Note: If the upgrade fails, ensure that your repository schema was upgraded. After you upgrade the repository schema, you can continue with the Entrust IdentityGuard upgrade by running the master user shell (supersh) command system upgrade.

13 You are prompted to save a backup of your configuration data.

Do you wish to keep the backup copy of configuration data? [yes or

no]

If you answer yes, Entrust IdentityGuard displays the location of the saved configuration data.

Your upgrade is now installed.

You are prompted to set up the sample application. Proceed to “Configuring the sample application on UNIX” on page 51.

Upgrading Entrust IdentityGuard Server from 8.0 to 8.1Complete the following steps to upgrade from version 8.0 to 8.1.

To upgrade Entrust IdentityGuard Server 8.0 to 8.11 Update your LDIF or SQL schema to apply to Entrust IdentityGuard 8.1. Refer to

the specific schema configuration instructions for your directory or database in either the Entrust IdentityGuard Directory Configuration Guide or the Entrust IdentityGuard Database Configuration Guide.

2 Download the Entrust IdentityGuard 8.1 software. To do so, complete the steps in “Downloading Entrust IdentityGuard software” on page 21.

3 Follow the instructions under“Installing Entrust IdentityGuard Server” on page 33.

4 The Entrust IdentityGuard installation detects version 8.0 and displays the following prompt:

Entrust IdentityGuard 8.0 is installed.

Do you wish to install Entrust IdentityGuard 8.1 and upgrade the

8.0 data? [yes or no]

Enter yes to continue with the upgrade.

5 The Entrust IdentityGuard installation detects the Java Runtime Environment and displays the following prompt:

Page 303: IG 81 Install Guide 3

303Upgrading Entrust IdentityGuard Server on LinuxFeedback on guide

Installing Java Runtime Environment...

Java Runtime Environment has already been installed.

Do you wish to reinstall it? [yes or no]

6 The installation detects the Application server and displays the following prompt:

Installing Tomcat...

Tomcat has already been installed.

Do you wish to reinstall in? [yes or no]

7 The installation creates the Entrust IdentityGuard service and the Entrust IdentityGuard Radius service:

Creating igradius service...

8 The following prompt appears:

Do you want the Entrust IdentityGuard Radius proxy to start

automatically when the host starts after reboot? [yes or no]

If you answer no, you can enable automatic startup later (using chkconfig igradius reset, when logged as root).

9 When the installation is complete, Entrust IdentityGuard prompts you to restore your configuration data.

Installation complete.

Configuration data from the existing installation has been backed

up. If you wish, you can configure a new server or restore the

existing configuration data and upgrade it to 8.1. If you don’t

restore the existing configuration data, all existing data will be

removed.

Do you wish to restore the existing configuration data? [yes or

no] yes

10 To retain your Entrust IdentityGuard data, answer yes. This message appears:

Configuration parameters restored.

To configure a new server, answer no. When you answer no, all of your previous configuration data is removed. You must complete the configuration and initialization procedures:

• “Configuring the primary Entrust IdentityGuard Server” on page 36

• “Initializing the primary Entrust IdentityGuard Server” on page 47

After initialization is complete, continue to Step 12 in this procedure.

11 You may be prompted to configure the Entrust IdentityGuard Radius proxy. Continue from Step 4 in “To configure the Radius proxy on UNIX” on page 180.

Page 304: IG 81 Install Guide 3

304 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

12 When you are finished, Entrust IdentityGuard displays:

PERFORMING UPGRADE

You are prompted to answer if you are upgrading a replica server:

Are you upgrading an Entrust IdentityGuard master or replica?

(PRIMARY or REPLICA):

To complete the upgrade of the first instance of Entrust IdentityGuard Server, answer PRIMARY. Answer REPLICA to upgrade the rest of your instances of Entrust IdentityGuard Server.

13 You are prompted to log in with a master user name and password to complete the upgrade. For example, Master1.

A master user must login to complete the upgrade.

Userid:

Password:

When you have successfully logged in, the following message appears:

Upgrade complete.

Note: If the upgrade fails, ensure that your repository schema was upgraded. After you upgrade the repository schema, you can continue with the Entrust IdentityGuard upgrade by running the master user shell (supersh) command system upgrade.

14 You are prompted to save a backup of your configuration data.

Do you wish to keep the backup copy of the configuration data?

[yes or no]

If you answer yes, Entrust IdentityGuard displays the location and the file name of the saved configuration data.

Your upgrade is now installed.

Page 305: IG 81 Install Guide 3

305

Appendix C

Using the sample Web application

This appendix provides administrators with detailed instructions for using the Any Bank sample Web application. Assuming the role of a sample end user, you will register with the Any Bank Web site and perform the following tasks: request a card, activate a card, register a token, and log in using several authentication methods

Attention: This sample Web application simulates a Web site with Entrust IdentityGuard installed. The primary purpose of the application is to demonstrate some of the authentication methods used by Entrust IdentityGuard. The sample Web application is not intended to perform as a fully featured application.

Topics in this appendix:

• “Preparing to use the sample Web application” on page 306

• “Accessing the sample Web application” on page 307

• “Registering as a user” on page 308

• “Activating a card” on page 315

• “Registering a token” on page 317

• “Using machine authentication to log in” on page 321

• “Using generic authentication to log in” on page 325

• “Using step-up authentication” on page 327

• “Using temporary PIN authentication to log in” on page 329

• “Using one-step grid authentication to log in” on page 332

• “Using two-step grid authentication to log in” on page 333

Page 306: IG 81 Install Guide 3

306 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Preparing to use the sample Web application

Review the following information before configuring the sample Web application:

Table 29: Preconfiguration considerations for the Sample Web application

Creating a user group • During installation, the sample Web application creates a user group named “samplegroup.”

• The sample Web application assigns all users to the sample group.

Creating a policy • During installation, the sample Web application creates a policy named “samplepolicy.”

• The sample Web application must use samplepolicy. Modify samplepolicy using the master user shell. For information about modifying policy settings using the master user shell, see the Entrust IdentityGuard Administration Guide.

Loading token data • Load all token data before attempting any token-related operations. For information about loading token data, see the Entrust IdentityGuard Administration Guide.

Loading preproduced card data

• Load all preproduced card data before attempting any card-related operations. For information about loading token data, see the Entrust IdentityGuard Administration Guide.

Locating the sample admin ID and password

• The sample Web application installs with an admin ID and password for the administrator. Use only the admin ID and password.

• Locate the admin ID and password in igsample.properties in <IDENTITYGUARD_INSTALL>\etc\ or <IG_INSTALL_DIR>\identityguard81\etc

Using passwords • The password field and user name field simulate the primary authentication mechanism of the sample bank’s Web site. The password field in the sample Web application is for demonstration purposes only and is nonfunctional.

Modifying authentication-type settings using the master user shell

• To complete the procedures in this appendix, you must modify the samplepolicy’s generic and machine authentication-type settings. For information about modifying policy settings using the master user shell, see the Entrust IdentityGuard Administration Guide.

Page 307: IG 81 Install Guide 3

307Using the sample Web applicationFeedback on guide

Accessing the sample Web applicationConfigure the sample Web application before accessing it. Refer to the following instructions to configure the sample Web application:

• for embedded Tomcat server on UNIX instructions, see “Configuring the sample application on UNIX” on page 51

• for embedded Tomcat server on Windows instructions, see “Configuring the sample application on Microsoft Windows” on page 87

• for existing application server instructions, see “Configuring the sample application on an existing application server” on page 121

Access the configured sample Web application from a Web browser.

To access the sample Web application from a URLEnter one of the following URLs:

https://<FQDN>:<httpsport>/IdentityGuardSampleApp

–or–

http://<FQDN>:<httpport>/IdentityGuardSampleApp

where:

• <FQDN> is the fully qualified domain name for the Entrust IdentityGuard host.

• <httpsport> is the sample application HTTPS port (default 8443, if using the embedded Tomcat server).

• <httpport> is the sample application HTTP port (default 8080, if using the embedded Tomcat server).

For example:

https://igserver.mycompany.com:8443/IdentityGuardSampleApp

http://igserver.mycompany.com:8080/IdentityGuardSampleApp

To access the sample Web application from the Windows start menuClick Start > All Programs > Entrust > IdentityGuard > Sample Application.

The sample Web application opens in your default browser. By default, the interface opens at the User registration Sign in page.

Page 308: IG 81 Install Guide 3

308 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Registering as a user

Note: The sample Web application’s policy, “samplepolicy,” installs with the default settings of GRID QA OTP TOKENRO for both the generic and machine authentication-types. The sample Web application uses only the first authentication-type setting listed for both the generic and machine authentication-types. A master user can modify the default settings in the master user shell. For example, to register a sample end user to authenticate using tokens, the master user must modify the policy setting for generic authentication-type to appear as: TOKENRO GRID QA OTP.

To access the Any Bank Web site, a sample end user must register an account with Entrust IdentityGuard. The end user must register contact information, a personal image, and a personal caption for use in future authentication challenges.

Assuming the role of a sample end user:

• register your account with Any Bank

• have a card or token issued to you

• optionally, configure question-and-answer authentication secrets.

To register as a sample user1 Select User registration from the main page of the interface.

The Sign in page appears.

Page 309: IG 81 Install Guide 3

309Using the sample Web applicationFeedback on guide

2 Enter a user name and password.

3 Click Continue.

The Entrust IdentityGuard user creation page appears displaying your user name.

4 Optionally, enter a valid email address and phone number.

Note: The administrator or application uses this information to deliver a one-time password (OTP) to the end user. In a real-life scenario, a valid email address must be entered if the policy setting for generic type is set to OTP and email is used to deliver the OTP.

5 Click Continue.

The Entrust IdentityGuard image selection page appears.

Page 310: IG 81 Install Guide 3

310 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

6 Click Continue to select an image.

Optionally, click here to choose another image from the Entrust IdentityGuard image library or to upload an image.

The Entrust IdentityGuard image caption page appears.

The previous two pages demonstrate two types of organization authentication: image and message replay authentication. For more information on image and message replay authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.

7 Enter a caption for the image. For example, “hammer.”

Entrust IdentityGuard displays your image and caption at login.

8 Optionally, click Change to select a different image or upload an image.

9 Click Continue.

• If the policy setting for the generic authorization-type is set to GRID, go to “To register with GRID as the policy setting”

• If the policy setting for the generic authorization-type is set to QA, go to “To register with QA as the policy setting”

• If the policy setting for the generic authorization-type is set to OTP, go to“To register with OTP as the policy setting”

• If the policy setting for the generic authorization-type is set to TOKENRO, go to “To register with TOKENRO as the policy setting”

Page 311: IG 81 Install Guide 3

311Using the sample Web applicationFeedback on guide

To register with GRID as the policy setting

Note: The following procedure has generic authentication-type set to GRID in the samplepolicy. The setting appears as: GRID QA OTP TOKENRO.

1 The Entrust IdentityGuard card creation page appears.

This page allows the end user to request a card. Entrust IdentityGuard provides two models for card production—produce-and-assign and preproduction cards. For more information about card and grid production models, see the Entrust IdentityGuard Deployment Guide.

2 Click Request a card to make Entrust IdentityGuard create the grid for a produced-and-assign card. You can view this grid using the Administration interface or the master user shell.

You must activate the card before using the card to authenticate to Entrust IdentityGuard. For more information about card activation, see “Activating a card” on page 315.

A page appears stating that your user account was successfully registered.

3 Click I already have a card if you possess a preproduced card.

You must activate the card before using the card to authenticate to Entrust IdentityGuard. For more information about card activation, see “Activating a card” on page 315.

A page appears stating that your user account was successfully registered.

To register with QA as the policy setting

Note: The following procedure has generic authentication-type set to question and answer in the samplepolicy. The setting appears as: QA OTP TOKENRO GRID.

Page 312: IG 81 Install Guide 3

312 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

1 The Entrust IdentityGuard Questions page appears.

The user can create authentication secrets from a list of predefined questions. The sample Web application installs with six predefined questions; however, Entrust IdentityGuard allows organizations to select a number of authentication secrets for each user and to prompt for all answers or a subset of the answers.

For more information about knowledge-based authentication and creating good questions, see the Entrust IdentityGuard Deployment Guide.

2 Select a different question from each drop-down list. For example, “What was the name of your high school?”

3 Enter an answer to each question.

4 Click Continue.

A page appears stating that your user account was successfully registered.

Page 313: IG 81 Install Guide 3

313Using the sample Web applicationFeedback on guide

To register with OTP as the policy setting

Note: The following procedure has generic authentication-type set to question and answer in the samplepolicy. The setting appears as: OTP TOKENRO GRID QA.

A page appears stating that your user account has been successfully registered.

OTP authentication-type does not require any additional user set up or activation.

To register with TOKENRO as the policy setting

Note: The following procedure has generic authentication-type set to token in the samplepolicy. The setting appears as: TOKENRO GRID QA OTP.

The Entrust IdentityGuard token registration page appears.

The user can proceed with token registration or defer token registration. You can configure the policy for the sample Web application to support token PINs or to not support token PINs.

Page 314: IG 81 Install Guide 3

314 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

• For more information on token registration without token PIN support enabled, see “To register a token” on page 317.

• For more information on token registration with token PIN support enabled, see “To register a token with token PIN support enabled” on page 319.

Page 315: IG 81 Install Guide 3

315Using the sample Web applicationFeedback on guide

Activating a cardA sample end user of the Any Bank Web site must activate a card before accessing a bank account. When a sample end user requests a card, it is assigned to the end user in a hold-pending state.

Do not use a card in the hold-pending state to authenticate to Entrust IdentityGuard. An administrator must activate a card by changing the state of the card to current or pending. The end user can then use the card to authenticate to Entrust IdentityGuard.

Assuming the role of a sample end user, use the sample Web application to activate your card and access your Any Bank account.

Note: If required, use the Administration interface or the master user shell to access the grid information for a card.

To activate a user card1 Select Card activation from the main menu of the interface.

The Sign in page appears.

2 Enter your user name and password.

3 Click Continue to begin the card activation process.

Page 316: IG 81 Install Guide 3

316 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

The Entrust IdentityGuard card activation page appears.

4 Enter the serial number of either your preproduced or produced-and-assign card.

Optionally, click Request a card to have a produced-and-assign card deployed to you. For more information, see “To register as a sample user” on page 308.

5 Click Activate.

Another Entrust IdentityGuard card activation page appears displaying the serial number.

6 Enter the specified grid coordinates.

Grid authentication is a second-factor authentication method that challenges the end user to enter a set of grid coordinates on a printed card. For more information on grid authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.

7 Click Continue.

A message appears stating that your card has been activated.

Page 317: IG 81 Install Guide 3

317Using the sample Web applicationFeedback on guide

Registering a token

Attention: Before you can register a token, load the token data and assign the token data to the group, “samplegroup.” For more information on loading token data, see “Preparing to use the sample Web application” on page 306.

Note: The following procedure has generic authentication-type set to token in the samplepolicy. The setting appears as TOKENRO GRID QA OTP.

A sample end user of the Any Bank Web site may log in using token authentication, a second-factor authentication method that challenges a sample end user to respond using a token-generated dynamic password.

Entrust IdentityGuard can be configured to issue challenges requiring end users to respond using a dynamic password or to respond using a token PIN in conjunction with a dynamic password.

For more information about configuring token authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.

Assuming the role of a sample end user, register a token for use in future authentication requests to Entrust IdentityGuard.

• For tokens that do not support token PINs, see “To register a token” on page 317.

• For tokens that support token PINs, see “To register a token with token PIN support enabled” on page 319.

To register a token1 Select Token registration from the main menu of the interface.

Page 318: IG 81 Install Guide 3

318 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

The Sign in page appears.

2 Enter your user name and password.

3 Click Continue to begin the token registration process.

The Entrust IdentityGuard token registration page appears.

4 Enter the token serial number.

5 Click Register.

A token is assigned to a sample end user in a hold-pending state.

Page 319: IG 81 Install Guide 3

319Using the sample Web applicationFeedback on guide

The Entrust IdentityGuard token registration page appears.

6 Enter the token-generated dynamic password as the response.

7 Click Continue.

A message appears stating that your token has been successfully registered.

To register a token with token PIN support enabledThe Entrust IdentityGuard token registration page appears.

1 Enter the token serial number.

2 Click Register.

A token is assigned to a sample end user in a hold-pending state.

Page 320: IG 81 Install Guide 3

320 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

The Entrust IdentityGuard token registration page appears.

3 Choose and confirm a token PIN between four and eight digits in length.

For example, your token PIN could be 1234. This token PIN is used in combination with a dynamic password for future authentication challenges.

4 Click Continue.

The Entrust IdentityGuard token registration page appears requesting the input of a token response.

5 Enter the token PIN and the token-generated dynamic password.

For example, if the token PIN value is 1234, and the token-generated string is 567890, enter 1234567890 as the authentication challenge response.

6 Click Continue.

A message appears stating that your token has been successfully registered.

Page 321: IG 81 Install Guide 3

321Using the sample Web applicationFeedback on guide

Using machine authentication to log in

Note: The following procedure has machine authentication-type set to token in the samplepolicy. The setting appears as: TOKENRO GRID QA OTP.

A sample end user of the Any Bank Web site may log in using machine authentication. However, you can also use machine authentication with the other authentication methods. This method of second-factor authentication associates a sample end user with a particular computer through the use of a machine secret.

For more information on machine authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.

Assuming the role of a sample end user, use the sample Web application to establish machine authentication using the machine secrets gathered during Entrust IdentityGuard machine registration. Once machine authentication is established, second-factor authentication becomes transparent to the end user.

To establish machine authentication1 Select User sign in from the main page of the interface.

2 Enter your user name.

3 Be sure to check Remember me on this machine.

This initiates machine authentication.

4 Click Continue.

Page 322: IG 81 Install Guide 3

322 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

The Entrust IdentityGuard Machine registration page appears displaying the serial number of your token.

This page demonstrates a type of machine authentication that uses a token password and token PIN as the default method of authentication. The end user must enter a token PIN and a dynamic password in response to the authentication challenge.

If the primary method of authentication was grid, this page would display a grid authentication challenge.

For more information on machine authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.

5 Enter the token PIN and the dynamic password.

For example, if the token PIN value is 1234, and the dynamic password is 567890, you must enter 1234567890 as the authentication challenge response.

6 Click Continue.

Page 323: IG 81 Install Guide 3

323Using the sample Web applicationFeedback on guide

The Entrust IdentityGuard Application authentication page appears displaying your image and caption.

This page demonstrates image and message replay authentication, a method of organization authentication.

For more information on image and message replay authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.

7 Enter your password.

8 Click Login.

Your sample bank account page appears. You have established machine authentication. Future log in attempts will not require you to authenticate to Entrust IdentityGuard.

To log in with established machine authentication1 From a new browser window, select User sign in from the main page of the

interface.

Page 324: IG 81 Install Guide 3

324 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

The Sign in page appears displaying your user name.

2 Be sure to check Remember me on this machine.

3 Click Continue.

The Entrust IdentityGuard Application authentication page appears.

The sample Web application checked that your machine is registered with the Entrust IdentityGuard server. No authentication challenge was issued because your machine was identified as a registered machine.

4 Enter your password.

5 Click Login.

Your sample bank account page appears. Once machine authentication is established, second-factor authentication is transparent to the end user associated with a particular computer.

Page 325: IG 81 Install Guide 3

325Using the sample Web applicationFeedback on guide

Using generic authentication to log in

Note: The following procedure has generic authentication-type set to question and answer in the samplepolicy. The setting appears as: QA OTP TOKENRO GRID.

A registered end user can log in to the Any Bank Web site using generic authentication. For more information on generic authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.

Assuming the role of a sample end user, use generic authentication to log in to your bank account.

To log in using generic authentication1 Select User sign in from the main page of the interface.

2 Enter your user name.

3 Be sure to disable Remember me on this machine.

Uncheck the box to initialize the generic authentication challenge and remove any machine secrets.

4 Click Continue.

Page 326: IG 81 Install Guide 3

326 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

The Entrust IdentityGuard second-factor authentication page appears.

Entrust IdentityGuard randomly selects a series of questions.

5 Enter your predefined answers.

6 Click Continue.

Your sample bank account page appears.

Page 327: IG 81 Install Guide 3

327Using the sample Web applicationFeedback on guide

Using step-up authentication

Note: This procedure uses one-time password authentication as the setting for generic authentication-type. The policy setting appears as: OTP TOKENRO GRID QA.

For situations requiring an additional level of security, Entrust IdentityGuard provides second-factor authentication of transactions initiated by an authenticated end user of the Any Bank Web site.

Assuming the role of a sample end user, use step-up authentication to transfer funds from your bank account to another bank account.

To use step-up authentication1 Follow the procedure “To log in with established machine authentication” to

access your sample bank account page.

2 Click Transfer funds.

Page 328: IG 81 Install Guide 3

328 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

The Entrust IdentityGuard second-factor authentication page appears.

3 Enter your one-time password.

Note: The one-time password can be viewed using the Administration interface.

4 Click Continue.

The Transfer Funds page appears.

5 Enter the amount to be transferred and the account numbers.

6 Click Transfer.

A page appears stating that the funds were transferred successfully.

Page 329: IG 81 Install Guide 3

329Using the sample Web applicationFeedback on guide

Using temporary PIN authentication to log in

Note: Temporary PINs are only available for grid or token authentication. The following procedure has generic authentication-type set to GRID in the samplepolicy. The setting appears as: GRID QA OTP TOKENRO.

In certain situations, a sample end user of the Any Bank Web site may not have a card or token. An administrator can issue a temporary PIN, either for a specific number of uses or a limited period of time. Examples of this situation include lost cards or tokens, or a newly registered end user awaiting arrival of a card or token.

For more information about temporary PINs, see the Entrust IdentityGuard Deployment Guide.

Assuming the role of a sample end user, use the sample Web application to access your Any Bank account using a temporary PIN.

As an administrator, use the Administration interface to issue a temporary PIN. Temporary PINs are issued with limits on the number of uses and expiry dates to limit exposure to attacks.

To use temporary PINs1 Select User sign in from the main page of the interface.

2 Enter your user name.

3 Be sure to disable Remember me on this machine.

Page 330: IG 81 Install Guide 3

330 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Uncheck the box to initialize the generic authentication challenge and remove any machine secrets.

4 Click Continue.

The Entrust IdentityGuard second-factor authentication page appears.

5 Use the Administration interface to issue yourself a temporary PIN.

6 Click Having problems or lost your Entrust IdentityGuard Card?

Another Entrust IdentityGuard second-factor authentication page appears.

7 Enter the temporary PIN issued to you by email or get the PIN from the Administration interface or the master user shell.

In this example, a sample end user can call a customer support number and have a temporary PIN issued to them. The telephone number on this second-factor authentication page is for demonstration purposes only.

Page 331: IG 81 Install Guide 3

331Using the sample Web applicationFeedback on guide

8 Click Continue.

Your sample bank account page appears.

Page 332: IG 81 Install Guide 3

332 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Using one-step grid authentication to log in

A sample end user of the Any Bank Web site may log in using one-step grid authentication. This authentication method presents first-factor and second-factor authentication challenges to the end user at the same time. For more information on one-step grid authentication, see the Entrust IdentityGuard Deployment Guide.

Assuming the role of a sample end user, use the sample Web application to log in using one-step grid authentication.

To log in using one-step grid authentication1 Select One-step grid login from the main menu of the interface.

The One-step grid authentication page appears.

2 Enter your user name, password, and the specified grid coordinates.

This step demonstrates grid authentication. For more information on grid authentication, see the Entrust IdentityGuard Administration Guide.

3 Click Login.

Your sample bank account page appears.

Page 333: IG 81 Install Guide 3

333Using the sample Web applicationFeedback on guide

Using two-step grid authentication to log in

A sample end user of the Any Bank Web site may log in using two-step grid authentication. This method of authentication presents first-factor and second-factor authentication challenges to the end user consecutively. The end user is authenticated and verified using the first-factor authentication method before being challenged with second-factor authentication.

For more information on two-step grid authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.

Assuming the role of a sample end user, use the sample Web application to log in using two-step grid authentication.

To log in using two-step grid authentication1 Select Two-step grid sign in from the main page of the interface.

The Sign in page appears.

2 Enter your user name and password.

3 Click Continue.

Page 334: IG 81 Install Guide 3

334 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

The Entrust IdentityGuard second-factor authentication page appears displaying the serial number on your card.

This page demonstrates a type of organization authentication called serial number replay authentication. For more information on serial number replay authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.

4 Enter the specified grid coordinates.

This step demonstrates grid authentication. For more information on grid authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide.

5 Click Continue.

Your sample bank account page appears.

Page 335: IG 81 Install Guide 3

335

Appendix D

Uninstalling Entrust IdentityGuard Server

This chapter provides instructions for uninstalling Entrust IdentityGuard Server from your system.

Topics in this section:

• “Uninstalling Entrust IdentityGuard Server with embedded Tomcat on UNIX” on page 336

• “Uninstalling Entrust IdentityGuard Server on Microsoft Windows” on page 337

• “Uninstalling Entrust IdentityGuard Server with an existing application server” on page 338

Page 336: IG 81 Install Guide 3

336 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Uninstalling Entrust IdentityGuard Server with embedded Tomcat on UNIX

Entrust IdentityGuard Server does not include an uninstall script. You will need to perform the following procedure to uninstall Entrust IdentityGuard.

Uninstalling the server also uninstalls the Radius proxy component, if configured.

To uninstall Entrust IdentityGuard on UNIX1 Stop the Entrust IdentityGuard service using the instructions in the topic

“Managing the Entrust IdentityGuard service” on page 62.

2 Optionally, as the application owner, back up the identityguard.properties file and the masterkeys.enc file (but not the masterkeys.kpf).

3 As root:

a In $IDENTITYGUARD_HOME/bin enter:

./igsvcconfig.sh igradius uninstall

b Still in $IDENTITYGUARD_HOME/bin enter:

./igsvcconfig.sh identityguard uninstall

4 Optionally, remove the Entrust IdentityGuard data from the repository.

• For a database, use the IG_81/sql/drop_v81_schema.sql file in the .tar install package (either IG_81_Linux.tar or the IG_81_Solaris.tar), to remove all Entrust IdentityGuard tables.

• For a directory, you will need to remove this data manually.

Page 337: IG 81 Install Guide 3

337Uninstalling Entrust IdentityGuard ServerFeedback on guide

Uninstalling Entrust IdentityGuard Server on Microsoft Windows

Complete the following procedure to uninstall the Entrust IdentityGuard Server on Microsoft Windows.

Uninstalling the server also uninstalls the Radius proxy component, if configured.

To uninstall Entrust IdentityGuard Server on Microsoft Windows1 Go to Add or Remove Programs located in your system’s Control Panel.

2 Select Entrust IdentityGuard Server 8.1 and click Remove.

3 Optionally, remove the Entrust IdentityGuard data from the repository on the repository server.

• For a database, use the IG_81/sql/drop_v81_schema.sql file in the .tar installation package to remove all Entrust IdentityGuard tables.

• For a directory, you will need to remove this data manually.

Note: During the Windows uninstall process, Entrust IdentityGuard attempts to create a backup of your Entrust IdentityGuard configuration. If successful, it displays a message listing the location of the backup file. Click OK to continue the uninstall. This occurs only if Entrust IdentityGuard was correctly configured and initialized.

Page 338: IG 81 Install Guide 3

338 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Uninstalling Entrust IdentityGuard Server with an existing application server

Entrust IdentityGuard Server does not include an uninstall script. You will need to perform the following procedure to uninstall Entrust IdentityGuard.

Uninstalling the server also uninstalls the Radius proxy component, if configured.

Topics in this section:

• “Uninstalling Entrust IdentityGuard on WebLogic 8.1” on page 338

• “Uninstalling Entrust IdentityGuard on WebLogic 9.1” on page 340

• “Uninstalling Entrust IdentityGuard on WebSphere 6.0” on page 342

Uninstalling Entrust IdentityGuard on WebLogic 8.1To uninstall Entrust IdentityGuard on WebLogic 8.1 you must:

• Stop the Entrust IdentityGuard services.

• Delete the Entrust IdentityGuard services.

• Delete the Entrust IdentityGuard files.

To uninstall Entrust IdentityGuard on WebLogic 8.11 Stop the Entrust IdentityGuard services (see “Stopping Entrust IdentityGuard

Services on WebLogic 8.1” on page 167).

2 Delete the Entrust IdentityGuard services:

a From the WebLogic 8.1 main page, select Deployments > Web Application Modules.

The Deploy a Web Application Module page appears showing a list of all deployed Web applications.

Page 339: IG 81 Install Guide 3

339Uninstalling Entrust IdentityGuard ServerFeedback on guide

b Click the trash can to the right of the Entrust IdentityGuard service.

A warning page appears prompting you to confirm that you want to delete the Entrust IdentityGuard service.

c Click Yes.

A message appears confirming that the Entrust IdentityGuard service has been deleted.

d Click Continue.

You are returned to the page listing deployed applications.

e Repeat Step b to Step d to delete the remaining Entrust IdentityGuard services.

Page 340: IG 81 Install Guide 3

340 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

3 Optionally, as the application owner, back up the identityguard.properties file and the masterkeys.enc file (but not the masterkeys.kpf).

4 As root:

a in $IDENTITYGUARD_HOME/bin enter:

./igsvcconfig.sh igradius uninstall

b Delete the installation directory (by default /opt/entrust) by entering:

rm -f -r /opt/entrust

5 Optionally, remove the Entrust IdentityGuard data from the repository.

• For a database, use the IG_81/sql/drop_v81_schema.sql file in the .tar installation package to remove all Entrust IdentityGuard tables.

• For a directory, you will need to remove this data manually.

Uninstalling Entrust IdentityGuard on WebLogic 9.1To uninstall Entrust IdentityGuard on WebLogic 9.1 you must:

• Stop the Entrust IdentityGuard services.

• Delete the Entrust IdentityGuard services.

• Delete the Entrust IdentityGuard files.

To uninstall Entrust IdentityGuard on WebLogic 9.11 Stop the Entrust IdentityGuard services (see “Stopping Entrust IdentityGuard

Services on WebLogic 9.1” on page 168).

2 Delete the Entrust IdentityGuard services:

a Under Change Center on the WebLogic main page click Lock & Edit.

b Under Domain Structure on the left of the main page click Deployments.

The Deployment Summary Page appears with a list of Entrust IdentityGuard services.

Page 341: IG 81 Install Guide 3

341Uninstalling Entrust IdentityGuard ServerFeedback on guide

c Select the check box for the Entrust IdentityGuard Services.

d Click Delete.

The Delete Application Assistant page appears.

e Click Yes to delete the application(s).

You are returned to the Summary of Deployments page.

f Under Change Center on the WebLogic main page click Activate Changes.

Page 342: IG 81 Install Guide 3

342 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

3 Optionally, as the application owner, back up the identityguard.properties file and the masterkeys.enc file (but not the masterkeys.kpf).

4 As root:

a In $IDENTITYGUARD_HOME/bin enter:

./igsvcconfig.sh igradius uninstall

b Delete the installation directory (by default /opt/entrust) by entering:

rm -f -r /opt/entrust

5 Optionally, remove the Entrust IdentityGuard data from the repository.

• For a database, use the IG_81/sql/drop_v81_schema.sql file in the .tar installation package to remove all Entrust IdentityGuard tables.

• For a directory, you will need to remove this data manually.

Uninstalling Entrust IdentityGuard on WebSphere 6.0To uninstall Entrust IdentityGuard on WebLogic 8.1 you must:

• Stop the Entrust IdentityGuard services

• Delete the Entrust IdentityGuard services

• Delete the Entrust IdentityGuard files

To uninstall Entrust IdentityGuard on WebSphere 6.01 Stop the Entrust IdentityGuard services (see “Stopping Entrust IdentityGuard

Services on WebSphere 6.0” on page 169).

2 Delete the Entrust IdentityGuard services:

a From the WebSphere main menu click Applications > Enterprise Applications.

The Enterprise Applications page appears.

Page 343: IG 81 Install Guide 3

343Uninstalling Entrust IdentityGuard ServerFeedback on guide

b Select the service(s) to uninstall and then click Uninstall.

The Uninstall Application page appears.

c Click OK.

A message appears indicating that changes have been made to your local configuration.

d Click Save to accept the changes.

The Enterprise Applications Save page appears.

Page 344: IG 81 Install Guide 3

344 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

e Click Save.

The Entrust IdentityGuard services are uninstalled.

3 Optionally, as the application owner, back up the identityguard.properties file and the masterkeys.enc file (but not the masterkeys.kpf).

4 As root:

a In $IDENTITYGUARD_HOME/bin enter:

./igsvcconfig.sh igradius uninstall

b Delete the installation directory (by default /opt/entrust) by entering:

rm -f -r /opt/entrust

5 Optionally, remove the Entrust IdentityGuard data from the repository.

• For a database, use the IG_81/sql/drop_v81_schema.sql file in the .tar installation package to remove all Entrust IdentityGuard tables.

• For a directory, you will need to remove this data manually.

Page 345: IG 81 Install Guide 3

345

Glossary

active card or token The card or token that the end user is presently using for authentication.

Administration API The Java Platform or C# API that applications can use to integrate with the Administration service.

Administration interface The Web interface used by administrators to manage end users (see end user).

Administration service The Entrust IdentityGuard Web service responsible for managing administrators, users, cards, tokens, PINs, and so on.

Administration WSDL The WSDL definition for the Administration service.

administrator The Entrust IdentityGuard user who manages the day-to-day activity of end users using the Administration service (see end user).

administrator password attributes The policy attributes that determine the password rules for an administrator. For example, the password length, expiry date, and so on.

alias An additional unique name for an end user.

See also user name.

all grouplist A predefined grouplist that allows an administrator to manage every Entrust IdentityGuard group.

anonymous authentication See one-step authentication.

auditor role A predefined role that has read access to operations available through the Administration service.

authentication The process of proving your identity, and/or determining the validity of a set of credentials presented to the system.

Authentication API The Java Platform or C# API that applications can use to integrate with the Authentication service.

Page 346: IG 81 Install Guide 3

346 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

authentication secret The secrets shared between the organization and the user when organization authentication is configured.

Authentication service The Entrust IdentityGuard Web service used for retrieving challenge requests and authenticating user responses.

Also see Authentication API.

Authentication WSDL The WSDL definition for the Authentication service.

Canceled state The state associated with a card or token that a user can no longer use to authenticate.

card A physical grid that is printed and distributed to users.

cardspec attributes See card specification attributes.

card specification attributes The policy attributes that determine the characteristics of a grid for grid authentication. For example, the characters to use in a grid, its expiry based on duration or use, the number of rows and columns, and so on.

cell A row and column coordinate in a grid.

challenge generation algorithm An algorithm used to produce the challenge when using grid authentication. Entrust IdentityGuard has two challenge generation algorithms:

• least-used cell challenge generation algorithm

• random challenge generation algorithm

client application Any application that uses the Authentication API and/or the Administration API to access Entrust IdentityGuard’s administration and multifactor authentication capabilities on behalf of the end user.

client authentication The authentication process whereby users prove their identity to an application, using, for example, Entrust IdentityGuard Server.

Consumer deployment An Entrust IdentityGuard deployment where the end users are external to the organization (for example, they are customers or partners), and are authenticating to a Web-based application.

credentials A set of data (for example, a user name and password, grid, or dynamic password) that defines a user to the system.

Current state The state associated with a card or token that is currently in use.

default role A predefined role that has access to most operations available through the Administration service.

Page 347: IG 81 Install Guide 3

347GlossaryFeedback on guide

dynamic password The random number displayed by a token that changes automatically at regular intervals.

end user A user who authenticates to Entrust IdentityGuard using one of the available multifactor authentication methods.

Enterprise deployment A deployment of Entrust IdentityGuard where the end users are internal to the organization (for example, employees) and are authenticating to internal services.

Entrust IdentityGuard Server An Entrust product that provides multifactor authentication to increase the security of an online identity.

Entrust IdentityGuard Desktop for Microsoft Windows

An Entrust IdentityGuard client that adds second-factor authentication capabilities to the first-factor authentication performed by Microsoft Windows Winlogin and the RAS/IAS servers.

See also Entrust IdentityGuard Remote Access Plug-in for Microsoft Windows Servers.

Entrust IdentityGuard Radius proxy An Entrust IdentityGuard client that adds second-factor authentication capabilities to the first-factor authentication performed by a Radius server or using external authentication.

Entrust IdentityGuard Remote Access Plug-in for Microsoft Windows Servers

An Entrust IdentityGuard client that installs on the RAS and IAS servers to enable Entrust IdentityGuard second-factor authentication for remote Microsoft Windows users.

external authentication The first-factor authentication provided by Entrust IdentityGuard in a deployment where remote users connect through VPN and no external Radius server exists.

file-based repository A file containing preproduced cards or unassigned token information that is located on the primary Entrust IdentityGuard Server. Used only when your repository is an LDAP Directory.

first-factor authentication The first authentication challenge presented to the user. Usually user name and password authentication.

first-factor authentication application

The application which performs first-factor authentication and to which Entrust IdentityGuard is added as the second factor of authentication.

grid An assortment or table of characters listed in row and column format.

See also card.

Page 348: IG 81 Install Guide 3

348 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

grid authentication A second-factor authentication method that challenges a user for a set of grid coordinates or cells.

grid location replay authentication A type of organization authentication used with grid authentication that requires the organization to display the contents of certain coordinates in the grid once the user has authenticated.

group A means to organize end users, administrators, tokens, and cards to delegate administrative tasks and assign policy behavior (such as allowed authentication methods).

grouplist The set of user groups (see group) that an administrator can manage. A master user creates grouplists.

See all grouplist and own grouplist.

Hold state The state associated with an active card or token that an administrator has suspended (because, for example, the user lost the card). While in Hold, a user cannot use the card or token to authenticate.

See also Current state.

Hold_pending state The state associated with a card or token that an administrator has not yet activated. Unlike the Pending state, the end user cannot activate the card and use it for authentication.

identityguard.properties file The Java properties file containing all the configuration settings for a particular Entrust IdentityGuard Server.

image replay authentication See message or image replay authentication.

initialization A one-time process completed while setting up Entrust IdentityGuard that provides the system with the license keys and creates the master users, and the master key.

If repeated, re-initialization replaces the master key, overwrites policy data already stored in the repository, and renders existing user, preproduced card and unassigned token information unusable.

See master key.

knowledge-based authentication A second-factor authentication method that challenges a user for correct responses to a series of questions.

layered authentication An authentication process in which additional authentication challenges are presented for particular transactions that require stronger authentication than the user presently has.

Page 349: IG 81 Install Guide 3

349GlossaryFeedback on guide

least-used cell challenge generation algorithm

A challenge generation algorithm that uses a configured number of least-used coordinates (cells) when creating the challenge.

machine authentication An authentication process in which a user is associated with a particular computer through the use of a machine secret. After association, second-factor authentication is transparent for the user on that computer.

machine authentication type list A list of machine authentication methods assigned to a user, based on their policy.

machine secret One or more nonces and optional application-provided data that uniquely identify a particular computer.

master key The key that Entrust IdentityGuard uses to encrypt information stored in the repository.

master key protection file The file containing the obfuscation key used to access the master key.

master user The Entrust IdentityGuard user that configures how Entrust IdentityGuard will work in your system.

Entrust IdentityGuard has three master users.

See master user shell.

master user shell A command-line interface used by master users to configure Entrust IdentityGuard.

See master user.

message or image replay authentication

A type of organization authentication in which the organization displays a predefined message or image either before or after the user has authenticated.

multifactor authentication An authentication process in which two or more authentication methods are used consecutively to verify a user and often an organization.

mutual authentication An authentication process in which both the user and the organization verify themselves as legitimate.

See also organization authentication and user authentication.

nonce A random value generated for security purposes.

Page 350: IG 81 Install Guide 3

350 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

one-step authentication An authentication process in which first-factor and second-factor authentication challenges are presented to the end user at the same time. Also referred to as “anonymous authentication” as the system does not know the identity of the user.

Available only when using grid authentication.

See also two-step authentication.

one-time password A set of characters provided to a user out-of-band that can only be used once for authentication.

See also out-of-band authentication.

organization authentication An authentication process in which the organization verifies itself as authentic to the end user. Entrust IdentityGuard supports the following types:

• grid location replay authentication

• message or image replay authentication

• serial number replay authentication

OTP See one-time password.

out-of-band authentication A second-factor authentication method that challenges a user for a one-time password that is sent (for example) to their mobile phone when the challenge occurs.

own grouplist A predefined grouplist that allows an administrator to manage only the group to which they belong. It is the default grouplist.

passcode list A list of one-time transaction numbers (TANs) that are distributed to end users (sometimes on a physical card) and used with passcode list authentication.

passcode list authentication A second-factor authentication method that challenges a user for a passcode that matches a particular number in their passcode list. It is similar to grid authentication.

password attributes See administrator password attributes.

Pending state The state associated with a card or token that a user or administrator has not yet activated. Should an end user user a card or token in this state, it automatically changes to the Current state.

pinspec attributes See temporary PIN attributes.

Page 351: IG 81 Install Guide 3

351GlossaryFeedback on guide

policy A set of attributes that determines the characteristics for each member in a group. A policy is divided into four subsets:

• administrator password attributes

• user specification attributes

• card specification attributes

• temporary PIN attributes

preproduction model A method of creating cards in which they are created anonymously and assigned to users at a later date.

See also produce-and-assign model.

primary Entrust IdentityGuard Server

In a replicated system, this is the Entrust IdentityGuard Server on which the file-based repository is stored.

Therefore, it usually also is the Entrust IdentityGuard Server hosting the Administration service to which all instances of the Administration interface connect.

produce-and-assign model A method of creating cards in which a card is created and assigned to a user in one-step.

Also see preproduction model.

question and answer authentication See knowledge-based authentication.

Radius See Remote Authentication Dial-In User Service (Radius).

Radius proxy See Entrust IdentityGuard Radius proxy.

random challenge generation algorithm

A challenge generation algorithm that picks coordinates in a grid randomly when creating a challenge.

registration The process of adding new users to Entrust IdentityGuard by obtaining their information and setting required attributes such as group association and authentication method.

Remote Authentication Dial-In User Service (Radius)

Remote Authentication Dial-In User Service. An industry standard authentication protocol used to authenticate users with Radius clients.

A Radius client passes information about a user to a designated Radius server and then acts on the response that the Radius server returns. Transactions between the Radius client and the Radius server are authenticated through a server secret, which is never sent over the network.

Page 352: IG 81 Install Guide 3

352 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

repository The Entrust IdentityGuard information associated with users and administrators stored in a database or directory. A repository contains information such as:

• group association

• available authentication methods

• user name and aliases

• authentication information such as grids, token data, questions and answers, temporary PINs, one-time passwords, and so on

• preproduced cards and unassigned token data

replica Entrust IdentityGuard Server In a system with more than one Entrust IdentityGuard Server, any Entrust IdentityGuard Server that does not function as the primary Entrust IdentityGuard Server.

Replicas are usually identical to each other.

role Defines, for administrators (see administrator), what operations they can perform using the Administration service.

A master user creates roles. Entrust IdentityGuard installs with three roles:

• auditor role

• default role

• superuser role

sample application The client Web application installed with the Entrust IdentityGuard Server that demonstrates the various capabilities and authentication methods of Entrust IdentityGuard.

second-factor authentication The second authentication method in a system that uses two independent mechanisms of authentication. It ensures strong authenticity. See strong authentication.

serial number replay authentication A type of organization authentication used with grid authentication that requires the organization to display the card’s unique serial number to the user.

shared secret A name and value pair associated with an end user and used by a client application only (not Entrust IdentityGuard).

Page 353: IG 81 Install Guide 3

353GlossaryFeedback on guide

Simple Object Access Protocol (SOAP)

Simple Object Access Protocol. An XML protocol that governs the exchange of information in a distributed environment. SOAP provides a way for programs running in two different operating systems (such as Windows 2000 and Solaris) or written in different programming languages (such as Java Platform and C#) to exchange information, using HTTP and XML. Refer to http://www.w3.org/2000/xp/Group/.

single-factor authentication An authentication system in which the user is verified using only one authentication method (usually a user name and password).

See also second-factor authentication.

single-stage authentication See one-step authentication.

SOAP See Simple Object Access Protocol (SOAP).

state The lifecycle status that determines what a user can do with a card or token. Entrust IdentityGuard cards and tokens support the following states:

• Pending state

• Hold_pending state

• Current state

• Hold state

• Canceled state

static token PIN A numeric value that associates a user with their token. When a user receives a token challenge, they must prefix their response with the static token PIN, thereby enhancing the strength of the authentication.

Do not confuse with temporary PIN or dynamic password.

strong authentication A form of client authentication in which users prove their identity by logging in with credentials other than just user name and password (for example, a grid or token).

super shell See master user shell.

superuser role A predefined role that has access to all operations available through the Administration service.

supersh See master user shell.

TAN Transaction number. See passcode list authentication.

Page 354: IG 81 Install Guide 3

354 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

temporary PIN A character string assigned to a user for a brief period of time or usage duration to substitute for a temporarily unavailable card or token.

temporary PIN attributes The policy attributes that determine the characteristics of the temporary PIN. For example, the number of characters in the PIN, its expiry date, and so on.

token A battery-operated hardware device that provides a user with a dynamic password that changes periodically (for example, every minute).

token authentication A second-factor authentication method that challenges a user for a token-generated string. The response can include a static token PIN.

token PIN See static token PIN.

two-step authentication An authentication process in which first-factor and second-factor authentication challenges are presented to the end user consecutively. The end user is authenticated and verified using the first-factor authentication method before being challenged with second-factor authentication.

See also one-step authentication.

two-stage authentication. See two-step authentication.

user authentication An authentication process in which the end user is verified as authentic by the organization. Entrust IdentityGuard supports the following types:

• grid authentication

• token authentication

• knowledge-based authentication

• passcode list authentication

• out-of-band authentication

user name The name of the Entrust IdentityGuard user in their first-factor authentication system.

A user name must be unique within its group.

userspec attributes See user specification attributes.

user ID The globally unique name of an end user or administrator. It includes both the Entrust IdentityGuard group name and the user name of the user in the first-factor authentication system, written as group/username.

Page 355: IG 81 Install Guide 3

355GlossaryFeedback on guide

user specification attributes The policy attributes that determine the rules for an end user’s interaction with Entrust IdentityGuard. For example, the number of aliases a user can have, their authentication methods, and so on.

Web service A program that runs within an application server that communicates to other requesting components, often using the Simple Object Access Protocol (SOAP). Web services have two advantages:

• The SOAP protocol provides a standard way for the Web service and its clients to encode and decode (or "parse") the program data so that programmers don't have to write their own. The standard also means that programs written by different companies can communicate with the Web service.

• SOAP envelopes are typically sent within HTTP requests so you do not have to open additional ports in your firewall for clients to communicate with the Web service.

Entrust IdentityGuard has two Web services: Administration service and Authentication service.

WSDL Web Services Definition Language. An XML format for describing network services as a set of endpoints operating on messages. WSDL service definitions provide the technical details for describing a Web service that would be required for someone to actually invoke the service (for example, input parameters, output format, and so on).

Page 356: IG 81 Install Guide 3

356 IdentityGuard 8.1 Installation Guide Document issue: 3.0Feedback on guide

Page 357: IG 81 Install Guide 3

357

Index

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z- -.wsdl files 259

Aactive card

definition 345active token

definition 345Administration API

definition 345Administration interface

definition 345Administration service

definition 345Administration WSDL

definition 345administrator

definition 345administrator password attributes

definition 345algorithms 97, 99, 101alias

definition 345all grouplist

definition 345anonymous authentication. See one-step authenticationaudit integrity check 281auditor role

definition 345authentication

definition 345domain controller 172LDAP directory 172Radius 172strong

definition 353Authentication API

definition 345authentication secret

definition 346Authentication service

definition 346

Authentication WSDLdefinition 346

Bbackup

UNIX 211, 247Windows 213

backupsbackup strategy 244of LDAP Directory and database 225, 247restoring file-based card preproduction repository 253restoring IdentityGuard 250

Ccached challenges 270Canceled state

definition 346card

definition 346card preproduction

configuring 220database 224disk files 221

card specification attributesdefinition 346

cardspec. See card specification attributescell

definition 346certificate

exporting 238importing the SSL certificate 233updating 238

challenge cache 271challenge generation algorithm

definition 346client application

definition 346client authentication

definition 346

Index

Page 358: IG 81 Install Guide 3

358 IdentityGuard 8.1 Installation Guide Document issue: 3.0

B C D E F G H I J K L M N O P Q R S T U V W X Y Z- -A

commandssupersh 53, 56, 123, 126, 251, 254version 54, 124

configuration during installIdentityGuard 36, 109

Consumer deploymentdefinition 346

credentialsdefinition 346

cryptographypolicy files 96, 98, 100, 101

Current state

definition 346Customer support 16

Ddefault role

definition 346deployment, Consumer

definition 346deployment, Enterprise

definition 347dynamic password

definition 347

Eend user

definition 347Enterprise deployment

definition 347Entrust IdentityGuard Desktop for Microsoft Windows

definition 347Entrust IdentityGuard Radius proxy

definition 347Entrust IdentityGuard Remote Access Plug-in for Microsoft

Windows Serversdefinition 347

Entrust IdentityGuard Serverdefinition 347

external authentication 202definition 347groups 209

Ffailover

Radius 195repository 218

file-based preproduction card repositoryrestoring 253

file-based repositorydefinition 347

first-factor authenticationdefinition 347

first-factor authentication applicationdefinition 347

GGetting help

Technical Support 16grid

definition 347grid authentication

definition 348grid location replay authentication

definition 348group

definition 348grouplist

definition 348own

definition 350groups

external authentication 178, 209

HHold state

definition 348Hold_pending state

definition 348

IIdentityGuard

configuration during install 36, 109configuring to use cached challenges 270disabling 64, 65enabling 64, 65failed initialization 47, 118

Page 359: IG 81 Install Guide 3

359Index

B C D E F G H I J K L M N O P Q R S T U V W X Y Z- -A

initializing 47, 83, 118installing 33installing a replica server 210querying status 63, 64restarting 63, 64sample application 51starting 63, 64starting automatically 63, 166stopping 63, 64testing 58, 162uninstalling 336, 338upgrading 299WebLogic 8.1

installing 106WebLogic 9.1

installing 106WebSphere 6.0

installing 106identityguard.properties

audit.integrity 281externalauth 293externalauth.kerberos 294igradius.challengestring 284igradius.msglog 289igradius.port 283igradius.radius 290igradius.skipauth 289igradius.tokenchallengestring 286

tokenrequirespinupdate 288igradius.url 282igradius.vpn 290igradius.vpn.useradius 293jdbc.blobAccess 268jdbc.connectionpool 267jdbc.connectionpool.max 267jdbc.connectionpool.minIdleClose Time 267jdbc.driverClass 268jdbc.logintimeout 267jdbc.needsEscape 268jdbc.password 268jdbc.querytimeout 267jdbc.schema 268jdbc.selectLock 269jdbc.timestampDataType 268jdbc.url 268jdbc.user 268ldap.addAdminObjectClass 262ldap.addPolicyObjectClass 263

ldap.addUserObjectClass 262ldap.connectionpool.max 265ldap.connecttimeout 262ldap.credentials 261ldap.GeneralizedTime 266ldap.policyentry 262ldap.principal 261ldap.searchbase 264ldap.searchtimeout 265ldap.sizelimit 265ldap.sslEnabled 262ldap.url 261ldap.useridattribute 262log.maxstacksize 273refreshinterval 273supersh.adminlist 279supersh.preproducedcardlist 279supersh.tokenlist 280supersh.usercardlist 278supersh.userlist 278tokenRepository 221, 223webadmin

bulk 296export 297

identityguard.properties fileauthentication success audit 258caching policies 272changing log configuration 273changing log locations 277column width formatting 278configuring 255configuring to use cached challenges 270definition 348enabling cached challenges 270encrypted properties 257JDBC properties 267LDAP properties 261license audit 281properties for card preproduction 224search bases 260

identityguard.sh 52, 63, 64igkrb5.conf file 204image replay authentication

definition 348, 349initialization

definition 348initializing IdentityGuard 47, 83, 118

reasons for failure 47, 118

Page 360: IG 81 Install Guide 3

360 IdentityGuard 8.1 Installation Guide Document issue: 3.0

B C D E F G H I J K L M N O P Q R S T U V W X Y Z- -A

installing IdentityGuard 33, 106

JJava Development Kit 96, 98, 100

Kkeytool 235

documentation 235knowledge-based authentication

definition 348

Llayered authentication

definition 348least-used cell challenge generation algorithm

definition 349license audit 281

replica servers 281loadbalancing 210log locations

changing 277log4j properties 273logging

configuring 45, 116, 273to Syslog 45, 116, 277

Mmachine authentication

definition 349machine authentication type list

definition 349machine secret

definition 349master key

definition 349master key protection file

definition 349master user

definition 349master user shell 49, 119

configuring formatting 278definition 349

message replay authentication

definition 349multifactor authentication

definition 349mutual authentication 349

Nnative libraries 128, 134nonce

definition 349

Oone-step authentication

definition 350one-time password

definition 350organization authentication 350OTP. See one-time passwordout-of-band authentication

definition 350own grouplist

definition 350

Ppasscode list

definition 350passcode list authentication

definition 350password attributes. See administrator password attributesPending state

definition 350pinspec attributes. See temporary PIN attributespolicy

definition 351preproduction model

definition 351primary Entrust IdentityGuard Server

definition 351produce-and-assign model

definition 351Professional Services 17properties file

authentication success audit 258changing log configuration 273changing log location 277column width formatting 278

Page 361: IG 81 Install Guide 3

361Index

B C D E F G H I J K L M N O P Q R S T U V W X Y Z- -A

configuring to use cached challenges 270enabling cached challenges 270encrypted properties 257JDBC properties 267LDAP properties 261license audit 281

Qquestion and answer authentication. See knowledge-based

authentication

RRadius

definition 351Radius Proxy

automatic restart 35, 107Radius proxy 171

architecture 173configuring overview 172external 187overview 172with domain controller 187with LDAP server 187with Radius server 180

Radius proxy. See Entrust IdentityGuard Radius proxyrandom challenge generation algorithm

definition 351registration

definition 351replica

definition 352replica server

configuring 210initializing 210installing 210new SSL certificate 210

repositorydefinition 352preparing 22

restoring IdentityGuard from backup 250role

definition 352

Ssample application

configuring 51definition 352disabling 52

sample Web applicationenabling 52

second-factory authenticationdefinition 352

serial numberreconfiguring 254

serial number replay authenticationdefinition 352

shared secretdefinition 352

single-factor authenticationdefinition 353

single-page authentication. See one-step authenticationSOAP

definition 353SSL

creating a self-signed certificate 235exporting a certificate 238importing the SSL certificate 233ports 228securing the LDAP repository, after installation 233

stateCurrent

definition 346definition 353hold

definition 348Hold_pending

definition 348Pending

definition 350static token PIN

definition 353strong authentication

definition 353super shell. See master user shellsupersh. See master user shellsuperuser role

definition 353Syslog

configuring 226logging to 45, 116, 277

Page 362: IG 81 Install Guide 3

362 IdentityGuard 8.1 Installation Guide Document issue: 3.0

B C D E F G H I J K L M N O P Q R S T U V W X Y Z- -A

TTAN. See passcode list authenticationTechnical Integration Guides 22Technical Support 16temporary PIN

definition 354temporary PIN attributes

definition 354testing IdentityGuard 58, 162token

definition 354token authentication

definition 354token PIN. See static PINtokens

Entrust 30two-stage authentication. See two-step authenticationtwo-step authentication

definition 354typographic conventions 13

Uuninstalling IdentityGuard 336, 338UNIX group and user

creating 32UNIX service command

starting and stopping IdentityGuard 63upgrading

IdentityGuard 7.2 to 8.1 299user authentication

definition 354user ID

definition 354user name

definition 354user specification attributes

definition 355user, end

definition 347userspec attributes. See user specification attributes

Vversion command 54, 124VPN server

configure 193

WWeb service

definition 355WebLogic 8.1 96

configuring SSL 97deploying IdentityGuard services 128preparing for installation 96

WebLogic 9.1 98configuring SSL 98deploying IdentityGuard services 134preparing for installation 98

WebSphere 6.0 100configuring SSL 101deploying IdentityGuard services 142preparing for installation 100shared library settings 142

WSDLdefinition 355

Page 363: IG 81 Install Guide 3

363 IdentityGuard 8.1 Installation Guide Document issue: 3.0

B C D E F G H I J K L M N O P Q R S T U V W X Y Z- -A

Page 364: IG 81 Install Guide 3

364 IdentityGuard 8.1 Installation Guide Document issue: 3.0

B C D E F G H I J K L M N O P Q R S T U V W X Y Z- -A