SSL Config Was61 Ihs
SSL Config Was61 Ihs
Click OK.
5) When prompted for a password for the key ring, enter and confirm
was1edu as the password. If desired, modify the expiration time.
Check the “Stash the password to a file” check box. Click OK
and OK again for the informational box.
Example Description
Key Label IHSCertificate
Common Name <domain_name>
Organization Royal Cyber Inc.
Organization Unit IBM WebSphere
Locality bolingbrook
State/Province IL
Zipcode 60563
5) Click OK
6) Exit iKeyman
List the contents of the directory <ihs_root>\ssl\ and verify that the
following files were created:
ihsKeyring.kdb
ihsKeyring.sth
ihsKeyring.crl
ihsKeyring.rdb
Configure a Virtual Host on IHS for HTTPS
3) Add Virtual Host definition for HTTPS. This allows for the
definition of HTTPS on a separate virtual host from HTTP.
Listen 443
<VirtualHost w2k3was61.rc.net:443>
ServerName w2k3was61
DocumentRoot “C:/Program Files/IBM/HTTPServer/htdocs/en_US”
SSLEnable
Keyfile “C:/Program Files/IBM/HTTPServer/ssl/ihsKeyring.kdb”
SSLV2Timeout 100
SSLV3Timeout 1000
</VirtualHost>
SSLDisable
1) Restart the IBM HTTP Server process so that the new httpd.conf
settings take effect
http://w2k3was61/
b) Now that the Web server is known to be running, enter the
following URL to verify that HTTPS is working (notice, the only
different is that the HTTP protocol was replaced with HTTPS):
https://w2k3was61/
That takes care of talking to the Web server with HTTPS. But, in order
for the HTTPS connections to be able to reach the application server,
port 443 needs to be enabled on the application server’s virtual host.
WebSphere Application Server V6.1 automatically adds port 443 to the
default virtual host, but it would be a good idea to verify that it is
there.
1) Using the administrative console, select Environment —>
Virtual Hosts.
2) Click default_host.
3) On the right, under Additional Properties, click Host Aliases
4) Verify that port 443 is one of the ports listed. If it is not, you
should add it.
5) Since this document has configured the IBM HTTP Server to be a
managed server, it is possible to propagate the correct version
of the keyfile through the console. Using the administrative
console, navigate to Servers —> Web servers. Click your Web
server, and then under the Additional Properties click Plug-in
properties.
Notice that the snoop servlet is showing that the connection was made
via HTTPS.