Installing Entrust IdentityGuard Server
Transcription
Installing Entrust IdentityGuard Server
Entrust® Entrust IdentityGuard 8.1 Installation Guide Document issue: 3.0 Date of Issue: April 2007 Copyright © 2007 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of Entrust, Inc. in certain countries. All Entrust product names and logos are trademarks or registered trademarks of Entrust, Inc. in certain countries. All other company and product names and logos are trademarks or registered trademarks of their respective owners in certain countries. This information is subject to change as Entrust reserves the right to, without notice, make changes to its products as progress in engineering or manufacturing methods or circumstances may warrant. Export and/or import of cryptographic products may be restricted by various regulations in various countries. Export and/or import permits may be required. 2 Entrust IdentityGuard 8.1 Installation Guide Table of contents About this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Revision information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Documentation conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Note and Attention text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Related documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Obtaining documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Documentation feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Obtaining technical assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Technical support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Telephone numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Email address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Professional Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 CHAPTER 1 Preparing for installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Preinstallation overview Preinstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Downloading Entrust IdentityGuard software Preparing your repository Preparing your VPN network Installation worksheet . . . . . . . . . . . . . . . . . . . . . . . . . 21 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Installing the token support patch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Reconfiguring for third-party tokens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 CHAPTER 2 Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX . 31 Creating the UNIX group and user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Installing Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Linux Red Hat Enterprise 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Table of contents 3 Configuring the primary Entrust IdentityGuard Server Starting the Entrust IdentityGuard configuration . . . . . . . . . . . . . . . . . . . . . . . 36 . . . . . . . . . . . . . . . . . . . . . . . 36 Adding Directory information to Entrust IdentityGuard . . . . . . . . . . . . . . . . . . 37 Adding Database information to Entrust IdentityGuard . . . . . . . . . . . . . . . . . . 42 Completing the Entrust IdentityGuard configuration Initializing the primary Entrust IdentityGuard Server What initialization does If initialization fails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Initializing the primary server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Configuring the sample application on UNIX Running the scripts manually Testing your installation . . . . . . . . . . . . . . . . . . . . 43 . . . . . . . . . . . . . . . . . . . . . . . . 47 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Managing the Entrust IdentityGuard service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Starting and stopping Entrust IdentityGuard . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Starting and stopping Entrust IdentityGuard with the UNIX service command Enabling and disabling individual Entrust IdentityGuard services . 63 . . . . . . . . . . . . 64 CHAPTER 3 Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67 Installing Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Configuring the primary Entrust IdentityGuard Server Using the Configuration Panel . . . . . . . . . . . . . . . . . . . . . . . 70 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Starting the Entrust IdentityGuard Configuration wizard Selecting your repository settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Selecting Entrust IdentityGuard service ports Selecting your system host name . . . . . . . . . . . . . . . . . . . . . . . . . . 79 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Completing Entrust IdentityGuard configuration Initializing the primary Entrust IdentityGuard Server What initialization does If initialization fails . . . . . . . . . . . . . . . . . . . . . . . 82 . . . . . . . . . . . . . . . . . . . . . . . . 83 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Running the Entrust IdentityGuard Initialization wizard . . . . . . . . . . . . . . . . . . 84 Configuring the sample application on Microsoft Windows . . . . . . . . . . . . . . . . . . 87 Testing your installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Installation troubleshooting 4 . . . . . . . . . . . . . . . . . 70 IdentityGuard 8.1 Installation Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Document issue: 3.0 Managing the Entrust IdentityGuard service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 CHAPTER 4 Installing Entrust IdentityGuard Server with an existing application server . . 95 Preparing WebLogic for installation of IdentityGuard Preparing WebLogic 8.1 for installation . . . . . . . . . . . . . . . . . . . . . . . 96 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Configuring SSL for WebLogic 8.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Configuring SSL for WebLogic 9.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Preparing WebSphere for installation of Entrust IdentityGuard Configuring SSL for WebSphere 6.0 Installing Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Configuring the primary Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . 109 Starting the Entrust IdentityGuard configuration . . . . . . . . . . . . . . . . . . . . . . 109 Adding Directory information to Entrust IdentityGuard Completing the Entrust IdentityGuard configuration Initializing the primary Entrust IdentityGuard Server What initialization does If initialization fails . . . . . . . . . . . . . . . 100 . . . . . . . . . . . . . . . . . 110 . . . . . . . . . . . . . . . . . . . 115 . . . . . . . . . . . . . . . . . . . . . . . 118 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Initializing the primary server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Configuring the sample application on an existing application server Running the scripts manually . . . . . . . . . . 121 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 CHAPTER 5 Deploying Entrust IdentityGuard services on an existing application server . 127 Deploying Entrust IdentityGuard services on WebLogic . . . . . . . . . . . . . . . . . . . . 128 Deploying Entrust IdentityGuard services on WebLogic 8.1 application server Deploying Entrust IdentityGuard services on WebLogic 9.1 application server Deploying Entrust IdentityGuard services on WebSphere 6.0 application server Defining and deploying shared library settings 134 . . 142 . . . . . . . . . . . . . . . . . . . . . . . . 142 Installing Entrust IdentityGuard services on WebSphere 6.0 Testing your installation 128 . . . . . . . . . . . . . . 155 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Table of contents 5 Managing the Entrust IdentityGuard service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Query the status of Entrust IdentityGuard service . . . . . . . . . . . . . . . . . . . . . . 166 Stopping Entrust IdentityGuard Services on WebLogic 8.1 . . . . . . . . . . . . . . . 167 Stopping Entrust IdentityGuard Services on WebLogic 9.1 . . . . . . . . . . . . . . . 168 Stopping Entrust IdentityGuard Services on WebSphere 6.0 . . . . . . . . . . . . . . 169 CHAPTER 6 Configuring the Entrust IdentityGuard Radius proxy . . . . . . . . . . . . . . . . . .171 Radius proxy integration overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 Configuring the Radius proxy for groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 Using Entrust IdentityGuard groups with a VPN server . . . . . . . . . . . . . . . . . . 175 Radius server example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 External authentication example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Matching a group to a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 Using the Radius proxy with a Radius server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 Using the Radius proxy with a domain controller or LDAP directory Configuring the VPN server Configuring a Radius server for first-factor authentication Configuring Radius server failover Managing the Radius proxy . . . . . . . . . . . 187 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 . . . . . . . . . . . . . . . . . . 194 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Managing the Radius proxy on UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Managing the Radius proxy on Microsoft Windows . . . . . . . . . . . . . . . . . . . . 199 CHAPTER 7 Postinstall configuration options for Entrust IdentityGuard Server . . . . . . . . .201 Configuring Entrust IdentityGuard for external authentication Configuring external authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 Adding Entrust IdentityGuard replica servers Configuring failover on the repository Configuring failover for a database Configuring failover for a directory Storing unassigned cards and tokens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Configuring Syslog for remote logging on UNIX 6 . . . . . . . . . . . . . . . 202 . . . . . . . . . . . . . . . . . . . . . . . . . . 226 Disabling the non-SSL port on the Authentication service . . . . . . . . . . . . . . . . . . . 228 Enabling the non-SSL port on the Administration service . . . . . . . . . . . . . . . . . . . 230 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Disabling the SSL port on the Administration service Securing the LDAP connection with SSL . . . . . . . . . . . . . . . . . . . . . . 231 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Changing the Entrust IdentityGuard certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Creating self-signed certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Importing CA-signed certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Exporting the certificate to client applications . . . . . . . . . . . . . . . . . . . . . . . . 238 Updating certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Enabling system binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 CHAPTER 8 Backing up and restoring Entrust IdentityGuard Server. . . . . . . . . . . . . . . . 243 Planning a backup strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 Backing up your configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 Restoring Entrust IdentityGuard from a backup Restoring a file-based repository . . . . . . . . . . . . . . . . . . . . . . . . . . 250 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 Reconfiguring the system or Entrust IdentityGuard serial number . . . . . . . . . . . . . 254 APPENDIX A Configuring the Entrust IdentityGuard Server properties file . . . . . . . . . . . . 255 Editing property values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 Encrypting property values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 Enabling the authentication success audit Enabling a WSDL query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 Configuring additional search bases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 Configuring LDAP directory properties Configuring database properties Enabling cached challenges Caching policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 Changing log configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 Changing log locations on UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 Configuring master user shell formatting Configuring license auditing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281 Configuring the Entrust IdentityGuard Radius proxy properties Configuring external authentication properties Configuring token properties . . . . . . . . . . . . . . 282 . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Table of contents 7 Configuring the Administration interface properties for bulk operations . . . . . . . . 296 Configuring the Administration interface to control the output format . . . . . . . . . 297 APPENDIX B Upgrading Entrust IdentityGuard Server on Linux . . . . . . . . . . . . . . . . . . . .299 Upgrading Entrust IdentityGuard Server 7.2 to 8.1 . . . . . . . . . . . . . . . . . . . . . 299 Upgrading Entrust IdentityGuard Server from 8.0 to 8.1 . . . . . . . . . . . . . . . . 302 APPENDIX C Using the sample Web application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .305 Preparing to use the sample Web application Accessing the sample Web application Registering as a user Activating a card . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315 Registering a token . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317 Using machine authentication to log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321 Using generic authentication to log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325 Using step-up authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327 Using temporary PIN authentication to log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 Using one-step grid authentication to log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 Using two-step grid authentication to log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 APPENDIX D Uninstalling Entrust IdentityGuard Server . . . . . . . . . . . . . . . . . . . . . . . . . .335 Uninstalling Entrust IdentityGuard Server with embedded Tomcat on UNIX Uninstalling Entrust IdentityGuard Server on Microsoft Windows . . . . . 336 . . . . . . . . . . . . . 337 Uninstalling Entrust IdentityGuard Server with an existing application server . . . . 338 Uninstalling Entrust IdentityGuard on WebLogic 8.1 . . . . . . . . . . . . . . . . . . . 338 Uninstalling Entrust IdentityGuard on WebLogic 9.1 . . . . . . . . . . . . . . . . . . . 340 Uninstalling Entrust IdentityGuard on WebSphere 6.0 . . . . . . . . . . . . . . . . . . 342 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .345 Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .357 8 IdentityGuard 8.1 Installation Guide Document issue: 3.0 About this guide The Entrust IdentityGuard Installation Guide provides detailed information for administrators to plan, install, configure, and troubleshoot the Entrust IdentityGuard Server installation. This guide contains the following sections: • Chapter 1 “Preparing for installation” describes important preinstallation steps for installers as well as directory and database administrators. • Chapter 2 “Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX” provides all the necessary steps for installing, configuring, initializing, and testing Entrust IdentityGuard. • Chapter 3 “Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows” provides all the necessary steps for installing, configuring, initializing, and testing Entrust IdentityGuard. • Chapter 4 “Installing Entrust IdentityGuard Server with an existing application server” provides all the necessary steps for installing, configuring, initializing, and testing Entrust IdentityGuard using WebLogic 8.1 or 9.1 and WebSphere 6.0 applications servers. • Chapter 5 “Deploying Entrust IdentityGuard services on an existing application server” provides all the necessary steps to deploy Entrust IdentityGuard services using the WebLogic 8.1 or 9.1 or WebSphere 6.0 application servers. • Chapter 6 “Configuring the Entrust IdentityGuard Radius proxy” provides all the necessary steps for configuring the Radius Proxy for VPN use and to manage the Radius Proxy. • Chapter 7 “Postinstall configuration options for Entrust IdentityGuard Server” describes steps for configuring or reconfiguring Entrust IdentityGuard after installation. • Chapter 8 “Backing up and restoring Entrust IdentityGuard Server” provides guidelines for planning a backup strategy and steps for restoring Entrust IdentityGuard from a backup. 9 10 • Appendix A “Configuring the Entrust IdentityGuard Server properties file” provides guidelines to reconfigure your installation by editing or adding settings to the identityguard.properties file. • Appendix B “Upgrading Entrust IdentityGuard Server on Linux” describes steps to upgrade to Entrust IdentityGuard from a previous installation of IdentityGuard 7.2 or 8.0. • Appendix C “Using the sample Web application” provides instructions for using the “Any Bank” sample Web application. • Appendix D “Uninstalling Entrust IdentityGuard Server” provides instructions for uninstalling Entrust IdentityGuard from your system. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Revision information Table 1: Revisions in this document Revision Section Description Document issue 3.0 • “Preparing for installation” Expands the chapter introduction to on page 19 describe the various installation scenarios available to users. • “Downloading Entrust IdentityGuard software” on page 21 Adds steps for downloading and extracting the token patch file. • “Installing the token Adds instructions for installing the patch support patch” on page 30 that supports Entrust tokens. Changes the instructions (Step 11) to • “Defining and deploying shared library settings” on include adding Entrust tokens to the page 142 WebSphere shared library. • “Configuring the Radius proxy for groups” on page 175 • “Configuring the Entrust IdentityGuard Radius proxy properties” on page 282 Adds an explanation of how you can configure the Radius proxy to convert names with the form “name@group” or “group\name” to “group/name,” which is the form used by Entrust IdentityGuard. • “Configuring external authentication” on page 202. Describes a problem that can occur with the Kerberos protocol if LDAP user names are in mixed case. • “Configuring token properties” on page 295 Adds a section that explains new token-related properties added to the identityguard.properties file. Document Issue 2.0 • “Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX” on page 31 Adds a section on required preinstallation steps if using Linux Red Hat Enterprise 4. About this guide Feedback on guide 11 Table 1: Revisions in this document Revision Section Description Document Issue 1.0, • “Preparing WebSphere for Adds instructions on installing Entrust IdentityGuard on an AIX server with IBM patch 108508 installation of Entrust WebSphere 6.0. IdentityGuard” on page 100 Modifies instructions for configuring • “Deploying Entrust external authentication with a domain IdentityGuard services on controller. This patch removed the WebSphere 6.0 application identityguard.externalauth.kerb server” on page 142 eros.kdc property and replaced it with a igkrb5.conf file instead. • “Configuring the Radius proxy for groups” on For more information, see “External page 175 authentication example” on page 177. • “Configuring Entrust IdentityGuard for external authentication” on page 202 12 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Documentation conventions Following are documentation conventions which appear in this guide: Table 2: Typographic conventions Convention Purpose Example Bold text (other than headings) Indicates graphical user interface elements and wizards Click Next. Italicized text Used for book or document titles Entrust TruePass 7.0 Deployment Guide Blue text Used for hyperlinks to other sections in the document Entrust TruePass supports the use of many types of digital ID. Underlined blue text Used for Web links For more information, visit our Web site at www.entrust.com. Courier type Use the entrust-configuration.xml file Indicates installation paths, file names, to change certain options for Verification Server. Windows registry keys, commands, and text you must enter Angle brackets Indicates variables (text you must replace with your organization’s correct values) By default, the entrust.ini file is located in <install_path>/conf/security/entrust. ini. Indicates optional parameters dsa passwd [-ldap] <> Square brackets [courier type] Note and Attention text Throughout this guide, there are paragraphs set off by ruled lines above and below the text. These paragraphs provide key information with two levels of importance, as shown below. Note: Information to help you maximize the benefits of your Entrust product. Attention: Issues that, if ignored, may seriously affect performance, security, or the operation of your Entrust product. About this guide Feedback on guide 13 Related documentation Entrust IdentityGuard is supported by a complete documentation suite: 14 • For instructions on installing and configuring Entrust IdentityGuard on UNIX and Microsoft Windows, see the Entrust IdentityGuard Installation Guide. • For instructions on administering Entrust IdentityGuard users and groups, see the Entrust IdentityGuard Administration Guide. • For information on deploying Entrust IdentityGuard, see the Entrust IdentityGuard Deployment Guide. • For information on configuring Entrust IdentityGuard to work with a supported LDAP repository—Microsoft® Active Directory, Microsoft® Active Directory Application Mode, Critical Path InJoin Directory, IBM Tivoli Directory, Novell eDirectory, or Sun ONE Directory—see the Entrust IdentityGuard Directory Configuration Guide. • For information on configuring Entrust IdentityGuard to work with a supported database—IBM DB2 Universal Database, Microsoft SQL Server, or Oracle Database—see the Entrust IdentityGuard Database Configuration Guide. • For information on Entrust IdentityGuard error messages, see the Entrust IdentityGuard Error Messages. • For information on new features, limitations and known issues in the latest release, see the Entrust IdentityGuard Release Notes. • For information on integrating the authentication and administration processes of your applications with Entrust IdentityGuard, see the Entrust IdentityGuard Programming Guide that applies to your development platform (either Java Platform or C#). • For Entrust IdentityGuard product information and a data sheet, go to http://www.entrust.com/strong-authentication/identityguard/index.htm • For information on identity theft protection seminars, go to http://www.entrust.com/events/identityguard.htm IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Obtaining documentation Entrust product documentation, white papers, technical notes, and a comprehensive Knowledge Base are available through Entrust TrustedCare Online. If you are registered for our support programs, you can use our Web-based Entrust TrustedCare Online support services at: https://www.entrust.com/trustedcare Documentation feedback You can rate and provide feedback about Entrust product documentation by completing the online feedback form. You can access this form by • clicking the Feedback on guide link located in the footer of Entrust’s PDF documents (see bottom of this page). • following this link: http://sottwebdev2.entrust.com/products/feedback/index.cfm Feedback concerning documentation can also be directed to the Customer Support email address. support@entrust.com About this guide Feedback on guide 15 Obtaining technical assistance Entrust recognizes the importance of providing quick and easy access to our support resources. The following subsections provide details about the technical support and professional services available to you. Technical support Entrust offers a variety of technical support programs to help you keep Entrust products up and running. To learn more about the full range of Entrust technical support services, visit our Web site at: http://www.entrust.com/ If you are registered for our support programs, you can use our Web-based support services. Entrust TrustedCare Online offers technical resources including Entrust product documentation, white papers and technical notes, and a comprehensive Knowledge Base at: https://www.entrust.com/trustedcare If you contact Entrust Customer Support, please provide as much of the following information as possible: • Your contact information • Product name, version, and operating system information • Your deployment scenario • Description of the problem • Copy of log files containing error messages • Description of conditions under which the error occurred • Description of troubleshooting activities you have already performed Telephone numbers For support assistance by telephone call one of the numbers below: • 1-877-754-7878 in North America • 1-613-270-3700 outside North America Email address The email address for Customer Support is: support@entrust.com 16 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Professional Services The Entrust team assists e-businesses around the world to deploy and maintain secure transactions and communications with their partners, customers, suppliers and employees. We offer a full range of professional services to deploy our e-business solutions successfully for wired and wireless networks, including planning and design, installation, system integration, deployment support, and custom software development. Whether you choose to operate your Entrust solution in-house or subscribe to hosted services, Entrust Professional Services will design and implement the right solution for your e-business needs. For more information about Entrust Professional Services please visit our Web site at: http://www.entrust.com About this guide Feedback on guide 17 18 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Chapter 1 Preparing for installation Use this chapter before you install Entrust IdentityGuard Server. It contains important preinstallation steps for installers, as well as for directory and database administrators. • For a first-time installation of Entrust IdentityGuard, follow instructions in this guide related to a full install on your platform. Then install the latest patch. • For an upgrade from an earlier version of Entrust IdentityGuard, see “Upgrading Entrust IdentityGuard Server on Linux” on page 299. • To add support for tokens to an existing installation of Entrust IdentityGuard 8.1, install patch 129366 or a later patch (see “Installing the token support patch” on page 30). (Not available for AIX.) Attention: Complete the steps in this chapter before you install Entrust IdentityGuard Server. This chapter contains the following sections: • “Preinstallation overview” on page 20 • “Preinstallation” on page 21 • “Installation worksheet” on page 25 • “Installing the token support patch” on page 30 19 Preinstallation overview The following flowchart outlines the high level preinstallation steps you must complete before doing a full install of Entrust IdentityGuard Server, including an install on AIX. Figure 1: Preinstallation overview Download the Entrust IdentityGuard software Create UNIX group and UNIX user (if you are installing on UNIX) Back up your repository Preparing your data repository JDBC LDAP Create database user and table spaces Install schema file Install JDBC driver Gather configuration data Add attributes and object classes to LDAP directory schema Gather configuration data Are you using a VPN server? VPN Determine the group names to use, if applicable What method are you using for primary authentication ? 20 Radius External Gather addresses and shared secrets for your VPN and Radius servers Decide if you will use a domain controller or LDAP directory for primary authentication IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Preinstallation Complete the following procedures before you install Entrust IdentityGuard Server. Topics in this section: • “Downloading Entrust IdentityGuard software” on page 21 • “Preparing your repository” on page 22 • “Preparing your VPN network” on page 23 Note: Some versions of Solaris may not have ZIP. If required, download ZIP from Sun’s Web site at http://www.sun.com/software/solaris/freeware. You will need ZIP for some procedures later in this document. Downloading Entrust IdentityGuard software Download the Entrust IdentityGuard software package or patch from Entrust TrustedCare Online Web site. They include any schema files you need to set up your repository. To download Entrust IdentityGuard software 1 Browse to the Entrust IdentityGuard downloads page on the Entrust TrustedCare Online Web site: https://www.entrust.com/trustedcare You should have an email from Entrust that includes: 2 • your user name and password for accessing the downloads page • instructions on how to access the downloads page • activation and installation keys required for the installer For a full install, download one of the following files (depending on the operating system you are using) by clicking the Download link: • IG_81_Linux.tar • IG_81_Solaris.tar • IG_81_Windows.zip • IG_81_WebLogic_WebSphere.tar • IG_81_WebSphere_AIX.tar Save the .tar or .zip file to any directory on the computer you want to use to run Entrust IdentityGuard. Preparing for installation Feedback on guide 21 3 For the patch that adds support for Entrust tokens, download either IG_81_129366.zip (for Windows) or IG_81_129366.tar (for Linux or Solaris). If a newer patch is available, download it instead. 4 For a full install, extract the files to a temporary directory. To do so: • On UNIX, enter the command, tar -xvf IG_81_<your_version>.tar where <your_version> is the file you have downloaded for your specific installation. • On Microsoft Windows, locate the IG_81_Windows.zip file and extract the files using a utility such as WinZip®. Extracting the file for a full install creates a subdirectory called IG_81 that contains all the Entrust IdentityGuard files and subdirectories. 5 For patch 129366 or a later patch, extract the files to the existing Entrust IdentityGuard 8.1 root directory. If an error occurs, try the download again. If the problem persists, contact Entrust Customer Support. To install patch 129366 or a later patch, skip to “Installing the token support patch” on page 30. For a full install (including an AIX install), continue with the preinstallation instructions in this chapter, and then follow the applicable installation instructions in later chapters. Preparing your repository Configure your repository to work with Entrust IdentityGuard before you begin the Entrust IdentityGuard Server installation. Entrust IdentityGuard supports the use of an Active Directory, LDAP directory, or a database as the data repository. Whether you are upgrading Entrust IdentityGuard Server, or installing for the first time, you must apply the Entrust IdentityGuard schema changes by running the LDIF or SQL files. To do so, follow the instructions in the Entrust IdentityGuard Directory Configuration Guide or Entrust IdentityGuard Database Configuration Guide. For up-to-date and detailed information on configuring your repository, see the Technical Integration Guides. These guides are available for download from Entrust TrustedCare Online at: https://www.entrust.com/trustedcare 22 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Preparing your VPN network To enable multifactor authentication for VPN connections, you can install and configure the Entrust IdentityGuard Radius proxy component with your full installation of Entrust IdentityGuard Server. There are two ways you can set up the system to perform the required first-factor authentication before the second-factor authentication provided by Entrust IdentityGuard: • Configure a separate Radius server that will perform the first-factor authentication, and use the Entrust IdentityGuard Radius proxy to communicate with Entrust IdentityGuard for second-factor authentication. For more information, see “Using the Radius proxy with a Radius server” on page 180. • Configure the external authentication feature provided with Entrust IdentityGuard. This enables Entrust IdentityGuard to perform first-factor authentication using the Windows domain controller or the information from the LDAP directory. For more information, see “Configuring Entrust IdentityGuard for external authentication” on page 202. If you are configuring Entrust IdentityGuard to add multifactor authentication to VPN connections, ensure that the following are already installed: • an external Radius server installed using the instructions provided by the vendor, if you plan to use a Radius server for first-factor authentication For details, see the Technical Integration Guide that applies to your VPN platform. • a VPN client and server installed using the instructions provided by the vendor Note: If you want to configure your VPN servers to recognize Entrust IdentityGuard groups, ensure that you create the groups (or at least know what you are going to name the groups) before installing and configuring the Entrust IdentityGuard Radius proxy. For more information, see “Configuring the Radius proxy for groups” on page 175. The details of Radius use and implementation vary with the platform and provider. Entrust supports several authentication protocols with Radius for grid authentication: • Challenge Handshake Authentication Protocol (CHAP) • Microsoft Challenge Handshake Authentication Protocol versions 1 and 2 (MS-CHAP and MS-CHAPv2) • Password Authentication Protocol (PAP) For token authentication, Entrust IdentityGuard supports only PAP. If you configure the Radius proxy to use external authentication, you must use PAP. Preparing for installation Feedback on guide 23 PAP supports the cell replacement properties in the card specification attributes (cardspec) and temporary PIN attributes (pinspec) of the Entrust IdentityGuard policies; however, CHAP and MS-CHAP do not. This means that, for example, user entries are treated as case-sensitive in CHAP. 24 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Installation worksheet For a full install, ensure you have the following information before installing Entrust IdentityGuard. Attention: If you choose to record passwords on this worksheet, remember to always keep passwords secure. Store this worksheet in a secure place. Table 3: Installation worksheet Required information Value Which type of install of Entrust IdentityGuard? • Entrust IdentityGuard Server with embedded Tomcat application server on UNIX • Entrust IdentityGuard Server with embedded Tomcat application server on Microsoft Windows • Entrust IdentityGuard Server with an existing application server on Solaris or AIX Entrust IdentityGuard Server host name UNIX user and group that owns Entrust IdentityGuard (on embedded Tomcat application server on UNIX install only) Group: Name: Password: Application server user and group Complete “Creating the UNIX group and user” on page 32 that owns the application server (for installation with embedded Tomcat) (for installations with an existing application server only). Entrust IdentityGuard installation directory. The default is: on UNIX /opt/entrust; on Windows c:\Program Files\Entrust\IdentityGua rd) Radius proxy required? yes or no Complete “Radius proxy information” on page 28 Location of server trust store (installs with existing application server only) Preparing for installation Feedback on guide 25 Table 3: Installation worksheet (continued) Required information Value Location of Java directory (installs with existing application server only) Database, Active Directory, or LDAP directory? DB, AD, or LDAP Complete “Database information” on page 27 or “Directory information” on page 27 Entrust IdentityGuard Authentication Web service port number (8080) Entrust IdentityGuard Administration Web service port number (8443) Installation key Activation key Master1 password Master2 password Master3 password Enable sample application? yes or no If yes, complete one of: • “Configuring the sample application on Microsoft Windows” on page 87 if you are installing on Windows with the embedded Tomcat server • “Configuring the sample application on UNIX” on page 51 if you are installing on UNIX with the embedded Tomcat server • “Configuring the sample application on an existing application server” on page 121 if you are installing on an existing application server Sample application administrator1 Name: Password: 1. If you are using a Directory as your repository, you need to create this user in the Directory prior to installation. 26 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Table 4: Database information Database required information Value Database driver .jar files. (Ensure they are copied to the Entrust IdentityGuard computer.) Database driver class name Database URL Database user Name: Password: Schema name For a list of applicable .jar files for your database, the JDBC class name, and related details, see the Entrust IdentityGuard Database Configuration Guide. For details related to your Directory type, see the Entrust IdentityGuard Directory Configuration Guide. Table 5: Directory information Directory required information Value Using the LDAP or LDAPS protocol? LDAP or LDAPS If using LDAPS, copy the certificate to the Entrust IdentityGuard computer. LDAP host name LDAP port number LDAP base DN LDAP user DN DN: Password: LDAP policy RDN LDAP user ID attribute Preparing for installation Feedback on guide 27 Table 6: Radius proxy information Radius proxy required information Value Radius proxy ports VPN server information Label: Host name/IP address: Port: Shared secret: Should VPN servers recognize Entrust IdentityGuard groups? yes or no Entrust IdentityGuard groups for VPN servers Will the Radius proxy connect to a Radius server, domain controller or LDAP directory? If the Radius proxy will use a Radius server, what is the unique Radius server name? Unique name: Host name/IP address: Port: Shared secret: Table 7: External authentication information Radius proxy required information Value Will Entrust IdentityGuard use an yes or no LDAP directory or Windows If yes, answer one of the next two questions. domain controller for first-factor authentication? For a Windows domain controller, Kerberos realm server: what server will host the Kerberos Kerberos KDC server: realm and the Kerberos Key Distribution Center (KDC)? 28 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Table 7: External authentication information Radius proxy required information Value yes or no For an LDAP directory, Entrust IdentityGuard must be configured to use an LDAP repository. Is that configuration complete? Preparing for installation Feedback on guide 29 Installing the token support patch Follow these steps to install a patch that provides support for Entrust tokens on Linux or Windows. 1 Download either IG_81_129366.zip (for Windows) or IG_81_129366.tar (for Linux). See “Downloading Entrust IdentityGuard software” on page 21. If a newer patch is available, download it instead. 2 To install the patch: 3 • On Linux, run the patch install script install.sh. • On Windows, run the patch installer file, for example IG_81_129366.msp. Examine the instructions in the “Installation notes” section of the readme.txt file included with the download. It includes instructions that may be specific to your system or environment. For example, these instructions include: • Deployment instructions for WebSphere and WebLogic. • Fixing performance problems that can occur with preproduced cards stored in a database repository. • Instructions on using Oracle Internet Directory as a repository. The patch automatically sets properties in the identityguard.properties file related to tokens. Reconfiguring for third-party tokens When you run this patch, it sets up Entrust IdentityGuard to use only Entrust tokens. If you are already using supported Vasco tokens, or plan to use them, you must add the following entry to the identityguard.properties file after you install this patch or a later patch: identityguard.token.impl= com.entrust.identityGuard.common.token.vasco.VascoTokenManager To reset the property to use Entrust tokens, change the setting to this: identityguard.token.impl= com.entrust.identityGuard.common.token.activIdentity.ActivIdentity TokenManager Restart Entrust IdentityGuard for this setting to take effect. You can configure Entrust IdentityGuard to use Entrust tokens or Vasco tokens, but not both. 30 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Chapter 2 Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX This chapter provides all the necessary steps to install Entrust IdentityGuard Server (with the Apache Tomcat application server embedded) on UNIX. Complete the instructions in this chapter to install, configure, initialize, and test a full install of the Entrust IdentityGuard Server. Once you complete the full installation, install the latest patch. To install the patch that supports Entrust tokens, see “Installing the token support patch” on page 30. This chapter contains the following sections: • “Creating the UNIX group and user” on page 32 • “Installing Entrust IdentityGuard Server” on page 33 • “Configuring the primary Entrust IdentityGuard Server” on page 36 • “Initializing the primary Entrust IdentityGuard Server” on page 47 • “Configuring the sample application on UNIX” on page 51 • “Running the scripts manually” on page 53 • “Testing your installation” on page 58 • “Managing the Entrust IdentityGuard service” on page 62 31 Creating the UNIX group and user Before you install Entrust IdentityGuard Server on UNIX, create the UNIX group and user that will own the Entrust IdentityGuard installation. In a later step (Step 4 on page 34), you are asked to name the UNIX group and user that you create here. Attention: Arrange to have a dedicated user account and group created on the servers that will host Entrust IdentityGuard. You must use the same account for any future upgrades and patches. Note: On Solaris, use lowercase for creating groups and users. For example, use iggroup and iguser, instead of IGgroup and IGuser. To create a new UNIX group and user 1 As root, create a new UNIX group. For example, IGgroup: • on Linux and Solaris, groupadd iggroup 2 As root, create a new UNIX user. For example, IGuser. The user is a member of IGgroup and has a password: • on Linux, useradd -g iggroup -s /bin/bash -p password123 IGuser • on Solaris if using c-shell, • – useradd -g iggroup -s /usr/bin/csh iguser – passwd iguser on Solaris if using b-shell, – useradd -g iggroup -s /usr/bin/bsh iguser – passwd iguser When you run passwd, enter your password at the prompt. For example, password123. You have created a UNIX group and user. Note: Ensure that the user and group that you create here have permissions to access the directory to which you extracted the IG_81_Linux.tar or the IG_81_Solaris.tar file. 32 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Installing Entrust IdentityGuard Server Entrust IdentityGuard Server runs on UNIX and should be installed on a dedicated machine. Other software products on the same machine can interfere with the operation of Entrust IdentityGuard. To install and configure Entrust IdentityGuard, you must have an understanding of UNIX administration. Attention: If you are installing Entrust IdentityGuard on Linux, the install requires the native library file, libstdc++.so.5. Linux Red Hat 4.0 does not provide this file by default. For further information on downloading this file, see the Entrust IdentityGuard Release notes. Note: Before installing Entrust IdentityGuard, ensure that you have completed the tasks in “Preparing for installation” on page 19. If you are upgrading your version of Linux, you should do so before installing Entrust IdentityGuard 8.1. Linux Red Hat Enterprise 4 When using Linux Red Hat Enterprise 4, you need to include libstdc++.so.5. You can add this during Linux installation by selecting the Legacy Software Development package. If you have installed Linux Red Hat Enterprise 4 and have an X11 Window Manager such as KDE or Gnome, you can add the library after installation by doing the following: 1 Select Applications > System Settings > Add/Remove Applications. 2 On the Development tab, select Legacy Software Development. You are prompted for your Linux installation CD. If you have installed Linux Red Hat Enterprise 4 without access to an X11 Window Manager, and you are using the command line interface, you must install the most recent compat-libstdc++ package (for example, compat-libstdc++-33-3.2.3-47.3.i386.rpm). 1 Download the most recent package from the Red Hat Web site, www.redhat.com. 2 To install the package at the command line type rpm -i <compat-libstdc++-33-3.2.3-47.3.i386.rpm> Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 33 Note: Replace the file name with the one you downloaded from the Red Hat Web site. To install Entrust IdentityGuard 1 As root, change to the directory that you extracted the IG_81_Linux.tar or IG_81_Solaris.tar file to (<download_dir>/IG_81), and run install.sh by entering: ./install.sh Note: Cancel out of the script at any time by pressing Ctrl + C. 2 Read through the license carefully, pressing Enter until you reach the end. The following message appears: Do you agree to the above license terms? [yes or no] 3 Type yes and press Enter to accept the terms. Otherwise, if you do not agree with the license, type no and press Enter. The installation will cancel. Contact Entrust (“Obtaining technical assistance” on page 16). The following message appears: Enter the UNIX user name that will own the installation: 4 Type the user name for the UNIX user you created in Step 2 of “Creating the UNIX group and user” on page 32 and press Enter. Note: You cannot specify root as the owner. The following message appears: Enter the UNIX group name that will own the installation: 5 Enter the name for the UNIX group you created in Step 1 of “Creating the UNIX group and user” on page 32 and press Enter. The following message appears: Enter the install directory (default /opt/entrust): 6 Press Enter to accept the default, or type in another directory location. Note: If you have a previous installation of Entrust IdentityGuard, the installation detects the older version and prompts you to upgrade. If you are installing an upgrade, see the section “Upgrading Entrust IdentityGuard Server on Linux” on page 299. 34 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide The Java Runtime license agreement appears. 7 Read through the license carefully, pressing Enter until you reach the end. 8 You are asked to accept the Java Runtime license agreement. Do you agree to the above license terms? [yes or no] Type yes and press Enter to accept the terms. Otherwise, if you do not agree with the license, type no and press Enter. The installation will cancel. Contact Entrust (“Obtaining technical assistance” on page 16). The JRE, Java policy files, and the Application server are installed in the installation directory you entered in Step 6. The identityguard.zip file is automatically extracted into the directory $IDENTITYGUARD_HOME, where $IDENTITYGUARD_HOME is usually /opt/entrust/identityguard81. 9 The installation creates the Entrust IdentityGuard Radius service. Creating igradius service... Do you want the Entrust IdentityGuard Radius proxy to start automatically when the host starts after reboot? [yes or no] If you answer no, you can enable automatic startup later. If you wish to enable automatic startup in the future, run the command "chkconfig igradius reset" when logged on as root. Note: If you want to configure your VPN servers to recognize Entrust IdentityGuard groups, you must first install Entrust IdentityGuard and define the groups. In this case, enter no. See “Configuring the Entrust IdentityGuard Radius proxy” on page 171 for further details. 10 When the initial install steps are complete, you are prompted to respond to the following message: Installation complete. Do you want to configure the application now? [yes or no] • Answer yes and press Enter to start the configuration tasks. Proceed to “Configuring the primary Entrust IdentityGuard Server” on page 36. • If you answer no, you must run the configure.sh script manually from the $IDENTITYGUARD_HOME/bin directory before you can use Entrust IdentityGuard. To do so, proceed to “To run the primary Entrust IdentityGuard Server configuration manually” on page 53. Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 35 Configuring the primary Entrust IdentityGuard Server As part of the installation procedure, you are prompted to configure and initialize Entrust IdentityGuard. You can choose to complete these configuration steps at the same time as the installation, or after. Refer to your installation worksheet (“Installation worksheet” on page 25) when you complete this section. Topics in this section: • “Starting the Entrust IdentityGuard configuration” on page 36 • “Adding Directory information to Entrust IdentityGuard” on page 37 • “Adding Database information to Entrust IdentityGuard” on page 42 • “Completing the Entrust IdentityGuard configuration” on page 43 Starting the Entrust IdentityGuard configuration Complete the following steps to start configuring the primary Entrust IdentityGuard Server. To start the Entrust IdentityGuard configuration 1 Respond to the following prompt: Are you configuring an Entrust IdentityGuard primary or replica server? (PRIMARY or REPLICA): • Primary. If this is your first Entrust IdentityGuard Server installation, answer primary and continue on with the steps in this procedure. Note: There can only be one primary server. • Replica. If you have already installed an Entrust IdentityGuard Server, and you want to install more instances, answer replica. To configure and initialize a replica server, proceed to “Adding Entrust IdentityGuard replica servers” on page 210. 2 You are asked to indicate whether the user information is stored in an Active Directory (AD), LDAP, or database (DB) repository. What type of repository will you use to store Entrust IdentityGuard information? 36 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide AD - Microsoft(R) Active Directory or Microsoft Active Directory in Application Mode LDAP - LDAP-compliant Directory DB - Database (AD, LDAP or DB): • If you are using an LDAP repository, proceed to “To add LDAP directory information to Entrust IdentityGuard” on page 37. • If you are using an Active Directory or Active Directory Application Mode (ADAM) repository, proceed to “To add Active Directory (or ADAM) information to Entrust IdentityGuard” on page 39. • If you are using a database repository, proceed to “To add Database information to Entrust IdentityGuard” on page 42. Note: You can cancel the script at any time by pressing Ctrl + C. Adding Directory information to Entrust IdentityGuard The following steps sets up Entrust IdentityGuard to communicate with a directory repository. The identityguard.properties file is created based on the values you enter. Follow the appropriate steps: • if you are adding a LDAP directory, proceed to “To add LDAP directory information to Entrust IdentityGuard” • if you are adding Active Directory or Active Directory Application Mode, proceed to “To add Active Directory (or ADAM) information to Entrust IdentityGuard” Note: For more information on LDAP and Active Directory configuration, see the Entrust IdentityGuard Directory Configuration Guide. To add LDAP directory information to Entrust IdentityGuard 1 Respond to the following prompt: LDAP CONFIGURATION Do you wish to use SSL to connect to the LDAP server? [yes or no] Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 37 Type yes and press Enter to add the SSL certificate. If you answer no, proceed to Step 3 on page 38. Note: You can enable LDAPS after installation. For instructions, see “Securing the LDAP connection with SSL” on page 233. 2 If you answered yes, complete the following steps: a The following message appears: In order to verify the SSL connection to the LDAP server, Entrust IdentityGuard requires that the LDAP server's SSL certificate or the certificate of the CA that issued it be imported into its trust store. The Entrust IdentityGuard trust store already contains several public root CA certificates. If the server's certificate was not issued by a public root you must import the certificate. If Entrust IdentityGuard cannot trust the server's certificate, it will be unable to connect to the LDAP server causing operations including initialization to fail. Do you wish to import the LDAP server's SSL certificate? [yes or no] Answer yes and press Enter to import the certificate. For manual instructions on importing the certificate, see “To import the LDAP SSL certificate” on page 233. The following message appears: Enter the filename of the certificate: b Enter the path and file name of the LDAPS certificate. c The installer displays the details of the certificate. If they are correct, respond with yes to the prompt that asks if you wish to trust the certificate. <certificate information> Trust this certificate? [no]: yes Certificate was added to keystore. 3 At the following prompt, enter the host name or IP address of the computer hosting the directory. Enter the LDAP host (ex: identityguard.anycorp.com): 4 38 Enter the port number of the directory. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Enter the LDAP port number (default is 389): The default port for LDAPS is 636. 5 Enter the LDAP base DN (the DN under which all Entrust IdentityGuard entries are found). Enter the LDAP base DN (ex: dc=anycorp,dc=com): Note: See the Entrust IdentityGuard Directory Configuration Guide for more information on directory configuration. It includes information on setting the DN, RDN, and LDAP user name for several popular directories. 6 Enter the LDAP user DN information at the following prompts. The LDAP user DN and password define the credentials used by Entrust IdentityGuard to connect to the repository. Enter the LDAP user DN (ex: cn=Directory Manager): This is an existing LDAP user DN. Enter the LDAP password: Confirm: This is an existing LDAP password. 7 At the following prompt, enter the RDN of the entry that Entrust IdentityGuard should use to store its policy information. The LDAP policy RDN defines the entry in the LDAP repository used to store Entrust IdentityGuard policy information. The entry must already exist. Enter the LDAP policy RDN (ex: uid=policy): The RDN is the prefix that when joined with the base DN, comprises the full DN of the policy object. 8 At the following prompt, enter the attribute that uniquely identifies Entrust IdentityGuard users. The LDAP user name is the attribute that uniquely identifies Entrust IdentityGuard users. Entrust IdentityGuard uses this attribute to find entries in the repository. Enter the LDAP user name attribute (ex: uid): Proceed to “To complete the configuration script” on page 43. To add Active Directory (or ADAM) information to Entrust IdentityGuard 1 Respond to the following prompt: Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 39 MICROSOFT ACTIVE DIRECTORY CONFIGURATION Do you wish to use SSL to connect to the Microsoft Active Directory server? [yes or no] Type yes and press Enter to add the SSL certificate. If you answer no, proceed to Step 3 on page 40. 2 If you answered yes, complete the following steps: The following message appears: In order to verify the SSL connection to the Microsoft Active Directory server, Entrust IdentityGuard requires that the Microsoft Active Directory server's SSL certificate or the certificate of the CA that issued it be imported into its trust store. The Entrust IdentityGuard trust store already contains several public root CA certificates. If the server's certificate was not issued by a public root you must import the certificate. If Entrust IdentityGuard cannot trust the server's certificate, it will be unable to connect to the Microsoft Active Directory server causing operations including initialization to fail. Do you wish to import the Microsoft Active Directory server's SSL certificate? [yes or no] a Answer yes and press Enter to import the certificate. The following message appears: Enter the filename of the certificate: b Enter the path and file name of the Active Directory certificate. c The installer displays the details of the certificate. If they are correct, respond with yes to the prompt that asks if you wish to trust the certificate. <certificate information> Trust this certificate? [no]: yes Certificate was added to keystore 3 At the following prompt, enter the host name or IP address of the computer hosting the directory. Enter the Microsoft Active Directory host (ex: identityguard.anycorp.com): 4 Enter the port number of the directory. Enter the Microsoft Active Directory port number (default is 636): 40 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 5 Enter the Active Directory base DN (the DN under which all Entrust IdentityGuard entries are found). Enter the Microsoft Active Directory base DN (ex: dc=anycorp,dc=com): Note: Entrust IdentityGuard configuration automatically converts spaces in the Active Directory base DN to %20. If you edit the Active Directory base DN after installation in the identityguard.properties file, remember to replace spaces with %20. 6 Enter the Active Directory user DN information at the following prompts. The Active Directory user DN and password define the credentials used by Entrust IdentityGuard to connect to the repository. Enter the Microsoft Active Directory user DN (ex: cn=Administrator,cn=Users,dc=anycorp,dc=com): This is an existing Active Directory user DN. Enter the Microsoft Active Directory password: Confirm: This is an existing Active Directory password. 7 At the following prompt, enter the RDN of the entry that Entrust IdentityGuard should use to store its policy information. The policy RDN defines the entry in the Microsoft Active Directory repository used to store Entrust IdentityGuard policy information. The entry must already exist. Enter the Microsoft Active Directory policy RDN (ex: cn=igpolicy,cn=Users): The RDN is the prefix that when joined with the base DN, comprises the full DN of the policy object. 8 At the following prompt, enter the attribute that uniquely identifies Entrust IdentityGuard users. The Microsoft Active Directory user name is the attribute that identifies Entrust IdentityGuard users. Entrust IdentityGuard uses this attribute to find entries in the repository. Enter the Microsoft Active Directory user name attribute (ex: sAMAccountName): Proceed to “To complete the configuration script” on page 43. Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 41 Note: Use sAMAccountName for Active Directory. Use CN (common name) or uid for ADAM. See the Entrust IdentityGuard Directory Configuration Guide for more information on Active Directory and Active Directory Application Mode configuration. Adding Database information to Entrust IdentityGuard The following steps sets up Entrust IdentityGuard to communicate with a database repository. The identityguard.properties file is created based on the values you enter. Note: For more information on database configuration, see the Entrust IdentityGuard Database Configuration Guide. It includes information on the drivers, classes, and database URLs used with three common databases. To add Database information to Entrust IdentityGuard 1 Respond to the following prompt: DATABASE CONFIGURATION Enter the database type (Oracle, DB2, SQLServer, Other): Type the database you are using and press Enter. The following message appears: Enter the JDBC driver JAR file name: 2 Enter the path of the JDBC driver file (for example, /temp/ojdbc14.jar). Ensure the file permissions on this file allow the Entrust IdentityGuard user (“Creating the UNIX group and user” on page 32) to read and execute it. Note: Some databases require multiple .jar files. You can add other files in a later step. 3 At the following prompt, enter the JDBC driver class that Entrust IdentityGuard should use, (for example, oracle.jdbc.driver.OracleDriver). Enter the JDBC driver class name: The following message appears: Are there any other JDBC JAR files to be installed? [yes or no] 42 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 4 If your database requires multiple JDBC driver files, type yes and press Enter. You are prompted to enter more file names. If your database only requires one file, type no and press Enter to continue. The following message appears: Enter the DB URL: 5 Type the database URL Entrust IdentityGuard requires to connect to the database server and press Enter. 6 Provide Entrust IdentityGuard with the database administrator information. This database administrator was created to own the Entrust IdentityGuard database and schema. a At the following prompt, type the database administrator user name: Enter the DB user name: b At the following prompts, type and confirm the database administrator password: Enter the DB password: Confirm: The following message appears: Enter the DB schema name: 7 Type the schema name for your database. In some databases (for example, Oracle), the schema is automatically named with the user name associated with it. For these databases, type the database administrator user name. Completing the Entrust IdentityGuard configuration The following steps complete the initial configuration of Entrust IdentityGuard. You are prompted for the ports that the Application server should use. Client applications—through the Authentication API—communicate with the Entrust IdentityGuard Authentication service to perform challenge retrieval and response validation. The API communicates with Entrust IdentityGuard using SOAP over HTTP/HTTPS. The following prompts define the ports that Entrust IdentityGuard services listens on. To complete the configuration script 1 Enter a value for each, or leave it blank and press Enter to accept the default value at the prompts. APPLICATION SERVER CONFIGURATION Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 43 a Enter the Authentication Service HTTP port number (default is 8080): b Enter the Authentication Service HTTPS port number (default is 8443): The Entrust IdentityGuard Authentication service and the Entrust IdentityGuard sample application are deployed at both the HTTP and HTTPS ports. c Enter the Administration Service HTTPS port number (default is 8444): This is the port that administration applications use to connect to the Administration service when using SSL (HTTPS). This port is only used for remote administration of Entrust IdentityGuard. A self-signed SSL certificate and private key are created to protect the HTTPS connections to the Authentication service and Administration service. This certificate includes the host name of the Entrust IdentityGuard Server in its distinguished name (DN) and uses the RSA-1024 algorithm. Optionally, you can replace this certificate after configuration. See the section “Changing the Entrust IdentityGuard certificate” on page 235 for instructions. Note: Ensure the host name that you use in the service URLs matches the host name in the SSL certificate. 2 You are prompted to confirm the host name used in the service URLs and the SSL certificate: Entrust IdentityGuard will create a self-signed certificate for SSL communication. The hostname to be used in the service URLs and the SSL certificate is <hostname>. Do you want to use this hostname? [yes or no] 3 Enter yes to use this host name or enter no to choose another host name. a You are prompted to set the lifetime of the self-signed certificate: Enter the lifetime in days of the certificate (default is 365): Enter a new value, or leave it blank and press Enter to accept the default value of 365 days. The location of the certificate appears after you press Enter. Entrust IdentityGuard automatically exports a copy of the self-signed certificate to a file. The name and location of the file appears after you press Enter. Within 44 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide the keystore, the self-signed certificate and private key are stored under the alias “tomcat.” 4 You are prompted to configure Entrust IdentityGuard logs: LOG CONFIGURATION a The following question appears: Should Entrust IdentityGuard log to files or syslog [FILE or SYSLOG]: If you answer file, Entrust IdentityGuard displays the location of the files and configuration is complete. b If you answer syslog, logs are logged to Syslog. Entrust IdentityGuard prompts you for the host name. Enter the syslog host name (default is localhost): Ensure that Syslog on this host is configured to accept Entrust IdentityGuard logs. For more information, see the section “Configuring Syslog for remote logging on UNIX” on page 226. The following message appears: Do you want to configure the Entrust IdentityGuard Radius Proxy? [yes or no] 5 6 Do one of the following: • If you plan to use a Radius server for first-factor authentication and are not using VPN groups, enter yes. Proceed to Step 4 in “To configure the Radius proxy on UNIX” on page 180. • If you plan to use a Radius server for first-factor authentication and you want to configure your VPN servers to recognize Entrust IdentityGuard groups, you need to first complete the configuration and initialization of Entrust IdentityGuard and define the groups. In this case, enter no. • If you plan to use a Windows domain controller or LDAP directory for first-factor authentication, enter yes. Follow the instructions under “Using Entrust IdentityGuard groups with a VPN server” on page 175. • Otherwise, enter no. When you finish the configuration procedure, respond to the following message: Configuration complete. Do you wish to initialize the primary system? [yes or no] • Enter yes and press Enter to start the initialization tasks. Proceed to “Initializing the primary Entrust IdentityGuard Server” on page 47. • If you enter no, you must run the init command in the supersh command shell from the $IDENTITYGUARD_HOME/bin directory before you can use Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 45 Entrust IdentityGuard. Proceed to “To initialize the primary Entrust IdentityGuard Server manually” on page 53. 46 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Initializing the primary Entrust IdentityGuard Server Read this section for instructions on initializing the primary Entrust IdentityGuard Server in your system. Topics in this section: • “What initialization does” on page 47 • “If initialization fails” on page 47 • “Initializing the primary server” on page 48 What initialization does Initialization creates master keys and the various policy structures. The identityguard.properties file specifies two files that are used to store the keys that protect the repository and the master users. The files that store this information are: • Entrust IdentityGuard master keys file (masterkeys.enc)—a file containing the encryption keys that protect the repository. • Entrust IdentityGuard key protection file (masterkeys.kpf)—a file containing an obfuscation key which is used to encrypt the three master user passwords that are stored in the file. The contents of the master keys file can be unlocked by a master user. The contents of the key protection file provide access to the master user passwords. This access can then be used to unlock the master keys file. If initialization fails The most likely causes of an initialization failure are: • The Entrust IdentityGuard properties file contains invalid values. To resolve this, go to $IDENTITYGUARD_HOME/etc/identityguard.properties and edit the file. • Your repository is not configured correctly to work with Entrust IdentityGuard. • The repository is not running. For more information on Entrust IdentityGuard error messages, see Entrust IdentityGuard Error Messages included with your documentation package. Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 47 Initializing the primary server This section provides the steps necessary to initialize the primary server. Attention: As previously stated, if you are installing Entrust IdentityGuard on Linux, the install requires the native library file, libstdc++.so.5. Ensure that you have this file for initializing the system. Linux Red Hat 4.0 does not provide this file by default. If you are initializing a replica server, see “Managing the Entrust IdentityGuard service” on page 62. To initialize the primary Entrust IdentityGuard Server during installation 1 Respond to the following message: PRIMARY SYSTEM INITIALIZATION If you are reinstalling Entrust IdentityGuard, the following prompt appears: An existing system has been detected. Overwriting an existing system will mean the existing data can no longer be accessed. Are you sure you want to overwrite the existing system? (y/n) [n]: Attention: If you are using an LDAP repository, and you run init -overwrite, you must first manually remove the fpcr folder located at $IDENTITYGUARD_HOME/etc/fpcr/ and the ftkr folder located at $IDENTITYGUARD_HOME/etc/ftkr. Attention: If you reinitialize an Entrust IdentityGuard system by running init -overwrite, you must first replace any encrypted values in the identityguard.properties file with cleartext values because Entrust IdentityGuard cannot decrypt the old values once the reinitialization is performed. See the section “Editing property values” on page 257. When you answer y, the command init -overwrite runs automatically. The init command: 48 • generates a new master key and stores it in the master keys file • generates the key protection file • initializes default policy settings IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide If you answer n, or if initialization fails, you must run the init command in the master user shell (supersh) at a later time. For steps for initializing manually, see the section “To initialize the primary Entrust IdentityGuard Server manually” on page 53. Note: Cancel out of the script at any time by pressing Ctrl + C. The following messages appear: Enter install key: Enter activation key: 2 Enter the installation key and the activation key you received from Entrust. Once the activation key is validated, masters keys are then generated. Attention: The two master keys files are created in $IDENTITYGUARD_HOME/etc. After initialization, back up masterkeys.enc. If this file is lost, the system cannot be recovered. See the system restore procedure in “Restoring Entrust IdentityGuard from a backup” on page 250. Do not back up the key protection file (masterkeys.kpf). The masterkeys.kpf file is unique to each server. 3 Type the three master user passwords for the user names—Master1, Master2, and Master3. The passwords must meet the following criteria: • be over eight characters in length • contain upper and lowercase characters • contain a numerical value The following prompts are displayed: Enter a new password for Master1. Password: Confirm: Enter a new password for Master2. Password: Confirm: Enter a new password for Master3. Password: Confirm: 4 When you have finished creating passwords, the following message appears: Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 49 System initialized. Do you wish to setup the sample application [yes or no] 50 • Enter yes to configure the sample application. Proceed to “Configuring the sample application on UNIX” on page 51. • If you enter no, you can optionally configure the sample application later. Proceed to “Testing your installation” on page 58. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Configuring the sample application on UNIX Entrust IdentityGuard provides a sample application that includes user registration functionality as well as various authentication samples. This sample requires an administrator user name and password. If you are using a directory, you must create the administrator before configuring the sample application. For more information on the sample application, see “Using the sample Web application” on page 305 or see the Entrust IdentityGuard Administration Guide. Attention: The sample administrator password is stored in clear text in the file $IDENTITYGUARD_HOME/etc/igsample.properties. For security reasons, disable the sample application when you are not using it. The configsample.sh script creates the following: • a role called samplerole • a policy called samplepolicy • a group called samplegroup • an administrator in the samplegroup (the administrator has access to the samplegroup) • an igsample.properties file If you are configuring the sample application manually, see “To enable the sample application manually” on page 52. To configure the sample application 1 You are prompted to enter the user name for the sample administrator: Enter adminid for sample administrator: 2 You are prompted to enter and confirm a password: Enter password for sample administrator: Confirm: The password must meet the following criteria: 3 • be over eight characters in length • contain upper and lowercase characters • contain a numerical value Log in as a master user to complete the setup. You are prompted for a master user name and password: Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 51 Userid: Password: 4 When you are finished setting up the sample, the following message appears: Setup of Entrust IdentityGuard sample successful. 5 You are prompted to enable the sample. Do you want to enable the sample service? [yes or no] If you answer yes, the sample is enabled. If you answer no, the sample is disabled. You can manually enable the sample later. 6 Once you have enabled the sample application, it is running and you can use it. Proceed to “Using the sample Web application” on page 305 to start Entrust IdentityGuard and test your installation. To enable the sample application manually 1 From $IDENTITYGUARD_HOME, enter . ./env_settings.sh (Include a space between the two periods in the command.) 2 Enter identityguard.sh enable sample To disable the sample application manually 1 From $IDENTITYGUARD_HOME, enter: . ./env_settings.sh (Include a space between the two periods in the command.) 2 Enter identityguard.sh disable sample 52 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Running the scripts manually If you did not run the scripts during the installation procedure, you have the option to manually run the configuration and initialization scripts. To run the primary Entrust IdentityGuard Server configuration manually 1 Log in as the UNIX user that belongs to the UNIX group that was specified during the installation. See “To install Entrust IdentityGuard” on page 34. 2 Change to $IDENTITYGUARD_HOME (default is /opt/entrust/identityguard81). 3 From $IDENTITYGUARD_HOME, source the environment settings file by entering: . ./env_settings.sh (Include a space between the two periods in the command.) 4 Run the configure.sh script. If you have previously configured Entrust IdentityGuard, the following message appears: An identityguard.properties file exists. If you continue, this file will be overwritten. Do you want to continue? [yes or no] 5 Type yes and continue from Step 1 of the “To start the Entrust IdentityGuard configuration” on page 36. To initialize the primary Entrust IdentityGuard Server manually 1 Log in as the UNIX user that belongs to the UNIX group that was specified during the installation. See “To install Entrust IdentityGuard” on page 34. 2 Change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81). 3 From $IDENTITYGUARD_HOME, source the environment settings file by entering . ./env_settings.sh (Include a space between the two periods in the command.) 4 Enter the following command to start the master user shell: supersh Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt. Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 53 Note: You can view copyright and version information at any time by entering version at the command prompt. 5 Enter init <optionalvalues> where <optionalvalues> are listed in the table below: Values Description -sernum To start card serial numbers at a specific number, enter: init -sernum <num> where <num> is a positive integer. Defaults to 1 if not specified. Use this option if you are adding additional cards to your system. For example, if you have previously loaded 350 cards, enter: init -sernum 351 -overwrite If the system was initialized previously, this command overwrites the existing data. You are prompted to confirm that you want existing data to be overwritten. Attention: If you are using an LDAP repository, and you run init -overwrite, you must first manually remove the fpcr folder located at $IDENTITYGUARD_HOME/etc/fpcr/. Attention: If you reinitialize an Entrust IdentityGuard system by running init -overwrite, you must first replace any encrypted values in the identityguard.properties file with cleartext values because Entrust IdentityGuard cannot decrypt the old values once the reinitialization is performed. See the section “Editing property values” on page 257. -force 54 If you use the -force option, you are not prompted for confirmation. 6 Complete Step 2 and Step 3 on page 49. 7 Type exit to leave the command shell. 8 Check the log files for errors. If you chose to log to files when you installed Entrust IdentityGuard, the logs are stored in $IDENTITYGUARD_HOME/logs. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide To configure the sample application 1 Log in as the UNIX user that belongs to the UNIX group that was specified during the installation. See “To install Entrust IdentityGuard” on page 34. 2 Change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81). 3 From $IDENTITYGUARD_HOME, source the environment settings file by entering: . ./env_settings.sh (Include a space between the two periods in the command.) 4 Run the configsample.sh script. 5 You are prompted to enter the user name for the sample administrator: Enter adminid for sample administrator: 6 You are prompted to enter and confirm a password: Enter password for sample administrator: Confirm: The password must meet the following criteria: 7 • be over eight characters in length • contain upper and lowercase characters • contain a numerical value Log in as a master user to complete the setup. You are prompted for a master user name and password: Userid: Password: When you are finished setting up the sample, the following message appears: Setup of Entrust IdentityGuard sample successful. 8 You are prompted to enable the sample. Do you want to enable the sample service? [yes or no] If you answer yes, the sample is enabled. If you answer no, the sample is disabled. You can manually enable the sample later. Once you have enabled the sample application, it is running and you can use it. To make changes to the sample Web application configuration 1 Log in as the UNIX user that belongs to the UNIX group that was specified during the installation. See “To install Entrust IdentityGuard” on page 34. Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 55 2 Change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81). 3 From $IDENTITYGUARD_HOME, source the environment settings file by entering . ./env_settings.sh (Include a space between the two periods in the command.) 4 Enter the following command to start the master user shell: supersh Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt. 5 Log in as a master user. For example, Master1 6 If you have previously configured the sample, delete each of the following individually: • sample administrator • sample group • sample role • sample policy To do so: a Run the delete command for each. For example, admin delete sample/SampleAdmin1 Note: Use the list command to list sample administrators, groups, roles, and policies, so that you can see which ones to delete. For example, use admin list to list all the sample administrators that have already been created. Use group list to list the sample groups that exist, and so on. b Answer yes to confirm the delete. Are you sure you wish to delete the admin? (y/n) [n]: 7 Type exit to exit the master user shell and return to the command-line. 8 Enter the following command to start configuring the sample: configsample.sh You are warned that the igsample.properties file already exists. For example: /opt/entrust/identityguar81/etc/igsample.properties file already exists. Do you wish to continue? [yes or no] 9 56 Answer yes. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 10 Follow the steps in “To configure the sample application” on page 51. Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 57 Testing your installation This section provides testing steps that determine whether your installation is working properly. It assumes you have completed the installation, configuration, and initialization tasks. To test your installation 1 Check the log files for errors. If you chose to log to files when you installed Entrust IdentityGuard, the logs are stored in $IDENTITYGUARD_HOME/logs. 2 Start the Entrust IdentityGuard Server as the Entrust IdentityGuard application owner. For instructions, see “Starting and stopping Entrust IdentityGuard” on page 62. 3 Check whether all Entrust IdentityGuard services are running as expected. Enter: igservice.sh all status The following is an example of the status report when all services are running: Entrust IdentityGuard (pid 1247) is running... Authentication V1 service at http://<hostname>:8080/IdentityGuardAuthService/ services/AuthenticationService is available. Authentication V2 service at http://<hostname>:8080/IdentityGuardAuthService/ services/AuthenticationServiceV2 is available. Sample application is enabled. Sample application at https://<hostname>:8444/IdentityGuardSampleApp is available. Administration V1 service at https://<hostname>:8444/IdentityGuardAdminService/ services/AdminService is available. Administration V2 service at https://<hostname>:8444/IdentityGuardAdminService/ services/AdminServiceV2 58 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide is available. Administration interface at https://<hostname>:8444/IdentityGuardAdmin is available. Entrust IdentityGuard Radius (pid 1275) is running... The following is an example of the output when there are no services running (only the sample application is enabled): Entrust IdentityGuard (pid 13267) is not running... Sample application is enabled. Entrust IdentityGuard Radius (pid 1275) is not running... 4 Ensure that you can log in to the Administration webservice. a Create an administrator account or use the sample administrator account, if you have configured the sample application. For information on creating an administrator, see the Entrust IdentityGuard Administration Guide. b Open a browser and enter the following URL: https://<FQDN>:<port>/IdentityGuardAdmin where: – <FQDN> is the Entrust IdentityGuard host name. – <port> is the Administration webservice port (default 8444). Note: If you cannot access the Entrust IdentityGuard services (administration or authentication), verify that firewall rules are not blocking the HTTPS ports (by default 8443 and 8444). Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 59 60 c At the login page, enter the administrator user name and password. Optionally, enter the group name, if the user does not belong to the default group. d You are prompted to change the administrator password. (There will be no prompt if you are using an account that has already logged in, such as the sample account created earlier in “To configure the sample application” on page 51.) e Follow the rules on the screen to change the administrator password. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide The Entrust IdentityGuard Administration interface appears: 5 Optionally, test the sample application. To do so, follow the steps in “Using the sample Web application” on page 305. You have completed testing of the Entrust IdentityGuard installation. You can now: • complete various advanced configuration tasks (“Postinstall configuration options for Entrust IdentityGuard Server” on page 201 and “Configuring the Entrust IdentityGuard Server properties file” on page 255) such as adding replica Entrust IdentityGuard Servers to your system • set up Entrust IdentityGuard by adding policies, groups, users, authentication methods, and so on (see the Entrust IdentityGuard Administration Guide) Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 61 Managing the Entrust IdentityGuard service Complete the following steps to start, stop, check the status, or restart the Entrust IdentityGuard service. You have the option of using either the identityguard.sh command, or the UNIX service command. Topics in this section: • “Starting and stopping Entrust IdentityGuard” on page 62 • “Starting and stopping Entrust IdentityGuard with the UNIX service command” on page 63 • “Enabling and disabling individual Entrust IdentityGuard services” on page 64 Starting and stopping Entrust IdentityGuard The identityguard.sh command enables you to start, stop, restart, and query the status of the Entrust IdentityGuard service. Note: If you are root, you cannot start Entrust IdentityGuard using identityguard.sh start, igradius.sh start, or the igservice start commands. To stop the Entrust IdentityGuard service, you must be the user who started the service. To start and stop Entrust IdentityGuard using identityguard.sh 1 Log in as the UNIX user that belongs to the UNIX group that was specified during the installation. See “To install Entrust IdentityGuard” on page 34. 2 From $IDENTITYGUARD_HOME, enter . ./env_settings.sh 3 To start, stop, restart, or query the status of the Entrust IdentityGuard service, enter identityguard.sh followed by one of the options in Table 8: 62 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Table 8: Starting and stopping Entrust IdentityGuard Command Description start Starts the Entrust IdentityGuard service. You can also start the Entrust IdentityGuard service by entering igstartup.sh Entrust IdentityGuard generates audits that indicate if the services have started successfully or failed to start. You will not see an error message if the service fails to start. stop Stops the Entrust IdentityGuard service. You can also stop the Entrust IdentityGuard service by entering igservice.sh identityguard stop status Tells you if the Entrust IdentityGuard service is running. If the service is running, the process ID number appears. restart Stops and restarts the Entrust IdentityGuard service. When you change some settings in the identityguard.properties file, you must restart the service so that the server recognizes the new settings. Note: Once IdentityGuard is installed, the service is started automatically when you reboot. Starting and stopping Entrust IdentityGuard with the UNIX service command You can also start and stop the Entrust IdentityGuard services using the UNIX service command. If these commands are run as root, they start the service as the UNIX user ID that installed Entrust IdentityGuard. To start and stop Entrust IdentityGuard with the Linux service command 1 To start, stop, restart, or query the status of the Entrust IdentityGuard service, enter service identityguard followed by one of the options shown in Table 9: Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 63 Table 9: Linux service command Command Description start Starts the Entrust IdentityGuard service. IdentityGuard generates audits that indicate if the services have started successfully or failed to start. You will not see an error message if the service fails to start. stop Stops the Entrust IdentityGuard service. status Tells you if the Entrust IdentityGuard service is running. If the service is running, the process ID number appears. restart Stops and restarts the Entrust IdentityGuard service. Changes to some settings in identityguard.properties require a restart so that the server recognizes the new settings. Enabling and disabling individual Entrust IdentityGuard services You can use the manual command identityguard.sh to enable and disable the following Entrust IdentityGuard individual services: • administration service • Administration interface • sample To enable Entrust IdentityGuard manually using identityguard.sh 1 From $IDENTITYGUARD_HOME, enter: . ./env_settings.sh (Include a space between the two periods in the command.) 2 Enter identityguard.sh enable adminservice|admininterface|sample For example, to enable the administration service, use the command identityguard.sh enable adminservice To disable the Entrust IdentityGuard manually using identityguard.sh 1 64 From $IDENTITYGUARD_HOME, enter IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide . ./env_settings.sh (Include a space between the two periods in the command.) 2 Enter identityguard.sh disable adminservice|admininterface|sample For example, to disable the Administration interface, use the command identityguard.sh disable admininterface You can also use the Entrust IdentityGuard igsvcconfig.sh command to enable or disable Entrust identityGuard. To enable Entrust IdentityGuard manually using igsvcconfig.sh • As root in $IDENTITYGUARD_HOME/bin enter ./igsvccongif.sh identityguard enable To disable the Entrust IdentityGuard manually igsvcconfig.sh • As root in $IDENTITYGUARD_HOME/bin enter ./igsvccongif.sh identityguard disable Installing Entrust IdentityGuard Server with embedded Tomcat server on UNIX Feedback on guide 65 66 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Chapter 3 Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows This chapter provides all the necessary steps to install Entrust IdentityGuard Server (with Apache Tomcat application server embedded) on Microsoft Windows. Complete the instructions in this chapter to unzip and run the Entrust IdentityGuard Installation wizard. Once you complete the full installation, install the latest patch. To install the patch that supports Entrust tokens, see “Installing the token support patch” on page 30. This chapter contains the following information: • “Installing Entrust IdentityGuard Server” on page 68. • “Configuring the primary Entrust IdentityGuard Server” on page 70 • “Initializing the primary Entrust IdentityGuard Server” on page 83 • “Configuring the sample application on Microsoft Windows” on page 87 • “Testing your installation” on page 89 • “Managing the Entrust IdentityGuard service” on page 94 67 Installing Entrust IdentityGuard Server Install Entrust IdentityGuard Server on a dedicated machine. Other software products on the same machine can interfere with the operation of Entrust IdentityGuard. Attention: Arrange to have a dedicated account and group created on the servers that will host Entrust IdentityGuard. You must use the same account for any future upgrades and patches. Note: Before installing Entrust IdentityGuard, ensure that you have completed the tasks in “Preparing for installation” on page 19. Also, exit all Windows programs before running the Entrust IdentityGuard Installation wizard to prevent any conflicts in resources. To install Entrust IdentityGuard Server 1 Change to the directory in which you extracted the Entrust IdentityGuard Server for Windows installation package. 2 Double-click the IG_81_Windows.msi installer. The Entrust IdentityGuard Installation wizard opens. 3 Click Next on the Entrust IdentityGuard Installation wizard Welcome page to begin installation. Note: If you are not prepared to install, click Cancel at any time to exit. Click Back to re-enter previous information. 4 Read the license agreement for Entrust IdentityGuard software carefully, select I accept the licence agreement, and then click Next. If you do not agree with the license, select I do not accept the license agreement. The installation cannot continue. Contact Entrust (“Obtaining technical assistance” on page 16). 5 Read the licence agreement for Sun Microsystems, Inc. carefully, select I accept the licence agreement, and then click Next. If you do not agree with the license, select I do not accept the license agreement. The installation cannot continue. Contact Entrust (“Obtaining technical assistance” on page 16). 6 68 Click Next to accept the default destination folder for the Entrust IdentityGuard installation (C:\Program Files\Entrust\IdentityGuard\). Alternatively, IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide click Browse to select your own destination location and then click Next to accept it. 7 Click Next to install Entrust IdentityGuard. 8 Click Finish to exit the installation. The Entrust IdentityGuard Configuration Panel appears. Proceed to “Configuring the primary Entrust IdentityGuard Server” on page 70. Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows Feedback on guide 69 Configuring the primary Entrust IdentityGuard Server As part of the installation procedure, you are prompted to configure and initialize Entrust IdentityGuard Server using the configuration panel. Refer to your installation worksheet (“Installation worksheet” on page 25) when you complete this section. Topics in this section: • “Starting the Entrust IdentityGuard Configuration wizard” on page 70. • “Selecting your repository settings” on page 72 • “Selecting Entrust IdentityGuard service ports” on page 79 • “Selecting your system host name” on page 81 • “Completing Entrust IdentityGuard configuration” on page 82 Using the Configuration Panel The Configuration Panel includes the following features: • The main page of the Configuration Panel contains help sections. Click Find Out More beside any option for helpful tips. • You can maneuver through the options and buttons on the main page using the Tab key. • Hot keys are available on the procedural pages. When you hold down the Alt key, one letter on each option or button displays an underline. With the Alt key still depressed, enter one of the underlined letters to navigate directly to that option or button. • During any procedure, click Cancel at any time to exit. Click Back to re-enter any previous information. Starting the Entrust IdentityGuard Configuration wizard To configure Entrust IdentityGuard, use the Entrust IdentityGuard Configuration wizard. The Entrust IdentityGuard Configuration wizard is located on the Entrust IdentityGuard Configuration Panel, which appears immediately after running the Entrust IdentityGuard Installation wizard. 70 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide To start the Entrust IdentityGuard Configuration wizard 1 Launch the Entrust IdentityGuard Configuration Panel, if it is not open. Open the Configuration Panel by clicking Start > All Programs > Entrust > IdentityGuard > Configuration Panel. 2 From the Entrust IdentityGuard Configuration Panel, select Primary as your system type. Attention: You can only have one primary Entrust IdentityGuard Server. If you are configuring another Entrust IdentityGuard Server as a replica, see “Adding Entrust IdentityGuard replica servers” on page 210. 3 Select Configure Entrust IdentityGuard to start the Entrust IdentityGuard Configuration wizard. The Entrust IdentityGuard Configuration wizard Welcome page appears. 4 Click Next to begin your Entrust IdentityGuard configuration. Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows Feedback on guide 71 Note: Click Back if you need to re-enter information on a previous page. No information will be lost. You may click Cancel or close the Entrust IdentityGuard Configuration wizard window at any time to exit the configuration process; however, all configurations will be lost. Selecting your repository settings Select a repository to store and retrieve your Entrust IdentityGuard data. To select your repository settings 1 72 On the Repository Settings page, select the repository. There are three choices: • Microsoft Active Directory. Proceed to “To use Active Directory as your repository” on page 73 for the configuration procedure. See the Entrust IdentityGuard Directory Configuration Guide before you begin this process. It contains detailed information on the DN, RDN, and user attribute. • LDAP. Proceed to “To use an LDAP directory as your repository” on page 75 for the configuration procedure. See the Entrust IdentityGuard Directory Configuration Guide before you begin this process. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide • 2 Database. Proceed to “To use a database as your repository” on page 77 for the configuration procedure. See the Entrust IdentityGuard Database Configuration Guide before you begin this process. Click Next. To use Active Directory as your repository 1 Under Microsoft Active Directory Server SSL Configuration, select Yes or No depending on whether you want to secure Entrust IdentityGuard’s communications with your Active Directory server by using SSL. • If you select Yes, click Browse to import your SSL certificate and then click Next. Entrust IdentityGuard verifies your SSL connection to the Active Directory server by adding your imported certificate to its trust store. If the certificate cannot be trusted, Entrust IdentityGuard cannot connect to the directory. • If you select No, click Next. Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows Feedback on guide 73 2 Under Microsoft Active Directory Server Connection Information, do the following: a Enter the following information into the respective fields: – Microsoft Active Directory host name – Microsoft Active Directory server port – Microsoft Active Directory user DN – Microsoft Active Directory password – Confirm password Once you enter this information, click Test Connection. Entrust IdentityGuard performs a query and informs you if there is a successful connection to the repository. Note: If the connection attempt fails, you can still proceed to the next step in the configuration process by clicking Next. However, all fields must be filled and passwords must match. b 3 74 Click Next to perform the host name validation check. If the host name cannot be validated, a warning message gives you the option to proceed with the configuration or enter the server connection information. On the Microsoft Active Directory Server Settings page: IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide a Enter the following information into the respective fields: – Microsoft Active Directory base DN – Policy RDN – Microsoft Active Directory userid attribute See the Entrust IdentityGuard Directory Configuration Guide for detailed information on the DN, RDN, and user attribute. b 4 Click Next. Proceed to “Selecting Entrust IdentityGuard service ports” on page 79 to continue your Entrust IdentityGuard configuration. To use an LDAP directory as your repository 1 Under LDAP Server SSL Configuration, select Yes or No depending on whether you want to secure Entrust IdentityGuard’s communications with your LDAP server by using SSL. • If you select Yes, click Browse to import your SSL certificate and then click Next. Entrust IdentityGuard verifies your SSL connection to the LDAP server by adding your imported certificate to its trust store. If you select Yes when you browse for and select a certificate, a warning message displays the certificate details and prompts you to proceed. Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows Feedback on guide 75 Note: If the certificate cannot be trusted, Entrust IdentityGuard cannot connect to the server. • 2 If you select No, click Next. Under LDAP Server Connection Information (see the Entrust IdentityGuard Directory Configuration Guide for more information), do the following: a Enter the following information into the respective fields: – LDAP server host name – LDAP server port (SSL default 636, non-SSL default 389) – LDAP user DN – LDAP password – Confirm password Once you enter this information, click Test Connection. Entrust IdentityGuard performs a query and informs you if there is a successful connection to the repository. Note: If the connection attempt fails, you can still proceed to the next step in the configuration process by clicking Next. However, all fields must be filled and passwords must match. 76 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide b 3 Click Next to perform the host name validation check. If the host name cannot be validated, a warning message gives you the option to proceed with the configuration or enter the server connection information. On the LDAP Server Settings page: a Enter the following information into the respective fields: – LDAP base DN – Policy RDN – LDAP userid attribute See the Entrust IdentityGuard Directory Configuration Guide for detailed information on the DN, RDN, and user attribute. b 4 Click Next. Proceed to “Selecting Entrust IdentityGuard service ports” on page 79 to continue your Entrust IdentityGuard configuration. To use a database as your repository 1 Under Database Settings, select your database from the drop-down list. The choices are • Oracle • DB2 Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows Feedback on guide 77 • SQL Server • Other Note: Use “Other” only if you are instructed to do so by Entrust Support. 2 Under JDBC Driver Information: a Click Browse to import your JDBC driver .jar file. b Enter your JDBC driver class name. c Click Add to include any additional JDBC .jar files (optional). Alternatively, to remove any additional JDBC .jar files that you have added, highlight the .jar file in the Additional JDBC JAR files list, and click Remove. If your JDBC driver does not require additional .jar files, leave this field blank. 3 Click Next. 4 Under Database Connection Information: a Enter the following information into the respective fields: – Database URL in driver-specific format See the vendor-specific driver documentation for additional details on URL format. 78 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide – Database user name – Database password – Confirm database password – Database schema name Once you enter this information, click Test Connection. Entrust IdentityGuard performs a query and informs you if there is a successful connection to the database. Note: If the connection test fails, you may still proceed to the next step in the configuration process by clicking Next; however, all fields on this page must be filled and passwords must match. b 5 Click Next. Proceed to “Selecting Entrust IdentityGuard service ports” on page 79 to continue your Entrust IdentityGuard configuration. Selecting Entrust IdentityGuard service ports Specify the ports on which Entrust IdentityGuard services listen. Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows Feedback on guide 79 Note: Ensure the ports for each Entrust IdentityGuard service are unique for that computer. To select Entrust IdentityGuard service ports 1 Under Authentication Service, enter a port number: • in the Authentication Service HTTP port number field (default 8080) • in the Authentication Service HTTPS port number field (default 8443) Note: You can always disable the HTTP port later to enhance security. See “Disabling the non-SSL port on the Authentication service” on page 228. 80 2 Under Administration Service, enter a port number in the Administration service HTTPS port number field (default 8444). 3 Click Next. 4 Proceed to “Selecting your system host name” on page 81. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Selecting your system host name Select a host name to generate the self-signed certificate and service URLs that are used by Entrust IdentityGuard. To select your system host name 1 From the System host name page, a Validate the system host name in the Enter the host name to be used in the self-signed certificate and service URLs field. The self-signed certificate secures outside communication with Entrust IdentityGuard’s services using HTTPS. b Validate the certificate lifetime in the Self-signed SSL certificate lifetime (in days) field. Optionally, change the lifetime value. Default is 365. Note: Optionally, you can choose to reconfigure the LDAP repository connection later. For instructions, see “To import the LDAP SSL certificate” on page 233 c 2 Click Next. Proceed to “Completing Entrust IdentityGuard configuration” on page 82. Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows Feedback on guide 81 Completing Entrust IdentityGuard configuration The Configuration Summary page contains a list of all information you have entered into the Entrust IdentityGuard Configuration wizard. Review this information carefully and record and store the information in a secure place, if necessary. All text boxes in the Configuration Panel include basic, context-sensitive Windows menu commands. This lets you copy the contents of any text box. For example, you can copy the contents of the Configuration Summary page. To copy contents of the Configuration Summary page 1 Right-click in the content area of the Configuration Summary page. 2 Choose Select All from the menu. 3 Right-click again and select Copy from the menu. 4 Paste the copied text into a text file or other document. To complete Entrust IdentityGuard Server configuration 1 On the Configuration Summary page, click Confirm and Save if all the information in the summary list is complete and correct. Note: If you choose to cancel, all information will be lost. Note: If the system has already been initialized, when you click Initialize Entrust IdentityGuard a warning message explains the consequences of reinitializing an existing system. 2 Click Finish to complete the configuration process. You can now initialize the server. Go to “Initializing the primary Entrust IdentityGuard Server” on page 83. 82 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Initializing the primary Entrust IdentityGuard Server Once you configure your Entrust IdentityGuard Server, initialize it using the Entrust IdentityGuard Initialization wizard. If you have not yet configured, see “Configuring the primary Entrust IdentityGuard Server” on page 70. Attention: If you are reinitializing, all stored information (such as user accounts, cards, and groups) will be lost and all settings reset to their defaults. Topics in this section: • “What initialization does” on page 83 • “If initialization fails” on page 83 • “Running the Entrust IdentityGuard Initialization wizard” on page 84. What initialization does Initialization creates master keys and the various policy structures. The identityguard.properties file specifies two files used to store the keys that protect the repository and the master users. The files that store this information are: • Entrust IdentityGuard master keys file (masterkeys.enc)—a file containing the encryption keys that protect the repository. • Entrust IdentityGuard key protection file (masterkeys.kpf)—a file containing an obfuscation key which is used to encrypt the three master user passwords that are stored in the file. The contents of the master keys file can be unlocked by a master user. The contents of the key protection file provide access to the master user passwords. This access can then be used to unlock the master keys file. If initialization fails Review the sytem.log file to identify the cause of failure. The log file is in <IG_Install_Dir>\identityguard81\logs\system.log. By default <IG_Install_Dir> is C:\Program Files\Entrust\IdentityGuard. Some possible causes of an initialization failure are: • The Entrust IdentityGuard properties file contains invalid values. To resolve this, go to <IG_Install_Dir>\etc\identityguard.properties and edit the file. Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows Feedback on guide 83 • Your repository is not configured correctly. • The repository is not running. • Your Entrust IdentityGuard Server service is running. See, “To check the status of Entrust IdentityGuard” on page 94. For more information on Entrust IdentityGuard error messages, see Entrust IdentityGuard Error Messages included with your documentation package. Running the Entrust IdentityGuard Initialization wizard Start and run the Entrust IdentityGuard Initialization wizard by completing the following procedures. To start the Entrust IdentityGuard Initialization wizard 84 1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking Start > All Programs > Entrust > IdentityGuard > Configuration Panel. 2 Select Primary as the system type. 3 Select Initialize Entrust IdentityGuard. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide The Primary System Initialization page appears. Note: If you cancel at any time, all information will be lost. 4 5 Under License Information: a Type your Entrust IdentityGuard installation key in the Entrust IdentityGuard Installation Key field. b Type your Entrust IdentityGuard activation key in the Entrust IdentityGuard Activation Key field. Click Validate. The master user information fields are enabled as soon as the licence information is validated. 6 Under Master User Information, enter passwords for each one of the three master users (Master1, Master2, and Master3), and confirm each password. The passwords must meet the following criteria: • be over 8 characters in length • contain upper and lowercase characters Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows Feedback on guide 85 • 7 contain a numerical value Click Initialize. The Entrust IdentityGuard Server initializes. 8 Click OK. You can now configure the sample application or test your installation. Go to one of: 86 • “Configuring the sample application on Microsoft Windows” on page 87 • “Testing your installation” on page 89 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Configuring the sample application on Microsoft Windows This section details how you can configure and enable the Entrust IdentityGuard sample application. The sample Web application demonstrates how Entrust IdentityGuard registers users and authenticates them. This sample requires an administrator user ID and password. If you are using a directory, create the user ID entry in the directory prior to installing the sample Web application. For details on how to use the sample application, see “Using the sample Web application” on page 305. For more information about authentication features shown in the sample application, see the Entrust IdentityGuard Administration Guide. Note: You cannot configure the sample application on a replica Entrust IdentityGuard Server. Attention: The sample administrator password is stored in clear text in the <IG_INSTALL_DIR>\identityguard81\ect\igsamples.properties file. For security reasons, disable the sample application when you are not using it. If you have previously configured the sample, delete each of the following individually to reconfigure the sample: • sample administrator • sample group • sample role • sample policy You can only disable or enable the sample application after initial configuration, using the Entrust IdentityGuard Web interface and Application Manager located on the Entrust IdentityGuard Configuration Panel. To configure the sample application 1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking Start > All Programs > Entrust > IdentityGuard > Configuration Panel. 2 Under Sample Application Setup, select Set Up the Sample Application to run the utility. Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows Feedback on guide 87 The Master User Login page appears. 3 Enter your master user name and master user password in the applicable fields. Use any one of the three master users set up in “Initializing the primary Entrust IdentityGuard Server” on page 83. The Entrust IdentityGuard Sample Web Application Setup page appears. 4 5 Under Configure Web Sample Administrator, type the following information: • Administrator user name. If you are using an LDAP or Active Directory repository, enter the ID of a user that already exists in the directory. • Administrator password. The password must be over 8 characters in length, contain upper and lower case characters, and contain a numerical value. • Confirm password. Re-enter the password entered in the field above. Click Save to configure the sample application. The sample application is configured and by default, enabled. 88 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Testing your installation This section provides testing steps that determine whether your installation is working properly. It assumes you have completed the installation, primary configuration, and initialization tasks. To test your installation 1 Check the log files in <IG_INSTALL_DIR>\identityguard81\logs for errors, where <IG_INSTALL_DIR> is C:\Program Files\Entrust\IdentityGuard, by default. 2 Start the Entrust IdentityGuard Server. For instructions, see “Managing the Entrust IdentityGuard service” on page 94. 3 Check the status of all services in Entrust IdentityGuard Web interface and Application Manager, accessible through the Entrust IdentityGuard Configuration Panel. a Launch the Entrust IdentityGuard Configuration Panel and select Launch Web Service and Application Manager. b On the Status tab, check the status of each service: Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows Feedback on guide 89 – Administration service – Authentication service – Administration interface – Sample Web application If the status of any of these is offline, see “Installation troubleshooting” on page 92. If the status of any of these is Error, ensure that the URLs correspond to valid svcs/apps in IdentityGuard.properties. To edit the URLs, go to <IG_Install_Dir>\etc\identityguard.properties. 4 Ensure that you can log in to the Administration Web interface. a Create an administrator account or use the sample administrator account, if you have configured the sample application. For information on creating an administrator, see the Entrust IdentityGuard Administration Guide. b Once you have created an administrator, do one of the following: – In Windows, click Start > All Programs > Entrust > IdentityGuard >Administration Interface. This opens the interface in your default browser. – In a Web browser, enter the URL of your Administration interface. https://<hostname>:<port>/IdentityGuardAdmin Where: <hostname> is the server host name you selected during configuration. <port> is the administration port you selected during configuration (default 8444). Note: If you cannot access the Entrust IdentityGuard services (Administration or Authentication), verify that firewall rules are not blocking the HTTPS ports (by default 8443 and 8444). 90 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide c At the login page, enter the administrator user name and password. Optionally, enter the group name, if the user does not belong to the default group. The Entrust IdentityGuard Administration interface appears. 5 Optionally, test the sample application. To do so, follow the steps in “Using the sample Web application” on page 305. You have now completed testing the Entrust IdentityGuard installation. Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows Feedback on guide 91 You can now: • Complete various advanced configuration tasks (“Postinstall configuration options for Entrust IdentityGuard Server” on page 201 and “Configuring the Entrust IdentityGuard Server properties file” on page 255) such as adding replica Entrust IdentityGuard Servers to your system. • Set up your Entrust IdentityGuard system by adding policies, groups, users, authentication methods, and so on (see the Entrust IdentityGuard Administration Guide). Installation troubleshooting When you reinstall Entrust IdentityGuard, its Windows services may need to be restarted. If one or more services is marked as Offline on the Status tab of the Web Service and Application Manager page, restart the services. See “Managing the Entrust IdentityGuard service” on page 94. If the Administration interface does not appear, but you know the services are running, you need to check if it is disabled. To enable the Administration interface and service 1 Select Launch Web Service and Application Manager on the Entrust IdentityGuard Configuration Panel. The Web Service and Application Manager page appears. 2 Click the Controls tab. 3 Under Administration Service, select Enabled. 4 Under Administration Interface, select Enabled. 5 Click Apply Changes. The interface is enabled. To enable the sample application 1 92 Select Launch Web Service and Application Manager on the Entrust IdentityGuard Configuration Panel. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide The Web Service and Application Manager page appears. 2 Click the Controls tab. 3 Under Sample Application, select Enabled. 4 Click Apply Changes. The sample application is enabled and the IdentityGuard service is restarted. To disable the sample application Note: Only a configured sample application can be disabled. 1 Select Launch Web Service and Application Manager on the Entrust IdentityGuard Configuration Panel. 2 Click the Controls tab. 3 Under Sample Application, select Disabled. 4 Click Apply Changes. The sample application is disabled. Installing Entrust IdentityGuard Server with embedded Tomcat server on Microsoft Windows Feedback on guide 93 Managing the Entrust IdentityGuard service Complete the following steps to start, stop, check the status, or restart the Entrust IdentityGuard service. Starting and stopping events are logged in the Event Viewer. Note: By default, Entrust IdentityGuard starts automatically whenever you reboot the computer. The following commands allow you to start, stop, restart, and query the status of the Entrust IdentityGuard Server. Changes to some settings in identityguard.properties require a restart so that the server recognizes the new settings. To start, stop, and restart Entrust IdentityGuard 1 Go to Start > All Programs > Control Panel > Administrative Tools > Services. The Services window appears. 2 To stop, start, or restart, the Entrust IdentityGuard Server (including the sample application), right-click Entrust IdentityGuard Server and select the appropriate command. 3 To start, stop, or restart the Entrust IdentityGuard Radius proxy, right-click Entrust IdentityGuard Radius Proxy and select the appropriate command. To check the status of Entrust IdentityGuard 1 Go to Start > All Programs > Control Panel > Administrative Tools > Services. The Services window appears. 2 Locate Entrust IdentityGuard Server and check the status column to view the status. The status tells you if the Entrust IdentityGuard Server is running. 94 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Chapter 4 Installing Entrust IdentityGuard Server with an existing application server This chapter provides all the necessary steps to install, configure, initialize, and test Entrust IdentityGuard Server on UNIX using a WebLogic 8.1 or 9.1 or a WebSphere 6.0 application server. Once you complete the full installation, install the latest patch. To install the patch that supports Entrust tokens, see “Installing the token support patch” on page 30. This chapter contains the following sections: • “Preparing WebLogic for installation of IdentityGuard” on page 96 • “Preparing WebSphere for installation of Entrust IdentityGuard” on page 100 • “Installing Entrust IdentityGuard Server” on page 106 • “Configuring the primary Entrust IdentityGuard Server” on page 109 • “Initializing the primary Entrust IdentityGuard Server” on page 118 • “Configuring the sample application on an existing application server” on page 121 • “Running the scripts manually” on page 123 95 Preparing WebLogic for installation of IdentityGuard Complete the following tasks to prepare your WebLogic application server for Entrust IdentityGuard. Topics in this section: • “Preparing WebLogic 8.1 for installation” on page 96 • “Configuring SSL for WebLogic 8.1” on page 97 • “Preparing WebLogic 9.1 for install” on page 98 • “Configuring SSL for WebLogic 9.1” on page 98 Attention: Arrange to have a dedicated user account and group created on the servers that will host Entrust IdentityGuard. You must use the same account for any future upgrades and patches. Preparing WebLogic 8.1 for installation Complete the following procedure to prepare WebLogic 8.1 server for the installation of Entrust IdentityGuard. Note: The following steps use $WEBLOGIC as the directory in which the WebLogic server was installed, for example /usr/local/bea. $DOMAIN is the directory of the WebLogic domain where Entrust IdentityGuard is being installed, for example, /opt/bea/weblogic/samples/domains/wl_server. To prepare for install 1 Download and install the unlimited strength cryptography policy files for the Java Development Kit (JDK) being used to run WebLogic from the Sun Java Web site http://java.sun.com/j2se/1.4.2/download.html, and depending on the JRE you are using, install them in $WEBLOGIC/<java>/jre/lib/security where <java> is the directory for the Java version used by the application server. Note: It is important that you install the policy files specific to your Java Development Kit (JDK). 2 96 Extract the policy files. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide The files are extracted to a new directory called jce. You must move the two .jar files from the jce directory to the security directory. 3 To move the jar files enter: mv local_policy.jar $WEBLOGIC/<java>/jre/lib/security mv US_export_policy.jar $WEBLOGIC/<java>/jre/lib/security Note: It is recommended that you backup the existing versions of the policy files. Configuring SSL for WebLogic 8.1 You can configure SSL using public CA or self-signed certificates. SSL configuration is straightforward if you are using certificates signed by a public Certification Authority (CA) such as Entrust Certificate Services (http://www.entrust.net/index.htm). If you are using a public CA you must: • Ensure that the SSL protocol is set to SSLv3. • Have a secure connection between administration services and Web administration—128+ bit strength algorithms are recommended. If you want an SSL certificate from a public CA, use the Java keytool to create a certificate signing request (CSR). Then, follow the instructions on the public CA Web site to create a certificate. Once the certificate is created, import it and the CA certificate into your keystore using the Java keytool. For detailed instructions on configuring SSL on WebLogic, refer to http://edocs.bea.com/wls/docs91/secmanage/ssl.html. Additional steps are required if you are using a self-signed certificate. To set up a self-signed certificate you configure the Java Virtual Machine (JVM) property to javax.net.ssl.trustStore by following “To set up a self-signed certificate” on page 97 below. To set up a self-signed certificate 1 Edit $DOMAIN/startWebLogic.sh. 2 Move to the line where JAVA_OPTIONS are specified and set the argument -Djavax.net.ssl.trustStore=<$TRUST_STORE>.JKS <$TRUST_STORE>.JKS refers to the file that contains the trusted certificates. Installing Entrust IdentityGuard Server with an existing application server Feedback on guide 97 Preparing WebLogic 9.1 for install Complete the following procedure to prepare your WebLogic 9.1 server for installation of Entrust IdentityGuard. Note: In the following, $WEBLOGIC is the directory in which the WebLogic server was installed, for example, /usr/local/bea.$DOMAIN is the directory of the WebLogic domain where Entrust IdentityGuard is being installed, for example /opt/bea/weblogic/samples/domains/wl_server. To prepare for install 1 Download the unlimited strength cryptography policy files for Java 1.5.0 from the Sun Java Web site at http://java.sun.com/j2se/1.5.0/download.jsp, and depending on the JRE you are using, install them in $WEBLOGIC/<java>/jre/lib/security, where <java> is the directory for the Java version used by the application server. Note: It is important that you install the policy files specific to your Java Development Kit (JDK). 2 Extract the policy files. The files are extracted to a new directory called jce. You must move the two .jar files from the jce directory to the security directory: 3 To move the jar files enter: mv local_policy.jar $WEBLOGIC/<java>/jre/lib/security mv US_export_policy.jar $WEBLOGIC/<java>/jre/lib/security where <java> is the directory for the Java version used by the application server. Note: It is recommended that you back up the existing versions of the policy files. Configuring SSL for WebLogic 9.1 You can configure SSL using public CA or self-signed certificates. SSL configuration is straightforward if you are using certificates signed by a public Certification Authority (CA) such as Entrust Certificate Services (http://www.entrust.net/index.htm). If you are using a public CA you must: • 98 Ensure that the SSL protocol is set to SSLv3. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide • Have a secure connection between administration services and Web administration—128+ bit strength algorithms are recommended. If you want an SSL certificate from a public CA, use the Java keytool to create a certificate signing request (CSR). Then, follow the instructions on the public CA Web site to create a certificate. Once the certificate is created, import it and the CA certificate into your keystore using the Java keytool. For detailed instructions on configuring SSL on WebLogic, refer to http://edocs.bea.com/wls/docs81/index.html. Additional steps are required if you are using a self-signed certificate. You must update the command line options to start the domain. To set up a self-signed certificate 1 Edit $DOMAIN/setDomainEnv.sh. 2 Move to the line where JAVA_OPTIONS are specified and set the following argument: -Djavax.net.ssl.trustStore=<$trustStore>.jks where <$trustStore> refers to the file that contains the trusted certificates. Installing Entrust IdentityGuard Server with an existing application server Feedback on guide 99 Preparing WebSphere for installation of Entrust IdentityGuard These instructions assume that you have already installed and tested your application server and enabled SSL. They also assume that you are using the default Java Virtual Machine (JVM) in $WEBSPHERE/AppServer/java. Complete one of the following procedures, depending on your platform: • “To prepare for installation on Solaris” on page 100 • “To prepare for installation on AIX” on page 100 To prepare for installation on Solaris 1 Download and install the unlimited strength cryptography policy files for the Java Development Kit (JDK) being used to run WebSphere from the Sun Java Web site http://java.sun.com/j2se/1.4.2/download.html, and depending on the JRE you are using, install them in $WEBSPHERE/<java>/jre/lib/security where <java> is the directory for Java version used by the application server. Note: It is important that you install the policy files specific to your Java Development Kit (JDK) if you are not using J2SE 1.4.2. 2 Extract the policy files. The files are extracted to a new directory called jce. You must move the two jar files from the jce directory to the security directory. 3 To move the jar files to the security directory enter: mv local_policy.jar $WEBSPHERE/<java>/jre/lib/security mv US_export_policy.jar $WEBSPHERE/<java>/jre/lib/security 4 Repeat Step 2 and Step 3 for each JRE on your computer. Note: It is recommended that you back up the existing versions of the policy files. To prepare for installation on AIX 1 100 Download the following RPMs from AIX Toolkit for Linux applications (http://www-03.ibm.com/servers/aix/products/aixos/linux/download.html): • bash • unzip IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide • 2 zip Install each package on your AIX server. To do so, run the following command as root: rpm -i <package file> 3 Download and install the unlimited strength cryptography policy files for the Java Development Kit (JDK) being used to run WebSphere. You can download the policy files by browsing to https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=jce sdk and selecting “Unrestricted JCE Policy files for SDK 1.4.2”. 4 Install them in $WEBSPHERE/<java>/jre/lib/security, where <java> is the directory for Java version used by the application server. For example, $WEBSPHERE/AppServer/java/jre/lib/security. For further instructions, refer to http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/topic/com.ibm.websp here.base.doc/info/aes/ae/tsec_egs.html. Note: It is recommended that you back up the existing versions of the policy files. Configuring SSL for WebSphere 6.0 You can configure SSL using public CA or self-signed certificates. SSL configuration is straightforward if you are using certificates signed by a public Certification Authority (CA) such as Entrust Certificate Services (http://www.entrust.net/index.htm). If you are using a public CA you must: • Ensure that the SSL protocol is set to SSLv3. • Have a secure connection between administration services and Web administration—128+ bit strength algorithms are recommended. If you want an SSL certificate from a public CA, use the key management utility to create a certificate signing request (CSR). Then, follow the instructions on the public CA Web site to create a certificate. Once the certificate is created, import it and the CA certificate into your keystore using the key management utility. For detailed instructions on configuring SSL on WebSphere, refer to http://publib.boulder.ibm.com/infocenter/wasinfo/v6r0/index.jsp?topic=/com.ibm. websphere.base.doc/info/aes/ae/tsec_ssl.html. Additional steps are required if you are using a self-signed certificate. To set up a self-signed certificate you can do one of the following: • Import the self-signed certificate into the root store for the JRE, in $WEBSPHERE/AppServer/java/jre/lib/security/cacerts. Installing Entrust IdentityGuard Server with an existing application server Feedback on guide 101 • Set the Java Virtual Machine (JVM) property to javax.net.ssl.trustStore by following “To set up a self-signed certificate by setting the JVM property” on page 102 below. To set up a self-signed certificate by setting the JVM property 1 Start your WebSphere server from $WEBSPHERE/AppServer/bin by entering ./startServer.sh <server_name> where server_name is the name of the server you are starting. 2 Start the administration console for your server. The default URL is http://localhost:9060/ibm/console. 3 Log in to your server. The WebSphere main page appears. 4 102 From the WebSphere main page, select Servers > Application servers. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide The Application servers page appears. 5 Click the server name on which you want to deploy Entrust IdentityGuard services from the Application servers list. The Server page appears. Installing Entrust IdentityGuard Server with an existing application server Feedback on guide 103 6 104 Under Server Infrastructure, select Java and Process Management > Process Definition > Java Virtual machine > Custom Properties. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide The Custom Properties page appears. 7 Click New. The Custom Properties configuration page appears. 8 Name the new property javax.net.ssl.trustStore and set the value to <$trustStore>.jks where <$trustStore> is the name of the file that contains the trusted certificates. 9 Click OK. Installing Entrust IdentityGuard Server with an existing application server Feedback on guide 105 Installing Entrust IdentityGuard Server Install Entrust IdentityGuard on a dedicated machine. Other software products on the same machine can interfere with the operation of Entrust identityGuard. To install and configure Entrust IdentityGuard, you must have an understanding of UNIX administration. Note: Before installing Entrust IdentityGuard, ensure that you have also completed the tasks in “Preparing for installation” on page 19. To install Entrust IdentityGuard 1 As root, change to the IG_81 directory. This directory was created when you extracted the download package. 2 Run install.sh by entering: ./install.sh Note: Cancel out of the script at any time by pressing Ctrl + C or Ctrl + @. 3 Read through the license carefully, pressing Enter until you reach the end. The following message appears: Do you agree to the above license terms? [yes or no] 4 Enter yes to accept the terms. Otherwise, if you do not agree with the license, type no and press Enter. The installation will cancel. Contact Entrust (“Obtaining technical assistance” on page 16). The following message appears: Enter the UNIX user name that will own the installation: 5 Enter the user name already created for your WebLogic or WebSphere application server. The following message appears: Enter the UNIX group name that will own the installation: 6 Enter the name for the group already created for your WebLogic or WebSphere application server. The following message appears: Enter the install directory (default /opt/entrust): 106 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Note: The installer will create this directory. If someone has already created the installation directory, you must ensure that the directory permissions allow the installer to write to that directory. 7 Press Enter to accept the default, or type in another directory location. After pressing Enter, the identityguard.zip file is automatically extracted into the directory $IDENTITYGUARD_HOME, where $IDENTITYGUARD_HOME is usually /opt/entrust/identityguard81. To continue Java must already be installed. It is recommended that you use the version of Java installed on your application server. The following message appears: Enter the Java directory: 8 Enter the full directory path of the Java directory where the JCE policy files were installed. The following message appears: Entrust IdentityGuard uses the trust store of the application server. Enter the file name of the application server trust store: 9 Enter the full directory path and file name of the application server trust store. See “Configuring SSL for WebSphere 6.0” on page 101. This file sets environment variables needed to run Entrust IdentityGuard. 10 The installation creates the Entrust IdentityGuard Radius service: Creating igradius service... Do you wish the Entrust IdentityGuard Radius proxy to start automatically when the host starts after reboot? [yes or no] If you answer no, you can enable automatic startup later. If you wish to enable automatic startup in the future, run the command “igsvcconfig.sh igradius enable” when logged on as root. Note: If you want to configure your VPN servers to recognize Entrust IdentityGuard groups, you must first install Entrust IdentityGuard and define the groups. In this case, enter no. See “Configuring the Entrust IdentityGuard Radius proxy” on page 171 for further details. 11 When the initial installation steps are complete, you must respond to the following prompt: Installing Entrust IdentityGuard Server with an existing application server Feedback on guide 107 Installation complete. Do you wish to configure the application now? [yes or no] 108 • Answer yes and press Enter to start the configuration tasks. Proceed to “Configuring the primary Entrust IdentityGuard Server” on page 109. • If you answer no, you must run the configure.sh script manually from the $IDENTITYGUARD_HOME/bin directory before you can use Entrust IdentityGuard. To do so, proceed to “To run the primary Entrust IdentityGuard Server configuration manually” on page 123. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Configuring the primary Entrust IdentityGuard Server As part of the installation procedure, you are prompted to configure and initialize Entrust IdentityGuard. You can choose to complete these configuration steps at the same time as the installation or after. Refer to your installation worksheet (“Installation worksheet” on page 25) when you complete this section as you use this information to answer the prompts during configuration. Topics in this section: • “Starting the Entrust IdentityGuard configuration” on page 109 • “Adding Directory information to Entrust IdentityGuard” on page 110 • “Adding Database information to Entrust IdentityGuard” on page 114 • “Completing the Entrust IdentityGuard configuration” on page 115 Starting the Entrust IdentityGuard configuration Complete the following steps to start configuring the primary Entrust IdentityGuard Server. To start the Entrust IdentityGuard configuration 1 Respond to the following prompt: Are you configuring an Entrust IdentityGuard primary or replica server? (PRIMARY or REPLICA): • Primary. If this is your first Entrust IdentityGuard Server installation, answer primary and continue with the steps in this procedure. Note: There can only be one primary server. • Replica. If you have already installed an Entrust IdentityGuard Server, and you want to install more instances, answer replica. To configure and initialize a replica server, proceed to“Adding Entrust IdentityGuard replica servers” on page 210. 2 You are asked to indicate whether the user information is stored in an Active Directory (AD), LDAP, or database (DB) repository. Installing Entrust IdentityGuard Server with an existing application server Feedback on guide 109 What type of repository will you use to store Entrust IdentityGuard information? AD - Microsoft(R) Active Directory or Microsoft Active Directory in Application Mode LDAP - LDAP-compliant Directory DB - Database (AD, LDAP or DB): • If you are using an LDAP repository, proceed to “To add LDAP Directory information to Entrust IdentityGuard” on page 110. • If you are using an Active Directory or Active Directory Application Mode (ADAM) repository, proceed to “To add Active Directory (or ADAM) information to Entrust IdentityGuard” on page 112. • If you are using a database repository, proceed to “To add Database information to Entrust IdentityGuard” on page 114. Note: You can cancel the script at any time by pressing Ctrl + C. Adding Directory information to Entrust IdentityGuard The following steps sets up Entrust IdentityGuard to communicate with a directory repository. The steps create the identityguard.properties file based on the values you enter. Follow the appropriate steps: • if you are adding a LDAP Directory, proceed to “To add LDAP Directory information to Entrust IdentityGuard” • if you are adding Active Directory or Active Directory Application Mode, proceed to “To add Active Directory (or ADAM) information to Entrust IdentityGuard” Note: See the Entrust IdentityGuard Directory Configuration Guide for more information on LDAP and Active Directory configuration. To add LDAP Directory information to Entrust IdentityGuard 1 Respond to the following prompt: LDAP CONFIGURATION 110 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Do you wish to use SSL to connect to the LDAP server? [yes or no] Note: You can enable LDAPS after installation. For instructions, see “Securing the LDAP connection with SSL” on page 233. 2 If you answered yes, the following message appears: Make sure that SSL certificate of the LDAP server is installed into the application server trust store. If you answer no, no further message appears. 3 At the following prompt, enter the host name or IP address of the computer hosting the Directory: Enter the LDAP host (ex: identityguard.anycorp.com): 4 Enter the port number of the Directory: Enter the LDAP port number (default is 389): The default port for LDAPS is 636. 5 Enter the LDAP base DN (the DN under which all Entrust IdentityGuard entries are found): Enter the LDAP base DN (ex: dc=anycorp,dc=com): Note: Entrust IdentityGuard configuration automatically converts spaces in the Active Directory base DN to %20. If you edit the Active Directory base DN after installation in the identityguard.properties file, remember to replace spaces with %20. 6 Enter the LDAP user DN information at the following prompts. The LDAP user DN and password define the credentials used by Entrust IdentityGuard to connect to the repository. Enter the LDAP user DN (ex: cn=Directory Manager): This is an existing LDAP user DN. Enter the LDAP password: Confirm: This is an existing LDAP password. 7 At the following prompt, enter the RDN of the entry that Entrust IdentityGuard should use to store its policy information: Installing Entrust IdentityGuard Server with an existing application server Feedback on guide 111 The LDAP policy RDN defines the entry in the LDAP repository used to store Entrust IdentityGuard policy information. The entry must already exist. Enter the LDAP policy RDN (ex: uid=policy): The RDN is the prefix that, when joined with the base DN, comprises the full DN of the policy object. 8 At the following prompt, enter the attribute that uniquely identifies Entrust IdentityGuard users: The LDAP user name is the attribute that uniquely identifies Entrust IdentityGuard users. Entrust IdentityGuard uses this attribute to find entries in the repository. Enter the LDAP user name attribute (ex: uid): Proceed to “To complete the configuration script” on page 115. To add Active Directory (or ADAM) information to Entrust IdentityGuard 1 Respond to the following prompt: MICROSOFT ACTIVE DIRECTORY CONFIGURATION Do you wish to use SSL to connect to the Microsoft Active Directory server? [yes or no] 2 If you answered yes, the following message appears: Make sure that SSL certificate of the of the Microsoft Active Directory server is installed into the application server trust store. If you answer no, no further message appears. 3 At the following prompt, enter the host name or IP address of the computer hosting the Directory: Enter the Microsoft Active Directory host (ex: identityguard.anycorp.com): 4 Enter the port number of the Directory: Enter the Microsoft Active Directory port number (default is 636): If you do not use SSL to connect to ADAM, the default port is 389. 5 Enter the Active Directory base DN (the DN under which all Entrust IdentityGuard entries are found): Enter the Microsoft Active Directory base DN (ex: dc=anycorp,dc=com): 112 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Note: Entrust IdentityGuard configuration automatically converts spaces in the Active Directory base DN to %20. If you edit the Active Directory base DN after installation in the identityguard.properties file, remember to replace spaces with %20. 6 Enter the Active Directory user DN information at the following prompts. The Active Directory user DN and password define the credentials used by Entrust IdentityGuard to connect to the repository. Enter the Microsoft Active Directory user DN (ex: cn=Administrator,cn=Users,dc=anycorp,dc=com): This is an existing Active Directory user DN. Enter the Microsoft Active Directory password: Confirm: This is an existing Active Directory password. 7 At the following prompt, enter the RDN of the entry that Entrust IdentityGuard should use to store its policy information: The policy RDN defines the entry in the Microsoft Active Directory repository used to store Entrust IdentityGuard policy information. The entry must already exist. Enter the Microsoft Active Directory policy RDN (ex: cn=igpolicy,cn=Users): The RDN is the prefix that when joined with the base DN, comprises the full DN of the policy object. 8 At the following prompt, enter the attribute that uniquely identifies Entrust IdentityGuard users: The Microsoft Active Directory user name is the attribute that identifies Entrust IdentityGuard users. Entrust IdentityGuard uses this attribute to find entries in the repository. Enter the Microsoft Active Directory user name attribute (ex: sAMAccountName): Proceed to “To complete the configuration script” on page 115. Installing Entrust IdentityGuard Server with an existing application server Feedback on guide 113 Adding Database information to Entrust IdentityGuard The following steps sets up Entrust IdentityGuard to communicate with a database repository. The steps create the identityguard.properties file based on the values you enter. Note: See the Entrust IdentityGuard Database Configuration Guide for more information on database configuration. To add Database information to Entrust IdentityGuard 1 Respond to the following prompt: DATABASE CONFIGURATION Enter the database type (Oracle, DB2, SQLServer, Other): Enter the type of database you are using. The following message appears: Enter the JDBC driver JAR file name: 2 Enter the path of the JDBC driver file (for example, /temp/ojdbc14.jar). Ensure that the file permissions on this file allow the Entrust IdentityGuard user to read and execute it. Note: Some databases require multiple .jar files. You can add other files in a later step. 3 At the following prompt, enter the JDBC driver class that Entrust IdentityGuard should use. For example, oracle.jdbc.driver.OracleDriver. Enter the JDBC driver class name: The following message appears: Are there any other JDBC JAR files to be installed? [yes or no] Press Enter. 4 If your database requires multiple JDBC driver files, type yes and press Enter. You are prompted to enter more file names. If your database only requires one file, type no and press Enter to continue. The following message appears: Enter the DB URL: 5 114 Enter the database URL Entrust IdentityGuard requires to connect to the database server. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 6 Provide Entrust IdentityGuard with the database administrator information. This database administrator was created to own the Entrust IdentityGuard database and schema. a At the following prompt, enter the database administrator user name: Enter the DB userid: b At the following prompts, enter and confirm the database administrator password: Enter the DB password: Confirm: The following message appears: Enter the DB schema name: c Enter the schema name for your database. In some databases (for example, Oracle), the schema is automatically named with the user name associated with it. For these databases, type the database administrator user name. Completing the Entrust IdentityGuard configuration The following steps complete the initial configuration of Entrust IdentityGuard. Attention: It is important that you do not allow non-SSL access to the Administration Service. Allowing non-SSL access could severely compromise the security of your system. To complete the configuration script 1 You are prompted for the ports that the Application server should use. Client applications—through the use of the IdentityGuardAuthAPI client toolkit—communicate with the Entrust IdentityGuard Authentication service to perform challenge retrieval and response validation. The client toolkit communicates with Entrust IdentityGuard using SOAP over HTTP/HTTPS. The following prompts define the ports that Entrust IdentityGuard services listen on. Enter a value for each. Note: The http and https ports should be the ones used by your application server. APPLICATION SERVER CONFIGURATION Installing Entrust IdentityGuard Server with an existing application server Feedback on guide 115 a Enter the Authentication Service HTTP port number: b Enter the Authentication Service HTTPS port number: The Entrust IdentityGuard Authentication service and the Entrust IdentityGuard sample application are deployed at both the HTTP and HTTPS ports. c Enter the Administration Service HTTPS port number: This is the port that administration applications use to connect to the Administration service when using SSL (HTTPS). Note: The Authentication Service HTTPS and Administration Service HTTPS port numbers can be the same. 2 You are prompted to confirm the host name used in the service URLs. The hostname to be used in the service URLs is <hostname>. Do you want to use this hostname? [yes or no] Enter yes to use this host name or enter no to choose another host name. 3 You are prompted to configure Entrust IdentityGuard logs: LOG CONFIGURATION a The following question appears: Should Entrust IdentityGuard log to files or syslog? [FILE or SYSLOG]: If you answer file, Entrust IdentityGuard displays the location of the files and configuration is complete. b If you answer syslog, logs are logged to Syslog. Entrust IdentityGuard prompts you for the host name. Enter the syslog host name (default is localhost): Ensure that Syslog on this host is configured to accept Entrust IdentityGuard logs. For more information, see the section “Configuring Syslog for remote logging on UNIX” on page 226. 4 The following message appears: Do you want to configure the Entrust IdentityGuard Radius Proxy? [yes or no] Do one of the following: • 116 If you plan to use a Radius server for first-factor authentication and are not using VPN groups, enter yes. Proceed to Step 4 in “To configure the Radius proxy on UNIX” on page 180. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 5 • If you plan to use a Radius server for first-factor authentication and you want to configure your VPN servers to recognize Entrust IdentityGuard groups, you need to first complete the configuration and initialization of Entrust IdentityGuard and define the groups. In this case, enter no. • If you plan to use a Windows domain controller or LDAP directory for first-factor authentication, enter yes. Follow the instructions under “Using Entrust IdentityGuard groups with a VPN server” on page 175. • Otherwise, enter no. When you finish the configuration procedure, this message appears: Configuration complete. Do you wish to initialize the primary system? [yes or no] • Enter yes to start the initialization tasks. Proceed to “Initializing the primary Entrust IdentityGuard Server” on page 118. • If you enter no you must run the init command in the supersh command shell from the $IDENTITYGUARD_HOME/bin directory before you can use Entrust IdentityGuard. Proceed to “To initialize the primary Entrust IdentityGuard Server manually” on page 123. Installing Entrust IdentityGuard Server with an existing application server Feedback on guide 117 Initializing the primary Entrust IdentityGuard Server Complete the following procedure to initialize the primary Entrust IdentityGuard Server on your system. Topics in this section: • “What initialization does” on page 118 • “If initialization fails” on page 118 • “Initializing the primary server” on page 119 What initialization does Initialization creates master keys and the various policy structures. The identityguard.properties file specifies two files that are used to store the keys that protect the repository and the master users. The files that store this information are: • Entrust IdentityGuard master keys file (masterkeys.enc)—a file containing the encryption keys that protect the repository. • Entrust IdentityGuard key protection file (masterkeys.kpf)—a file containing an obfuscation key which is used to encrypt the three master user passwords that are stored in the file. The contents of the master keys file can be unlocked by a master user. The contents of the key protection file provide access to the master user passwords. This access can then be used to unlock the master keys file. If initialization fails The most likely causes of an initialization failure are: • The Entrust IdentityGuard properties file contains invalid values. To resolve this, go to $IDENTITYGUARD_HOME/etc/identityguard.properties and edit the file. • Your repository is not configured correctly to work with Entrust IdentityGuard. • The repository is not running. For more information on Entrust IdentityGuard error messages, see Entrust IdentityGuard Error Messages included with your documentation package. 118 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Initializing the primary server This section provides the steps necessary to initialize the primary server. To initialize the primary Entrust IdentityGuard Server during installation 1 Respond to the following prompt: PRIMARY SYSTEM INITIALIZATION If you are reinstalling Entrust IdentityGuard, the following prompt appears: An existing system has been detected. Overwriting an existing system will mean the existing data can no longer be accessed. Are you sure you want to overwrite the existing system? (y/n) [n]: Attention: If you are using an LDAP repository, and you run init -overwrite, you must first manually remove the fpcr directory located at $IDENTITYGUARD_HOME/etc/fpcr/ as well as the ftkr directory located at $IDENTITYGUARD_HOME/etc/ftkr. Attention: If you reinitialize an Entrust IdentityGuard system by running init -overwrite, you must first replace any encrypted values in the identityguard.properties file with cleartext values because Entrust IdentityGuard cannot decrypt the old values once the reinitialization is performed. See the section “Editing property values” on page 257. When you answer y, the command init -overwrite runs automatically. The init command: • generates a new master key and stores it in the master keys file • generates the key protection file • initializes default policy settings If you answer n or if initialization fails, you must run the init command in the master user shell (supersh) at a later time. For steps for initializing manually, see the section “To initialize the primary Entrust IdentityGuard Server manually” on page 123. Note: You can cancel the script at any time by pressing Ctrl + C. The following messages appear: Enter install key: Installing Entrust IdentityGuard Server with an existing application server Feedback on guide 119 Enter activation key: 2 Enter the installation key and the activation key you received from Entrust. Once the activation key is validated, master keys are then generated. Attention: The two master keys files are created in $IDENTITYGUARD_HOME/etc. After initialization, back up masterkeys.enc. If this file is lost, the system cannot be recovered. See the system restore procedure in “Restoring Entrust IdentityGuard from a backup” on page 250. Do not back up the key protection file (masterkeys.kpf). The masterkeys.kpf file is unique to each server. 3 Type the three master user passwords for the user names—Master1, Master2, and Master3. The passwords must meet the following criteria: • be over eight characters in length • contain upper and lowercase characters • contain a numerical value The following prompts are displayed: Enter a new password for Master1. Password: Confirm: Enter a new password for Master2. Password: Confirm: Enter a new password for Master3. Password: Confirm: 4 When you have finished creating passwords, the following message is displayed: System initialized. Do you wish to setup the sample application [yes or no] 120 • Enter yes to configure the sample application. Proceed to “Configuring the sample application on an existing application server” on page 121. • If you enter no you can optionally configure the sample application later. Proceed to “Deploying Entrust IdentityGuard services on an existing application server” on page 127. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Configuring the sample application on an existing application server Entrust IdentityGuard provides a sample Web application that includes user registration functionality as well as various authentication samples. This sample requires an administrator user name and password. If you are using a directory you must create the administrator before configuring the sample application. For more information on the sample application, see the Entrust IdentityGuard Administration Guide. Attention: The sample administrator password is stored in clear text in the file $IDENTITYGUARD_HOME/etc/igsample.properties. For security reasons, disable the sample application when you are not using it. The configsample.sh script creates the following: • a role called samplerole • a policy called samplepolicy • a group called samplegroup • an administrator in the samplegroup (the administrator has access to the samplegroup) • an igsample.properties file If you are configuring the sample application manually, refer to “To configure the Entrust IdentityGuard Server sample application manually” on page 125. To configure the sample application 1 You are prompted to enter the user name for the sample administrator. Enter adminid for sample administrator: 2 You are prompted to enter and confirm a password: Enter password for sample administrator: Confirm: The password must meet the following criteria: 3 • be over eight characters in length • contain upper and lowercase characters • contain a numerical value Log in as a master user to complete the setup. You are prompted for a master user name and password: Installing Entrust IdentityGuard Server with an existing application server Feedback on guide 121 Userid: Password: 4 When you are finished setting up the sample, the following message appears: Setup of Entrust IdentityGuard sample successful. You can now deploy the sample Web application from your application server (see “Deploying Entrust IdentityGuard services on an existing application server” on page 127). 122 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Running the scripts manually If you did not run the scripts during the installation procedure, you have the option to manually run the configuration and initialization scripts. To run the primary Entrust IdentityGuard Server configuration manually 1 Log in as the UNIX user that belongs to the UNIX group that was specified during the installation. See “To install Entrust IdentityGuard” on page 106. 2 Change to $IDENTITYGUARD_HOME (default is /opt/entrust/identityguard81). 3 From $IDENTITYGUARD_HOME, source the environment settings file by entering . ./env_settings.sh (Include a space between the two periods in the command.) 4 Run the configure.sh script. If you have previously configured Entrust IdentityGuard, the following message appears: An identityguard.properties file exists. If you continue, this file will be overwritten. Do you want to continue? [yes or no] 5 Enter yes and continue from Step 1 of the “To start the Entrust IdentityGuard configuration” on page 109. To initialize the primary Entrust IdentityGuard Server manually 1 Log in as the UNIX user that belongs to the UNIX group that was specified during the installation. See “To install Entrust IdentityGuard” on page 106. 2 Go to $IDENTITYGUARD_HOME. 3 From $IDENTITYGUARD_HOME, source the environment settings file by entering . ./env_settings.sh (Include a space between the two periods in the command.) 4 Enter the following command to start the master user shell: supersh Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt. Installing Entrust IdentityGuard Server with an existing application server Feedback on guide 123 Note: You can view copyright and version information at any time by entering version at the command prompt. 5 Enter init <optionalvalues> where <optionalvalues> are listed in Table 10: Table 10: Initialization optional values Values Description -sernum To start card serial numbers at a specific number, enter init -sernum <num> where <num> is a positive integer. Defaults to 1 if not specified. Use this option if you are adding additional cards to your system. For example, if you have previously loaded 350 cards, enter: init -sernum 351 -overwrite If the system was initialized previously, this command overwrites the existing data. You are prompted to confirm that you want existing data to be overwritten. Attention: If you are using an LDAP repository, and you run init -overwrite, you must first manually remove the fpcr folder located at $IDENTITYGUARD_HOME/etc/fpcr/. Attention: If you reinitialize an Entrust IdentityGuard system by running init -overwrite, you must first replace any encrypted values in the identityguard.properties file with cleartext values because Entrust IdentityGuard cannot decrypt the old values once the reinitialization has been performed. See the section “Editing property values” on page 257. -force 124 If you use the -force option, you are not prompted for confirmation. 6 Complete Step 2 and Step 3 on page 120. 7 Type exit to leave the command shell. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 8 Check the log files for errors. If you chose to log to files when you installed Entrust IdentityGuard, the logs are stored in $IDENTITYGUARD_HOME/logs. To configure the Entrust IdentityGuard Server sample application manually 1 Log in as the UNIX user that belongs to the UNIX group that was specified during the installation. See “To install Entrust IdentityGuard” on page 106. 2 Change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81). 3 From $IDENTITYGUARD_HOME, source the environment settings file by entering . ./env_settings.sh (Include a space between the two periods in the command.) 4 Run the configsample.sh script. 5 You are prompted to enter the user name for the sample administrator. Enter adminid for sample administrator: 6 You are prompted to enter and confirm a password: Enter password for sample administrator: Confirm: The password must meet the following criteria: 7 • be over eight characters in length • contain upper and lowercase characters • contain a numerical value Log in as a master user to complete the setup. You are prompted for a master user name and password: Userid: Password: 8 When you are finished setting up the sample, the following message is displayed: Setup of Entrust IdentityGuard sample successful. To make changes to the sample Web application configuration 1 Log in as the UNIX user that belongs to the UNIX group that was specified during the installation. See “To install Entrust IdentityGuard” on page 106. 2 Change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81). 3 From $IDENTITYGUARD_HOME, source the environment settings file by entering Installing Entrust IdentityGuard Server with an existing application server Feedback on guide 125 . ./env_settings.sh (Include a space between the two periods in the command.) 4 Enter the following command to start the master user shell: supersh Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt. 5 Log in as a master user. For example, Master1 6 If you have previously configured the sample, delete each of the following individually: • sample administrator • sample group • sample role • sample policy To do so: a Run the delete command for each. For example, admin delete sample/SampleAdmin1 Note: Use the list command to list sample administrators, groups, roles, and policies, so that you can see which ones to delete. For example, use admin list to list all the sample administrators that have already been created. Use group list, to list the sample groups that exist, and so on. b Answer yes to confirm the delete. Are you sure you wish to delete the admin? (y/n) [n]: 7 Type exit to exit the master user shell and return to the command-line. 8 Enter the following command to start configuring the sample: configsample.sh 9 You are warned that the igsample.properties file already exists. For example: /opt/entrust/identityguar81/etc/igsample.properties file already exists. Do you wish to continue? [yes or no] Answer yes. 10 Follow the steps in “To configure the sample application” on page 121. 126 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Chapter 5 Deploying Entrust IdentityGuard services on an existing application server This chapter provides all the necessary steps to deploy Entrust IdentityGuard services using the WebLogic 8.1 or 9.1 or WebSphere 6.0 application servers. This chapter contains the following sections: • “Deploying Entrust IdentityGuard services on WebLogic” on page 128. • “Deploying Entrust IdentityGuard services on WebSphere 6.0 application server” on page 142 • “Testing your installation” on page 162 • “Managing the Entrust IdentityGuard service” on page 166 127 Deploying Entrust IdentityGuard services on WebLogic Once you have installed Entrust IdentityGuard on a WebLogic 8.1 or 9.1 application server, you must install and deploy the Entrust IdentityGuard services. The process is different depending on the version of WebLogic you are using. Topics in this section: • “Deploying Entrust IdentityGuard services on WebLogic 8.1 application server” on page 128 • “Deploying Entrust IdentityGuard services on WebLogic 9.1 application server” on page 134 Deploying Entrust IdentityGuard services on WebLogic 8.1 application server To deploy Entrust IdentityGuard services on a WebLogic 8.1 application server you must: • extract and install the Entrust IdentityGuard service files • deploy the Entrust IdentityGuard services Note: In the following, $WEBLOGIC is the directory in which the WebLogic server was installed. $DOMAIN is the directory of the WebLogic domain where Entrust IdentityGuard is being installed, for example /bea/weblogic81/samples/domains/wl_server. To install Entrust IdentityGuard services 1 Install the native libraries libaal2sdk.so and libualjni.so required by Entrust IdentityGuard to one of the directories listed in the LD_LIBRARY_PATH environment variable. The native libraries are located in $IDENTITYGUARD_HOME/lib/solaris. Enter at the command line: LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/opt/entrust/identityguard81/lib/ solaris/;export LD_LIBRARY_PATH Note: Substitute the correct installation directory if it is different from the default /opt/entrust. 128 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 2 Edit the domain startup script $DOMAIN/startWebLogic.sh and add enttoolkit.jar, log4j-1.2.14.jar and any database driver .jar files to the line that sets the CLASSPATH environment variable. 3 Still in $DOMAIN/startWebLogic.sh, move to the line where it sets JAVA_OPTIONS, and at the end add -Didentityguard.home=/opt/entrust/identityguard81 Note: Substitute the correct install directory if it is different from the default /opt/entrust and add the line if there is currently no setting of JAVA_OPTIONS. 4 At the command line, go to (cd) to $IDENTITYGUARD_HOME/services/auth. 5 Create a directory named IdentityGuardAuthService. 6 Go to (cd) to the IdentityGuardAuthService directory. 7 Using the jar tool from the WebLogic JDK ($WEBLOGIC/jdk_141_05/bin/jar), extract the file IdentityGuardAuthService.war by entering the following at the command line: jar xvf ../IdentityGuardAuthService.war A new directory called WEB-INF is created. 8 Go to (cd) to the WEB-INF directory, and create a file named weblogic.xml and give it the following content: Note: The file name is case-sensitive. <!DOCTYPE weblogic-web-app PUBLIC "-//BEA Systems, Inc.//DTD Web Application 8.1//EN" "http://www.bea.com/servers/wls810/ dtd/weblogic810-web-jar.dtd"> <weblogic-web-app> <container-descriptor> <prefer-web-inf-classes>true</prefer-web-inf-classes> </container-descriptor> </weblogic-web-app> 9 In $IDENTITYGUARD_HOME/services/admin create a directory named IdentityGuardAdmin. 10 Go to the IdentityGuardAdmin directory. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 129 11 Extract IdentityGuardAdmin.war by entering the following at the command line: jar xvf ../IdentityGuardAdmin.war 12 Repeat Step 8. 13 In $IDENTITYGUARD_HOME/services/admin, create a directory named IdentityGuardAdminService. 14 Change to the IdentityGuardAdminService directory. 15 Extract IdentityGuardAdminService.war by entering the following at the command line: jar xvf ../IdentityGuardAdminService.war 16 Repeat Step 8. 17 Optionally, deploy the sample application: a In $IDENTITYGUARD_HOME/services/auth, create a directory named IdentityGuardSampleApp. b Change to the IdentityGuardSampleApp directory. c Extract IdentityGuardSampleApp.war by entering the following at the command line: jar xvf ../IdentityGuardSampleApp.war d Repeat Step 8. To deploy Entrust IdentityGuard services 1 Start your WebLogic domain from $DOMAIN by entering ./startWeblogic.sh 2 Start the administration console for your server (default URL http://localhost:7001/console) and log in. The WebLogic 8.1 main page appears. 130 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 3 From the WebLogic 8.1 main page, select Deployments > Web Application Modules. The Deploy a Web Application Module page appears. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 131 4 Click the Deploy a New Web Application link. The Select the archive for this Web application module page appears. 5 Browse through the location link to locate the directory where authentication service WAR file, was extracted. The directory is $IDENTITYGUARD_HOME/services/auth/IdentityGuardAuthService The Select the archive for this Web application module page appears. 132 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 6 Click the radio button to the left of the directory IdentityGuardAuthService and then click Target Module. The Review your choices and deploy page appears. 7 After reviewing your choices, click Deploy. A deployment status page appears showing the status of the Web application deployment. 8 Repeat Step 3 through Step 7 to install the Administration service from $IDENTITYGUARD_HOME/services/admin/IdentityGuardAdminService Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 133 9 Repeat Step 3 through Step 7 to install the Administration interface from $IDENTITYGUARD_HOME/services/admin/IdentityGuardAdmin 10 Optionally, repeat Step 3 through Step 7 to enable the sample application from $IDENTITYGUARD_HOME/services/auth/IdentityGuardSampleApp. Deploying Entrust IdentityGuard services on WebLogic 9.1 application server To deploy Entrust IdentityGuard services on a WebLogic 9.1 application server you must: • extract and install the entrust IdentityGuard service files • deploy the Entrust IdentityGuard services Note: In the following, $WEBLOGIC is the directory in which the WebLogic server was installed, and $DOMAIN is the directory of the WebLogic domain where Entrust IdentityGuard is being installed, for example /opt/bea/weblogic91/samples/domains/wl_server. To install and deploy Entrust IdentityGuard services 1 Install the native libraries libaal2sdk.so and libualjni.so required by Entrust IdentityGuard to one of the directories listed in the LD_LIBRARY_PATH environment variable. The native libraries are located in $IDENTITYGUARD_HOME/lib/solaris. Install them by entering at the command line: LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/opt/entrust/identityguard81/lib/ solaris/;export LD_LIBRARY_PATH Note: Substitute the correct installation directory if it is different than the default /opt/entrust. 2 Copy enttoolkit.jar, log4j-1.2.14.jar found in $IDENTITYGUARD_HOME/lib and any database driver .jar files to $DOMAIN/lib. All .jar files in this directory are added to the Classpath environment when the server starts. 3 134 Edit the domain startup script that sets the environment variables, $DOMAIN/bin/setDomainEnv.sh. Move to the line that sets JAVA_OPTIONS IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide and add -Didentityguard.home=/opt/entrust/identityguard81 to the end of the line. Note: Your installation directory may be different. 4 Start your WebLogic server from $DOMAIN/bin by typing: ./startWebLogic.sh 5 Start the administration console for your server (the default URL is http://localhost:7001/console) and log in. The WebLogic main page appears. 6 Under Change Center click Lock & Edit. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 135 7 Under Domain Configurations, click Deployments. The Summary of Deployments page appears. 8 Click Install. The Install Applications Assistant page appears. 9 Click Upload your file(s) located in the Note paragraph. The Install Application Assistant appears prompting you to upload a deployment to the administration server. 136 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 10 Click Browse to the right of Deployment Archive to locate the authentication service WAR file, IdentityGuardAuthService.war and click Open. The file is located in $IDENTITYGUARD_HOME/services/auth/IdentityGuardAuthService.war 11 Click Next on the Install Applications Assistant page to upload a deployment to the administration server. The Install Applications Assistant page updates so that you can locate the deployment to install and prepare for deployment. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 137 12 Click the radio button to the left of the file name IdentityGuardAuthService.war to locate the deployment to install and prepare for deployment. 13 Click Next. The Install Applications Assistant page updates and prompts you to choose a targeting style. 14 Select Install this deployment as an application, and then click Next. The Install Applications Assistant page updates with optional settings. 138 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 15 Accept the default optional settings and click Next. The Install Applications Assistant page updates to enable you to review your choices. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 139 16 Review the choices, and click Finish. The Settings for IdentityGuardAuthService page appears. 17 Under Change Center in the top left of the page, click Activate Changes to accept the changes. 18 Repeat Step 6 through Step 17 to install the Administration service ($IDENTITYGUARD_HOME/services/admin/IdentityGuardAdminServic e.war). 19 Repeat Step 6 through Step 17 to install the Administration interface ($IDENTITYGUARD_HOME/services/admin/IdentityGuardAdmin.war). 20 Optionally, repeat Step 6 through Step 17 to enable the sample application ($IDENTITYGUARD_HOME1/services/auth/IdentityGuardSampleApp.w ar). 21 Under Domain Structure on the main page, click Deployments. 140 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide The IdentityGuard deployments display in a prepared state, but they are not running yet. 22 Select the checkbox for each Entrust IdentityGuard application. 23 Click the Start drop-down menu. 24 Select Start servicing all requests. The Start Application Assistant page appears. 25 Click Yes to start deployments. Entrust IdentityGuard is now up and running. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 141 Deploying Entrust IdentityGuard services on WebSphere 6.0 application server After completing installation of Entrust IdentityGuard server, you must deploy IdentityGuard services on a WebSphere application server. Topics in this section: • “Defining and deploying shared library settings” on page 142 • “Installing Entrust IdentityGuard services on WebSphere 6.0” on page 155 Defining and deploying shared library settings You must define the shared library settings for the Security Toolkit for Java Platform, your Entrust tokens (if applicable), and the database driver. To define shared library settings 1 Start your WebSphere server from $WEBSPHERE/AppServer/bin by entering ./startServer.sh <server_name> where server_name is the name of the server you are starting. 2 Start the administration console for your server. The default URL is http://localhost:9060/ibm/console. 3 Log in to your server. The WebSphere main page appears. 142 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 4 From the WebSphere main page, click Environment > Shared Libraries. The Shared Libraries page appears. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 143 5 Click the Node scope for the library and click Apply. 6 Under Preferences, click New. The New Shared Libraries page appears prompting you to define the settings for the shared library. These are the settings for the Security Toolkit for Java Platform. 144 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 7 8 Define the Shared Library settings: a In the Name field, type Security Toolkit for Java Platform b Leave the Description field blank. c Set the Classpath to the enttoolkit.jar file to /opt/entrust/identityguard81/lib/enttoolkit.jar d If the log4j-1.2.14.jar file is not already a shared library, also add /opt/entrust/identityguard81/lib/log4j-1.2.14.jar e Set the Native library path to /opt/entrust/identityguard81/lib/solaris or /opt/entrust/identityguard81/lib/aix Click OK. You are returned to the Shared Libraries page. Security Toolkit for Java Platform appears in the preferences list and a message displays indicating that changes have been made to your local configuration and that the server may need to be restarted for the changes to take place. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 145 9 Click Save to save the changes, but do not restart the server at this time. The Shared Libraries Save page appears prompting you to click Save to update the master repository with changes. 146 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 10 Click Save to return to the Shared Libraries page. 11 If your installation will uses Vasco tokens, repeat Step 6 to Step 10 to define a shared token library. • Add a Classpath for each of the following: /opt/entrust/identityguard81/lib/aal2wrap.jar • The library path is /opt/entrust/identityguard81/lib/solaris 12 If using a database, repeat Step 6 to Step 10 to define the database driver library file. 13 Click Save. To deploy shared libraries 1 From the WebSphere server main page, click Servers > Application Servers. The Application servers page appears. 2 Click the server name on which you want to deploy Entrust IdentityGuard services from the Application servers list. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 147 The Server page appears. 3 148 Under Server Infrastructure, click Java and Process Management > Class loader. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide The Application servers Class Loader page appears. 4 Select the class loader from the list. If there are no class loaders defined: a Click New to create a new class. The Class loader configuration page appears. b Select Class loader mode Parent First. c Click OK. You are returned to the Server page and a Class Loader appears in the preferences list. d Select the Class loader. The Class loader configuration page appears. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 149 5 Under Additional Properties, select Libraries. The Application servers Library Reference page appears. 6 Click Add. The Application server Library Reference General Properties page appears. 150 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 7 Under Library name, select Security Toolkit for Java Platform. 8 Click OK. The Library Reference page updates with Security Toolkit for Java Platform listed in the preferences list. 9 Repeat Step 6 to Step 8 for the Entrust token library and, optionally, the database driver library. 10 Return to the server page from Step 2. You can do this by clicking the server name from the Library Reference page. 11 From the server page, click Java and Process Management > Process Definition > Java Virtual Machine > Custom Properties. The Custom Properties page appears. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 151 12 Click New. The Custom Properties configuration page appears. 13 Name the new property identityguard.home. 14 Set the value to the install directory of Entrust IdentityGuard to /opt/entrust/identityguard81 15 Click OK. 152 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Note: When using the default JDK on Solaris, applications running in WebSphere do not understand the HTTPS protocol. To resolve this issue, you must define another custom property with the name java.protocol.handler.pkgs and value com.ibm.net.ssl.www.protocol. 16 Click Save followed by Save on the Custom Properties Save page. 17 Repeat Step 12 to Step 16 to define the java.protocol.handler.pkgs custom property. Note: Ensure that you have also set up the javax.net.ssl.trustStore custom property if you are using self-signed certificates (see “Configuring SSL for WebSphere 6.0” on page 101). 18 If you are using AIX, complete this step. On Solaris, proceed to Step 19 on page 155. a Return to the server page from Step 2. b From the server page, click Java and Process Management > Environment Entries. The Application server Custom Properties page opens. c Click New. The General Properties page opens. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 153 d 154 Set Name to LIBPATH (all caps) and Value to the path of the native libraries. For example, /opt/entrust/identityguard81/lib/aix. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide e Click Apply. You are returned to the Custom Properties page. f Click Save followed by Save. 19 Restart the server. Installing Entrust IdentityGuard services on WebSphere 6.0 After setting the shared libraries you can deploy the Entrust identityGuard authentication and administration services. To install Entrust IdentityGuard services 1 From the WebSphere main page, select Applications > Install New Application. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 155 The Preparing for the application installation page appears. 2 Click Browse under Specify path to locate the authentication service WAR file, IdentityGuardAuthService.war, which is most likely in /opt/entrust/identityguard81/services/auth/. 3 Type /IdentityGuardAuthService in the Context Root text box. 4 Click Next. The Preparing for the application installation page updates prompting you to choose to generate default bindings and mappings. 5 156 Select Generate Default Bindings and click Next. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide An Application Security Warnings page appears warning about contents of the was.policy file. 6 Accept the warning and click Continue. The Install New Application page updates prompting you to select your installation options. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 157 7 Select the installation options. You can select to keep the default settings or, optionally in the Directory to install application text box, specify an installation directory and remove _war from the Application name. 8 Click Next. The Map modules to servers page appears. 158 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 9 On the Map Modules to Servers page, select the server(s) on which to deploy the Entrust IdentityGuard authentication service. Note: You must select at least one server. 10 Click Next. The Map virtual hosts for Web modules page appears. 11 On the Map Virtual Hosts for Web Modules page, select the virtual host to deploy the Entrust IdentityGuard authentication service. 12 Click Next. The Summary page appears. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 159 13 Review the details on the Summary page, and click Finish. WebSphere attempts to load the Entrust IdentityGuard authentication service. If this fails, consult the WebSphere logs for the domain to see why. When installation completes the following message appears: Application IdentityGuardAuthServices installed successfully. To start the application, first save changes to the master configuration. 14 Click Save to Master Configuration. The Save page appears. 15 Click Save. 16 Repeat Step 1 through Step 15 to install the administration service from /opt/entrust/identityguard81/services/admin/IdentityGuardAdm inService.war 17 Repeat Step 1 through Step 15 to install the Web interface from /opt/entrust/identityguard81/services/admin/IdentityGuardAdm in.war. 18 Optionally, repeat Step 1 through Step 15 to install the sample applicationfrom opt/entrust/identityguard81/services/auth/IdentityGuardSampl eApp.war. 160 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide To start Entrust IdentityGuard services 1 From the WebSphere main menu, select Applications > Enterprise Applications. The Enterprise Applications page appears. 2 Select the box next to Entrust IdentityGuard service(s), and then click Start. A message appears indicating that the services have started successfully. Note: You can select to start multiple services simultaneously. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 161 Testing your installation This section provides testing steps that determine if your installation is working properly. It assumes that you have completed the installation, configuration, and initialization tasks. To test your installation 1 Check the log files for errors. If you chose to log to files when you installed Entrust IdentityGuard, the logs are stored in $IDENTITYGUARD_HOME/logs. 2 Start the Entrust IdentityGuard Server as the Entrust IdentityGuard application owner. For instructions, see “Query the status of Entrust IdentityGuard service” on page 166. 3 Check whether all Entrust IdentityGuard services are running as expected. a Source env_settings.sh by entering: . ./env_settings.sh b Enter igservice.sh all status The following shows part of the status report generated when all services are running: Authentication V1 service at http://<hostname>/IdentityGuardAuthService/services/Authenticat ionService is available. Authentication V1 service at https://<hostname>/IdentityGuardAuthService/services/Authentica tionService is available. Authentication V2 service at http://<hostname>/IdentityGuardAuthService/services/Authenticat ionServiceV2 is available. Authentication V2 service at https://<hostname>/IdentityGuardAuthService/services/Authentica tionServiceV2 is available. Sample application at http://<hostname>/IdentityGuardSampleApp is available. 162 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Administration V1 service at https://<hostname>/IdentityGuardAdminService/services/AdminServ ice is available. Administration V2 service at https://<hostname>/IdentityGuardAdminService/services/AdminServ iceV2 is available. Administration interface at https://<hostname>/IdentityGuardAdmin is available. 4 Ensure that you can log in to the Administration Web interface. a Create an administrator account or use the sample administrator account, if you have configured the sample application. For information on creating an administrator, refer to the Entrust IdentityGuard Administration Guide. b Open a browser and enter the following URL: https://<FQDN>:<port>/IdentityGuardAdmin where: – <FQDN> is the Entrust IdentityGuard host name. – <port> is the Administration interface service port. Note: If you cannot access the Entrust IdentityGuard services (administration or authentication), verify that firewall rules are not blocking the HTTP and HTTPS ports. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 163 c At the login page, enter the administrator user name and password. Optionally, enter the group name, if the user does not belong to the default group. d You are prompted to change the administrator password. e Follow the rules on the screen to change the administrator password. The Entrust IdentityGuard Administration interface appears: 164 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 5 Optionally, test the sample application. To do so, follow the steps in “Using the sample Web application” on page 305. You have now completed testing of the Entrust IdentityGuard installation. You can now: • complete various advanced configuration tasks (“Postinstall configuration options for Entrust IdentityGuard Server” on page 201 and “Configuring the Entrust IdentityGuard Server properties file” on page 255) such as adding replica Entrust IdentityGuard Servers to your system • set up Entrust IdentityGuard by adding policies, groups, users, authentication methods, and so on (see the Entrust IdentityGuard Administration Guide) Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 165 Managing the Entrust IdentityGuard service Complete the following steps to check the status of the Entrust IdentityGuard service. You have the option of using either the identityguard.sh command, or the UNIX output command. Topics in this section: • “Query the status of Entrust IdentityGuard service” on page 166 • “Stopping Entrust IdentityGuard Services on WebLogic 8.1” on page 167 • “Stopping Entrust IdentityGuard Services on WebLogic 9.1” on page 168 • “Stopping Entrust IdentityGuard Services on WebSphere 6.0” on page 169 Query the status of Entrust IdentityGuard service The following command allows you to query the status of the Entrust IdentityGuard service. Note: If you are root, you cannot start Entrust IdentityGuard Radius service using the igradius.sh start command. Also, to stop the Entrust IdentityGuard service, you must be the user who started the service. To query the status of Entrust IdentityGuard 1 Log in as the UNIX user that belongs to the UNIX group that was specified during the installation. 2 From $IDENTITYGUARD_HOME, enter . ./env_settings.sh 3 To query the status of the Entrust IdentityGuard service, enter identityguard.sh status Note: Once Entrust IdentityGuard is installed, the service is started automatically when you reboot. 166 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Stopping Entrust IdentityGuard Services on WebLogic 8.1 Complete the following procedure to stop Entrust IdentityGuard on WebLogic 8.1. To stop Entrust IdentityGuard Services 1 From the WebLogic 8.1 main page, select Deployments > Web Application Modules. The Deploy a Web Application Module page appears showing a list of all deployed Web applications. 2 Click the application name, for example, IdentityGuardAdmin. The Deployment status page appears. 3 Click Stop. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 167 4 Repeat Step 1 to Step 3 for each Entrust IdentityGuard service you want to stop. Stopping Entrust IdentityGuard Services on WebLogic 9.1 You can stop Entrust IdentityGuard Services using one of the following three options: • When work completes. Specifies that WebLogic Server wait for the application to finish its work and for all currently connected users to disconnect. • Force stop now. Specifies that WebLogic Server stop the application immediately, regardless of the work that is being performed and the users that are connected. • Stop, but continue servicing administrative requests. Specifies that WebLogic Server stops the application once all its work has finished, but to then puts the application in Administrative Mode so it can be accessed for administrative purposes. To stop Entrust IdentityGuard Services 1 Under Domain Structure on the left of the main page click Deployments. The Deployment Summary Page appears with a list of Entrust IdentityGuard services. 168 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 2 Select the checkbox for the service(s) you want to stop. 3 From the Stop drop-down menu select the desired stop option. The Stop Application Assistant page appear. 4 Click Yes to stop the application. You are returned to the Summary of Deployments page. Stopping Entrust IdentityGuard Services on WebSphere 6.0 Complete the following procedure to stop Entrust IdentityGuard on WebSphere 6.0. To stop Entrust IdentityGuard services 1 From the WebSphere main page click Applications > Enterprise Applications. Deploying Entrust IdentityGuard services on an existing application server Feedback on guide 169 The Enterprise Applications page appears. 2 Select the service(s) you want to stop. 3 Click Stop. A message appears indicating that the service was stopped successfully. 170 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Chapter 6 Configuring the Entrust IdentityGuard Radius proxy This chapter provides all the necessary steps for configuring the Entrust IdentityGuard Radius proxy component for use with your VPN servers, and for managing the Radius proxy after installation. You can configure the Entrust IdentityGuard Radius proxy during installation of Entrust IdentityGuard Server or afterwards. This chapter includes the following sections: • “Radius proxy integration overview” on page 172 • “Configuring the Radius proxy for groups” on page 175 • “Matching a group to a user” on page 179 • “Using the Radius proxy with a Radius server” on page 180 • “Using the Radius proxy with a domain controller or LDAP directory” on page 187 • “Configuring the VPN server” on page 193 • “Configuring a Radius server for first-factor authentication” on page 194 • “Configuring Radius server failover” on page 195 • “Managing the Radius proxy” on page 196 171 Radius proxy integration overview Entrust IdentityGuard provides a way to use the Radius authentication protocol with a VPN server and optionally, an actual Radius server. During configuration of the Radius proxy, you are asked to choose between a Radius server or an external authentication resource for first-factor authentication. Regardless of your choice, the VPN server still believes it is communicating with a Radius server. It is actually communicating with the Entrust IdentityGuard Radius proxy. In a normal VPN and Radius implementation, the VPN server communicates with the VPN client and with the Radius server, while the Radius server communicates directly with the VPN server. When you integrate with Entrust IdentityGuard, the Entrust IdentityGuard Radius proxy intercepts messages between the VPN server and the first-factor authentication resource, as shown in Figure 2 on page 173. That resource may be one of a: • Radius server • Windows domain controller • LDAP directory Once your VPN server uses the Radius proxy for first-factor authentication, you can configure Entrust IdentityGuard to add the grid, token, or temporary PIN multifactor authentication methods to the first-factor authentication performed by the Radius proxy. You can configure some VPN servers to use a Radius server and some to use a different first-factor authentication resource. You can take advantage of the Entrust IdentityGuard groups feature to organize users into different groups for authentication purposes. This way you can direct the users of some groups to one first-factor authentication resource and other users to other resources. For details, see “Configuring the Radius proxy for groups” on page 175. Note: When you configure the Entrust IdentityGuard Radius proxy, the program stores the results in the identityguard.properties file. You can edit this file to change settings or to add additional VPN servers and their first-factor authentication method later. For information on the property settings, see section “Configuring the Entrust IdentityGuard Radius proxy properties” on page 282. 172 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Figure 2: Radius proxy integrated with a VPN and Radius server VPN client Entrust IdentityGuard Server ` VPN server Entrust IdentityGuard Radius proxy Radius server Note: In the above diagram and the next, the Entrust IdentityGuard Radius proxy is shown as a separate physical entity just for illustration. In reality, it is a component that resides on the Entrust IdentityGuard Server. VPN authentication through the Entrust IdentityGuard Radius proxy follows these steps: 1 A user enters a user name and password using a VPN client. 2 The VPN server passes this information to the Entrust IdentityGuard Radius proxy. 3 The Entrust IdentityGuard Radius proxy forwards the request to the first-factor authentication resource to verify the user. 4 The first-factor authentication resource responds with an accept or reject message to the Entrust IdentityGuard Radius proxy. If the Radius proxy receives a reject message, the Radius proxy forwards it unchanged to the VPN server. 5 If the Radius proxy receives an accept message, it requests either a grid or token challenge from Entrust IdentityGuard and sends it to the VPN server. 6 The VPN server forwards this to the VPN client. The challenge requires a temporary PIN or a response from a user’s card or token. 7 The VPN server sends the user’s response to the challenge back to the Entrust IdentityGuard Radius proxy. 8 The Radius proxy forwards the response to Entrust IdentityGuard. 9 Entrust IdentityGuard checks the response and the Radius proxy sends an accept or reject message to the VPN server. Configuring the Entrust IdentityGuard Radius proxy Feedback on guide 173 10 An accept message indicates that the user has passed second-factor authentication. Figure 3: Radius proxy integrated with a VPN and external authentication VPN client Entrust IdentityGuard Server ` VPN server First-factor authentication resource: domain controller or LDAP directory Entrust IdentityGuard Radius proxy Authentication using a Windows domain controller or LDAP directory follows these steps: 1 A user enters a user name and password in the VPN client. The VPN server passes the data to the Entrust IdentityGuard Radius proxy. 2 The Radius proxy forwards the request to the Entrust IdentityGuard Server to verify the user. 3 Entrust IdentityGuard checks the first-factor authentication resource to verify the user. 4 Entrust IdentityGuard sends a success or fail message to the Radius proxy. 5 If the Radius proxy receives a fail message, the Radius proxy generates a reject message and sends it to the VPN server. 6 If the Radius proxy receives a success message, it requests a challenge from Entrust IdentityGuard and sends the challenge to the VPN server. 7 The VPN server forwards this to the VPN client. The challenge requires a temporary PIN or a response from a user’s card or token. 8 The VPN server sends the response to the Radius proxy. 9 The Radius proxy forwards the information to Entrust IdentityGuard for authentication. 10 Entrust IdentityGuard authenticates the response (or not) and the Radius proxy sends an accept or reject message to the VPN server. 11 An accept message indicates the user has now passed second-factor authentication. 174 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Configuring the Radius proxy for groups Your VPN server must already be configured to recognize specific user groups. The group names used by your VPN server do not have to be the same as those you created in Entrust IdentityGuard. Note: While VPN groups can be specifically paired with Entrust IdentityGuard groups during configuration of the Radius proxy, this pairing is optional if the names of users are unique in your system. In this case, Entrust IdentityGuard determines the correct group. See “Matching a group to a user” on page 179 for an explanation. Entrust IdentityGuard expects group and user name pairs to be in the form “group/name.” You can configure the Radius proxy to convert names with the form “name@group” or “group\name” to “group/name.” See the processbackslash and processat Radius proxy properties in the section “Configuring the Entrust IdentityGuard Radius proxy properties” starting on page 282. Using Entrust IdentityGuard groups with a VPN server This section applies if you want to associate groups of VPN users with Entrust IdentityGuard groups. You need to define a VPN server entry for each VPN group you wish to pair with an Entrust IdentityGuard group. You can use the same VPN server for multiple groups or you can use different servers for different groups. During configuration of the Radius proxy, you are asked to respond to prompts in UNIX or to choose options in Windows. Your answers to several of those prompts or options determine how the VPN and Entrust IdentityGuard groups are paired. The key prompts related to groups are: 1 When asked to enter a list of Radius ports, enter one port number for each VPN group. 2 When asked to enter a unique VPN server host, specify either a DNS or IP address. If you plan to associate several groups with the same VPN server, enter the same IP each time you run through the Radius proxy configuration. Enter a different IP for another VPN server. 3 You are asked to enter the Radius port used by the VPN server. Configuring the Entrust IdentityGuard Radius proxy Feedback on guide 175 The default is all the ports you entered in Step 1. Enter a specific port only when you want the current VPN configuration to apply to a predefined group. 4 When asked to enter the VPN server secret, enter the applicable secret for the VPN server. 5 You are asked for the Entrust IdentityGuard group name. Enter the group you plan to associate with the port number entered above in Step 3. 6 You are asked to select Radius or external authentication. For a Radius server, enter RADIUS; otherwise, enter EXTERNAL. 7 If you choose Radius in Step 6, you are asked to enter the Radius server name. You can use the same Radius server for all VPN servers or use different servers. Once you complete the configuration for one VPN server, the installation program prompts you to define an additional VPN server. Answer yes at the prompt to complete a configuration for another group. Alternatively, you can edit the identityguard.properties file to add values for the properties related to the prompts listed above. Radius server example Assume you want to set up one Radius server to provide first-factor authentication for two VPN groups (on a single VPN server) named SalesVPN and MarketingVPN. These groups are paired with two Entrust IdentityGuard user groups, IGSales and IGMarketing. In this scenario, the relevant settings in the identityguard.properties file would look like this: # IdentityGuard Radius ports identityguard.igradius.port=1812 1813 # VPN sales identityguard.igradius.vpn.salesVPN.igport=1812 identityguard.igradius.vpn.salesVPN.radius=radius1 identityguard.igradius.vpn.salesVPN.host=10.12.1.1 identityguard.igradius.vpn.salesVPN.secret=xyz identityguard.igradius.vpn.salesVPN.group=IGSales identityguard.igradius.vpn.salesVPN.useradius=true # VPN marketing identityguard.igradius.vpn.marketingVPN.igport=1813 identityguard.igradius.vpn.marketingVPN.radius=radius1 identityguard.igradius.vpn.marketingVPN.host=10.12.1.1 176 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide identityguard.igradius.vpn.marketingVPN.secret=xyz identityguard.igradius.vpn.marketingVPN.group=IGMarketing identityguard.igradius.vpn.marketingVPN.useradius=true You can follow the prompts in the Radius proxy configuration script twice to achieve these results or you can edit the identityguard.properties file directly. External authentication example In this example, assume you want to set up an LDAP directory to provide first-factor authentication for the same two VPN groups, SalesVPN and MarketingVPN. These groups are paired with two Entrust IdentityGuard user groups, IGSales and IGMarketing. In this scenario, the relevant settings in the identityguard.properties file would look like this: # IdentityGuard Radius ports identityguard.igradius.port=1812 1813 # VPN sales identityguard.igradius.vpn.salesVPN.igport=1812 identityguard.igradius.vpn.salesVPN.host=10.12.1.1 identityguard.igradius.vpn.salesVPN.secret=xyz identityguard.igradius.vpn.salesVPN.group=IGSales identityguard.igradius.vpn.salesVPN.useradius=false # VPN marketing identityguard.igradius.vpn.marketingVPN.igport=1813 identityguard.igradius.vpn.marketingVPN.host=10.12.1.1 identityguard.igradius.vpn.marketingVPN.secret=xyz identityguard.igradius.vpn.marketingVPN.group=IGMarketing identityguard.igradius.vpn.marketingVPN.useradius=false # external authentication identityguard.externalauth.impl=com.entrust.identityGuard.au thenticationManagement.external.ldap.LdapAuthentication If you use a domain controller as an external authentication resource, the last section would look like this: # external authentication identityguard.externalauth.impl=com.entrust.identityGuard.au thenticationManagement.external.kerberos.KerberosAuthenticat ion Configuring the Entrust IdentityGuard Radius proxy Feedback on guide 177 identityguard.externalauth.kerberos.realm=ENTRUST.COM Also, if you are using a domain controller, you will need to map each realm to its KDC in the igkrb5.conf file. For more information, see “To set the external authentication properties for a domain controller” on page 203. Note: This patch removes the identityguard.externalauth.kerberos.kdc property that existed in previous Entrust IdentityGuard releases and replaces it with the igkrb5.conf file. You can follow the prompts in the Radius proxy configuration script twice to achieve these results or you can edit the identityguard.properties file directly. The identityguard.externalauth.impl and Kerberos-related properties must always be added manually. The identityguard.externalauth.impl property can include a group name. When it does not, as in the above example, the property creates a default entry for all users. When you include an Entrust IdentityGuard group name in the identityguard.externalauth.impl property, it limits the authentication resource to just members of that group. For more details, see “Using groups with external authentication” on page 209. Also see “Configuring Entrust IdentityGuard for external authentication” on page 202 for more information on the identityguard.externalauth.impl and Kerberos-related properties. 178 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Matching a group to a user You do not need to include group names as part of a user identification if your system contains only unique user names. When Entrust IdentityGuard needs to verify a user and that user is not specifically identified with a group, Entrust IdentityGuard tries to match the user with the correct group following these rules: • First search the repository for all users with the given user name. For an LDAP directory, look in all search bases. • If no matching user name is found, return an error. • If one unique user entry is found, use that entry. • If multiple entries are found with the same user name, return an error. Configuring the Entrust IdentityGuard Radius proxy Feedback on guide 179 Using the Radius proxy with a Radius server You can configure the Entrust IdentityGuard Radius proxy to use a Radius server for first-factor authentication by completing one of the following procedures: • “To configure the Radius proxy on UNIX” on page 180 • “To configure the Radius proxy on Microsoft Windows” on page 182 If you intend to associate specific predefined VPN group names with existing Entrust IdentityGuard group names, read “Configuring the Radius proxy for groups” on page 175 before you begin to configure the Radius proxy. Attention: Entrust IdentityGuard rejects any VPN server configuration that creates an explicit or implied duplicate VPN server/port combination. An explicit duplicate occurs when you specify the same port more than once for the same VPN server. An implied duplicate occurs if you select the default port (any port in Unix or All in Windows) more than once for the same VPN server. To configure the Radius proxy on UNIX 1 Log in as the UNIX user that belongs to the UNIX group that was specified during the installation. 2 Navigate to the $IDENTITYGUARD_HOME (/opt/entrust/identityguard81) directory and enter: . ./env_settings.sh 3 Navigate to the $IDENTITYGUARD_HOME directory and enter: configradius.sh 4 At the prompt, enter a list of Radius ports for the Radius proxy or accept the default: Enter a space-separated list of ports used by IdentityGuard Radius (default: 1812): Each port value must be an integer between 1024 and 65535. Note: If you plan to associate different VPN server groups with separate Radius proxy ports, enter all applicable ports separated by spaces. There can be only one VPN server defined for each port. 5 At the next prompt, define a VPN server. Do you wish to define a VPN server? [yes or no] 180 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide If you answer yes, continue with these configuration steps. If you answer no, the configuration will stop. You are asked whether you want to initialize the system. Proceed to “Initializing the primary server” on page 48. 6 At the next prompt, type a unique VPN server name. This provides a unique string that is used by Entrust IdentityGuard to reference this server. Note: A VPN server name must not include the equals sign (=). Enter a unique label for the VPN server: 7 At the next prompt, enter a unique VPN server host, using either a DNS or IP address: Enter the VPN server host name (or IP address): Entrust IdentityGuard Radius proxy identifies a VPN server by its host name and the Radius port to which it sends messages. If you do not specify a port in the next step, the Radius proxy treats all requests as coming from the same VPN server regardless of which port receives them. 8 At the next prompt, type the Entrust IdentityGuard Radius port used by the VPN server: Enter the Entrust IdentityGuard Radius port used by the VPN server: The default is the ports you set in Step 4. If you enter a specific port, then any communication from this VPN server uses that port only. Enter a specific port if you want the current VPN configuration to apply to an Entrust IdentityGuard group. 9 At the next prompt, type and confirm the VPN server secret. The secret you use for Entrust IdentityGuard Radius proxy must match the server secret already set for the VPN server: Enter the VPN server shared secret: Confirm: 10 If you have already defined Entrust IdentityGuard user groups, you can set a specific Entrust IdentityGuard group for use with the current VPN server. If you do, the group is included with the user ID when VPN sends requests to Entrust IdentityGuard. Enter the Entrust IdentityGuard group for the VPN server: Note: You do not need to enter a group name if the names of users are unique in your system. Entrust IdentityGuard will determine the correct group. See “Matching a group to a user” on page 179 for an explanation. Configuring the Entrust IdentityGuard Radius proxy Feedback on guide 181 11 If you want the Radius proxy to use a Radius server for first-factor authentication, enter RADIUS at the next prompt: Do you want to use External or Radius authentication? (EXTERNAL or RADIUS): Enter RADIUS and continue with these configuration steps. (If you enter EXTERNAL, the configuration will stop. Proceed to “Configuring Entrust IdentityGuard for external authentication” on page 202.) 12 Each VPN server needs a corresponding Radius server that performs the first-factor authentication. At the next prompt, enter the server name: Enter the label of the Radius server for this VPN server: 13 If no Radius server configuration exists for the name you chose in Step 12, enter it at this prompt: No Radius server is defined with the label <your server name> Do you wish to define a new Radius server? [yes or no] a If you enter no, the configradius.sh script prompts you for another Radius server name. b If you enter yes, the configradius.sh script prompts you for the Radius server host name and port: Enter the Radius server host name (or IP address): Enter the Radius server port (default: 1812): This provides the address of the Radius server where the Radius proxy sends Radius requests. 14 At the next prompt, enter and confirm the Radius server secret: Enter the Radius server shared secret: Confirm: The server secret is the password value the Radius client uses to protect the message. The secret you enter must match the server secret set for the Radius server. The Entrust IdentityGuard Radius proxy is now configured for this VPN server and your Radius server. Answer yes to configure another server or no to exit. To configure the Radius proxy on Microsoft Windows 1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking Start > All Programs > Entrust > IdentityGuard > Configuration Panel. 2 Select Set Up the Radius Proxy to run the Entrust IdentityGuard Radius Proxy Setup. The Entrust IdentityGuard Radius Proxy Configuration page appears. 182 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 3 In the Ports used by the Entrust IdentityGuard Radius Proxy field, specify the ports that the Entrust IdentityGuard Radius Proxy will listen on. Use commas to separate your various ports. Each port value must be an integer between 1 and 65535. The port value entered must be unique to the system. 4 If you are using a Radius server for first-factor authentication, in the Radius Authentication Servers section, click Add. Alternatively, you can select an existing server definition and click Change to modify it or Remove to remove it. The Add/Change Radius Server page appears. Configuring the Entrust IdentityGuard Radius proxy Feedback on guide 183 5 On the Add/Change Radius Server page, enter the connection details for a Radius server. Note: If you plan to use external authentication, skip this step. 6 • Radius server label. Enter a unique string that is used by Entrust IdentityGuard to reference this server. Once a label is saved it cannot be changed. • Radius server host name. Type a unique Radius server host, using either a DNS or IP address. • Radius server port. Type the port on the Radius server where the Radius proxy sends messages. This is the same port that the VPN server uses. • Radius server shared secret. Type the shared secret value the client uses to protect the message. The secret you enter must match the shared secret set on the Radius server. • Confirm shared secret. Type the shared secret again. • Click OK. In the VPN Servers section, click Add to map your VPN Server to your first-factor Authentication Server. Alternatively, you can select an existing server definition and click Change to modify it or Remove to remove it. The Add/Change VPN Server page appears. 184 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 7 On the Add/Change VPN Server page, enter the connection details for a VPN server: • VPN server label. This provides a unique string that is used by Entrust IdentityGuard to reference this server. Once the label is saved it cannot be changed. • VPN server host name. Enter a VPN server host, using either a FQDN, hostname, or IP address. • VPN server shared secret. Enter the VPN server secret. This secret you use for Entrust IdentityGuard Radius proxy must match the server secret already set for the VPN server • Confirm shared secret. Enter the VPN server secret again. • Entrust IdentityGuard group (optional). If you have already defined Entrust IdentityGuard user groups, you can set a specific Entrust IdentityGuard group for use with the current VPN server. Note: You do not need to enter a group name if the names of users are unique in your system. Entrust IdentityGuard determines the correct group. See “Matching a group to a user” on page 179 for an explanation. • Radius Proxy port. This drop-down list contains: Configuring the Entrust IdentityGuard Radius proxy Feedback on guide 185 – all port numbers you entered earlier in the Ports used by the Entrust IdentityGuard Radius Proxy field – as well as, the all option If you enter a specific port, then any communication from this VPN server uses that port only. Enter a specific port if you want the current VPN configuration to apply to an Entrust IdentityGuard group. Select all if the port used is not important. The Server hostname and Radius proxy port number must be unique. 8 • First-factor authentication server. This drop-down list contains the names of all Radius servers you defined on the Add/Change Radius Server page. Select the server to use with this VPN server. • Click OK. Click Save. A pop-up box appears validating your configuration. The Entrust IdentityGuard Radius proxy is now configured for this VPN server and your Radius server. You can configure additional VPN and Radius servers. 186 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Using the Radius proxy with a domain controller or LDAP directory Configure the Entrust IdentityGuard Radius proxy to use an external authentication resource completing these steps. Topics in this section: • “To configure Radius proxy on UNIX” on page 187 • “To configure the Radius proxy on Microsoft Windows” on page 189 Note: When you configure Entrust IdentityGuard Radius proxy, the program stores the results in the identityguard.properties file. You can edit this file to change settings or to add additional VPN servers and their first-factor authentication method later. For information on the property settings, see section “Configuring the Entrust IdentityGuard Radius proxy properties” on page 282. If you intend to associate specific predefined VPN group names with existing Entrust IdentityGuard group names, read “Configuring the Radius proxy for groups” on page 175 before you begin to configure the Radius proxy. Attention: Entrust IdentityGuard rejects any VPN server configuration that creates an explicit or implied duplicate VPN server/port combination. An explicit duplicate occurs when you specify the same port more than once for the same VPN server. An implied duplicate occurs if you select the port default (any port in UNIX or All in Windows) more than once for the same VPN server. To configure Radius proxy on UNIX 1 Log in as the UNIX user that belongs to the UNIX group that was specified during the installation. See “Installing Entrust IdentityGuard Server” on page 33 for installations with embedded Tomcat or “Installing Entrust IdentityGuard Server” on page 106 for installation using an existing application server. 2 Navigate to the $IDENTITYGUARD_HOME (/opt/entrust/identityguard81) directory and enter: . ./env_settings.sh 3 Navigate to the $IDENTITYGUARD_HOME directory and enter: configradius.sh 4 At the prompt, enter a list of Radius ports for the Radius proxy or accept the default: Configuring the Entrust IdentityGuard Radius proxy Feedback on guide 187 Enter a space-separated list of ports used by IdentityGuard Radius (default: 1812): Each port value must be an integer between 1024 and 65535. Note: If you plan to associate different VPN server groups with separate Radius proxy ports, enter all applicable ports separated by spaces. There can be only one VPN server defined for each port. 5 At the next prompt, confirm that you want to use a VPN server. Do you wish to define a VPN server? [yes or no] If you type no, the configuration stops. You are asked whether you want to initialize the system. Proceed to “Initializing the primary server” on page 48 for installations with embedded Tomcat or “Initializing the primary Entrust IdentityGuard Server” on page 118 for installations using an existing application server. 6 At the next prompt, enter a unique VPN server name. This provides a unique string that is used by Entrust IdentityGuard to reference this server. Note: A VPN server name must not include the equal sign (=). Enter a unique label for the VPN server: 7 At the next prompt, enter a unique VPN server host, using either a DNS or IP address: Enter the VPN server host name (or IP address): The Entrust IdentityGuard Radius proxy identifies a VPN server by its host name, and the port to which it sends messages. If you do not specify a port in the next step, the Radius proxy treats all requests as coming from the same VPN server regardless of which port receives them. 8 At the next prompt, enter the Entrust IdentityGuard port used by the VPN server: Enter the Entrust IdentityGuard Radius port used by the VPN server: The default is the ports you set in Step 4. If you enter a specific port, then any communication from this VPN server uses that port only. Enter a specific port if you want the current VPN configuration to apply to an Entrust IdentityGuard group. 9 At the next prompt, enter and confirm the VPN server secret. This secret you use for Entrust IdentityGuard Radius proxy must match the server secret already set for the VPN server: Enter the VPN server shared secret: 188 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Confirm: 10 If you have already defined Entrust IdentityGuard user groups, you can set a specific Entrust IdentityGuard group for use with the current VPN server. Enter the Entrust IdentityGuard group for the VPN server: Note: You do not need to enter a group name if the names of users are unique in your system. Entrust IdentityGuard determines the correct group. See “Matching a group to a user” on page 179 for an explanation. 11 If you want the Radius proxy to use a domain controller or LDAP directory for first-factor authentication, enter EXTERNAL at the next prompt: Do you want to use External or Radius authentication? (EXTERNAL or RADIUS): (If you enter RADIUS, the configuration continues. Proceed to “To configure the Radius proxy on UNIX” on page 180.) When you enter EXTERNAL, the configuration script stop and you see the following message: Make sure that the Entrust IdentityGuard Server is configured so that External authentication is enabled. Answer yes to configure another VPN server or no to exit. Go to “Configuring Entrust IdentityGuard for external authentication” on page 202 to finish this configuration. To configure the Radius proxy on Microsoft Windows 1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking Start > All Programs > Entrust > IdentityGuard > Configuration Panel. 2 Select Set Up the Radius Proxy to run the Entrust IdentityGuard Radius proxy setup program. The Entrust IdentityGuard Radius Proxy Configuration page appears. Configuring the Entrust IdentityGuard Radius proxy Feedback on guide 189 3 In the Ports used by the Entrust IdentityGuard Radius Proxy field, enter a list of Radius ports for the Radius proxy or accept the default. Use commas to separate the port numbers. The port value entered must be unique to the system. 190 4 Skip the Radius Authentication Servers section if you plan to use external authentication. 5 In the VPN Servers section, click Add to configure a VPN server for use with Entrust IdentityGuard. Alternatively, you can select an existing server definition and click Change to modify it or Remove to remove it. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide The Add/Change VPN Server page appears. 6 On the Add/Change VPN Server page, enter the connection details for a VPN server: • VPN server label. This provides a unique string that is used by Entrust IdentityGuard to reference this server. • VPN server host name. Enter a unique VPN server host, using either a FQDB, hostname, or IP address. The hostname and Radius proxy port combination must be unique for each VPN server entry. • VPN server shared secret. Enter the VPN server secret. This secret you use for Entrust IdentityGuard Radius proxy must match the server secret already set for the VPN server • Confirm shared secret. Enter the VPN server secret again. • Entrust IdentityGuard group (optional). If you have already defined Entrust IdentityGuard user groups, you can set a specific Entrust IdentityGuard group for use with the current VPN server. Note: You do not need to enter a group name if the names of users are unique in your system. Entrust IdentityGuard will determine the correct group. See “Matching a group to a user” on page 179 for an explanation. • Radius Proxy port. This drop-down list contains all port numbers you entered earlier in the Ports used by the Entrust IdentityGuard Radius Proxy field plus Configuring the Entrust IdentityGuard Radius proxy Feedback on guide 191 the all option (the default). If you enter a specific port, then any communication from this VPN server uses that port only. It makes sense to enter a specific port if you want the current VPN configuration to apply to an Entrust IdentityGuard group. Select all if the port used is not important. 7 • First-factor authentication server. To use external authentication, select IdentityGuard External. • Click OK. Click Save. A pop-up box appears validating your configuration. The Entrust IdentityGuard Radius proxy is now configured for this VPN server. Add as many VPN servers as required. Go to “Configuring Entrust IdentityGuard for external authentication” on page 202 to finish this configuration for external authentication. 192 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Configuring the VPN server Follow these general steps to configure your VPN server to communicate with the Entrust IdentityGuard Radius proxy. The interface details vary depending on your platform and the interface tool you use. For detailed integration instructions specific to your platform, see the Technical Integration Guide that applies to your VPN server. To configure the VPN server 1 Log in to the VPN server as administrator. 2 If applicable, select a VPN user group. You may have more than one choice here if your VPN recognizes different groups of users. 3 Select Radius as the server used for authentication. (Select Radius even if you plan to use a Windows domain controller or an LDAP directory with the Entrust IdentityGuard Radius proxy.) 4 For the authentication server, set the IP address to that of the Entrust IdentityGuard Radius proxy instead of a Radius server. 5 If you are using groups, for the server port, enter the port assigned to the VPN group selected in Step 10 on page 181 (UNIX) or Step 7 on page 185. (Windows). The default Entrust IdentityGuard Radius proxy port is 1812. (See also “Configuring the Radius proxy for groups” above.) 6 For the server secret (configured in Step 4 on page 176 in UNIX and Step 7 on page 185 in Windows), enter a value that matches the value known to Entrust IdentityGuard. 7 Save your settings. Configuring the Entrust IdentityGuard Radius proxy Feedback on guide 193 Configuring a Radius server for first-factor authentication Remote Authentication Dial-In User Service (Radius) is an industry standard authentication protocol. Radius authenticates users through a series of communications between Radius clients and the Radius server. A Radius client passes information about a user to a designated Radius server and then acts on the response that the Radius server returns. Transactions between the Radius client and the Radius server are authenticated through a shared secret, which is never sent over the network. Many networks use Radius to centralize and coordinate VPN authentication. If you configure your remote VPN access gateway (IPSec or SSL) to use an existing Radius server for configuration, the Entrust IdentityGuard Radius proxy lets you add Entrust IdentityGuard for second-factor authentication. The Radius proxy sends the authentication request to the Radius server to perform first-factor authentication and then it adds an Entrust IdentityGuard authentication step. Users that do not exist in Entrust IdentityGuard are authenticated by the first-factor authentication mechanism only. If you plan to use a Radius server for first-factor authentication, follow these general steps to configure the Radius server to communicate with the Entrust IdentityGuard Radius proxy. The interface details will vary depending on your platform and the interface tool you use. To configure the Radius server for first-factor authentication 194 1 Log in to the Radius server as administrator. 2 For the Radius client address, change the IP address from the VPN server to that of the Entrust IdentityGuard Radius proxy. 3 For the server secret, enter a value that matches the value known to Entrust IdentityGuard. 4 Save your settings. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Configuring Radius server failover By configuring Radius server failover on the Entrust IdentityGuard Radius proxy, you ensure that there are backup Radius servers if the primary system fails. When failover is configured, if a timeout occurs while waiting for a response from the Radius server, Entrust IdentityGuard Radius proxy uses the next IP address in the list (for the next request that it receives). The current request times out. When Entrust IdentityGuard Radius proxy reaches the end of the list of IP addresses, it restarts at the beginning of the list. Complete the following steps to add the list of Radius server IP addresses to the identityguard.properties file. For more information on high availability and disaster recovery, see the Entrust IdentityGuard Deployment Guide. To configure the Radius server for failover 1 Open the $IDENTITYGUARD_HOME/etc/identityguard.properties file. 2 Edit the file to include the multiple Radius servers in the Radius server address property. For example, identityguard.igradius.radius.{0}.address=radius_server1:1812 radius_server2:1812 radius_server3:1813 where the {0} placeholder is replaced by the Radius server name. Use a space to separate each of radius servers in the list. Note: All the Radius servers should use the same secret. Configuring the Entrust IdentityGuard Radius proxy Feedback on guide 195 Managing the Radius proxy You can set the Entrust IdentityGuard Radius proxy to start automatically when you reboot, or you can start and stop it manually. Topics in this section: • “Managing the Radius proxy on UNIX” on page 196 • “Managing the Radius proxy on Microsoft Windows” on page 199 Managing the Radius proxy on UNIX Complete one of the following procedures to manage the Radius proxy: • “To enable/disable automatic restart of the Radius proxy” on page 196 • “To start and stop the Radius proxy” on page 196 • “To start and stop Entrust IdentityGuard and the Radius proxy together” on page 197 • “To start and stop the Radius proxy with the Linux service command” on page 198 To enable/disable automatic restart of the Radius proxy • As root in $IDENTITYGUARD_HOME/bin, enable automatic restart by entering: ./igsvvconfig.sh igradius enable The Entrust IdentityGuard Radius proxy will start every time the computer reboots. • As root in $IDENTITYGUARD_HOME/bin disable automatic restart by entering: ./igsvvconfig.sh igradius disable You must start the Entrust IdentityGuard Radius proxy manually. To start and stop the Radius proxy 1 Log in as the UNIX user that belongs to the UNIX group that was specified during the installation. See “Installing Entrust IdentityGuard Server” on page 33 for installations with embedded Tomcat or “Installing Entrust IdentityGuard Server” on page 106 for installation using an existing application server. 2 Navigate to the $IDENTITYGUARD_HOME directory and enter: . ./env_settings.sh 3 196 Enter the following command at the command prompt followed by one of the options in Table 11: IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide igradius.sh Table 11: Managing the Radius proxy Command Description start Starts the Radius proxy. Entrust IdentityGuard generates audits that you can use to determine if the services started successfully or failed to start. You will not see an error message if the service fails to start. stop Stops the Radius proxy. status Tells you if the Radius proxy is running. If it is running, Entrust IdentityGuard displays the process ID number. restart Stops and restarts the Radius proxy. Note: When the Entrust IdentityGuard Radius proxy starts, it checks that at least one VPN client and one resource (external authentication or Radius server) are defined and that each server referred to by a client exists. If that is not the case, it issues an error to the logs and the Radius proxy exits. To start and stop Entrust IdentityGuard and the Radius proxy together 1 Log in as the UNIX user that belongs to the UNIX group that was specified during the installation. See “Installing Entrust IdentityGuard Server” on page 33 for installations with embedded Tomcat or “Installing Entrust IdentityGuard Server” on page 106 for installations using an existing application server. 2 Navigate to $IDENTITYGUARD_HOME directory and enter: . ./env_settings.sh 3 Enter one of these commands at the command prompt followed by one of the options in Table 12: igservice.sh identityguard igservice.sh igradius igservice.sh all Configuring the Entrust IdentityGuard Radius proxy Feedback on guide 197 Table 12: Managing the Radius proxy service Command Description start Starts the specified service. Entrust IdentityGuard does not display an error message if the service fails to start. Check the logs to determine if startup failed. stop Stops the specified service. status Tells you if the specified service is running. restart Stops and restarts the specified service. For example, to restart Entrust IdentityGuard and the Radius proxy on installations of Entrust IdentityGuard with embedded Tomcat, enter: igservice.sh all restart Note: In versions of Entrust IdentityGuard installed on an existing application service, you can use any of these commands for the Radius proxy; however, only the status command is available for Entrust IdentityGuard. To start and stop the Radius proxy with the Linux service command You can also use the Linux service command to start and stop the Entrust IdentityGuard Radius proxy. 1 Enter this command at the command prompt followed by one of the options in the table below: service igradius Command Description start Starts the specified services. Entrust IdentityGuard does not display an error message if the service fails to start. Check the logs to determine if startup failed. 198 stop Stops the specified service. status Tells you if the specified service is running. restart Stops and restarts the specified service. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide If you run the service igradius command as root, the service automatically switches to the UNIX user ID originally used to install Entrust IdentityGuard. Managing the Radius proxy on Microsoft Windows You can set the Entrust IdentityGuard Radius proxy to start automatically when you reboot, or you can start and stop it manually. Note: You must log in as administrator to install Entrust IdentityGuard. You then select a user/group that will own the installation. That user (or any member of the group) can then start or stop the services as described below. To enable automatic restart of the Radius proxy 1 Log in as a user that belongs to the group that was specified during the installation as the owner of the installation. 2 Go to Start > Control Panel > Administrative Tools > Services. The Services window appears. 3 Right-click Entrust IdentityGuard Radius Proxy and select Properties. 4 In the Startup type drop-down menu, select Automatic. To disable automatic restart of the Radius proxy 1 Log in as a user that belongs to the group that was specified during the installation as the owner of the installation. 2 Go to Control Panel > Administrative Tools > Services. The Services window appears. 3 Right-click Entrust IdentityGuard Radius Proxy and select Properties. 4 In the Startup type drop-down menu, select Disabled. (Select Manual if you want to start this Radius proxy service manually.) To start and stop the Radius proxy 1 Log in as a user that belongs to the group that was specified during the installation as the owner of the installation. 2 Go to Control Panel > Administrative Tools > Services. The Services window appears. 3 Right-click Entrust IdentityGuard Radius Proxy and select Properties. Configuring the Entrust IdentityGuard Radius proxy Feedback on guide 199 4 In the Service status section, click either Start or Stop depending on your requirements. Note: When the Entrust IdentityGuard Radius proxy starts, it checks that at least one VPN client and one service (external authentication or Radius server) are defined and that each server referred to by a client exists. If that is not the case, it issues an error and the Radius proxy exits. 200 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Chapter 7 Postinstall configuration options for Entrust IdentityGuard Server Use this chapter to configure or reconfigure Entrust IdentityGuard Server after installation. This chapter contains the following sections: • “Configuring Entrust IdentityGuard for external authentication” on page 202 • “Adding Entrust IdentityGuard replica servers” on page 210 • “Configuring failover on the repository” on page 218 • “Storing unassigned cards and tokens” on page 220 • “Configuring Syslog for remote logging on UNIX” on page 226 • *“Disabling the non-SSL port on the Authentication service” on page 228 • *“Enabling the non-SSL port on the Administration service” on page 230 • *“Disabling the SSL port on the Administration service” on page 231 • “Securing the LDAP connection with SSL” on page 233 • *“Changing the Entrust IdentityGuard certificate” on page 235 • “Enabling system binding” on page 240 Attention: *These sections only apply to versions of Entrust IdentityGuard that use embedded Tomcat. 201 Configuring Entrust IdentityGuard for external authentication The external authentication feature provided with Entrust IdentityGuard lets you use Entrust IdentityGuard to manage first-factor authentication using the Windows domain controller or LDAP directory information as authentication sources. Typically, you would use external authentication as the first layer of a multifactor Entrust IdentityGuard authentication regime. To configure Entrust IdentityGuard for external authentication, you need to do the following: • Add external authentication as an authentication option for the users in each applicable Entrust IdentityGuard group. Use the master user shell to add the External option to the applicable policies like this: policy userspec set -genericauthtype GRID EXTERNAL policy userspec set -machineauthtype GRID EXTERNAL Note: This example shows how to add grid and External authentication options. Add all the authentication options that you want to use with this command. For more information, see “Modifying, exporting and importing the user specification attributes for a policy” in the Entrust IdentityGuard Administration Guide. • Edit the identityguard.properties file to set the external authentication properties, as explained: – If you store Entrust IdentityGuard user information in Active Directory, ADAM, or other supported LDAP repository, proceed to “To set the external authentication properties for an LDAP directory” on page 203. – If you want to use the Windows domain controller for first-factor authentication, proceed to “To set the external authentication properties for a domain controller” on page 203. When you configure external authentication, it applies to all deployment types managed by Entrust IdentityGuard, whether the user is accessing your application through VPN, a Web application, or other method. Configuring external authentication In the following procedures, when you make changes to the identityguard.properties file, ensure that you restart Entrust IdentityGuard Server. For instructions on restarting, see “Managing the Entrust IdentityGuard service” on page 62 for installations with embedded Tomcat, “Managing the Entrust 202 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide IdentityGuard service” on page 166 for installations using an existing application server, or “Managing the Entrust IdentityGuard service” on page 94 for Windows. To set the external authentication properties for an LDAP directory 1 Open the identityguard.properties file located: • on UNIX, $IDENTITYGUARD_HOME/etc/ • on Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\ 2 Add the identityguard.externalauth.impl property to the file. 3 Set the property to the correct Java class for an LDAP directory. The entry appears as follows: identityguard.externalauth.impl=com.entrust.identityGuard.authenti cationManagement.external.ldap.LdapAuthentication This example creates a global or default setting for all users. This property can also include an Entrust IdentityGuard group name, such as IGSales in this example: identityguard.externalauth.impl.IGSales=com.entrust.identityGuard. authenticationManagement.external.ldap.LdapAuthentication See “Using groups with external authentication” on page 209 for more information using groups with external authentication. During LDAP directory authentication, Entrust IdentityGuard attempts to bind to the user’s LDAP entry. If the bind succeeds, the user is authenticated. Note: The directory used for external authentication must be the same one used as the Entrust IdentityGuard repository. The Kerberos protocol used for authentication through a domain controller is case-sensitive. If the user enters an ID that does not match the case Kerberos expects, the authentication fails. If you use a Directory repository and user names are stored in mixed case, make sure the user names entered in Entrust IdentityGuard use exactly the same case for all letters. Entrust IdentityGuard and LDAP do not care about the case of user names. They can be uppercase, lowercase or mixed case. While you can specify that Kerberos convert names to uppercase or lowercase, this is no solution for mixed case user names. To set the external authentication properties for a domain controller 1 Open the identityguard.properties file located: • on UNIX, $IDENTITYGUARD_HOME/etc/ • on Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\ Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 203 2 Add the identityguard.externalauth.impl property to the file. 3 Set the property to the correct Java class for a domain controller. The entry looks like this: • if you are not using groups: identityguard.externalauth.impl=com.entrust.identityGuard.authenti cationManagement.external.kerberos.KerberosAuthentication The above example creates a global or default setting for all users. • If you are using groups, for example IGSales: identityguard.externalauth.impl.IGSales=com.entrust.identityGuard. authenticationManagement.external.kerberos.KerberosAuthentication 4 Domain controller authentication uses the Kerberos protocol. You must add a property to specify the server acting as the Kerberos realm. For example: identityguard.externalauth.kerberos.realm=ENTRUST.COM The realm provides the name the domain controller. Make sure to enter the realm name in uppercase characters. 5 Kerberos authentication is case-sensitive. If the user enters an ID that does not match the case Kerberos expects, the authentication fails. Use this property to convert the user ID to upper or lowercase, for example: identityguard.externalauth.kerberos.caseconvert=lower Valid entries are upper or lower. If this property is absent or contains another value, Entrust IdentityGuard does not change the entered user ID. The case should always be set to lower when using a domain controller for external authentication. The Kerberos properties can also include an Entrust IdentityGuard group name, such as IGSales in this example: identityguard.externalauth.kerberos.realm.IGSales=ENTRUST.COM identityguard.externalauth.kerberos.caseconvert.IGSales=lower When specified without a group name, they create a global or default setting for users. When specified with an Entrust IdentityGuard group name, they set the realm, KDC and user ID case to use for members of that group. See “Using groups with external authentication” on page 209 for more information using groups with external authentication. 204 6 Save your changes. 7 Open igkrb5.conf in a text editor, located: • on UNIX, $IDENTITYGUARD_HOME/etc/ • on Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\ IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 8 Using Kerberos syntax, map each realm to the server hosting the corresponding Kerberos Key Distribution Center (KDC). For example: [realms] IG1.ENTRUST.COM = { kdc = ig1.entrust.com } IG2.ENTRUST.COM = { kdc = ig2.entrust.com } Make sure to enter the realm name in uppercase characters. For an example, see the igkrb5.sample file stored in the same location. 9 Add other Kerberos-related settings as required. For example, you may want to change the default encryption key type. For more information on syntax, refer to http://web.mit.edu/kerberos/krb5-1.5/krb5-1.5.1/doc/krb5-admin/krb5.conf. html. 10 Save your changes. If you are not using WebSphere, you have finished setting up external authentication properties for a domain controller. If you are using WebSphere, complete the following procedure (“To finish setting up external authentication for a domain controller on WebSphere”). To finish setting up external authentication for a domain controller on WebSphere 1 Start the administration console for your WebSphere server. The default URL is http://localhost:9060/ibm/console. 2 Select Security > Global Security > JAAS Configuration. 3 In the JAAS Configuration page, click Application Logins. 4 Click New. Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 205 5 206 Set the Alias value to IGKerberos. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 6 Click Apply. The JAAS login modules link under Additional Properties becomes available. 7 Click JAAS login modules. Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 207 8 Set the Module class name to com.ibm.security.auth.module.Krb5LoginModule. 9 Click Apply. 10 Click Save followed by Save. 208 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Using groups with external authentication When you include an Entrust IdentityGuard group name in one of the identityguard.externalauth.impl property entries, it limits the authentication resource to just members of that group. This way, you can direct users in different groups to different authentication resources or exclude some groups from an authentication resource. You can have multiple entries for the identityguard.externalauth.impl property as long as each is unique. For example, you can have one default entry with no group name, and several entries each with a different group name. If all entries for this property include a group name (that is, there is no entry without a group), this means there is no default and only the users in the specified groups can use external authentication. You do not need to include external authentication groups unless you intend to direct certain groups of users to specific external authentication resources. See “Using the Radius proxy with a domain controller or LDAP directory” on page 187 for details on configuring a VPN server to use the Radius proxy for external authentication. Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 209 Adding Entrust IdentityGuard replica servers Replica systems help decrease the load on the primary Entrust IdentityGuard Server. Add replica servers to set up a loadbalanced or failover environment when you are administering very large numbers of users. You may add any number of replica servers. Note: For information on repository failover, see “Configuring failover on the repository” on page 218. For information on high availability and disaster recovery, see the Entrust IdentityGuard Deployment Guide. You must have a existing Entrust IdentityGuard Server before attempting to create a replica system. When adding a replica, consider the following: • Do not enable a file-based repository on a replica server. The replica configuration enables a file-based repository by default. For more details, see “Storing unassigned cards and tokens” on page 220. Note: If you are using a file-based repository, ensure that administrators and master users log in to the primary Entrust IdentityGuard Server when assigning tokens or cards to users. • The repository is not copied when you add a replica. The replica uses the same repository that the primary Entrust IdentityGuard Server uses. • With Entrust IdentityGuard Server installations with embedded Tomcat only, a new self-signed certificate with the proper host name is created during the replica configuration. If you create a new SSL certificate for the replica server, ensure the host name in the SSL certificate is the same as the host name used by the server. For details on creating an SSL certificate, after completing this procedure, see the section “Changing the Entrust IdentityGuard certificate” on page 235. • If you make any configuration changes to the primary Entrust IdentityGuard Server, you must manually propagate the changes to any replicas. For example, if you update the certificates or change the identityguard.properties file, you must also update the replicas. 210 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Note: All files being added should be readable and writable by the user and group selected during installation. Follow the appropriate procedures in this section depending on what type of system you are using to run Entrust IdentityGuard Server: • for UNIX, proceed to “To add a replica server on UNIX” on page 211 • for Microsoft Windows, proceed to “To add a replica server on Microsoft Windows” on page 213 To add a replica server on UNIX 1 As the UNIX user on the existing Entrust IdentityGuard Server, run the partial backup command: igbackup.sh -partial For instructions and options (such as creating a partial or full backup file, and naming a backup file), see “Backing up your configuration” on page 247. 2 Copy the backup onto the computer that will host the new Entrust IdentityGuard replica server. The default location for the backup ZIP file is $IDENTITYGUARD_HOME/backups. 3 Complete the following preinstallation tasks on the computer that will host the replica: 4 a Create a UNIX group and user for Entrust IdentityGuard (“Creating the UNIX group and user” on page 32) or use the UNIX group already created for your application server. b Copy the Entrust IdentityGuard installation package (“Downloading Entrust IdentityGuard software” on page 21). Start the Entrust IdentityGuard installation procedure (“Installing Entrust IdentityGuard Server” on page 33 for installations with embedded Tomcat or “Installing Entrust IdentityGuard Server” on page 106 for installations using an existing application server) on the computer that will host the replica until you see the message: Installation complete Do you wish to configure the application now? [yes or no] Answer yes. 5 The following message appears: Are you configuring an Entrust IdentityGuard primary or replica server?(PRIMARY or REPLICA): Answer replica. 6 You are prompted to enter the backup file name. Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 211 Enter the name of the configuration backup file: Type the name of the partial (or full) configuration backup file that you copied in in Step 2 in this procedure. For example, igpartialbackup_20060224150045.zip. 7 You are prompted to select the mode of the Administration service: How should the administration services be setup? (ENABLED, DISABLED, or PRIMARY)? Choose one of the three modes: • ENABLED enables the Administration service, which the Administration interface uses. The sample will use the local services. • DISABLED disables the Administration service and the Administration interface. The sample is also disabled since it uses the local Administration service. • PRIMARY disables the Administration service on the replica server and enables it on the primary server. Note: If you are using file-based repositories, select either disabled or primary. The Administration interface is enabled on the replica server. In this mode, the SSL certificate of the primary must be installed in the local key store. This is done automatically with installations of Entrust IdentityGuard with embedded Tomcat, but you must complete this manually if your installation of Entrust IdentityGuard uses an existing application server. 8 You are prompted for the ports that the Application server should use. APPLICATION SERVER CONFIGURATION Complete Step 2 to Step 4 on page 45 for installations with embedded Tomcat or Step 1 on page 115 to Step 3 on page 116 for installations using an existing application server. 9 You are prompted to initialize the replica. Do you wish to initialize the replica system? [yes or no] Answer yes, to initialize the replica. REPLICA SYSTEM INITIALIZATION If you want to initialize the system manually later, follow the steps below “To initialize the replica manually on UNIX” on page 213. 10 All three master users must enter their passwords. 212 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide The following message appears: Replica initialized. 11 If you are using a directory, remove the file-based repository settings. See “Storing unassigned cards and tokens” on page 220. 12 Optionally, if you want to enable system binding on the replica, from the master user shell, run the command system bind to enable system binding. For more information on system binding, see “Enabling system binding”. 13 To configure and enable the sample application, proceed to the procedure on “Configuring the sample application on UNIX” on page 51 for installations with embedded Tomcat or “Configuring the sample application on an existing application server” on page 121 for installations using an existing application server. Your replica server is now installed, configured, and initialized. Proceed to “Testing your installation” on page 58 for installations with embedded Tomcat or “Testing your installation” on page 162 for installations using an existing application server. To initialize the replica manually on UNIX 1 As the UNIX user on the replica, change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81). 2 From $IDENTITYGUARD_HOME, source the environment settings file by entering: . ./env_settings.sh (Include a space between the two periods in the command.) 3 Enter the following command to start the master user shell: supersh The copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt. 4 Enter the following command: init -replica All three master users must enter their passwords. To add a replica server on Microsoft Windows 1 Copy the Entrust IdentityGuard installation package to the computer that will host the replica (“Downloading Entrust IdentityGuard software” on page 21). 2 On an existing Entrust IdentityGuard Server, create a backup (for more information on creating a backup, see “Backing up your configuration” on page 247): Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 213 a If the Entrust IdentityGuard Configuration Panel is not open, click Start > All Programs > Entrust > IdentityGuard > Configuration Panel. b Select Backup Entrust IdentityGuard Configuration from the Entrust IdentityGuard Configuration Panel. The Backup Type page appears. c Select Partial as the backup type. Partial backups contain enough information to configure a replica system. d In the Backup File Location section, click Browse. The backup utility create a file name in the File name field, which includes a date/time stamp. e Click OK to save the backup under the file name with the date/time stamp. Alternatively, rename the file in the File name field and press OK. f Click Save. A message appears indicating whether the backup was saved or an error occurred. 3 214 Copy the backup onto the computer that will host the new Entrust IdentityGuard replica server. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 4 Start the Entrust IdentityGuard installation procedure (“Installing Entrust IdentityGuard Server” on page 68) on the computer that will host the replica. 5 When the Entrust IdentityGuard Configuration Panel appears, select Replica as your system type. 6 Select Configure Entrust IdentityGuard. The Entrust IdentityGuard Configuration wizard Welcome page appears. 7 Click Next to begin configuration. The System Backup File page appears. 8 Click Browse to select your Entrust IdentityGuard backup file that you copied in Step 3. 9 Select Next. The Service Settings page appears. 10 Complete “Selecting Entrust IdentityGuard service ports” on page 79 and “Selecting your system host name” on page 81. 11 On the Administration Controls page, select the administration state: • Enabled. This option enables both the Administration service and interface controls on the replica system. • Disabled. This option disables both the Administration service and interface controls on the replica system. Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 215 • Primary. This option disables the Administration service on the replica system and forwards all Administration interface requests to the primary system. The Administration interface is enabled on the replica. 12 Select Next. The Configuration Summary page appears. 13 On the Configuration Summary page, click Confirm and Save if all the information in the summary list is complete and correct. 14 Click Finish to complete the configuration process. The configuration file is extracted from the backup file and updated with the changes made in the Entrust IdentityGuard Configuration wizard. File-based repositories are disabled, as is the Administration service and interface controls (if you selected it to be disabled). A new application server SSL certificate is generated, and the primary server’s public key (SSL certificate) and the LDAP SSL certificate (it is exists) are imported to the new key store. To initialize a replica server on Microsoft Windows 216 1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking Start > All Programs > Entrust > IdentityGuard > Configuration Panel. 2 On the main page of the Configuration Panel, select Replica as the system type. 3 Select Initialize Entrust IdentityGuard. 4 Each master user must enter their password when prompted. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 5 Click Initialize. A confirmation message appears. Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 217 Configuring failover on the repository Attention: This section applies only to installations of Entrust IdentityGuard with embedded Tomcat. By configuring failover on the repository, you ensure that there are backup repositories in the event that the primary repository fails. Topics in this section: • “Configuring failover for a database” on page 218 • “Configuring failover for a directory” on page 219 Note: For instructions on configuring the Radius server failover, see “Configuring Radius server failover” on page 195. Configuring failover for a database You may have a mechanism that updates the DNS information so that the database host name points to the IP address of the new database when the original database fails. If so, you must make the following configuration changes to Entrust IdentityGuard so that it will use the IP address. Configure failover for a database by modifying the default behavior of Entrust IdentityGuard to permanently cache the IP address of a DNS lookup. Complete the following procedure to change the DNS lookup to expire after a period of time, rather than permanently caching the IP address from a DNS lookup. To configure failover for a database 1 2 Locate and back up the java.security configuration file located: • on UNIX, $IDENTITYGUARD_HOME/j2rel.4.2_09/lib/security • on Microsoft Windows, <IG_INSTALL_DIR>\j2rel.4.2_09\lib\security Edit the java.security file and search for the networkaddress.cache.ttl setting. Read the comments surrounding this setting and ensure that any changes that you make to this setting comply with your company’s security policy. 3 218 Comment out the networkaddress.cache.ttl setting to set the IP address expiration time on the DNS lookup. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 4 Specify a positive integer value to define how long, in seconds, the DNS lookup will be cached for. Define an appropriate value for this setting based on your company’s failover requirements. 5 Restart the Entrust IdentityGuard Server. For instructions on restarting, see “Managing the Entrust IdentityGuard service” on page 62 for UNIX installations and “Managing the Entrust IdentityGuard service” on page 94 for Windows. Configuring failover for a directory For LDAP directory failover, you can specify multiple URLs in the identityguard.ldap.url setting in the identityguard.properties file. Entrust IdentityGuard attempts to use each URL in turn, until a successful connection is made. To configure failover for a directory 1 As the Entrust IdentityGuard application owner, open the identityguard.properties file in $IDENTITYGUARD_HOME/etc/ on UNIX or <INSTALL_DIR>\identityguard81\etc on Microsoft Windows. 2 Find the section of the properties file that identifies the LDAP URL, and specify multiple URLs. For example: identityguard.ldap.url=ldap://myldapserver1.com:389/ou=users,c=ca ldap://myldapserver2.com:389/ou=users,c=ca ldap://myldapserver3.com:389/ou=users,c=ca Attention: Type these statements all on the same line separated by a space only. 3 If SSL is enabled, import the certificates of all listed directories into the trust store. 4 Save the file and restart Entrust IdentityGuard. You now have configured failover for your directory. Note: The LDAP credentials and principal specified must work for all directories listed. Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 219 Storing unassigned cards and tokens Entrust IdentityGuard allows the production of cards prior to their association with individual users—called card preproduction. It also requires that you load the token information into the system before you can assign tokens to users. Topics in this section: • “Configuring the disk files for tokens and cards” on page 221 • “Configuring the database” on page 224 The type of repository you use (directory or database) determines where Entrust IdentityGuard stores the unassigned cards and tokens. If you are using a database, the unassigned cards and tokens are stored in the database. If you are using a directory, you have a choice of storing the unassigned cards and tokens in a local file or in a separate database. During the installation and configuration you choose between a directory or database to store your user information. When you configure: • a directory for your user’s information, a file-based repository is automatically configured for your preproduced cards and unassigned tokens You can change the defaults using the “Configuring the disk files for tokens and cards” on page 221 topic. • a directory for your user’s information, and if you want to use a database repository, you must manually configure the database For instructions, see “Configuring the database” on page 224. Attention: If your organization plans to have a large deployment of 100,000 cards or tokens, it is recommended that you configure a database (instead of the file-based repository). • a database for your user’s information, a database repository for preproduced cards and unassigned tokens is automatically configured For more information on storing preproduced cards and unassigned tokens, see the Entrust IdentityGuard Administration Guide. 220 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Configuring the disk files for tokens and cards Entrust IdentityGuard allows you to use files to store preproduced card or unassigned token information, as this information cannot be stored in the directory itself (unlike a database). Once the card or token is assigned to a user, then the information is moved into the user entry in the repository. To change a setting, add or edit the application property to the identityguard.properties file. Note: Do not use a file-based repository on a replica system. The card repository settings shown in Table 13 are configured when you are using an LDAP directory and choose to use file-based repository storage. Use the following information to override the defaults: Table 13: Repository properties for preproduced cards Property Description identityguard.preproducedCardRepository.impl Provides the storage location of preproduced cards on the primary system. It is set automatically when you configure Entrust IdentityGuard. When using a directory, it is set to: com.entrust.identityGuard.car dManagement.dataAccess.file.F ilePreproducedCardRepository When using a database, it is set to: com.entrust.identityGuard.car dManagement.dataAccess.jdbc.J dbcPreproducedCardRepository Note: For any replica system, make sure it is set to: com.entrust.identityGuard.car dManagement.dataAccess.notImp lemented.NotImplementedPrepro ducedCardRepository Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 221 Table 13: Repository properties for preproduced cards (continued) Property Description identityguard.preproducedCardRepository.file.name The base name of the files that store the preproduced cards. The default is, $IDENTITYGUARD.HOME/etc/fpcr/ fpcr.pcr on UNIX or <IG_INSTALL_DIR>/identityguar d81/etc/fpcr on Microsoft Windows Note: Remove this setting for a replica system. identityguard.preproducedCardRepository.file.maxsize The maximum number of cards in each component file of the file-based card preproduction repository. If you deploy cards for over 100,000 users, and you still want to use LDAP file-based card preproduction, set this setting to a value higher than 200. The value should be the (approximate) number of cards, divided by 500. For example 150,000 cards divided by 500, equals 300. Defaults to 200. Note: The preproduced card repository needs approximately 0.5 KB of memory per card. Therefore, 100,000 cards use about 50 MB of memory. Note: Remove this setting for a replica system. The following token repository settings are configured when you are using an LDAP directory and choose to use file-based repository storage. Use the following information to override the defaults. 222 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Table 14: File-based repository properties for unassigned tokens Property Description identityguard.tokenRepository.impl Provides the storage location of unassigned tokens on the primary system. It is set automatically when you configure Entrust IdentityGuard. When using a directory, it is set to: com.entrust.identityGuard.cardManagem ent.dataAccess.file.FileTokenReposito ry When using a database, it is set to: com.entrust.identityGuard.cardManagem ent.dataAccess.jdbc.JdbcTokenReposito ry Note: For any replica system, make sure it is set to: com.entrust.identityGuard.cardManagem ent.dataAccess.notImplemented.NotImpl ementedTokenRepository identityguard.tokenRepository.file.name Specifies the base file used for the file-based repository. The default is, $IDENTITYGUARD_HOME/etc/ftkr/ftkr.pcr on UNIX or <IG_INSTALL_DIR>/identityguard81/etc/ ftkr/ftkr.pcr on Microsoft Windows Applies to an LDAP repository only. Note: Remove this setting for a replica system. identityguard.tokenRepository.file.maxsize Sets the maximum number of tokens the file-based repository can store. The default is 200. Applies to an LDAP repository only. Note: Remove this setting for a replica system. Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 223 Configuring the database If you have configured an LDAP directory for user information and your organization plans to have a large deployment of 100,000 cards or tokens or more, it is recommended that you configure a database for storing the unassigned card and token information. Entrust IdentityGuard requires a supported database to store the preproduced card and unassigned token information. Add the following properties for the database to the identityguard.properties file. To configure database settings for card preproduction 1 Load the Entrust IdentityGuard schema into your database. For instructions, see the Entrust IdentityGuard Database Configuration Guide. 2 Add the following settings to the identityguard.properties file and enter the values for your database: Property Description identityguard.jdbc.driverClass= The name of the JDBC driver class. identityguard.jdbc.url= The URL used to connect to the database server. identityguard.jdbc.user= The ID of the database user. &identityguard.jdbc.password=1 The password of the database user. identityguard.jdbc.schema= The database schema. 1. The ampersand (&) indicates this setting will be encrypted when Entrust IdentityGuard restarts. The values used for these database related configuration settings are similar to the settings used if Entrust IdentityGuard was installed with a database repository (instead of an LDAP repository). See the Entrust IdentityGuard Database Configuration Guide for example values for these settings. 3 If you have configured Entrust IdentityGuard to use an LDAP repository and you want to store the preproduced cards in the database instead of the file-based repository, complete the following step: Note: If you are configuring a replica, do not manually set this setting. When you configure the replica, this setting is set automatically. Change the value of identityguard.preproducedCardRepository.impl to the following: com.entrust.identityGuard.cardManagement.dataAccess.jdbc.JdbcPrepr oducedCardRepository 224 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 4 If you have configured Entrust IdentityGuard to use an LDAP repository and you want to store the unassigned tokens in the database instead of the file-based repository, complete the following step: Note: If you are configuring a replica, do not manually set this setting. When you configure the replica, this setting is set automatically. Change the value of identityguard.tokenRepository.impl to the following: com.entrust.identityGuard.cardManagement.dataAccess.jdbc.JdbcToken Repository 5 On UNIX install the driver of the database .jar files in $IDENTITYGUARD_HOME/lib/db and $CATALINA_HOME/common/lib. On Microsoft Windows install the driver of the database .jar files in <IG_INSTALL_DIR>\identityguard81\lib\ and <IG_INSTALL_DIR>\jakarta-tomcat-5.0.28\common\lib Attention: Ensure that you synchronize the backups of your LDAP directory or database repositories. Remember that any time you restore Entrust IdentityGuard from a backup, both the LDAP and database repositories must be restored as well. Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 225 Configuring Syslog for remote logging on UNIX Configure Syslog to enable remote logging of Entrust IdentityGuard messages. For information on Windows logs, see the “Troubleshooting” chapter in the Entrust IdentityGuard Administration Guide. To log Entrust IdentityGuard messages remotely on Linux 1 As root, edit the file /etc/sysconfig/syslog by changing the entry SYSLOGD_OPTIONS to SYSLOGD_OPTIONS="-m 0 -r". 2 As root, restart Syslog by running service syslog restart To configure Syslog on Linux 1 As root, edit /etc/syslog.conf and make changes similar to the following: old line: # *.info;mail.none;authpriv.none;cron.none /var/log/messages new line: *.info;local1.*;local2.*;local3.*;mail.none;authpriv.none;cron.non e /var/log/messages 2 As root, restart Syslog by running: service syslog restart To configure Syslog on Solaris 1 As root, edit /etc/syslog.conf and add the following line: local1.*;local2.* /var/adm/messages 2 As root, force Syslog to reread its configuration by running: kill -HUP ‘cat /etc/syslog.pid‘ To configure Syslog on AIX 1 As root, edit /etc/syslog.conf and add the following lines: local1.debug /var/adm/messages local2.debug /var/adm/messages 2 226 As root, either restart syslogd or run the following command: IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide kill -HUP <pid> where <pid> is the process identifier of the syslogd process. 3 AIX Syslog will not log to a file unless it already exists. Run the following command: touch /var/adm/messages Ensure the resulting file has the proper file permissions. Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 227 Disabling the non-SSL port on the Authentication service Attention: This section applies only to installations of Entrust IdentityGuard with embedded Tomcat. By default, the Entrust IdentityGuard Authentication service supports both non-SSL (default: 8080) and SSL (default: 8443) ports for communication between the Entrust IdentityGuard Server and the Authentication Web service. To further secure your Entrust IdentityGuard Server, disable the non-SSL (HTTP) port. To disable the non-SSL port 1 If Entrust IdentityGuard is currently running, shut it down. See “Managing the Entrust IdentityGuard service” on page 62 for UNIX instructions and “Managing the Entrust IdentityGuard service” on page 94 for Windows instructions. 2 Edit the server.xml file found at: • on UNIX, $CATALINA_HOME/conf where $CATALINA_HOME is the install directory for Tomcat, for example, /opt/entrust/jakarta-tomcat-5.0.28. • on Microsoft Windows, <IG_INSTALL_DIR>\jakarta-tomcat-5.0.28\conf 3 Identify and comment out the following section: <Connector port="8080" maxThreads="150" minSpareThreads="25" maxSpareThreads="75" enableLookups="false" redirectPort="8443" acceptCount="100" debug="0" connectionTimeout="20000" disableUploadTimeout="true" /> After adding comments, the section should appear as follows: <!-<Connector port="8080" maxThreads="150" minSpareThreads="25" maxSpareThreads="75" enableLookups="false" redirectPort="8443" 228 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide acceptCount="100" debug="0" connectionTimeout="20000" disableUploadTimeout="true" /> --> 4 Save the server.xml file. 5 Update the identityguard.properties file to direct the sample application to the SSL port by modifying the identityguard.authservice.url property to: https://<yourhostname>:<SSL_PORT>/IdentityGuardAuthService/service s/AuthenticationServiceV2 For example, using the default port values, the value should appear after modification as: identityguard.authservice.url=https://igserver.anycorp.com:8443/Id entityGuardAuthService/services/AuthenticationServiceV2 6 Restart the Entrust IdentityGuard Server. For instructions on restarting, see “Managing the Entrust IdentityGuard service” on page 62 for UNIX and “Managing the Entrust IdentityGuard service” on page 94 for Windows. Attention: Update Entrust IdentityGuard clients to use the SSL port for communication with the Authentication service. If clients attempt to access the Entrust IdentityGuard Authentication service at the non-SSL port, they will receive a “Connection Refused” error. Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 229 Enabling the non-SSL port on the Administration service Attention: This section applies only to installations of Entrust IdentityGuard with embedded Tomcat. By default, the Entrust IdentityGuard Administration service runs on HTTPS (port 8444) to take advantage of better security. If necessary, complete the following steps to allow the Administration service to run on a non-SSL port. Note: It is important that you understand that enabling the non-SSL port on the Administration service can seriously compromise the security of your system. To enable the non-SSL port on the Administration service 1 Open the server.xml file found at: • on UNIX, $CATALINA_HOME/conf • on Microsoft Windows, <IG_INSTALL_DIR>\jakarta-tomcat-5.0.28\conf 2 Add a new <Connector> element to the second <Service> element (which defines the Administration service). This new <Connector> element should be the same as the first <Connector> element in the first <Service> element, except you must pick a new port (do not use 8080, 8443, 8444). The port number must be greater than 1024. 3 Open the web.xml file found at: • on UNIX, $IDENTITYGUARD_HOME/services/admin/IdentityGuardAdminSer vice/WEB-INF/ • on Microsoft Windows, <IG_INSTALL_DIR>\Identityguard81\services\admin\Identity GuardAdminService\WEB-INF\ 4 230 Remove the <security-constraint> element. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Disabling the SSL port on the Administration service Attention: This section applies only to installations of Entrust IdentityGuard with embedded Tomcat. If you have disabled the Administration service and the Administration interface, complete the following steps to disable the default HTTPS port (8444) on the Administration service. After you have disabled this port, if you wish to enable either the Administration service or the Administration interface, you must enable the SSL port on the Administration service. To disable the SSL port on UNIX 1 If Entrust IdentityGuard is currently running, shut it down. See “Managing the Entrust IdentityGuard service” on page 62 for instructions. 2 Run the command to disable the Administration interface, if it is still running: identityguard.sh disable admininterface 3 Run the command to disable the Administration service, if it is still running: identityguard.sh disable adminservice 4 Locate and make a backup copy of the server.xml file found at: $CATALINA_HOME/conf/server.xml 5 Identify and comment out the code between <Service ..> and </Service> that contains <Connector port="8444">. 6 Save the server.xml file. 7 Restart the Entrust IdentityGuard Server. For instructions on restarting, see “Managing the Entrust IdentityGuard service” on page 62. To disable the SSL port on Microsoft Windows 1 If Entrust IdentityGuard is currently running, shut it down. See “Managing the Entrust IdentityGuard service” on page 94 for instructions. 2 Locate and make a backup copy of the server.xml file found at: <IG_INSTALL_DIR>\jakarta-tomcat-5.0.28\conf\server.xml 3 Identify and comment out the code between <Service ..> and </Service> that contains <Connector port="8444">. 4 Save the server.xml file. Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 231 5 232 Restart the Entrust IdentityGuard Server. For instructions on restarting, see “Managing the Entrust IdentityGuard service” on page 94. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Securing the LDAP connection with SSL During installation, if you chose not to use an SSL connection to the LDAP repository, you can reconfigure the connection without reinstalling and configuring Entrust IdentityGuard. Topics in this section: • “Creating self-signed certificates” on page 235 • “Importing CA-signed certificates” on page 236 • “Exporting the certificate to client applications” on page 238 • “Updating certificates” on page 238 To reconfigure the connection, update the Entrust IdentityGuard keystore, and then the identityguard.properties file. First ensure that you have: • an LDAP repository that supports SSL • a user with permissions to update the identityguard.properties file • an SSL certificate for your LDAP server • access to the Java keytool executable There are two steps to this process: • Import the LDAP server's SSL certificate into the Entrust IdentityGuard keystore so that Entrust IdentityGuard can communicate with the LDAP server. Entrust IdentityGuard uses this certificate (when establishing a connection) to verify the identity of the LDAP server. • Edit the properties file so that Entrust IdentityGuard will connect to the LDAP server using SSL. To import the LDAP SSL certificate 1 Copy the LDAP server certificate onto the Entrust IdentityGuard Server. 2 From the command line on the Entrust IdentityGuard Server, issue the following command: keytool -import -alias ldapssl -keystore <path_to_keystore> -file <path_to_ldap_ssl_cert_file> -storepass <password> Where: • <path_to_keystore> is: – for UNIX, $IDENTITYGUARD_HOME/etc/keystore – for Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\keystore Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 233 Note: The path to the keystore for versions of Entrust IdentityGuard installed using an existing application server is the location of the trustStore.jks file. • 3 <path_to_ldap_ssl_cert_file> is the directory you chose to store the file when you exported the certificate. When prompted to answer whether or not you trust the certificate, review the displayed details, and if they are correct, answer yes. To update the Entrust IdentityGuard properties file 1 As the Entrust IdentityGuard application owner, open the identityguard.properties file in $IDENTITYGUARD_HOME/etc/ 2 Find the section of the properties file that identifies the LDAP URL: # URL that will be used to connect to the LDAP server. identityguard.ldap.url=ldap://myldapserver:389/ou=users, dc=myserver,dc=com 3 Change the URL to use the LDAP SSL port on your LDAP server. The default SSL port for LDAP servers is 636. Update the property with the value appropriate to your environment. identityguard.ldap.url=ldap://myldapserver:636/ou=users, dc=myserver,dc=com 4 Find the section of the properties file that identifies the LDAP SSL connections: # Specify whether this will be a secure SSL connection to the directory. # If set to true, the identityguard.ldap.url must be directed to a # secure ldap port (default: 636). # This property can be true or false, or commented out entirely. identityguard.ldap.sslEnabled=false 5 Change the property value to true: identityguard.ldap.sslEnabled=true 6 Save the file and restart Entrust IdentityGuard. You now have a secure SSL connection between Entrust IdentityGuard and your LDAP repository. 234 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Changing the Entrust IdentityGuard certificate Attention: This section applies only to installations of Entrust IdentityGuard with embedded Tomcat. When engaged in an SSL-secured communication, Entrust IdentityGuard requires an SSL certificate. A client application uses the SSL certificate to identify the Entrust IdentityGuard Server. Note: You can purchase or renew an SSL certificate by going to http://www.entrust.com/certificate_services/index.htm. Note: The J2SE 1.4 installed with your Entrust IdentityGuard system includes the keytool application. Use it to manage the Java keystore containing private keys and SSL certificates (X.509 chains and public keys). For complete documentation on keytool, see http://java.sun.com/j2se/1.4.2/docs/tooldocs/solaris/keytool.html on Solaris, and http://java.sun.com/j2se/1.4.2/docs/tooldocs/windows/keytool.html on Windows. Configure one of the two different types of certificates: self-signed certificate and CA-signed certificate. The following topics provide procedural information for using SSL certificates: • “Creating self-signed certificates” on page 235 • “Importing CA-signed certificates” on page 236 • “Exporting the certificate to client applications” on page 238 • “Updating certificates” on page 238 Creating self-signed certificates A self-signed certificate is not guaranteed. Your client application must accept that the certificate is valid, and choose to import it. For a Java client, this means that you must add the self-signed certificate to the client keystore in order to communicate with Entrust IdentityGuard using SSL. To create a self-signed certificate for Entrust IdentityGuard, generate a new private key and certify it. Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 235 To create a self-signed certificate 1 Delete the existing key if there is one: keytool -delete -alias tomcat -storepass entrust -keystore <path_to_keystore> Where <path_to_keystore> is: 2 • for UNIX, $IDENTITYGUARD_HOME/etc/keystore • for Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\keystore Generate a new key pair: keytool -genkey -alias tomcat -keyalg RSA -validity <cert_lifetime_in_days> -keystore <path_to_keystore> -dname "<subject_DN>" -keypass entrust -storepass entrust Where: • <path_to_keystore> is: – for UNIX, $IDENTITYGUARD_HOME/etc/keystore – for Microsoft Windows, <IG_INSTALL_DIR>/identityguard81\etc\keystore Importing CA-signed certificates A CA-signed certificate has the following advantages: • it is automatically recognized and accepted by major Web browsers • it is automatically recognized and accepted by a Java client using a recent JRE • it guarantees the identity of the owning organization To import a CA-signed certificate 1 Delete the existing key: keytool -delete -alias tomcat -keystore <path_to_keystore> -keypass entrust -storepass entrust where <path_to_keystore> is: 2 236 • for UNIX, $IDENTITYGUARD_HOME/etc/keystore • for Microsoft Windows, <IG_INSTALL_DIR>/identityguard81\etc\keystore Before generating a certificate request, generate a public/private key pair for your server. To generate the necessary key pair, enter: IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide keytool -genkey -alias tomcat -dname "<required DN>" -keyalg RSA -keysize <value> -keystore <path_to_keystore> -keypass entrust -storepass entrust Where: • • • 3 <required DN> depends on the CA that will process the certificate request. – If you are using a certificate from, for example, the Entrust Certificate Service, you must enter a fully qualified DN. – If you are using an Entrust CA with Entrust Authority Enrollment Server for Web to process the request, the DN must be "cn=<refnum>" where <refnum> is the reference number generated by the CA. <value> is the keysize value. Ensure the keysize value is secure, for example, 1024 or 2048. <path_to_keystore> is one of: – for UNIX, $IDENTITYGUARD_HOME/etc/keystore – for Microsoft Windows, <IG_INSTALL_DIR>/identityguard81\etc\keystore A Certificate Signing Request (CSR) is used by the CA to generate your SSL certificate. To create a CSR, enter: keytool -certreq -alias tomcat -file <file to store request in> -keystore <path_to_keystore> -keypass entrust -storepass entrust Provide the file generated by this command to the CA. The CA takes the request file and creates a certificate. 4 Optionally, once you receive your SSL certificate from the CA, import a chain certificate (if the CA is not already included in the JRE Trusted CA list). To import a CA chain certificate, enter: keytool -import -alias root -trustcacerts -file <file containing CA certificate> -keystore <path_to_keystore> -keypass entrust -storepass entrust 5 To import the SSL certificate that was generated by the CA, save the certificate file to a location on the Entrust IdentityGuard Server and enter: keytool -import -alias tomcat -trustcacerts -file <SSL_cert_file> -keystore <path_to_keystore> -keypass entrust -storepass entrust Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 237 Exporting the certificate to client applications When you use SSL, you may be required to export the Entrust IdentityGuard Server certificate so that the client has access to it. Complete the following steps to export a server certificate that you manually created. To export a certificate 1 Enter the following command (on one line): keytool -export -alias tomcat -file <path_to_file.cer> -keystore <path_to_keystore> -keypass entrust where <path_to_keystore> is: 2 • for UNIX, $IDENTITYGUARD_HOME/etc/keystore • for Microsoft Windows, <IG_INSTALL_DIR>/identityguard81\etc\keystore Enter the password when prompted. Updating certificates Whether you chose a self-signed certificate or a CA-signed certificate, the certificate will eventually expire. It is necessary to update the keystore with the new certificate before expiry. As well, there are other reasons why you might want to replace the self-signed certificate that was created during installation. For example, you may need • to modify the lifetime or key type The default self-signed certificate is RSA-1024. • a different DN in the certificate The default self-signed certificate has a DN of cn=<hostname>, where <hostname> is the host name of the Entrust IdentityGuard Server. If the client applications connecting to the Entrust IdentityGuard services are not using this host name, you need a new self-signed certificate. • additional security To update the certificate 1 If you are updating a self-signed certificate, use the Java keytool application to issue the following command (on one line): keytool -selfcert -alias tomcat -validity <number_of_days> -keystore <path_to_keystore> -keypass entrust where <path_to_keystore> is: 238 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide • for UNIX, $IDENTITYGUARD_HOME/etc/keystore • for Microsoft Windows, <IG_INSTALL_DIR>/identityguard81\etc\keystore You should not have to delete the original alias when creating a new self-signed certificate. 2 If Entrust IdentityGuard is using a CA-signed certificate, it is necessary to generate a new signing request and import the response. See “Importing CA-signed certificates” on page 236. Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 239 Enabling system binding As a master user, you can bind the master keys to a specific machine through an update to the key protection file (.kpf). This is called system binding. You can also perform system unbinding of the master keys, making them portable. Perform system binding on the master keys to: • rebind master keys that were unbound • rebind master keys after a hardware change, as required • complete initializing of a replica or restoring from a backup Note: When you initialize Entrust IdentityGuard for the first time, system binding occurs automatically. Perform system unbinding on the master keys to copy a key protection file (.kpf) to another computer. To bind the master keys 1 On UNIX: a As the UNIX user, change to $IDENTITYGUARD_HOME. b From $IDENTITYGUARD_HOME, source the environment settings file by entering: . ./env_settings.sh (Include a space between the two periods in the command.) c Enter the following command to start the master user shell: supersh 2 On Windows, click Start > All Programs > Entrust > IdentityGuard > Master User Shell. The copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt. 3 Enter the following command: system bind You are prompted for a user name and password. To unbind the master keys 1 On UNIX: a 240 As the UNIX user, change to $IDENTITYGUARD_HOME. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide b From $IDENTITYGUARD_HOME, source the environment settings file by entering: . ./env_settings.sh (Include a space between the two periods in the command.) c Enter the following command to start the master user shell: supersh 2 On Windows, click Start > All Programs > Entrust > IdentityGuard > Master User Shell. The copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt. 3 Enter the following command: system unbind You are prompted for a user name and password. Postinstall configuration options for Entrust IdentityGuard Server Feedback on guide 241 242 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Chapter 8 Backing up and restoring Entrust IdentityGuard Server This chapter is intended for installers and administrators who are responsible for the backup and recovery of Entrust IdentityGuard. It provides guidelines for planning a backup strategy and steps for restoring Entrust IdentityGuard from a backup. This chapter contains the following sections: • “Planning a backup strategy” on page 244 • “Restoring Entrust IdentityGuard from a backup” on page 250 • “Restoring a file-based repository” on page 253 • “Reconfiguring the system or Entrust IdentityGuard serial number” on page 254 243 Planning a backup strategy It is strongly recommended that you have a backup strategy in place before you install or upgrade Entrust IdentityGuard. Backing up provides insurance in case something unexpected happens (for example, a hardware failure) to the servers hosting Entrust IdentityGuard and your repository. You should consider a separate server or separate physical disk to host the backup files in case of a hard disk failure. Topics in this section: • “To plan a backup strategy on UNIX” on page 244 • “To plan a backup strategy on Microsoft Windows” on page 245 To plan a backup strategy on UNIX Use the following points to help you develop a backup strategy for Entrust IdentityGuard Server and your repository on UNIX. • Back up the masterkeys.enc file. • Entrust IdentityGuard does not back up your data repository. Ensure that you back up your repository on a regular basis and before installing or upgrading Entrust IdentityGuard. • If the data is split over two repositories, back up and restore both repositories together. • Back up your logs on a regular basis. If you chose to log to files when you installed Entrust IdentityGuard, the logs are stored in $IDENTITYGUARD_HOME/logs • Decide on a backup type from the following two options: • – Full. Full backups contain all information required to restore the configuration, logs, and file-based repositories. – Partial. Partial backups contain enough information to restore a replica system. The following Entrust IdentityGuard files are backed up during a full backup: – $IDENTITYGUARD_HOME/etc/masterkeys.enc. This file changes whenever a master user changes a password and should be backed up again after such an operation. – $IDENTITYGUARD_HOME/etc/keystore (installations with embedded Tomcat only). This file changes whenever a new SSL key-pair is generated or imported. – $IDENTITYGUARD_HOME/etc/identityguard.properties – $CATALINA_HOME/conf/server.xml (installations with embedded Tomcat only) 244 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide • • – $IDENTITYGUARD_HOME/etc/igsample.properties – $IDENTITYGUARD_HOME/etc/igkrb5.conf Make sure you back up any files in the following directories: – $IDENTITYGUARD_HOME/export/ – $IDENTITYGUARD_HOME/etc/fpcr/ – $IDENTITYGUARD_HOME/etc/ftkr/ If you use a database repository, save the JDBC driver .jar files you used during installation. • You can create a new keystore file but then you must also generate new SSL keys. • You can run configure.sh again to recreate the identityguard.properties and server.xml files. To plan a backup strategy on Microsoft Windows Use the following points to help you develop a backup strategy for Entrust IdentityGuard Server and your repository on Microsoft Windows. • Entrust IdentityGuard does not back up your data repository. Ensure that you back up your repository on a regular basis and before installing or upgrading Entrust IdentityGuard. • If the data is split over two repositories, back up and restore both repositories together. • Back up your logs on a regular basis. The logs are stored in <IG_INSTALL_DIR>\identityguard81\logs • Decide on a backup type from the following two options: • – Full. Full backups contain all information required to restore the configuration, logs, and file based repository. – Partial. Partial backups contain enough information to set up a replica system. The following Entrust IdentityGuard files are backed up during a full backup. – <IG_INSTALL_DIR>\identityguard81\etc\masterkeys.enc. This file changes whenever a master user changes their password and should be backed up again after such an operation. – <IG_INSTALL_DIR>\identityguard81\etc\keystore. This file changes whenever a new SSL key-pair is generated or imported. – <IG_INSTALL_DIR>\identityguard81\etc\identityguard.prop erties – <IG_INSTALL_DIR>\jakarta-tomcat-5.0.28\conf\server.xml – <IG_INSTALL_DIR>\identityguard81\etc\igsample.properties – <IG_INSTALL_DIR>\identityguard81\etc\igkrb5.conf Backing up and restoring Entrust IdentityGuard Server Feedback on guide 245 • • 246 Make sure you back up any files in the following directories: – <IG_INSTALL_DIR>\identityguard81\export\ – <IG_INSTALL_DIR>\identityguard81\etc\fpcr\ – <IG_INSTALL_DIR>\identityguard81\etc\ftkr\ If you use a database repository, save copies of the JDBC driver .jar files you used during installation. • You cannot recover the masterkeys.enc file. • You can create a new keystore file but then you must also generate new SSL keys. • You can use the Configuration wizard from the Entrust IdentityGuard Configuration Panel to recreate the identityguard.properties and server.xml files. • Make sure you store your backup files on a separate machine from your Entrust IdentityGuard Server. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Backing up your configuration Back up your Entrust IdentityGuard configuration as a precaution in case your system fails. Attention: Ensure that you synchronize the backups of your LDAP directory or database repositories. Remember that any time you restore Entrust IdentityGuard from a backup, both the LDAP and database repositories must be restored as well. This section contains the following procedures: • “To back up your configuration on UNIX” on page 247 • “To back up your configuration on Microsoft Windows” on page 248 Attention: Backup files contain sensitive information, such as the masterkeys.enc file and export files. The igsample.properties file contains a clear text administrator password. As such, backup files should be stored carefully. To back up your configuration on UNIX 1 Log in as the UNIX user on the existing Entrust IdentityGuard Server. 2 Run the backup command: igbackup.sh [-partial|-full] This command creates a backup ZIP file and puts it in the default location, $IDENTITYGUARD_HOME/backups/. The default name includes the type of backup (partial or full), and the current date and time. For example, if you create a partial backup file created on February 24, 2006 at 3:00:45 P.M., the file name is: igpartialbackup_20060224150045.zip. Optionally, you can you can specify a file name by including [-file <file name>] in the backup command. For example, igbackup.sh -partial -file <file name> where <file name> is the name you choose for the backup file. The default location is relative to your current working directory. The partial backup ZIP file includes the following files for installations with embedded Tomcat: • masterkeys.enc • identityguard.properties Backing up and restoring Entrust IdentityGuard Server Feedback on guide 247 • igsample.properties file (if it exists) • igkrb5.conf • JDBC .jar files (if they exist) • identityguard.cer (contains the SSL certificate of the primary server) • LDAP SSL certificate (if the primary server has configured SSL to its LDAP repository) The partial backup ZIP file includes the following files for installations using an existing application server: • masterkeys.enc • identityguard.properties • igsample.properties file (if it exists) • JDBC .jar files (if they exist) The full backup ZIP file includes the following files (in addition to the files that are backed up in the partial backup): • server.xml (installations with embedded Tomcat only) • file-based repository files (both preproduced cards and unassigned tokens) • keystore • log files • export files Note: If you do not specify either -partial or -full with the igbackup.sh command, a full backup is created. To back up your configuration on Microsoft Windows 1 If the Entrust IdentityGuard Configuration Panel is not open, open it by clicking Start > All Programs > Entrust > IdentityGuard > Configuration Panel. 2 Select Backup Entrust IdentityGuard Configuration. 3 Select the backup type: Full or Partial. 4 In the Backup File Location section, click Browse. A file name including a date/time stamp will automatically be created in the File name field. The default location is relative to your current working directory. 5 248 Click OK to save the backup under the file name with the date/time stamp. Alternatively, rename the file in the File name field and press OK. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Note: If you are selecting your own file name, assure you can recognize which backup is the most recent file, as over time, more than one backup file may exist. 6 Click Save. Your backup is saved as a ZIP file. 7 Click Close to exit the Configuration Backup utility. Note: During the Windows uninstall process, Entrust IdentityGuard attempts to create a backup of your Entrust IdentityGuard configuration. If successful, it displays a message listing the location of the backup file. Click OK to continue the uninstall. This occurs only if Entrust IdentityGuard was correctly configured and initialized. Note: You can also use the command line backup utility, igbackup.exe, located in <IG_INSTALL_DIR>\identityguard81\bin to back up your configuration on Microsoft Windows. Backing up and restoring Entrust IdentityGuard Server Feedback on guide 249 Restoring Entrust IdentityGuard from a backup The following steps describe how to restore Entrust IdentityGuard from a backup. These steps assume that you have already restored your repository. Topics in this section: • “To restore Entrust IdentityGuard from a backup on UNIX” on page 250 • “To restore Entrust IdentityGuard from a backup on Windows” on page 251 Attention: If your backup does not include the masterkeys.enc file, then you cannot restore your system. To restore Entrust IdentityGuard from a backup on UNIX 1 Copy the full backup ZIP file from your Entrust IdentityGuard Server to the computer that you want to restore Entrust IdentityGuard on. The default location for the file is $IDENTITYGUARD_HOME/backups. Note: All files listed here should be readable and writable by the user and group selected during installation. 2 If the computer you are restoring to has a copy of the server.xml file, delete it before continuing with the restore. 3 Unzip the full backup ZIP file. For example, on UNIX, unzip igfullbackup_20060324151505.zip 4 Open the files.txt file in a text editor. This file contains a list of all the files copied into the backup ZIP file, and the location they were copied from. 5 Copy all the files back to their proper locations. 6 For database repositories: 7 250 • Copy the JDBC driver .jar files you used during the original installation to $CATALINA_HOME/common/lib (installations with embedded Tomcat only) and $IDENTITYGUARD_HOME/lib. • Restore the JDBC .jar files to $CATALINA_HOME/common/lib (installations with embedded Tomcat only) Open the manifest.txt file in a text editor and ensure you are using the correct version of the files. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Backups between versions of Entrust IdentityGuard may not be compatible. 8 Open the master user shell. a Log in as the UNIX user that belongs to the UNIX group and change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81). b From $IDENTITYGUARD_HOME, source the environment settings file by entering: . ./env_settings.sh (Include a space between the two periods in the command.) c Enter the following command to start the master user shell: supersh Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt. 9 Enter the following in the master user shell to initialize the restored system: init -replica All three master users must enter their passwords. 10 It is recommended that you run the command system bind from the master user shell to enable system binding. For more information on system binding, see “Enabling system binding” on page 240. Entrust IdentityGuard is now restored from backup. 11 Redeploy the Entrust IdentityGuard services: • see “Enabling and disabling individual Entrust IdentityGuard services” on page 64) for installations with embedded Tomcat • see “Deploying Entrust IdentityGuard services on an existing application server” on page 127) for installations using an existing application server To restore Entrust IdentityGuard from a backup on Windows 1 Copy the full backup ZIP file from your Entrust IdentityGuard Server to the computer that you want to restore Entrust IdentityGuard on. The default location for the file is <IG_INSTALL_DIR>\identityguard81\backups 2 If the computer you are restoring to has a copy of the server.xml file, delete it before continuing with the restore. 3 Unzip the full backup ZIP file. 4 Open the files.txt file in a text editor. This file contains a list of all the files copied into the backup ZIP file, and the location they were copied from. Backing up and restoring Entrust IdentityGuard Server Feedback on guide 251 5 Copy all the files back to their proper locations. 6 For database repositories, ensure that copies of the JDBC driver .jar files you used during installation are in these folders: 7 • <TOMCAT_INSTALL_DIR>\common\lib • <IG_INSTALL_DIR>\identityguard81\lib. Open the manifest.txt file in a text editor and ensure you are using the correct version of the files. Backups between versions of Entrust IdentityGuard may not be compatible. 8 Click Start > All Programs > Entrust > IdentityGuard > Configuration Panel. 9 Select Initialize Entrust IdentityGuard on the Entrust IdentityGuard Configuration Panel to initialize the restored system. For instructions, see “Running the Entrust IdentityGuard Initialization wizard” on page 84. All three master users must enter their passwords. Entrust IdentityGuard is now restored from backup. Note: The backup file does not contain saved settings for Entrust IdentityGuard services. Check that the Administration service, Administration interface and the sample application are enabled or disabled, as applicable. 252 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Restoring a file-based repository A restore backs up the configuration files, including the .pcr and .idx files. Specific files in the fpcr and ftkr directories should be backed up or restored with the repository, so that they are consistent. Topics in this section: • “To restore a file-based card repository on UNIX” on page 253 • “To restore a file-based card repository on Windows” on page 253 To restore a file-based card repository on UNIX 1 Back up the files that start with fpcr.pcr (for cards) located in: $IDENTITYGUARD_HOME/etc/fpcr You can override the base file for cards with the identityguard.properties setting: identityguard.preproduced.cardRepository.file.name 2 Back up the files that start with ftkr.pcr (for tokens) located in: $IDENTITYGUARD_HOME/etc/ftkr You can override the base file for tokens with the identityguard.properties setting: identityguard.tokenRepository.file.name 3 Ensure that the files are owned (and are readable and writable) by the user that owns Entrust IdentityGuard. To restore a file-based card repository on Windows 1 Back up the files that start with fpcr.pcr (for cards) located in: <IG_INSTALL_DIR>\identityguard81\etc\fpcr You can override the base file for cards with the identityguard.properties setting: identityguard.preproduced.cardRepository.file.name 2 Back up the files that start with ftkr.pcr (for tokens) located in: <IG_INSTALL_DIR>\identityguard81\etc\ftkr You can override the base file for tokens with the identityguard.properties setting: identityguard.tokenRepository.file.name Backing up and restoring Entrust IdentityGuard Server Feedback on guide 253 Reconfiguring the system or Entrust IdentityGuard serial number Reconfigure the next generated serial number after you restore your repository to an old backup. This prevents duplication of serial numbers for cards that were created and manufactured between the backup and the time the repository was restored. To configure the card serial number 1 Open the master user shell. • on UNIX: – Log in as the UNIX user that belongs to the UNIX group and change to $IDENTITYGUARD_HOME (usually /opt/entrust/identityguard81). – From $IDENTITYGUARD_HOME, source the environment settings file by entering: . ./env_settings.sh (Include a space between the two periods in the command.) – Enter the following command to start the master user shell: supersh • 2 Copyright information and the Entrust IdentityGuard version number appear, followed by a command prompt. on Microsoft Windows: – Click Start > All Programs > Entrust > IdentityGuard > Master User Shell. To display the next available serial number, at the command line, enter system get 3 To update to a new serial number, enter system set -sernum <value> 254 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Appendix A Configuring the Entrust IdentityGuard Server properties file When you installed Entrust IdentityGuard, it created an identityguard.properties file in the following directory: • on UNIX, $IDENTITYGUARD_HOME/etc/ • on Microsoft Windows, <IG_INSTALL_DIR>\identityguard81\etc\ Reconfigure your installation by editing or adding settings to the identityguard.properties file. Note: With the exception of log settings, you must restart the Entrust IdentityGuard service for changes to Entrust IdentityGuard properties to take effect. See: “Managing the Entrust IdentityGuard service” on page 62 for installation using embedded Tomcat on UNIX, “Managing the Entrust IdentityGuard service” on page 166 for installations using existing application servers, or “Managing the Entrust IdentityGuard service” on page 94 for installation using embedded Tomcat on Microsoft Windows. Topics in this section: • “Editing property values” on page 257 • “Enabling the authentication success audit” on page 258 • “Enabling a WSDL query” on page 259 255 256 • “Configuring additional search bases” on page 260 • “Configuring LDAP directory properties” on page 261 • “Configuring database properties” on page 267 • “Enabling cached challenges” on page 270 • “Caching policies” on page 272 • “Changing log configuration” on page 273 • “Changing log locations on UNIX” on page 277 • “Configuring master user shell formatting” on page 278 • “Configuring license auditing” on page 281 • “Configuring the Entrust IdentityGuard Radius proxy properties” on page 282 • “Configuring external authentication properties” on page 293 • “Configuring token properties” on page 295 • “Configuring the Administration interface properties for bulk operations” on page 296 • “Configuring the Administration interface to control the output format” on page 297 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Editing property values You can change any value in the identityguard.properties file. Change these settings with caution, as mistakes can disrupt Entrust IdentityGuard functions: • any setting that starts with log4j • identityguard.MasterKeyFile • identityguard.KeyProtectionFile • identityguard.authservice.url • identityguard.adminservice.url • identityguard.webadmin.url • identityguard.authservice.https.url • identityguard.webadmin.bulk.maxFileSize • identityguard.wedadmin.bulk.inMemoryThreshold Encrypting property values Some values in the identityguard.properties file are encrypted, for example, the database or LDAP password, and the Radius shared secret values. An encrypted property has an ampersand (&) in front of its name in the properties file (for example, &identityguard.jdbc.password). To change an encrypted value, replace it with a new cleartext value. The next time you start Entrust IdentityGuard, it encrypts the value. Configuring the Entrust IdentityGuard Server properties file Feedback on guide 257 Enabling the authentication success audit By default, the Entrust IdentityGuard authentication success audit is disabled. Enable this setting if your organization wishes to audit successful authentications. To enable the authentication success audit, in the Authentication Settings section of the identityguard.properties file, set identityguard.authentication.audit.success to true. For information on audited events, see the “Troubleshooting” chapter in the Entrust IdentityGuard Administration Guide. 258 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Enabling a WSDL query By default, the Entrust IdentityGuard WSDL query is disabled. Enable this setting to retrieve the WSDL definition for a service. For example, if you query the Entrust IdentityGuard Authentication service URL with ?wsdl — http://igserver:8080/IdentityGuardAuthService/services/ AuthService?wsdl—and the WSDL query is enabled, the WSDL definition for the Authentication service is returned. To enable the WSDL query, in the identityguard.properties file, set identityguard.service.wsdlquery.enable to true. Configuring the Entrust IdentityGuard Server properties file Feedback on guide 259 Configuring additional search bases Search bases allow administrators to search more quickly for users in the same domain or in cross-certified domains if you store user information in an LDAP-compliant directory. After you define search bases in the properties file, you can create groups and assign each group one or more search bases. Search bases also allow the Entrust IdentityGuard repository to span multiple directory servers. Note: In some cases, not all users will reside within a single search base or directory. The reference to the user attribute (uid) should be different for each additional search base added to Entrust IdentityGuard. For example, for the primary search base, the reference to the user attribute may be “uid,” and for an additional search base the reference may be “cn” or “upn.” For Active Directory, use sAMAccountName instead of uid for the first search base. An example of a search base URL is: ldap://dirserver:389/ou=someunit,o=yourcompany,c=ca Some of the characteristics of search bases are: • They can divide a large domain into smaller domains, simplifying searches. • Groups may be assigned one or more search bases. • A search base can be shared by multiple groups. When the user is created, a check is performed to ensure that the user ID is unique within all search bases assigned to that user in the group. • If a search base is not defined, the group will use the default search base. Note: If you are using multiple search bases, each user ID and administrator ID must be unique within a search base. Search bases are defined in the identityguard.properties configuration file. You must manually edit the identityguard.properties file to add, remove, or modify search base definitions. See the identityguard.ldap.searchbase setting description in Table 15 for instructions on editing search bases. For further instructions, see the Entrust IdentityGuard Administration Guide. 260 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Configuring LDAP directory properties To change the way that the LDAP directory is used by the Entrust IdentityGuard server, go to the LDAP Server Settings section of identityguard.properties and add or edit the properties described in Table 15. If you are using an LDAP repository, the properties marked Required in the table must have values defined in the identityguard.properties file. These values are added to the identityguard.properties file during the configuration that you completed during installation. Note: Entrust IdentityGuard configuration automatically converts spaces in the LDAP base DN to %20. If you edit the LDAP base DN after installation in the identityguard.properties file, remember to replace spaces with %20. Table 15: LDAP directory properties Property Description identityguard.ldap.url Required. LDAP URL to use to find and connect to the LDAP directory. This can include the host name, the port number, and initial context prefix to bind to. All lookups are relative to the given context prefix. For example: ldap://myldaphost:389/ou=People, dc=AnyCorp,dc=com binds to port 389 on the computer myldaphost, with ou=People,dc=AnyCorp,dc=com as the initial context prefix. identityguard.ldap.principal Required. Name of the entity binding to the LDAP directory, for example: cn=Directory Manager identityguard.ldap.credentials Required. Password of the entity binding to the LDAP directory. Configuring the Entrust IdentityGuard Server properties file Feedback on guide 261 Table 15: LDAP directory properties (continued) Property Description identityguard.ldap.connecttimeout Length of time in milliseconds that Entrust IdentityGuard waits when attempting to connect to the LDAP directory before giving up and returning an error. Defaults to 30000 (30 seconds). identityguard.ldap.useridattribute LDAP directory attribute that contains the unique user identifier. Default is cn. identityguard.ldap.policyentry Required. Specifies the directory that stores policies. It must exist, and be named relative to the context prefix. For example, if the URL is ldap://directory.AnyCorp.com/o= Entrust,c=ca, then the policy entry could be cn=Some Entry, ou=R and D to represent the DN cn=Some Entry,ou=R and D,o=Entrust,c=ca. identityguard.ldap.sslEnabled Specifies if you are using a secure SSL connection to the directory. If set to true, you must direct the identityguard.ldap.url to a secure LDAP port. For more information, see the section “To import the LDAP SSL certificate” on page 233. identityguard.ldap.addUserObjectClass Indicates whether the Entrust IdentityGuard Server should add the user object class when setting up an Entrust IdentityGuard user, or if it is expected to already be present. Set to false for Active Directory and to true for an LDAP directory. identityguard.ldap.addAdminObjectClass Indicates whether the Entrust IdentityGuard Server should add the admin object class when setting up an Entrust IdentityGuard administrator, or if it is expected to already be present. Set to false for Active Directory and to true for an LDAP directory. 262 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Table 15: LDAP directory properties (continued) Property Description identityguard.ldap.addPolicyObjectClass Indicates whether the Entrust IdentityGuard Server should add the policy object class when setting up the Entrust IdentityGuard policy, or if it is expected to already be present. Set to false for Active Directory and to true for an LDAP directory. To edit the remaining LDAP properties in this table (listed below), you must first add them to the identityguard.properties file. If a property is not included in the file, Entrust IdentityGuard uses the default value for that property as given here. Configuring the Entrust IdentityGuard Server properties file Feedback on guide 263 Table 15: LDAP directory properties (continued) Property Description identityguard.ldap.searchbase Required. url.<name>= Define one or more search bases where users can be located. See “Configuring additional search bases” on page 260. For example, a search base called sbase1 looks like this: identityguard.ldap.searchbase.url.sbas e1=ldap://mydirectoryhost:389/ou=Peopl e,dc=AnyCorp,dc=com You cannot name a search base “default” because that is a reserved search base name. See the Entrust IdentityGuard Administration Guide for more details. Note: Entrust IdentityGuard configuration automatically converts spaces in the LDAP base DN to %20. If you edit the LDAP base DN after installation in the identityguard.properties file, remember to replace spaces with %20. Optional. The following settings are optional and may be configured for each search base: • principal.<name>= • credentials.<name>= • connecttimeout.<name>= • searchtimeout.<name>= • sizelimit.<name>= • sslEnabled.<name>= • useridattribute.<name>= • userObjectClass.<name>= • useridcasesensitive.<name>= • addUserObjectClass.<name> • adminObjectClass.<name>= • addAdminObjectClass.<name>= • connectionpool.max.<name>= • connectionpool.minIdleCloseTime.<name>= • connectionpool.closeSchedule.<name>= 264 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Table 15: LDAP directory properties (continued) Property Description identityguard.ldap.searchbase (continued) The identityguard.ldap.searchbase .useridattribute.<name> property defaults to the default value for the identityguard.ldap.useridattribute. The other optional settings default to the corresponding value of the default search base. identityguard.ldap.searchtimeout Length of time in milliseconds that Entrust IdentityGuard waits when searching the LDAP directory before giving up and returning an error. Default is 30000 (30 seconds). identityguard.ldap.sizelimit Maximum number of entries to return in a single LDAP search. Default is 1000. identityguard.ldap.userObjectClass LDAP directory object class used to allow the user attributes to be added to an entry. Default is entrustIGUser. identityguard.ldap.adminObjectClass LDAP directory object class used to allow the administrator attributes to be added to an entry. Default is entrustIGAdmin. identityguard.ldap.policyObjectClass LDAP directory object class used to allow the policy attributes to be added to an entry. Default is entrustIGPolicy. identityguard.ldap.connectionpool.max The maximum number of connections that can be kept in the LDAP directory connection pool. An Entrust IdentityGuard service will not open more connections to the directory than this value. Default is 10. identityguard.ldap.connectionpool. minIdleCloseTime The minimum number of milliseconds a connection to the LDAP directory can be idle for before being closed. Default is 180000 (3 minutes). Configuring the Entrust IdentityGuard Server properties file Feedback on guide 265 Table 15: LDAP directory properties (continued) Property Description identityguard.ldap.connectionpool. closeSchedule The number of milliseconds between each check for idle LDAP directory connections and closure of those idle longer than the value set in the minIdleCloseTime setting. Set to 0 to disable closing idle connections. Default is 180000 (3 minutes). identityguard.ldap.GeneralizedTimeWithS Some directories do not support generalized time ubSecs attributes that contain subseconds, while other directories require them. If this value is set to true, generalized time is formatted with subseconds. Default is true. Note: This must be false when using a Novell eDirectory as your repository. identityguard.ldap.useReplace 266 IdentityGuard 8.1 Installation Guide Set this to true only if you use Oracle Internet Directory as your repository. Document issue: 3.0 Feedback on guide Configuring database properties To change the way the database is used by the Entrust IdentityGuard Server, go to the Database Server Settings section of the identityguard.properties file and add or edit the properties described in Table 16 on page 267. If you are using a database, the properties marked Required in the table must have values defined in the identityguard.properties file. These values are added to the identityguard.properties file during the configuration that you completed during the installation. Table 16: JDBC properties Property Description identityguard.jdbc.connectionpool.closeSchedule The number of milliseconds between each check for idle database connections and closure of those idle longer than the value set in the minIdleCloseTime setting. Set to 0 to disable closing idle connections. Default is 180000 (3 minutes). identityguard.jdbc.connectionpool.max The maximum number of connections that can be kept in the database connection pool. An Entrust IdentityGuard service will not open more connections than this value. If the database server cannot accept this number of connections, Entrust IdentityGuard may return errors when trying to open some of its connections. Default is 10. identityguard.jdbc.connectionpool.minIdleClose Time The minimum number of milliseconds a connection to the database can be idle before it is considered for closing. Default is 180000 (3 minutes). identityguard.jdbc.logintimeout Number of seconds that Entrust IdentityGuard will wait for the database login operation to complete. Default is 30 seconds. identityguard.jdbc.querytimeout Number of seconds that Entrust IdentityGuard will wait for the database to perform an operation. A value of 0 means that the connection will never time out. Default is 0. Configuring the Entrust IdentityGuard Server properties file Feedback on guide 267 Table 16: JDBC properties (continued) Property Description identityguard.jdbc.driverClass Required. The class name of the JDBC driver. This value is entered during configuration. identityguard.jdbc.password Required. The password of the database user name entered during configuration. identityguard.jdbc.schema Required. The database schema name entered during configuration. identityguard.jdbc.url Required. The database URL entered during configuration. identityguard.jdbc.user Required. The database user name entered during configuration. identityguard.jdbc.needsEscape Indicates whether Entrust IdentityGuard should use escape characters in an SQL Where clause. If you are using a MySQL database, set this to false. Default is true. identityguard.jdbc.timestampDataType Determines how timestamp expressions are formatted in an SQL Where clause. If you set this property to true, the SQL Where clause will include the TIMESTAMP datatype. This setting should be true for Oracle and false for DB2 and SQL Server. Default is true. identityguard.jdbc.blobAccess If you are using SQL Server, set this to false. Default is true. 268 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Table 16: JDBC properties (continued) Property Description identityguard.jdbc.selectLock Defines what SQL syntax is used to lock the policy when it is updated. Different databases use different syntaxes. The supported values are: • forupdate - Oracle • withrr - DB2 • withupdlock - SQL Server If not set or an invalid value is provided, it defaults to forupdate. Configuring the Entrust IdentityGuard Server properties file Feedback on guide 269 Enabling cached challenges By default, Entrust IdentityGuard uses a persistent repository to store challenges in the time between the getChallenge request and the authenticate request. Improve performance of your Entrust IdentityGuard system by using a cache for the challenge repository. The cache repository holds the challenge in memory and writes the challenge to the persistent repository after a period of time. Normally, the authenticate request is received within that time period, then the challenge is removed from the repository. Attention: If you enable cached challenges, you should not create replicas of the Entrust IdentityGuard Server since the cache is not shared between the replicas. Or, you must ensure “session stickiness” (that is, the entire session is completed by one Entrust IdentityGuard Server. Attention: It is recommended that you back up the identityguard.properties file before you make changes to it. For instructions on backing up files, see “Planning a backup strategy” on page 244. To enable cached challenges 1 In identityguard.properties,change the following settings: • for an LDAP repository, change identityguard.challengerepository.impl=com.entrust.identityGuard.c ardManagement.dataAccess.ldap.LdapChallengeRepository to: identityguard.challengerepository.impl=com.entrust.identityGuard.c ardManagement.dataAccess.cache.CacheChallengeRepository • for a database, change identityguard.challengerepository.impl=com.entrust.identityGuard.c ardManagement.dataAccess.jdbc.JdbcChallengeRepository to: identityguard.challengerepository.impl=com.entrust.identityGuard.c ardManagement.dataAccess.cache.CacheChallengeRepository 2 Add the following setting: • 270 for an LDAP repository: IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide identityguard.challengerepository.cache.persistentrepository.impl= com.entrust.identityGuard.cardManagement.dataAccess.ldap.LdapChall engeRepository • for a database: identityguard.challengerepository.cache.persistentrepository.impl= com.entrust.identityGuard.cardManagement.dataAccess.jdbc.JdbcChall engeRepository 3 Optionally, add the following setting, which defines how long (in seconds) a challenge remains in the cache before it is written to the persistent repository. The default value is 180 (3 minutes): identityguard.challengerepository.cache.timeout=180 4 Optionally, add the following setting, which controls the maximum size (in number of challenges) of the challenge cache. If the setting is not set, or is an invalid value or a non-positive number, the cache size defaults to infinite. identityguard.challengerepository.cache.maxsize=1000 Configuring the Entrust IdentityGuard Server properties file Feedback on guide 271 Caching policies Edit the identityguard.properties file to control the length of time a policy is cached (before the repository is checked for new policy definitions). The policy caching setting is identityguard.policyRepository.cacheTimeout=<number of milliseconds> The default is 30000 milliseconds (30 seconds). Set the value to 0 to disable policy caching and enable the policy to be accessed from the repository on every operation. Note: Disabling policy caching could delay performance. 272 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Changing log configuration Edit the identityguard.properties file to change certain UNIX logging behaviors. Note: Changes to log settings take effect almost immediately. In the Logging Configuration Settings section of identityguard.properties, remove the comment marks before and after the logging settings to change the default value, if necessary. Table 17 describes the settings you can edit. Table 17: UNIX Logging configuration settings Logging configuration setting Description identityguard.refreshinterval Defines how frequently the configuration is checked for changes to the log settings. Default is 10 seconds. identityguard.log.maxstacksize Defines the number of stack frames that are logged for errors. The default value, 0, means that no stack trace is logged. log4j.rootLogger Defines the logging level of the root logger, and the destination of any messages logged by the root logger. The root logger may catch errors not specifically logged by Entrust IdentityGuard, but occur within the application server. The default setting is WARN, and the appender will depend on the choices made during installation. Default is WARN, (other options are: SYSTEM_SYSLOG or SYSTEM_FILELOG). log4j.logger.IG.AUDIT Defines the audit level of Entrust IdentityGuard and the destination of the logged audits. The default setting is ALL, and the appender will depend on the choices made during installation. Default is ALL, (other options are: AUDIT_SYSLOG or AUDIT_FILELOG). Configuring the Entrust IdentityGuard Server properties file Feedback on guide 273 Table 17: UNIX Logging configuration settings (continued) Logging configuration setting Description lo4j.logger.IG.SYSTEM By default, all system log levels WARN and above are logged. • To reduce system logging, change WARN to ERROR or OFF. • To increase system logging (for example, for troubleshooting) change WARN to INFO, DEBUG, or ALL. Default is WARN. log4j.additivity.IG.AUDIT Defines whether Entrust IdentityGuard audits should also be added to the root logger. Leave this value set to the default, false. log4j.additivity.IG.SYSTEM Defines whether Entrust IdentityGuard system logs should also be added to the root logger. This value should remain set to the default, false. log4j.appender.AUDIT_SYSLOG Defines the log4j appender to use for audit logs. This should not be changed. This value should remain set to the default, org.apache.log4j.net.SyslogAppender. log4j.appender.AUDIT_SYSLOG.SyslogHost Defines the Syslog host that logging information is sent to. If using Syslog, the default is localhost. If using file logging, the default is $log_host}. log4j.appender.AUDIT_SYSLOG.Facility Defines the Syslog facility that is used to audit logs. Default is local1. log4j.appender.AUDIT_SYSLOG.layout The log4j class that converts a logging event into a message string to be printed in the logs. Default is org.apache.log4j.PatternLayout. log4j.appender.AUDIT_SYSLOG.layout .ConversionPattern The format of the converted logging event. See the log4j documentation for further information. Default is [%t] [%-5p] [%c] %m%n. 274 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Table 17: UNIX Logging configuration settings (continued) Logging configuration setting Description log4j.appender.SYSTEM_SYSLOG Defines the log4j appender to use for system logs. This should not be changed. Default is org.apache.log4j.net.SyslogAppender. log4j.appender.SYSTEM_SYSLOG .SyslogHost Defines the Syslog host to which logging information is sent. Default is localhost. log4j.appender.SYSTEM_SYSLOG.Facility Defines the Syslog facility that is used by Entrust IdentityGuard system logs. Default is local2. log4j.appender.SYSTEM_SYSLOG.layout The log4j class that converts a logging event into a message string to be printed in the logs. Default is org.apache.log4j.PatternLayout. log4j.appender.SYSTEM_SYSLOG.layout .ConversionPattern The format of the converted logging event. Please see the log4j documentation for further information. Default is [%t] [%-5p] [%c] %m%n. log4j.appender.AUDIT_FILELOG Defines the appender that is used if audit events are logged to files. This value should remain set to the default, org.apache.log4j.RollingFileAppender. log4j.appender.AUDIT_FILELOG.File Defines the location of the audit log. Default is: $IDENTITYGUARD.HOME/etc/audit.log log4j.appender.AUDIT_FILELOG.MaxFileSize Defines the maximum size of a log file before rolling over to a new empty file. Default is 1000KB. log4j.appender.AUDIT_FILELOG .MaxBackupIndex Defines the number of previous log files to keep as a history. Default is 10. Configuring the Entrust IdentityGuard Server properties file Feedback on guide 275 Table 17: UNIX Logging configuration settings (continued) Logging configuration setting Description log4j.appender.AUDIT_FILELOG.layout The log4j class that converts a logging event into a message string to be printed in the logs. Default is org.apache.log4j.PatternLayout. log4j.appender.AUDIT_FILELOG.layout .ConversionPattern The format of the converted logging event. Please see the log4j documentation for further information. Default is [%d] [%t] [%-5p] [%c] %m%n. log4j.appender.SYSTEM_FILELOG Defines the appender that is used if audit events are logged to files. This value should remain set to the default, org.apache.log4j.RollingFileAppender. log4j.appender.SYSTEM_FILELOG.File Defines the location of the audit log. Default is: $IDENTITYGUARD.HOME/etc/ system.log log4j.appender.SYSTEM_FILELOG .MaxFileSize Defines the maximum size of a log file before rolling over to a new empty file. Default is 1000KB. log4j.appender.SYSTEM_FILELOG .MaxBackupIndex Defines the number of previous log files to keep as a history. Default is 5. log4j.appender.SYSTEM_FILELOG .layout The log4j class that converts a logging event into a message string to be printed in the logs. Default is org.apache.log4j.PatternLayout. log4j.appender.SYSTEM_FILELOG.layout .ConversionPattern The format of the converted logging event. Please see the log4j documentation for further information. Default is [%d] [%t] [%-5p] [%c] %m%n. 276 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Changing log locations on UNIX If you chose to log to Syslog when you installed Entrust IdentityGuard, you can reconfigure to log to a file, or, if you chose to log to a file, you can reconfigure so as to log to Syslog. To switch between a log file and Syslog, edit the following: log4j.rootLogger=WARN, SYSTEM_<FILELOG> or <SYSLOG> log4j.logger.IG.AUDIT=ALL, AUDIT_<FILELOG> or <SYSLOG> log4j.logger.IG.SYSTEM=WARN, SYSTEM_<FILELOG> or <SYSLOG> For example, to switch logging from files to Syslog, change log4j.rootLogger=WARN, SYSTEM_FILELOG to log4j.rootLogger=WARN, SYSTEM_SYSLOG. If you are switching logging from files to Syslog, you will need to edit the following two entries in identityguard.properties and replace ${log_host} with the host name of your Syslog server. Use the value localhost if the Syslog server is running on the local host. log4j.appender.AUDIT_SYSLOG.SyslogHost=${log_host} log4j.appender.SYSTEM_SYSLOG.SyslogHost=${log_host} For example, if the Syslog server is running on the localhost, change the two entries to: log4j.appender.AUDIT_SYSLOG.SyslogHost=localhost log4j.appender.SYSTEM_SYSLOG.SyslogHost=localhost Configuring the Entrust IdentityGuard Server properties file Feedback on guide 277 Configuring master user shell formatting Certain identityguard.properties file settings define the column widths (measured in characters) of the output displayed by any of the list commands (for example, user list, user card list, admin list, token list, and so on). To change column width, add the following properties to identityguard.properties and change the numeric value associated with the fields in Table 18 through Table 22. Table 18: User list column widths Property Description identityguard.supersh.userlist.width.userid Indicates the width of the user ID field. Default is 14. identityguard.supersh.userlist.width.haspin Indicates the width of the temporary PIN field. Default is 9. identityguard.supersh.userlist.width.numcards Indicates the width of the number of cards field. Default is -1, meaning the remainder of the width of your screen. Table 19: User card list column widths Property Description identityguard.supersh.usercardlist.width.userid Indicates the width of the user ID field. Default is 14. identityguard.supersh.usercardlist.width.sernum Indicates the width of the serial number field. Default is 14. identityguard.supersh.usercardlist.width.state Indicates the width of the state field. Default is 9. identityguard.supersh.usercardlist.width.create Indicates the width of the creation date field. Default is 19. 278 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Table 19: User card list column widths Property Description identityguard.supersh.usercardlist.width.expire Indicates the width of the expiry date field. Default is -1, meaning the remainder of the width of your screen. Table 20: Preproduced cards column width Property Description identityguard.supersh.preproducedcardlist.width. Indicates the width of the preproduced card sernum serial number field. Default is 14. identityguard.supersh.preproducedcardlist.width. Indicates the width of the preproduced card create creation date field. Default is -1, meaning the remainder of the width of your screen. Table 21: Administrator list column width Property Description identityguard.supersh.adminlist.width.userid Indicates the width of the administrator ID field. Default is 20. identityguard.supersh.adminlist.width.state Indicates the width of the administrator state field. Default is -1, meaning the remainder of the width of your screen. Configuring the Entrust IdentityGuard Server properties file Feedback on guide 279 Table 22: Token list column width Property Description identityguard.supersh.tokenlist.width.pinsupport ed Indicates the width of the PIN Supported field. Default is 12 for tokens that support token PINs; otherwise false. 280 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Configuring license auditing Entrust IdentityGuard services performs a periodic license audit. The identityguard.properties file settings in Table 23 control the audit behavior. License auditing helps you determine when to renew your license or when you are about to run out of user licenses. When you reach your license limits, contact Entrust for more licenses. Table 23: Audit settings Property Description identityguard.audit.integrity.enabled Enables the audit integrity check. Default is true. identityguard.audit.integrity.interval Number of hours between audit integrity checks. Default is 24. identityguard.audit.integrity.count_limit If set to a positive integer value, an audit is generated when the user count gets to within the given value of the license limit. Default is 0. If the license has expired, the license expired audit is generated regardless of the count limit. identityguard.audit.integrity.time_limit If set to a positive integer value, an audit is generated when the current date gets to within the given number of days of the license expiry. Default is 0. The audit is enabled on all replicas of the Entrust IdentityGuard Server. To prevent duplicate audits from being generated on replica Entrust IdentityGuard servers, use the identityguard.audit.integrity.enabled property is to disable the audit integrity check on all but one of the replicas. The audit integrity check will only run for the first time after the interval has passed. This means that if the service is always restarted within that interval, the audit integrity is never executed. Configuring the Entrust IdentityGuard Server properties file Feedback on guide 281 Configuring the Entrust IdentityGuard Radius proxy properties When you configure the Radius proxy, it sets many of the properties in the identityguard.properties file. However, you need to edit this file to customize the grid and token challenge strings and other features. Edit the properties described in the following table to modify behavior of the Entrust IdentityGuard Radius proxy. Note: With the exception of log settings, you must restart the Radius proxy for property changes to take effect. See the section “Managing the Radius proxy” on page 196. Note: When users see a challenge message through VPN, they must enter their response as one continuous string. There is no user interface form to separate and parse entries as people expect when using Entrust IdentityGuard. For example, if a user’s card cells A3, H4 and J1 have the numbers 4, 8, and 9, the response to this message Enter a response to the challenge [A3] [H4] [J1] using a card with serial number 1952 must be 489 with no spaces or punctuation. Table 24: Radius proxy configuration settings Property Description identityguard.igradius.url Provides the URL of the Entrust IdentityGuard server. If not specified, it defaults to http://localhost:8080/IdentityGuard AuthService/services/Authentication Service. If the default is used, Entrust IdentityGuard changes this to the value of identityguard.authservice.https.url during configuration. 282 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Table 24: Radius proxy configuration settings (continued) Property Description identityguard.igradius.port Provides the port used by the Entrust IdentityGuard Radius proxy for first-factor authentication. If not specified, it defaults to 1812. If you use a Radius server for first-factor authentication and your VPN server recognizes different groups of users, use this property to specify a series of ports and direct those groups to different ports. For example, if you want requests for one group to be sent to port 1812 and requests for another group to be sent to port 1813, configure the property like this: identityguard.igradius.port=1812 1813 No additional ports are needed for groups for other first-factor authentication methods. Configuring the Entrust IdentityGuard Server properties file Feedback on guide 283 Table 24: Radius proxy configuration settings (continued) Property Description identityguard.igradius.challengestring This property sets the contents of the default Radius proxy challenge message for grid authentication. Note: This is one of six properties related to the challenge a user may see. At the very least, this property should be set as a default. Some or all of the other properties may be set to provide greater control over the challenges that apply to users with multiple cards and/or a PIN. The content consists of a string and one to three placeholders. The placeholders are: {0} = the challenge string {1} = the serial number of the first card {2} = the serial number of the second card. The placeholders are filled in when the message appears. For example, this setting Enter a response to the challenge {0} using cards with serial number {1} or {2} would result in a message like this: Enter a response to the challenge [A1] [B2] [C3] using cards with serial number 1234 or 2345. Users never have more than two valid cards: the current card and the pending card. A user may have a PIN and no card, or a PIN with one or two cards. If there is no challenge specified, this property defaults to: Enter the response for IdentityGuard challenge {0}. If there is no value for {0}, no challenge is sent. 284 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Table 24: Radius proxy configuration settings (continued) Property Description identityguard.igradius.challengestring .twocardswithpin This is one of six properties related to the challenge a grid user sees. It takes effect when the user has two cards and a valid PIN. The format of the string is tailored to this scenario: “Enter a response to the challenge {0} using cards with serial number {1} or {2} or your temporary PIN.” If not set, it defaults to the value of igradius.challengestring. identityguard.igradius.challengestring .twocardsnopin This is one of six properties related to the challenge a grid user sees. It takes effect when the user has two cards and no valid PIN. The format of the string is tailored to this scenario: “Enter a response to the challenge {0} using cards with serial number {1} or {2}.” If not set, it defaults to the value of igradius.challengestring. identityguard.igradius.challengestring .onecardwithpin This is one of six properties related to the challenge a grid user sees. It takes effect when the user has one card and a valid PIN. The format of the string is tailored to this scenario: “Enter a response to the challenge {0} using a card with serial number {1} or your temporary PIN.” If not set, it defaults to the value of igradius.challengestring. identityguard.igradius.challengestring .onecardnopin This is one of six properties related to the challenge a grid user sees. It takes effect when the user has one card but no valid PIN. The format of the string is tailored to this scenario: “Enter a response to the challenge {0} using a card with serial number {1}.” If not set, it defaults to the value of igradius.challengestring. Configuring the Entrust IdentityGuard Server properties file Feedback on guide 285 Table 24: Radius proxy configuration settings (continued) Property Description identityguard.igradius.challengestring .nocardwithpin This is one of six properties related to the challenge a grid user sees. It takes effect when the user has no cards but has a valid PIN. The format of the string is tailored to this scenario: “Enter a response to the challenge {0} using your temporary PIN.” If not set, it defaults to the value of igradius.challengestring. identityguard.igradius.tokenchallengestring This property sets the contents of the default Radius proxy challenge message for token authentication. Note: This is one of eight properties related to the challenge a token user may see. At the very least, this property should be set as a default. Some or all of the properties may be set to provide greater control over the challenges that apply to token users. The content consists of a string and one or two placeholders. The placeholders are: {0} = the serial number of the first token {1} = the serial number of the second token. The placeholders are filled in when the message appears. For example, this setting Enter the response to the token with serial number {0}. would result in a message like this: Enter the response to the token with serial number 92776. Users never have more than two valid tokens: the current token and the pending token. A user may have a temporary PIN and no token, or a temporary PIN with one or two tokens. If there is no challenge specified, this property defaults to: Enter the response from your Entrust IdentityGuard token. 286 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Table 24: Radius proxy configuration settings (continued) Property Description identityguard.igradius.tokenchallengestring .twotokenswithpin This is one of eight properties related to the challenge a token user sees. It takes effect when the user has two tokens and a valid temporary PIN. The format of the string is tailored to this scenario: “Enter the response to the token with serial number {0} or {1} or your temporary PIN.” If not set, it defaults to the value of igradius.tokenchallengestring. identityguard.igradius.tokenchallengestring .twotokensnopin This is one of six properties related to the challenge a token user sees. It takes effect when the user has two tokens and no valid temporary PIN. The format of the string is tailored to this scenario: “Enter the response to the token with serial number {0} or {1}.” If not set, it defaults to the value of igradius.tokenchallengestring. identityguard.igradius.tokenchallengestring .onetokenswithpin This is one of eight properties related to the challenge a token user sees. It takes effect when the user has one token and a valid temporary PIN. The format of the string is tailored to this scenario: “Enter the response to the token with serial number {0} or your temporary PIN.” If not set, it defaults to the value of igradius.tokenchallengestring. identityguard.igradius.tokenchallengestring .onetokennopin This is one of eight properties related to the challenge a token user sees. It takes effect when the user has one token and no valid temporary PIN. The format of the string is tailored to this scenario: “Enter the response to the token with serial number {0}.” If not set, it defaults to the value of igradius.tokenchallengestring. Configuring the Entrust IdentityGuard Server properties file Feedback on guide 287 Table 24: Radius proxy configuration settings (continued) Property Description identityguard.igradius.tokenchallengestring .notokenswithpin This is one of eight properties related to the challenge a token user sees. It takes effect when the user has no token but has a valid temporary PIN. The format of the string is tailored to this scenario: “Enter your temporary PIN.” If not set, it defaults to the value of igradius.tokenchallengestring. identityguard.igradius.tokenchallengestring.on This is one of eight properties related to the etokenrequirespinupdate challenge a token user sees and applies only to tokens that support token PINs. Not needed for Entrust tokens. Add this property if you want to alert the user that the static token PIN for a token needs an update. It takes effect when the user has just one token. The message is appended to the token challenge string message. The format of the string is tailored to this scenario: “The static PIN for the token with serial number {0} needs to be updated.” identityguard.igradius.tokenchallengestring.tw This is one of eight properties related to the otokensrequirespinupdate challenge a token user sees and applies only to tokens that support token PINs. Not needed for Entrust tokens. Add this property if you want to alert the user that the static token PINs for the current and pending token need an update. The message is appended to the token challenge string message. The format of the string is tailored to this scenario: “The static PINs for the tokens with serial number {0} and {1} need to be updated.” 288 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Table 24: Radius proxy configuration settings (continued) Property Description identityguard.igradius.skipauth.noexist Specifies how to deal with users who do not exist in Entrust IdentityGuard. If set to true, the user can log in without being prompted for Entrust IdentityGuard authentication. If set to false, the user login attempt generates an error. If not specified, it defaults to false. identityguard.igradius.skipauth.noactive Sets how to deal with users who exist in Entrust IdentityGuard but who do not have an active card or a temporary PIN. If set to true, the user can log in without being prompted for Entrust IdentityGuard authentication. If set to false, the user login attempt generates an error. If not specified, it defaults to false. identityguard.igradius.msglog.enabled If set to true, Radius messages are logged to the file specified by the property identityguard.igradius.msglog.file (described below). Default is false. identityguard.igradius.msglog.file Provides the name of the file that logs Radius messages. If the property does not provide an absolute path name, the file is created in: $IDENTITYGUARD_HOME/logs or <IG_INSTALL_DIR>\identityguard81\lo gs If you enable logging on the property identityguard.igradius.msglog.enabl ed (described above) but this property is not set or is not a valid file name, it generates errors and sends them to the system log. identityguard.igradius.vpnrequests Provides the size of the VPN state table, that is, the number of outstanding requests from the VPN. If not specified, it defaults to 1000. Configuring the Entrust IdentityGuard Server properties file Feedback on guide 289 Table 24: Radius proxy configuration settings (continued) Property Description identityguard.igradius.vpnrequiremsgauth If this property is set to true, incoming messages from the VPN server must include the Message-Authenticator attribute. If the attribute is not found, the message is ignored. If not specified, it defaults to false. identityguard.igradius.vpntimeout Provides the number of seconds that the Radius proxy will wait for a response from the VPN server. If not specified, it defaults to 180 seconds. identityguard.igradius.radiustimeout Provides the number of seconds that the Radius proxy will wait for a response from the Radius server. If not specified, it defaults to 10 seconds. identityguard.igradius.radiusrequiremsgauth If this property is set to true, incoming messages from the Radius server must include the Message-Authenticator attribute. If the attribute is not found, the message is ignored. If not specified, it defaults to false. identityguard.igradius.vpnincludemsgauth This determines if outgoing messages to the VPN server include the Message-Authenticator attribute. Set this to false if the VPN server does not understand the attribute and rejects messages as a result. If not specified, it defaults to true. identityguard.igradius.radiusincludesmsgauth This determines if outgoing messages to the Radius server include the Message-Authenticator attribute. Set this to false if the Radius server does not understand the attribute and rejects messages as a result. If not specified, it defaults to true. identityguard.igradius.radius.{0}.address 290 IdentityGuard 8.1 Installation Guide This is the Radius server address. It is set when you configure the Radius server. The {0} placeholder is replaced by the Radius server name. Document issue: 3.0 Feedback on guide Table 24: Radius proxy configuration settings (continued) Property Description identityguard.igradius.radius.{0}.secret This is the Radius server secret set when you configure the Radius server. The value is usually encrypted. The {0} placeholder is replaced by the Radius server name. identityguard.igradius.vpn.{0}.charset This specifies the character set used to decode user names sent by the VPN server and encode messages sent back to the server. Allowed values are UTF-8 and ISO-8859-1. If not specified, the Radius proxy expects UTF-8. The character set is only a concern when extended characters are part of the names. The {0} placeholder is replaced by the VPN server label. identityguard.igradius.vpn.{0}.group This optional setting specifies the group the VPN server is associated with. The {0} placeholder is replaced by the VPN server label. For information on using this and other VPN property options, see “Configuring the Radius proxy for groups” on page 175. identityguard.igradius.vpn.{0}.host This is the host of the VPN server set when you configure the Radius server. The {0} placeholder is replaced by the VPN server label. identityguard.igradius.vpn.{0}.igport This optional setting specifies the port the VPN server is associated with. The {0} placeholder is replaced by the VPN server label. identityguard.igradius.vpn.{0}.processbackslash Converts group and user name pairs in the form “group\name” coming through the Radius proxy into the form “group/name.” identityguard.igradius.vpn.{0}.processat Converts group and user name pairs in the form “name@group” coming through the Radius proxy into the form “group/name.” identityguard.igradius.vpn.{0}.radius This specifies the Radius server associated with the VPN server. The {0} placeholder is replaced by the VPN server label. identityguard.igradius.vpn.{0}.secret This is the VPN server secret set when you configure the Radius server. The value is usually encrypted. The {0} placeholder is replaced by the VPN server label. Configuring the Entrust IdentityGuard Server properties file Feedback on guide 291 Table 24: Radius proxy configuration settings (continued) Property Description identityguard.igradius.vpn.{0}.useradius This stores the results of the prompt for the type of first-factor authentication resource to use. When set to true, Radius is used. When set to false, an external authentication resource is used. The {0} placeholder is replaced by the VPN server label. If not specified, it defaults to true. 292 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Configuring external authentication properties You can configure the Entrust IdentityGuard Radius proxy component to use an external authentication resource (Windows domain controller or an LDAP directory) for first-factor authentication instead of a Radius server. See “Using the Radius proxy with a domain controller or LDAP directory” on page 187. As part of that operation, you must enter and set properties in the identityguard.properties file, as described in the following table. Table 25: Radius proxy configuration settings for external authentication Property Description identityguard.externalauth.impl This setting refers to the name of the Entrust IdentityGuard Java class used for external authentication. There are separate classes for a Windows domain controller and an LDAP directory. identityguard.externalauth.impl.<group> When specified without a group name, it creates the global or default setting for users. When specified with an Entrust IdentityGuard group name, it sets the authentication resource to use for members of that group. This way, you can direct different groups to different authentication resources. If all entries for this property include a group name (that is, there is no entry without a group), this means there is no default and only the users in the specified groups can use external authentication. identityguard.igradius.vpn.{0}.useradius This stores the results of the prompt for the type of first-factor authentication resource to use. When set to true, Radius is used. When set to false, an external authentication resource is used. If not specified, it defaults to true. Configuring the Entrust IdentityGuard Server properties file Feedback on guide 293 Table 25: Radius proxy configuration settings for external authentication (continued) Property Description identityguard.externalauth.kerberos.realm If you are using a domain controller, specify the server acting as the Kerberos realm. Give the identityguard.externalauth.kerberos.realm.<gr DNS name in uppercase. oup> When specified without a group name, it creates the global or default setting for users. When specified with an Entrust IdentityGuard group name, it sets the realm to use for members of that group. Note: When you specify this property, you also need to include the server information for the KDC server in igkrb5.conf file located: • on UNIX, in $IDENTITYGUARD_HOME/etc/ • on Windows, in <IG_INSTALL_DIR>\etc\ For more information, see “Configuring Entrust IdentityGuard for external authentication” on page 202. identityguard.externalauth.kerberos.kdc Obsolete. identityguard.externalauth.kerberos.kdc.<grou p> 294 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Configuring token properties Entrust IdentityGuard supports Entrust tokens and some third-party tokenstokens. For details on which tokens are supported, refer the Entrust TrustedCare Online Web site. Note: Entrust IdentityGuard does not support ActivIdentity tokens. Table 26: Token properties Property Description identityguard.token.impl Refers to the class name of the token library. For Entrust tokens, the property either does not exist or is blank. For Entrust tokens, there is an implied default of: com.entrust.identityGuard.common.token. activIdentity.ActiveIdentityTokenManager For other token vendors, add this property and set it to the applicable class name. identityguard.token.configfile Names the token configuration file, if used. Choose a name, such as token.conf, and place it: • on UNIX, in $IDENTITYGUARD_HOME/etc/ • on Windows, in <IG_INSTALL_DIR>\etc\ Configuring the Entrust IdentityGuard Server properties file Feedback on guide 295 Configuring the Administration interface properties for bulk operations It may take the Administration interface a significant period of time to process large bulk files, and processing may consume significant amounts of memory. Entrust IdentityGuard provides properties to manage resources used for bulk operations. Table 27: Administration interface settings for bulk operations 296 Property Description identityguard.webadmin.bulk.maxFileSize Limits the size of files imported for bulk operations. Enter a value in bytes. The default is 50 MB (52428800 bytes). If you attempt to load a bulk file that exceeds the set limit, the Administration interface cancels the operation and displays an error message. identityguard.webadmin.bulk.inMemoryThres hold Sets the maximum amount of memory used for bulk operations. Entrust IdentityGuard writes large bulk files to disk and caches them when they exceed the set size. Enter a value in bytes. The default is 1 MB (1048576 bytes). identityguard.webadmin.url Contains the URL of the Administration interface. It is set during installation configuration. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Configuring the Administration interface to control the output format Entrust IdentityGuard provides properties to manage the output of export operations. Table 28: Administration interface settings for export operations Property Description identityguard.export.csv By default, files exported through the Administration interface are in XML format. Set this to true to have all files exported in comma-separated-value (CSV) format. The default is false. identityguard.export.dir This setting defines the directory on the Entrust IdentityGuard server to which the export files are written. The default setting is $IDENTITYGUARD_HOME/export. Configuring the Entrust IdentityGuard Server properties file Feedback on guide 297 298 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Appendix B Upgrading Entrust IdentityGuard Server on Linux You can upgrade Entrust IdentityGuard Server on Linux from a previous installation of Entrust IdentityGuard version 7.2 or 8.0 installed on Linux. Attention: To install an upgrade or patch, you must use the same account used to originally install Entrust IdentityGuard. Note: When upgrading Entrust IdentityGuard Server from version 7.2, all existing administrators are assigned to the new default role and group in Entrust IdentityGuard 8.1. There were no roles or groups in 7.2. Topics in this appendix: • “Upgrading Entrust IdentityGuard Server 7.2 to 8.1” on page 299 • “Upgrading Entrust IdentityGuard Server from 8.0 to 8.1” on page 302 Upgrading Entrust IdentityGuard Server 7.2 to 8.1 Complete the following steps to upgrade to Entrust IdentityGuard 8.1 directly from version 7.2. To upgrade Entrust IdentityGuard Server 7.2 to 8.1 1 Update your LDIF or SQL schema to apply to Entrust IdentityGuard 8.1. Refer to the specific schema configuration instructions for your directory or database in 299 either the Entrust IdentityGuard Directory Configuration Guide or the Entrust IdentityGuard Database Configuration Guide. 2 Download the Entrust IdentityGuard 8.1 software. To do so, complete the steps in “Downloading Entrust IdentityGuard software” on page 21. 3 Follow the instructions under“Installing Entrust IdentityGuard Server” on page 33. 4 The Entrust IdentityGuard installation detects version 7.2 and displays the following prompt: Entrust IdentityGuard 7.2 is installed. Do you wish to install Entrust IdentityGuard 8.1 and upgrade the 7.2 data? [yes or no] Enter yes to continue with the upgrade. You are prompted to manually back up your configuration settings. 5 Manually back up your configuration settings if the master key file is not in the default location (default location, $IDENTITYGUARD_HOME/etc/masterkeys.enc). When you upgrade Entrust IdentityGuard, a copy of the existing configuration is made (so you can restore it later in this installation procedure) only if this file is in the default location. Attention: If you want to override the default configuration, do not store the configuration settings under $IDENTITYGUARD_HOME. During an upgrade, this directory is deleted and reinstalled. 6 The Java Runtime Environment is upgraded and you can reinstall the Application server. Installing Java Runtime Environment... Installing j2re-1_4_2_09-linux-i586.bin... Installing Tomcat... Tomcat has already been installed. Do you wish to reinstall it? [yes or no] 7 The installation creates the Entrust IdentityGuard service and the Entrust IdentityGuard Radius service: Creating igradius service... 8 The following prompt appears: Do you want the Entrust IdentityGuard Radius proxy to start automatically when the host starts after reboot? [yes or no] 300 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide If you answer no, you can enable automatic startup later. If you wish to enable automatic startup in the future, run the command "igsvcconfig.sh igradius reset" when logged on as root. 9 When the installation is complete, Entrust IdentityGuard prompts you to restore your existing configuration data. Configuration data from the existing installation has been backed up. If you wish, you can configure a new server or restore the existing configuration data. If you don't restore the existing configuration data, all existing data will be removed. Do you wish to restore the existing configuration data? [yes or no] To retain your Entrust IdentityGuard data, answer yes. This message appears: Configuration parameters restored. To configure a new server, answer no. When you answer no, all of your previous configuration data is removed. You must complete the configuration and initialization procedures: • “Configuring the primary Entrust IdentityGuard Server” on page 36 • “Initializing the primary Entrust IdentityGuard Server” on page 47 After initialization is complete, continue to Step 11 in this procedure. 10 You may be prompted to configure the Entrust IdentityGuard Radius proxy. Continue from Step 4 in “To configure the Radius proxy on UNIX” on page 180. 11 When you are finished, Entrust IdentityGuard displays: PERFORMING UPGRADE You are prompted to answer if you are upgrading a replica server: Are you upgrading an Entrust IdentityGuard master or replica? (PRIMARY or REPLICA): To complete the upgrade of the first instance of Entrust IdentityGuard Server, answer PRIMARY. Answer REPLICA to upgrade the rest of your instances of Entrust IdentityGuard Server. 12 You are prompted to log in with your master user name and password to complete the upgrade. A master user must login to complete the upgrade. Userid: Password: When you have successfully logged in, the following message appears: Upgrading Entrust IdentityGuard Server on Linux Feedback on guide 301 Upgrade complete. Note: If the upgrade fails, ensure that your repository schema was upgraded. After you upgrade the repository schema, you can continue with the Entrust IdentityGuard upgrade by running the master user shell (supersh) command system upgrade. 13 You are prompted to save a backup of your configuration data. Do you wish to keep the backup copy of configuration data? [yes or no] If you answer yes, Entrust IdentityGuard displays the location of the saved configuration data. Your upgrade is now installed. You are prompted to set up the sample application. Proceed to “Configuring the sample application on UNIX” on page 51. Upgrading Entrust IdentityGuard Server from 8.0 to 8.1 Complete the following steps to upgrade from version 8.0 to 8.1. To upgrade Entrust IdentityGuard Server 8.0 to 8.1 1 Update your LDIF or SQL schema to apply to Entrust IdentityGuard 8.1. Refer to the specific schema configuration instructions for your directory or database in either the Entrust IdentityGuard Directory Configuration Guide or the Entrust IdentityGuard Database Configuration Guide. 2 Download the Entrust IdentityGuard 8.1 software. To do so, complete the steps in “Downloading Entrust IdentityGuard software” on page 21. 3 Follow the instructions under“Installing Entrust IdentityGuard Server” on page 33. 4 The Entrust IdentityGuard installation detects version 8.0 and displays the following prompt: Entrust IdentityGuard 8.0 is installed. Do you wish to install Entrust IdentityGuard 8.1 and upgrade the 8.0 data? [yes or no] Enter yes to continue with the upgrade. 5 302 The Entrust IdentityGuard installation detects the Java Runtime Environment and displays the following prompt: IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Installing Java Runtime Environment... Java Runtime Environment has already been installed. Do you wish to reinstall it? [yes or no] 6 The installation detects the Application server and displays the following prompt: Installing Tomcat... Tomcat has already been installed. Do you wish to reinstall in? [yes or no] 7 The installation creates the Entrust IdentityGuard service and the Entrust IdentityGuard Radius service: Creating igradius service... 8 The following prompt appears: Do you want the Entrust IdentityGuard Radius proxy to start automatically when the host starts after reboot? [yes or no] If you answer no, you can enable automatic startup later (using chkconfig igradius reset, when logged as root). 9 When the installation is complete, Entrust IdentityGuard prompts you to restore your configuration data. Installation complete. Configuration data from the existing installation has been backed up. If you wish, you can configure a new server or restore the existing configuration data and upgrade it to 8.1. If you don’t restore the existing configuration data, all existing data will be removed. Do you wish to restore the existing configuration data? [yes or no] yes 10 To retain your Entrust IdentityGuard data, answer yes. This message appears: Configuration parameters restored. To configure a new server, answer no. When you answer no, all of your previous configuration data is removed. You must complete the configuration and initialization procedures: • “Configuring the primary Entrust IdentityGuard Server” on page 36 • “Initializing the primary Entrust IdentityGuard Server” on page 47 After initialization is complete, continue to Step 12 in this procedure. 11 You may be prompted to configure the Entrust IdentityGuard Radius proxy. Continue from Step 4 in “To configure the Radius proxy on UNIX” on page 180. Upgrading Entrust IdentityGuard Server on Linux Feedback on guide 303 12 When you are finished, Entrust IdentityGuard displays: PERFORMING UPGRADE You are prompted to answer if you are upgrading a replica server: Are you upgrading an Entrust IdentityGuard master or replica? (PRIMARY or REPLICA): To complete the upgrade of the first instance of Entrust IdentityGuard Server, answer PRIMARY. Answer REPLICA to upgrade the rest of your instances of Entrust IdentityGuard Server. 13 You are prompted to log in with a master user name and password to complete the upgrade. For example, Master1. A master user must login to complete the upgrade. Userid: Password: When you have successfully logged in, the following message appears: Upgrade complete. Note: If the upgrade fails, ensure that your repository schema was upgraded. After you upgrade the repository schema, you can continue with the Entrust IdentityGuard upgrade by running the master user shell (supersh) command system upgrade. 14 You are prompted to save a backup of your configuration data. Do you wish to keep the backup copy of the configuration data? [yes or no] If you answer yes, Entrust IdentityGuard displays the location and the file name of the saved configuration data. Your upgrade is now installed. 304 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Appendix C Using the sample Web application This appendix provides administrators with detailed instructions for using the Any Bank sample Web application. Assuming the role of a sample end user, you will register with the Any Bank Web site and perform the following tasks: request a card, activate a card, register a token, and log in using several authentication methods Attention: This sample Web application simulates a Web site with Entrust IdentityGuard installed. The primary purpose of the application is to demonstrate some of the authentication methods used by Entrust IdentityGuard. The sample Web application is not intended to perform as a fully featured application. Topics in this appendix: • “Preparing to use the sample Web application” on page 306 • “Accessing the sample Web application” on page 307 • “Registering as a user” on page 308 • “Activating a card” on page 315 • “Registering a token” on page 317 • “Using machine authentication to log in” on page 321 • “Using generic authentication to log in” on page 325 • “Using step-up authentication” on page 327 • “Using temporary PIN authentication to log in” on page 329 • “Using one-step grid authentication to log in” on page 332 • “Using two-step grid authentication to log in” on page 333 305 Preparing to use the sample Web application Review the following information before configuring the sample Web application: Table 29: Preconfiguration considerations for the Sample Web application Creating a user group • During installation, the sample Web application creates a user group named “samplegroup.” • The sample Web application assigns all users to the sample group. Creating a policy • During installation, the sample Web application creates a policy named “samplepolicy.” • The sample Web application must use samplepolicy. Modify samplepolicy using the master user shell. For information about modifying policy settings using the master user shell, see the Entrust IdentityGuard Administration Guide. Loading token data • Load all token data before attempting any token-related operations. For information about loading token data, see the Entrust IdentityGuard Administration Guide. Loading preproduced card • Load all preproduced card data before attempting any data card-related operations. For information about loading token data, see the Entrust IdentityGuard Administration Guide. Locating the sample admin ID and password • The sample Web application installs with an admin ID and password for the administrator. Use only the admin ID and password. • Locate the admin ID and password in igsample.properties in <IDENTITYGUARD_INSTALL>\etc\ or <IG_INSTALL_DIR>\identityguard81\etc 306 Using passwords • The password field and user name field simulate the primary authentication mechanism of the sample bank’s Web site. The password field in the sample Web application is for demonstration purposes only and is nonfunctional. Modifying authentication-type settings using the master user shell • To complete the procedures in this appendix, you must modify the samplepolicy’s generic and machine authentication-type settings. For information about modifying policy settings using the master user shell, see the Entrust IdentityGuard Administration Guide. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Accessing the sample Web application Configure the sample Web application before accessing it. Refer to the following instructions to configure the sample Web application: • for embedded Tomcat server on UNIX instructions, see “Configuring the sample application on UNIX” on page 51 • for embedded Tomcat server on Windows instructions, see “Configuring the sample application on Microsoft Windows” on page 87 • for existing application server instructions, see “Configuring the sample application on an existing application server” on page 121 Access the configured sample Web application from a Web browser. To access the sample Web application from a URL Enter one of the following URLs: https://<FQDN>:<httpsport>/IdentityGuardSampleApp –or– http://<FQDN>:<httpport>/IdentityGuardSampleApp where: • <FQDN> is the fully qualified domain name for the Entrust IdentityGuard host. • <httpsport> is the sample application HTTPS port (default 8443, if using the embedded Tomcat server). • <httpport> is the sample application HTTP port (default 8080, if using the embedded Tomcat server). For example: https://igserver.mycompany.com:8443/IdentityGuardSampleApp http://igserver.mycompany.com:8080/IdentityGuardSampleApp To access the sample Web application from the Windows start menu Click Start > All Programs > Entrust > IdentityGuard > Sample Application. The sample Web application opens in your default browser. By default, the interface opens at the User registration Sign in page. Using the sample Web application Feedback on guide 307 Registering as a user Note: The sample Web application’s policy, “samplepolicy,” installs with the default settings of GRID QA OTP TOKENRO for both the generic and machine authentication-types. The sample Web application uses only the first authentication-type setting listed for both the generic and machine authentication-types. A master user can modify the default settings in the master user shell. For example, to register a sample end user to authenticate using tokens, the master user must modify the policy setting for generic authentication-type to appear as: TOKENRO GRID QA OTP. To access the Any Bank Web site, a sample end user must register an account with Entrust IdentityGuard. The end user must register contact information, a personal image, and a personal caption for use in future authentication challenges. Assuming the role of a sample end user: • register your account with Any Bank • have a card or token issued to you • optionally, configure question-and-answer authentication secrets. To register as a sample user 1 Select User registration from the main page of the interface. The Sign in page appears. 308 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 2 Enter a user name and password. 3 Click Continue. The Entrust IdentityGuard user creation page appears displaying your user name. 4 Optionally, enter a valid email address and phone number. Note: The administrator or application uses this information to deliver a one-time password (OTP) to the end user. In a real-life scenario, a valid email address must be entered if the policy setting for generic type is set to OTP and email is used to deliver the OTP. 5 Click Continue. The Entrust IdentityGuard image selection page appears. Using the sample Web application Feedback on guide 309 6 Click Continue to select an image. Optionally, click here to choose another image from the Entrust IdentityGuard image library or to upload an image. The Entrust IdentityGuard image caption page appears. The previous two pages demonstrate two types of organization authentication: image and message replay authentication. For more information on image and message replay authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide. 7 Enter a caption for the image. For example, “hammer.” Entrust IdentityGuard displays your image and caption at login. 310 8 Optionally, click Change to select a different image or upload an image. 9 Click Continue. • If the policy setting for the generic authorization-type is set to GRID, go to “To register with GRID as the policy setting” • If the policy setting for the generic authorization-type is set to QA, go to “To register with QA as the policy setting” • If the policy setting for the generic authorization-type is set to OTP, go to“To register with OTP as the policy setting” • If the policy setting for the generic authorization-type is set to TOKENRO, go to “To register with TOKENRO as the policy setting” IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide To register with GRID as the policy setting Note: The following procedure has generic authentication-type set to GRID in the samplepolicy. The setting appears as: GRID QA OTP TOKENRO. 1 The Entrust IdentityGuard card creation page appears. This page allows the end user to request a card. Entrust IdentityGuard provides two models for card production—produce-and-assign and preproduction cards. For more information about card and grid production models, see the Entrust IdentityGuard Deployment Guide. 2 Click Request a card to make Entrust IdentityGuard create the grid for a produced-and-assign card. You can view this grid using the Administration interface or the master user shell. You must activate the card before using the card to authenticate to Entrust IdentityGuard. For more information about card activation, see “Activating a card” on page 315. A page appears stating that your user account was successfully registered. 3 Click I already have a card if you possess a preproduced card. You must activate the card before using the card to authenticate to Entrust IdentityGuard. For more information about card activation, see “Activating a card” on page 315. A page appears stating that your user account was successfully registered. To register with QA as the policy setting Note: The following procedure has generic authentication-type set to question and answer in the samplepolicy. The setting appears as: QA OTP TOKENRO GRID. Using the sample Web application Feedback on guide 311 1 The Entrust IdentityGuard Questions page appears. The user can create authentication secrets from a list of predefined questions. The sample Web application installs with six predefined questions; however, Entrust IdentityGuard allows organizations to select a number of authentication secrets for each user and to prompt for all answers or a subset of the answers. For more information about knowledge-based authentication and creating good questions, see the Entrust IdentityGuard Deployment Guide. 2 Select a different question from each drop-down list. For example, “What was the name of your high school?” 3 Enter an answer to each question. 4 Click Continue. A page appears stating that your user account was successfully registered. 312 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide To register with OTP as the policy setting Note: The following procedure has generic authentication-type set to question and answer in the samplepolicy. The setting appears as: OTP TOKENRO GRID QA. A page appears stating that your user account has been successfully registered. OTP authentication-type does not require any additional user set up or activation. To register with TOKENRO as the policy setting Note: The following procedure has generic authentication-type set to token in the samplepolicy. The setting appears as: TOKENRO GRID QA OTP. The Entrust IdentityGuard token registration page appears. The user can proceed with token registration or defer token registration. You can configure the policy for the sample Web application to support token PINs or to not support token PINs. Using the sample Web application Feedback on guide 313 314 • For more information on token registration without token PIN support enabled, see “To register a token” on page 317. • For more information on token registration with token PIN support enabled, see “To register a token with token PIN support enabled” on page 319. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Activating a card A sample end user of the Any Bank Web site must activate a card before accessing a bank account. When a sample end user requests a card, it is assigned to the end user in a hold-pending state. Do not use a card in the hold-pending state to authenticate to Entrust IdentityGuard. An administrator must activate a card by changing the state of the card to current or pending. The end user can then use the card to authenticate to Entrust IdentityGuard. Assuming the role of a sample end user, use the sample Web application to activate your card and access your Any Bank account. Note: If required, use the Administration interface or the master user shell to access the grid information for a card. To activate a user card 1 Select Card activation from the main menu of the interface. The Sign in page appears. 2 Enter your user name and password. 3 Click Continue to begin the card activation process. Using the sample Web application Feedback on guide 315 The Entrust IdentityGuard card activation page appears. 4 Enter the serial number of either your preproduced or produced-and-assign card. Optionally, click Request a card to have a produced-and-assign card deployed to you. For more information, see “To register as a sample user” on page 308. 5 Click Activate. Another Entrust IdentityGuard card activation page appears displaying the serial number. 6 Enter the specified grid coordinates. Grid authentication is a second-factor authentication method that challenges the end user to enter a set of grid coordinates on a printed card. For more information on grid authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide. 7 Click Continue. A message appears stating that your card has been activated. 316 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Registering a token Attention: Before you can register a token, load the token data and assign the token data to the group, “samplegroup.” For more information on loading token data, see “Preparing to use the sample Web application” on page 306. Note: The following procedure has generic authentication-type set to token in the samplepolicy. The setting appears as TOKENRO GRID QA OTP. A sample end user of the Any Bank Web site may log in using token authentication, a second-factor authentication method that challenges a sample end user to respond using a token-generated dynamic password. Entrust IdentityGuard can be configured to issue challenges requiring end users to respond using a dynamic password or to respond using a token PIN in conjunction with a dynamic password. For more information about configuring token authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide. Assuming the role of a sample end user, register a token for use in future authentication requests to Entrust IdentityGuard. • For tokens that do not support token PINs, see “To register a token” on page 317. • For tokens that support token PINs, see “To register a token with token PIN support enabled” on page 319. To register a token 1 Select Token registration from the main menu of the interface. Using the sample Web application Feedback on guide 317 The Sign in page appears. 2 Enter your user name and password. 3 Click Continue to begin the token registration process. The Entrust IdentityGuard token registration page appears. 4 Enter the token serial number. 5 Click Register. A token is assigned to a sample end user in a hold-pending state. 318 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide The Entrust IdentityGuard token registration page appears. 6 Enter the token-generated dynamic password as the response. 7 Click Continue. A message appears stating that your token has been successfully registered. To register a token with token PIN support enabled The Entrust IdentityGuard token registration page appears. 1 Enter the token serial number. 2 Click Register. A token is assigned to a sample end user in a hold-pending state. Using the sample Web application Feedback on guide 319 The Entrust IdentityGuard token registration page appears. 3 Choose and confirm a token PIN between four and eight digits in length. For example, your token PIN could be 1234. This token PIN is used in combination with a dynamic password for future authentication challenges. 4 Click Continue. The Entrust IdentityGuard token registration page appears requesting the input of a token response. 5 Enter the token PIN and the token-generated dynamic password. For example, if the token PIN value is 1234, and the token-generated string is 567890, enter 1234567890 as the authentication challenge response. 6 Click Continue. A message appears stating that your token has been successfully registered. 320 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Using machine authentication to log in Note: The following procedure has machine authentication-type set to token in the samplepolicy. The setting appears as: TOKENRO GRID QA OTP. A sample end user of the Any Bank Web site may log in using machine authentication. However, you can also use machine authentication with the other authentication methods. This method of second-factor authentication associates a sample end user with a particular computer through the use of a machine secret. For more information on machine authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide. Assuming the role of a sample end user, use the sample Web application to establish machine authentication using the machine secrets gathered during Entrust IdentityGuard machine registration. Once machine authentication is established, second-factor authentication becomes transparent to the end user. To establish machine authentication 1 Select User sign in from the main page of the interface. 2 Enter your user name. 3 Be sure to check Remember me on this machine. This initiates machine authentication. 4 Click Continue. Using the sample Web application Feedback on guide 321 The Entrust IdentityGuard Machine registration page appears displaying the serial number of your token. This page demonstrates a type of machine authentication that uses a token password and token PIN as the default method of authentication. The end user must enter a token PIN and a dynamic password in response to the authentication challenge. If the primary method of authentication was grid, this page would display a grid authentication challenge. For more information on machine authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide. 5 Enter the token PIN and the dynamic password. For example, if the token PIN value is 1234, and the dynamic password is 567890, you must enter 1234567890 as the authentication challenge response. 6 322 Click Continue. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide The Entrust IdentityGuard Application authentication page appears displaying your image and caption. This page demonstrates image and message replay authentication, a method of organization authentication. For more information on image and message replay authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide. 7 Enter your password. 8 Click Login. Your sample bank account page appears. You have established machine authentication. Future log in attempts will not require you to authenticate to Entrust IdentityGuard. To log in with established machine authentication 1 From a new browser window, select User sign in from the main page of the interface. Using the sample Web application Feedback on guide 323 The Sign in page appears displaying your user name. 2 Be sure to check Remember me on this machine. 3 Click Continue. The Entrust IdentityGuard Application authentication page appears. The sample Web application checked that your machine is registered with the Entrust IdentityGuard server. No authentication challenge was issued because your machine was identified as a registered machine. 4 Enter your password. 5 Click Login. Your sample bank account page appears. Once machine authentication is established, second-factor authentication is transparent to the end user associated with a particular computer. 324 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Using generic authentication to log in Note: The following procedure has generic authentication-type set to question and answer in the samplepolicy. The setting appears as: QA OTP TOKENRO GRID. A registered end user can log in to the Any Bank Web site using generic authentication. For more information on generic authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide. Assuming the role of a sample end user, use generic authentication to log in to your bank account. To log in using generic authentication 1 Select User sign in from the main page of the interface. 2 Enter your user name. 3 Be sure to disable Remember me on this machine. Uncheck the box to initialize the generic authentication challenge and remove any machine secrets. 4 Click Continue. Using the sample Web application Feedback on guide 325 The Entrust IdentityGuard second-factor authentication page appears. Entrust IdentityGuard randomly selects a series of questions. 5 Enter your predefined answers. 6 Click Continue. Your sample bank account page appears. 326 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Using step-up authentication Note: This procedure uses one-time password authentication as the setting for generic authentication-type. The policy setting appears as: OTP TOKENRO GRID QA. For situations requiring an additional level of security, Entrust IdentityGuard provides second-factor authentication of transactions initiated by an authenticated end user of the Any Bank Web site. Assuming the role of a sample end user, use step-up authentication to transfer funds from your bank account to another bank account. To use step-up authentication 1 Follow the procedure “To log in with established machine authentication” to access your sample bank account page. 2 Click Transfer funds. Using the sample Web application Feedback on guide 327 The Entrust IdentityGuard second-factor authentication page appears. 3 Enter your one-time password. Note: The one-time password can be viewed using the Administration interface. 4 Click Continue. The Transfer Funds page appears. 5 Enter the amount to be transferred and the account numbers. 6 Click Transfer. A page appears stating that the funds were transferred successfully. 328 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Using temporary PIN authentication to log in Note: Temporary PINs are only available for grid or token authentication. The following procedure has generic authentication-type set to GRID in the samplepolicy. The setting appears as: GRID QA OTP TOKENRO. In certain situations, a sample end user of the Any Bank Web site may not have a card or token. An administrator can issue a temporary PIN, either for a specific number of uses or a limited period of time. Examples of this situation include lost cards or tokens, or a newly registered end user awaiting arrival of a card or token. For more information about temporary PINs, see the Entrust IdentityGuard Deployment Guide. Assuming the role of a sample end user, use the sample Web application to access your Any Bank account using a temporary PIN. As an administrator, use the Administration interface to issue a temporary PIN. Temporary PINs are issued with limits on the number of uses and expiry dates to limit exposure to attacks. To use temporary PINs 1 Select User sign in from the main page of the interface. 2 Enter your user name. 3 Be sure to disable Remember me on this machine. Using the sample Web application Feedback on guide 329 Uncheck the box to initialize the generic authentication challenge and remove any machine secrets. 4 Click Continue. The Entrust IdentityGuard second-factor authentication page appears. 5 Use the Administration interface to issue yourself a temporary PIN. 6 Click Having problems or lost your Entrust IdentityGuard Card? Another Entrust IdentityGuard second-factor authentication page appears. 7 Enter the temporary PIN issued to you by email or get the PIN from the Administration interface or the master user shell. In this example, a sample end user can call a customer support number and have a temporary PIN issued to them. The telephone number on this second-factor authentication page is for demonstration purposes only. 330 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide 8 Click Continue. Your sample bank account page appears. Using the sample Web application Feedback on guide 331 Using one-step grid authentication to log in A sample end user of the Any Bank Web site may log in using one-step grid authentication. This authentication method presents first-factor and second-factor authentication challenges to the end user at the same time. For more information on one-step grid authentication, see the Entrust IdentityGuard Deployment Guide. Assuming the role of a sample end user, use the sample Web application to log in using one-step grid authentication. To log in using one-step grid authentication 1 Select One-step grid login from the main menu of the interface. The One-step grid authentication page appears. 2 Enter your user name, password, and the specified grid coordinates. This step demonstrates grid authentication. For more information on grid authentication, see the Entrust IdentityGuard Administration Guide. 3 Click Login. Your sample bank account page appears. 332 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Using two-step grid authentication to log in A sample end user of the Any Bank Web site may log in using two-step grid authentication. This method of authentication presents first-factor and second-factor authentication challenges to the end user consecutively. The end user is authenticated and verified using the first-factor authentication method before being challenged with second-factor authentication. For more information on two-step grid authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide. Assuming the role of a sample end user, use the sample Web application to log in using two-step grid authentication. To log in using two-step grid authentication 1 Select Two-step grid sign in from the main page of the interface. The Sign in page appears. 2 Enter your user name and password. 3 Click Continue. Using the sample Web application Feedback on guide 333 The Entrust IdentityGuard second-factor authentication page appears displaying the serial number on your card. This page demonstrates a type of organization authentication called serial number replay authentication. For more information on serial number replay authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide. 4 Enter the specified grid coordinates. This step demonstrates grid authentication. For more information on grid authentication, see the Entrust IdentityGuard Deployment Guide and the Entrust IdentityGuard Administration Guide. 5 Click Continue. Your sample bank account page appears. 334 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Appendix D Uninstalling Entrust IdentityGuard Server This chapter provides instructions for uninstalling Entrust IdentityGuard Server from your system. Topics in this section: • “Uninstalling Entrust IdentityGuard Server with embedded Tomcat on UNIX” on page 336 • “Uninstalling Entrust IdentityGuard Server on Microsoft Windows” on page 337 • “Uninstalling Entrust IdentityGuard Server with an existing application server” on page 338 335 Uninstalling Entrust IdentityGuard Server with embedded Tomcat on UNIX Entrust IdentityGuard Server does not include an uninstall script. You will need to perform the following procedure to uninstall Entrust IdentityGuard. Uninstalling the server also uninstalls the Radius proxy component, if configured. To uninstall Entrust IdentityGuard on UNIX 1 Stop the Entrust IdentityGuard service using the instructions in the topic “Managing the Entrust IdentityGuard service” on page 62. 2 Optionally, as the application owner, back up the identityguard.properties file and the masterkeys.enc file (but not the masterkeys.kpf). 3 As root: a In $IDENTITYGUARD_HOME/bin enter: ./igsvcconfig.sh igradius uninstall b Still in $IDENTITYGUARD_HOME/bin enter: ./igsvcconfig.sh identityguard uninstall 4 336 Optionally, remove the Entrust IdentityGuard data from the repository. • For a database, use the IG_81/sql/drop_v81_schema.sql file in the .tar install package (either IG_81_Linux.tar or the IG_81_Solaris.tar), to remove all Entrust IdentityGuard tables. • For a directory, you will need to remove this data manually. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Uninstalling Entrust IdentityGuard Server on Microsoft Windows Complete the following procedure to uninstall the Entrust IdentityGuard Server on Microsoft Windows. Uninstalling the server also uninstalls the Radius proxy component, if configured. To uninstall Entrust IdentityGuard Server on Microsoft Windows 1 Go to Add or Remove Programs located in your system’s Control Panel. 2 Select Entrust IdentityGuard Server 8.1 and click Remove. 3 Optionally, remove the Entrust IdentityGuard data from the repository on the repository server. • For a database, use the IG_81/sql/drop_v81_schema.sql file in the .tar installation package to remove all Entrust IdentityGuard tables. • For a directory, you will need to remove this data manually. Note: During the Windows uninstall process, Entrust IdentityGuard attempts to create a backup of your Entrust IdentityGuard configuration. If successful, it displays a message listing the location of the backup file. Click OK to continue the uninstall. This occurs only if Entrust IdentityGuard was correctly configured and initialized. Uninstalling Entrust IdentityGuard Server Feedback on guide 337 Uninstalling Entrust IdentityGuard Server with an existing application server Entrust IdentityGuard Server does not include an uninstall script. You will need to perform the following procedure to uninstall Entrust IdentityGuard. Uninstalling the server also uninstalls the Radius proxy component, if configured. Topics in this section: • “Uninstalling Entrust IdentityGuard on WebLogic 8.1” on page 338 • “Uninstalling Entrust IdentityGuard on WebLogic 9.1” on page 340 • “Uninstalling Entrust IdentityGuard on WebSphere 6.0” on page 342 Uninstalling Entrust IdentityGuard on WebLogic 8.1 To uninstall Entrust IdentityGuard on WebLogic 8.1 you must: • Stop the Entrust IdentityGuard services. • Delete the Entrust IdentityGuard services. • Delete the Entrust IdentityGuard files. To uninstall Entrust IdentityGuard on WebLogic 8.1 1 Stop the Entrust IdentityGuard services (see “Stopping Entrust IdentityGuard Services on WebLogic 8.1” on page 167). 2 Delete the Entrust IdentityGuard services: a From the WebLogic 8.1 main page, select Deployments > Web Application Modules. The Deploy a Web Application Module page appears showing a list of all deployed Web applications. 338 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide b Click the trash can to the right of the Entrust IdentityGuard service. A warning page appears prompting you to confirm that you want to delete the Entrust IdentityGuard service. c Click Yes. A message appears confirming that the Entrust IdentityGuard service has been deleted. d Click Continue. You are returned to the page listing deployed applications. e Repeat Step b to Step d to delete the remaining Entrust IdentityGuard services. Uninstalling Entrust IdentityGuard Server Feedback on guide 339 3 Optionally, as the application owner, back up the identityguard.properties file and the masterkeys.enc file (but not the masterkeys.kpf). 4 As root: a in $IDENTITYGUARD_HOME/bin enter: ./igsvcconfig.sh igradius uninstall b Delete the installation directory (by default /opt/entrust) by entering: rm -f -r /opt/entrust 5 Optionally, remove the Entrust IdentityGuard data from the repository. • For a database, use the IG_81/sql/drop_v81_schema.sql file in the .tar installation package to remove all Entrust IdentityGuard tables. • For a directory, you will need to remove this data manually. Uninstalling Entrust IdentityGuard on WebLogic 9.1 To uninstall Entrust IdentityGuard on WebLogic 9.1 you must: • Stop the Entrust IdentityGuard services. • Delete the Entrust IdentityGuard services. • Delete the Entrust IdentityGuard files. To uninstall Entrust IdentityGuard on WebLogic 9.1 1 Stop the Entrust IdentityGuard services (see “Stopping Entrust IdentityGuard Services on WebLogic 9.1” on page 168). 2 Delete the Entrust IdentityGuard services: a Under Change Center on the WebLogic main page click Lock & Edit. b Under Domain Structure on the left of the main page click Deployments. The Deployment Summary Page appears with a list of Entrust IdentityGuard services. 340 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide c Select the check box for the Entrust IdentityGuard Services. d Click Delete. The Delete Application Assistant page appears. e Click Yes to delete the application(s). You are returned to the Summary of Deployments page. f Under Change Center on the WebLogic main page click Activate Changes. Uninstalling Entrust IdentityGuard Server Feedback on guide 341 3 Optionally, as the application owner, back up the identityguard.properties file and the masterkeys.enc file (but not the masterkeys.kpf). 4 As root: a In $IDENTITYGUARD_HOME/bin enter: ./igsvcconfig.sh igradius uninstall b Delete the installation directory (by default /opt/entrust) by entering: rm -f -r /opt/entrust 5 Optionally, remove the Entrust IdentityGuard data from the repository. • For a database, use the IG_81/sql/drop_v81_schema.sql file in the .tar installation package to remove all Entrust IdentityGuard tables. • For a directory, you will need to remove this data manually. Uninstalling Entrust IdentityGuard on WebSphere 6.0 To uninstall Entrust IdentityGuard on WebLogic 8.1 you must: • Stop the Entrust IdentityGuard services • Delete the Entrust IdentityGuard services • Delete the Entrust IdentityGuard files To uninstall Entrust IdentityGuard on WebSphere 6.0 1 Stop the Entrust IdentityGuard services (see “Stopping Entrust IdentityGuard Services on WebSphere 6.0” on page 169). 2 Delete the Entrust IdentityGuard services: a From the WebSphere main menu click Applications > Enterprise Applications. The Enterprise Applications page appears. 342 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide b Select the service(s) to uninstall and then click Uninstall. The Uninstall Application page appears. c Click OK. A message appears indicating that changes have been made to your local configuration. d Click Save to accept the changes. The Enterprise Applications Save page appears. Uninstalling Entrust IdentityGuard Server Feedback on guide 343 e Click Save. The Entrust IdentityGuard services are uninstalled. 3 Optionally, as the application owner, back up the identityguard.properties file and the masterkeys.enc file (but not the masterkeys.kpf). 4 As root: a In $IDENTITYGUARD_HOME/bin enter: ./igsvcconfig.sh igradius uninstall b Delete the installation directory (by default /opt/entrust) by entering: rm -f -r /opt/entrust 5 344 Optionally, remove the Entrust IdentityGuard data from the repository. • For a database, use the IG_81/sql/drop_v81_schema.sql file in the .tar installation package to remove all Entrust IdentityGuard tables. • For a directory, you will need to remove this data manually. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Glossary active card or token The card or token that the end user is presently using for authentication. Administration API The Java Platform or C# API that applications can use to integrate with the Administration service. Administration interface The Web interface used by administrators to manage end users (see end user). Administration service The Entrust IdentityGuard Web service responsible for managing administrators, users, cards, tokens, PINs, and so on. Administration WSDL The WSDL definition for the Administration service. administrator The Entrust IdentityGuard user who manages the day-to-day activity of end users using the Administration service (see end user). administrator password attributes The policy attributes that determine the password rules for an administrator. For example, the password length, expiry date, and so on. alias An additional unique name for an end user. See also user name. all grouplist A predefined grouplist that allows an administrator to manage every Entrust IdentityGuard group. anonymous authentication See one-step authentication. auditor role A predefined role that has read access to operations available through the Administration service. authentication The process of proving your identity, and/or determining the validity of a set of credentials presented to the system. Authentication API The Java Platform or C# API that applications can use to integrate with the Authentication service. 345 authentication secret The secrets shared between the organization and the user when organization authentication is configured. Authentication service The Entrust IdentityGuard Web service used for retrieving challenge requests and authenticating user responses. Also see Authentication API. 346 Authentication WSDL The WSDL definition for the Authentication service. Canceled state The state associated with a card or token that a user can no longer use to authenticate. card A physical grid that is printed and distributed to users. cardspec attributes See card specification attributes. card specification attributes The policy attributes that determine the characteristics of a grid for grid authentication. For example, the characters to use in a grid, its expiry based on duration or use, the number of rows and columns, and so on. cell A row and column coordinate in a grid. challenge generation algorithm An algorithm used to produce the challenge when using grid authentication. Entrust IdentityGuard has two challenge generation algorithms: • least-used cell challenge generation algorithm • random challenge generation algorithm client application Any application that uses the Authentication API and/or the Administration API to access Entrust IdentityGuard’s administration and multifactor authentication capabilities on behalf of the end user. client authentication The authentication process whereby users prove their identity to an application, using, for example, Entrust IdentityGuard Server. Consumer deployment An Entrust IdentityGuard deployment where the end users are external to the organization (for example, they are customers or partners), and are authenticating to a Web-based application. credentials A set of data (for example, a user name and password, grid, or dynamic password) that defines a user to the system. Current state The state associated with a card or token that is currently in use. default role A predefined role that has access to most operations available through the Administration service. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide dynamic password The random number displayed by a token that changes automatically at regular intervals. end user A user who authenticates to Entrust IdentityGuard using one of the available multifactor authentication methods. Enterprise deployment A deployment of Entrust IdentityGuard where the end users are internal to the organization (for example, employees) and are authenticating to internal services. Entrust IdentityGuard Server An Entrust product that provides multifactor authentication to increase the security of an online identity. Entrust IdentityGuard Desktop for Microsoft Windows An Entrust IdentityGuard client that adds second-factor authentication capabilities to the first-factor authentication performed by Microsoft Windows Winlogin and the RAS/IAS servers. See also Entrust IdentityGuard Remote Access Plug-in for Microsoft Windows Servers. Entrust IdentityGuard Radius proxy An Entrust IdentityGuard client that adds second-factor authentication capabilities to the first-factor authentication performed by a Radius server or using external authentication. Entrust IdentityGuard Remote Access Plug-in for Microsoft Windows Servers An Entrust IdentityGuard client that installs on the RAS and IAS servers to enable Entrust IdentityGuard second-factor authentication for remote Microsoft Windows users. external authentication The first-factor authentication provided by Entrust IdentityGuard in a deployment where remote users connect through VPN and no external Radius server exists. file-based repository A file containing preproduced cards or unassigned token information that is located on the primary Entrust IdentityGuard Server. Used only when your repository is an LDAP Directory. first-factor authentication The first authentication challenge presented to the user. Usually user name and password authentication. first-factor authentication application The application which performs first-factor authentication and to which Entrust IdentityGuard is added as the second factor of authentication. grid An assortment or table of characters listed in row and column format. See also card. Glossary Feedback on guide 347 grid authentication A second-factor authentication method that challenges a user for a set of grid coordinates or cells. grid location replay authentication A type of organization authentication used with grid authentication that requires the organization to display the contents of certain coordinates in the grid once the user has authenticated. group A means to organize end users, administrators, tokens, and cards to delegate administrative tasks and assign policy behavior (such as allowed authentication methods). grouplist The set of user groups (see group) that an administrator can manage. A master user creates grouplists. See all grouplist and own grouplist. Hold state The state associated with an active card or token that an administrator has suspended (because, for example, the user lost the card). While in Hold, a user cannot use the card or token to authenticate. See also Current state. Hold_pending state The state associated with a card or token that an administrator has not yet activated. Unlike the Pending state, the end user cannot activate the card and use it for authentication. identityguard.properties file The Java properties file containing all the configuration settings for a particular Entrust IdentityGuard Server. image replay authentication See message or image replay authentication. initialization A one-time process completed while setting up Entrust IdentityGuard that provides the system with the license keys and creates the master users, and the master key. If repeated, re-initialization replaces the master key, overwrites policy data already stored in the repository, and renders existing user, preproduced card and unassigned token information unusable. See master key. 348 knowledge-based authentication A second-factor authentication method that challenges a user for correct responses to a series of questions. layered authentication An authentication process in which additional authentication challenges are presented for particular transactions that require stronger authentication than the user presently has. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide least-used cell challenge generation A challenge generation algorithm that uses a configured number of least-used coordinates (cells) when creating algorithm the challenge. machine authentication An authentication process in which a user is associated with a particular computer through the use of a machine secret. After association, second-factor authentication is transparent for the user on that computer. machine authentication type list A list of machine authentication methods assigned to a user, based on their policy. machine secret One or more nonces and optional application-provided data that uniquely identify a particular computer. master key The key that Entrust IdentityGuard uses to encrypt information stored in the repository. master key protection file The file containing the obfuscation key used to access the master key. master user The Entrust IdentityGuard user that configures how Entrust IdentityGuard will work in your system. Entrust IdentityGuard has three master users. See master user shell. master user shell A command-line interface used by master users to configure Entrust IdentityGuard. See master user. message or image replay authentication A type of organization authentication in which the organization displays a predefined message or image either before or after the user has authenticated. multifactor authentication An authentication process in which two or more authentication methods are used consecutively to verify a user and often an organization. mutual authentication An authentication process in which both the user and the organization verify themselves as legitimate. See also organization authentication and user authentication. nonce A random value generated for security purposes. Glossary Feedback on guide 349 one-step authentication An authentication process in which first-factor and second-factor authentication challenges are presented to the end user at the same time. Also referred to as “anonymous authentication” as the system does not know the identity of the user. Available only when using grid authentication. See also two-step authentication. one-time password A set of characters provided to a user out-of-band that can only be used once for authentication. See also out-of-band authentication. organization authentication 350 An authentication process in which the organization verifies itself as authentic to the end user. Entrust IdentityGuard supports the following types: • grid location replay authentication • message or image replay authentication • serial number replay authentication OTP See one-time password. out-of-band authentication A second-factor authentication method that challenges a user for a one-time password that is sent (for example) to their mobile phone when the challenge occurs. own grouplist A predefined grouplist that allows an administrator to manage only the group to which they belong. It is the default grouplist. passcode list A list of one-time transaction numbers (TANs) that are distributed to end users (sometimes on a physical card) and used with passcode list authentication. passcode list authentication A second-factor authentication method that challenges a user for a passcode that matches a particular number in their passcode list. It is similar to grid authentication. password attributes See administrator password attributes. Pending state The state associated with a card or token that a user or administrator has not yet activated. Should an end user user a card or token in this state, it automatically changes to the Current state. pinspec attributes See temporary PIN attributes. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide policy preproduction model A set of attributes that determines the characteristics for each member in a group. A policy is divided into four subsets: • administrator password attributes • user specification attributes • card specification attributes • temporary PIN attributes A method of creating cards in which they are created anonymously and assigned to users at a later date. See also produce-and-assign model. primary Entrust IdentityGuard Server In a replicated system, this is the Entrust IdentityGuard Server on which the file-based repository is stored. Therefore, it usually also is the Entrust IdentityGuard Server hosting the Administration service to which all instances of the Administration interface connect. produce-and-assign model A method of creating cards in which a card is created and assigned to a user in one-step. Also see preproduction model. question and answer authentication See knowledge-based authentication. Radius See Remote Authentication Dial-In User Service (Radius). Radius proxy See Entrust IdentityGuard Radius proxy. random challenge generation algorithm A challenge generation algorithm that picks coordinates in a grid randomly when creating a challenge. registration The process of adding new users to Entrust IdentityGuard by obtaining their information and setting required attributes such as group association and authentication method. Remote Authentication Dial-In User Remote Authentication Dial-In User Service. An industry standard authentication protocol used to authenticate Service (Radius) users with Radius clients. A Radius client passes information about a user to a designated Radius server and then acts on the response that the Radius server returns. Transactions between the Radius client and the Radius server are authenticated through a server secret, which is never sent over the network. Glossary Feedback on guide 351 repository The Entrust IdentityGuard information associated with users and administrators stored in a database or directory. A repository contains information such as: • group association • available authentication methods • user name and aliases • authentication information such as grids, token data, questions and answers, temporary PINs, one-time passwords, and so on • preproduced cards and unassigned token data replica Entrust IdentityGuard Server In a system with more than one Entrust IdentityGuard Server, any Entrust IdentityGuard Server that does not function as the primary Entrust IdentityGuard Server. Replicas are usually identical to each other. role Defines, for administrators (see administrator), what operations they can perform using the Administration service. A master user creates roles. Entrust IdentityGuard installs with three roles: • auditor role • default role • superuser role sample application The client Web application installed with the Entrust IdentityGuard Server that demonstrates the various capabilities and authentication methods of Entrust IdentityGuard. second-factor authentication The second authentication method in a system that uses two independent mechanisms of authentication. It ensures strong authenticity. See strong authentication. serial number replay authentication A type of organization authentication used with grid authentication that requires the organization to display the card’s unique serial number to the user. shared secret 352 IdentityGuard 8.1 Installation Guide A name and value pair associated with an end user and used by a client application only (not Entrust IdentityGuard). Document issue: 3.0 Feedback on guide Simple Object Access Protocol (SOAP) Simple Object Access Protocol. An XML protocol that governs the exchange of information in a distributed environment. SOAP provides a way for programs running in two different operating systems (such as Windows 2000 and Solaris) or written in different programming languages (such as Java Platform and C#) to exchange information, using HTTP and XML. Refer to http://www.w3.org/2000/xp/Group/. single-factor authentication An authentication system in which the user is verified using only one authentication method (usually a user name and password). See also second-factor authentication. single-stage authentication See one-step authentication. SOAP See Simple Object Access Protocol (SOAP). state The lifecycle status that determines what a user can do with a card or token. Entrust IdentityGuard cards and tokens support the following states: static token PIN • Pending state • Hold_pending state • Current state • Hold state • Canceled state A numeric value that associates a user with their token. When a user receives a token challenge, they must prefix their response with the static token PIN, thereby enhancing the strength of the authentication. Do not confuse with temporary PIN or dynamic password. strong authentication A form of client authentication in which users prove their identity by logging in with credentials other than just user name and password (for example, a grid or token). super shell See master user shell. superuser role A predefined role that has access to all operations available through the Administration service. supersh See master user shell. TAN Transaction number. See passcode list authentication. Glossary Feedback on guide 353 temporary PIN A character string assigned to a user for a brief period of time or usage duration to substitute for a temporarily unavailable card or token. temporary PIN attributes The policy attributes that determine the characteristics of the temporary PIN. For example, the number of characters in the PIN, its expiry date, and so on. token A battery-operated hardware device that provides a user with a dynamic password that changes periodically (for example, every minute). token authentication A second-factor authentication method that challenges a user for a token-generated string. The response can include a static token PIN. token PIN See static token PIN. two-step authentication An authentication process in which first-factor and second-factor authentication challenges are presented to the end user consecutively. The end user is authenticated and verified using the first-factor authentication method before being challenged with second-factor authentication. See also one-step authentication. two-stage authentication. See two-step authentication. user authentication An authentication process in which the end user is verified as authentic by the organization. Entrust IdentityGuard supports the following types: user name • grid authentication • token authentication • knowledge-based authentication • passcode list authentication • out-of-band authentication The name of the Entrust IdentityGuard user in their first-factor authentication system. A user name must be unique within its group. 354 userspec attributes See user specification attributes. user ID The globally unique name of an end user or administrator. It includes both the Entrust IdentityGuard group name and the user name of the user in the first-factor authentication system, written as group/username. IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide user specification attributes The policy attributes that determine the rules for an end user’s interaction with Entrust IdentityGuard. For example, the number of aliases a user can have, their authentication methods, and so on. Web service A program that runs within an application server that communicates to other requesting components, often using the Simple Object Access Protocol (SOAP). Web services have two advantages: • The SOAP protocol provides a standard way for the Web service and its clients to encode and decode (or "parse") the program data so that programmers don't have to write their own. The standard also means that programs written by different companies can communicate with the Web service. • SOAP envelopes are typically sent within HTTP requests so you do not have to open additional ports in your firewall for clients to communicate with the Web service. Entrust IdentityGuard has two Web services: Administration service and Authentication service. WSDL Web Services Definition Language. An XML format for describing network services as a set of endpoints operating on messages. WSDL service definitions provide the technical details for describing a Web service that would be required for someone to actually invoke the service (for example, input parameters, output format, and so on). Glossary Feedback on guide 355 356 IdentityGuard 8.1 Installation Guide Document issue: 3.0 Feedback on guide Index - A B C D E F G H I J K L M N O P Q R S T U V W X Y Z .wsdl files 259 A active card definition 345 active token definition 345 Administration API definition 345 Administration interface definition 345 Administration service definition 345 Administration WSDL definition 345 administrator definition 345 administrator password attributes definition 345 algorithms 97, 99, 101 alias definition 345 all grouplist definition 345 anonymous authentication. See one-step authentication audit integrity check 281 auditor role definition 345 authentication definition 345 domain controller 172 LDAP directory 172 Radius 172 strong definition 353 Authentication API definition 345 authentication secret definition 346 Authentication service definition 346 - Authentication WSDL definition 346 B backup UNIX 211, 247 Windows 213 backups backup strategy 244 of LDAP Directory and database 225, 247 restoring file-based card preproduction repository 253 restoring IdentityGuard 250 C cached challenges 270 Canceled state definition 346 card definition 346 card preproduction configuring 220 database 224 disk files 221 card specification attributes definition 346 cardspec. See card specification attributes cell definition 346 certificate exporting 238 importing the SSL certificate 233 updating 238 challenge cache 271 challenge generation algorithm definition 346 client application definition 346 client authentication definition 346 357 - A B C D E F G H I J K L M N O P Q R S T U V W X Y Z commands supersh 53, 56, 123, 126, 251, 254 version 54, 124 configuration during install IdentityGuard 36, 109 Consumer deployment definition 346 credentials definition 346 cryptography policy files 96, 98, 100, 101 Current state definition 346 Customer support 16 D default role definition 346 deployment, Consumer definition 346 deployment, Enterprise definition 347 dynamic password definition 347 E end user definition 347 Enterprise deployment definition 347 Entrust IdentityGuard Desktop for Microsoft Windows definition 347 Entrust IdentityGuard Radius proxy definition 347 Entrust IdentityGuard Remote Access Plug-in for Microsoft Windows Servers definition 347 Entrust IdentityGuard Server definition 347 external authentication 202 definition 347 groups 209 358 IdentityGuard 8.1 Installation Guide F failover Radius 195 repository 218 file-based preproduction card repository restoring 253 file-based repository definition 347 first-factor authentication definition 347 first-factor authentication application definition 347 G Getting help Technical Support 16 grid definition 347 grid authentication definition 348 grid location replay authentication definition 348 group definition 348 grouplist definition 348 own definition 350 groups external authentication 178, 209 H Hold state definition 348 Hold_pending state definition 348 I IdentityGuard configuration during install 36, 109 configuring to use cached challenges 270 disabling 64, 65 enabling 64, 65 failed initialization 47, 118 Document issue: 3.0 - - A B C D E F G H I J K L M N O P Q R S T U V W X Y Z initializing 47, 83, 118 installing 33 installing a replica server 210 querying status 63, 64 restarting 63, 64 sample application 51 starting 63, 64 starting automatically 63, 166 stopping 63, 64 testing 58, 162 uninstalling 336, 338 upgrading 299 WebLogic 8.1 installing 106 WebLogic 9.1 installing 106 WebSphere 6.0 installing 106 identityguard.properties audit.integrity 281 externalauth 293 externalauth.kerberos 294 igradius.challengestring 284 igradius.msglog 289 igradius.port 283 igradius.radius 290 igradius.skipauth 289 igradius.tokenchallengestring 286 tokenrequirespinupdate 288 igradius.url 282 igradius.vpn 290 igradius.vpn.useradius 293 jdbc.blobAccess 268 jdbc.connectionpool 267 jdbc.connectionpool.max 267 jdbc.connectionpool.minIdleClose Time 267 jdbc.driverClass 268 jdbc.logintimeout 267 jdbc.needsEscape 268 jdbc.password 268 jdbc.querytimeout 267 jdbc.schema 268 jdbc.selectLock 269 jdbc.timestampDataType 268 jdbc.url 268 jdbc.user 268 ldap.addAdminObjectClass 262 ldap.addPolicyObjectClass 263 - ldap.addUserObjectClass 262 ldap.connectionpool.max 265 ldap.connecttimeout 262 ldap.credentials 261 ldap.GeneralizedTime 266 ldap.policyentry 262 ldap.principal 261 ldap.searchbase 264 ldap.searchtimeout 265 ldap.sizelimit 265 ldap.sslEnabled 262 ldap.url 261 ldap.useridattribute 262 log.maxstacksize 273 refreshinterval 273 supersh.adminlist 279 supersh.preproducedcardlist 279 supersh.tokenlist 280 supersh.usercardlist 278 supersh.userlist 278 tokenRepository 221, 223 webadmin bulk 296 export 297 identityguard.properties file authentication success audit 258 caching policies 272 changing log configuration 273 changing log locations 277 column width formatting 278 configuring 255 configuring to use cached challenges 270 definition 348 enabling cached challenges 270 encrypted properties 257 JDBC properties 267 LDAP properties 261 license audit 281 properties for card preproduction 224 search bases 260 identityguard.sh 52, 63, 64 igkrb5.conf file 204 image replay authentication definition 348, 349 initialization definition 348 initializing IdentityGuard 47, 83, 118 reasons for failure 47, 118 Index 359 - A B C D E F G H I J K L M N O P Q R S T U V W X Y Z installing IdentityGuard 33, 106 J definition 349 multifactor authentication definition 349 mutual authentication 349 Java Development Kit 96, 98, 100 K keytool 235 documentation 235 knowledge-based authentication definition 348 L layered authentication definition 348 least-used cell challenge generation algorithm definition 349 license audit 281 replica servers 281 loadbalancing 210 log locations changing 277 log4j properties 273 logging configuring 45, 116, 273 to Syslog 45, 116, 277 M machine authentication definition 349 machine authentication type list definition 349 machine secret definition 349 master key definition 349 master key protection file definition 349 master user definition 349 master user shell 49, 119 configuring formatting 278 definition 349 message replay authentication 360 IdentityGuard 8.1 Installation Guide N native libraries 128, 134 nonce definition 349 O one-step authentication definition 350 one-time password definition 350 organization authentication 350 OTP. See one-time password out-of-band authentication definition 350 own grouplist definition 350 P passcode list definition 350 passcode list authentication definition 350 password attributes. See administrator password attributes Pending state definition 350 pinspec attributes. See temporary PIN attributes policy definition 351 preproduction model definition 351 primary Entrust IdentityGuard Server definition 351 produce-and-assign model definition 351 Professional Services 17 properties file authentication success audit 258 changing log configuration 273 changing log location 277 column width formatting 278 Document issue: 3.0 - - A B C D E F G H I J K L M N O P Q R S T U V W X Y Z configuring to use cached challenges 270 enabling cached challenges 270 encrypted properties 257 JDBC properties 267 LDAP properties 261 license audit 281 Q question and answer authentication. See knowledge-based authentication R Radius definition 351 Radius Proxy automatic restart 35, 107 Radius proxy 171 architecture 173 configuring overview 172 external 187 overview 172 with domain controller 187 with LDAP server 187 with Radius server 180 Radius proxy. See Entrust IdentityGuard Radius proxy random challenge generation algorithm definition 351 registration definition 351 replica definition 352 replica server configuring 210 initializing 210 installing 210 new SSL certificate 210 repository definition 352 preparing 22 restoring IdentityGuard from backup 250 role definition 352 - S sample application configuring 51 definition 352 disabling 52 sample Web application enabling 52 second-factory authentication definition 352 serial number reconfiguring 254 serial number replay authentication definition 352 shared secret definition 352 single-factor authentication definition 353 single-page authentication. See one-step authentication SOAP definition 353 SSL creating a self-signed certificate 235 exporting a certificate 238 importing the SSL certificate 233 ports 228 securing the LDAP repository, after installation 233 state Current definition 346 definition 353 hold definition 348 Hold_pending definition 348 Pending definition 350 static token PIN definition 353 strong authentication definition 353 super shell. See master user shell supersh. See master user shell superuser role definition 353 Syslog configuring 226 logging to 45, 116, 277 Index 361 - A B C D E F G H I J K L M N O P Q R S T U V W X Y Z T W TAN. See passcode list authentication Technical Integration Guides 22 Technical Support 16 temporary PIN definition 354 temporary PIN attributes definition 354 testing IdentityGuard 58, 162 token definition 354 token authentication definition 354 token PIN. See static PIN tokens Entrust 30 two-stage authentication. See two-step authentication two-step authentication definition 354 typographic conventions 13 Web service definition 355 WebLogic 8.1 96 configuring SSL 97 deploying IdentityGuard services 128 preparing for installation 96 WebLogic 9.1 98 configuring SSL 98 deploying IdentityGuard services 134 preparing for installation 98 WebSphere 6.0 100 configuring SSL 101 deploying IdentityGuard services 142 preparing for installation 100 shared library settings 142 WSDL definition 355 U uninstalling IdentityGuard 336, 338 UNIX group and user creating 32 UNIX service command starting and stopping IdentityGuard 63 upgrading IdentityGuard 7.2 to 8.1 299 user authentication definition 354 user ID definition 354 user name definition 354 user specification attributes definition 355 user, end definition 347 userspec attributes. See user specification attributes V version command 54, 124 VPN server configure 193 362 IdentityGuard 8.1 Installation Guide Document issue: 3.0 - - 363 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z IdentityGuard 8.1 Installation Guide Document issue: 3.0 - - 364 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z IdentityGuard 8.1 Installation Guide Document issue: 3.0 -