IBM Security Guardium Key Lifecycle Manager: Books
IBM Security Guardium Key Lifecycle Manager: Books
Rinkesh Bansal
Aditi Prasad
Shiv Jha
Saandiip Koturwwar
Alka Acharya
                                                                   Redbooks
Draft Document for Review June 11, 2021 12:08 pm                     8472edno.fm
IBM Redbooks
June 2021
                                                                     SG24-8472-01
8472edno.fm                                                    Draft Document for Review June 11, 2021 12:08 pm
Note: Before using this information and the product it supports, read the information in “Notices” on page v.
This edition applies to version 4.1.0.1 of IBM Security Guardium Key Lifecycle Manager (product number
5724-T60).
Contents
                Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .v
                Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
                Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
                Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
                Now you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
                Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
                Stay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
                Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation
                             27
                3.1 Pre-requisite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
                3.2 Installing IBM Security Guardium Key Lifecycle Manager on Red Hat OpenShift . . . . 29
                   3.2.1 Installing IBM Security Guardium Key Lifecycle Manager Container Edition on Red
                          Hat OpenShift with PostgreSQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
                   3.2.2 Activate the license and login to IBM Security Guardium Key Lifecycle Manager 33
                   3.2.3 Installing IBM Security Guardium Key Lifecycle Manager Container Edition on Red
                          Hat OpenShift with Db2U . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
                   3.2.4 Exposing non-HTTP Port in Red Hat OpenShift Installation . . . . . . . . . . . . . . . . . 36
                   3.2.5 Installing IBM Security Guardium Key Lifecycle Manager Container Edition as Fix
                          Pack on Red Hat OpenShift . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
                   3.2.6 Troubleshooting in Red Hat OpenShift . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
                3.3 Installing IBM Security Guardium Key Lifecycle Manager Container Edition on Kubernetes
                     40
                   3.3.1 Installing IBM Security Guardium Key Lifecycle Manager on Kubernetes . . . . . . 40
                   3.3.2 Installing IBM Security Guardium Key Lifecycle Manager Container Edition as Fix
                          Pack on Kubernetes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
                   3.3.3 Troubleshooting in Kubernetes environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
                3.4 Installing IBM Security Guardium Key Lifecycle Manager Container Edition on IBM Z/OS
                     Container Extensions (zCX) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
                   3.4.1 Installing IBM Security Guardium Key Lifecycle Manager on zCX with PostgreSQL
                          43
                   3.4.2 Installing IBM Security Guardium Key Lifecycle Manager with Db2 for z/OS . . . . 44
                   3.4.3 Installing IBM Security Guardium Key Lifecycle Manager Container Edition as Fix
                         Pack in z/CX Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Notices
This information was developed for products and services offered in the US. This material might be available
from IBM in other languages. However, you may be required to own a copy of the product or product version in
that language in order to access it.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not grant you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any
manner serve as an endorsement of those websites. The materials at those websites are not part of the
materials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you provide in any way it believes appropriate without
incurring any obligation to you.
The performance data and client examples cited are presented for illustrative purposes only. Actual
performance results may vary depending on specific configurations and operating conditions.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
Statements regarding IBM’s future direction or intent are subject to change or withdrawal without notice, and
represent goals and objectives only.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to actual people or business enterprises is entirely
coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are
provided “AS IS”, without warranty of any kind. IBM shall not be liable for any damages arising out of your use
of the sample programs.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines
Corporation, registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright
and trademark information” at http://www.ibm.com/legal/copytrade.shtml
The following terms are trademarks or registered trademarks of International Business Machines Corporation,
and might also be trademarks or registered trademarks in other countries.
     AIX®                              IBM®                                 Tivoli®
     Db2®                              IBM Security™                        WebSphere®
     DS8000®                           Redbooks®                            z/OS®
     Guardium®                         Redbooks (logo)    ®
The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive
licensee of Linus Torvalds, owner of the mark on a worldwide basis.
LTO, the LTO Logo and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and other
countries.
Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States,
other countries, or both.
Java, and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its
affiliates.
OpenShift, Red Hat, are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the United
States and other countries.
VMware, and the VMware logo are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in
the United States and/or other jurisdictions.
Other company, product, or service names may be trademarks or service marks of others.
Preface
                This IBM® Redbooks® publication describes the installation, integration, and configuration
                of IBM Security™ Guardium® Key Lifecycle Manager .
Authors
                This book was produced by a team of IBM specialists from around the world:.
                Rinkesh Bansal is a Senior Development and Release Manager for Encryption and Key
                Management products in IBM. He is expert of Key Management domain and has more than
                18 years of experience. He joined IBM in 2009, working with IBM Security Guardium Key
                Lifecycle (GKLM) team since 2012. His experience includes roles as an Install package
                developer, test engineer, test lead, automation lead, Project Manager, Release Manager and
                he currently manages the GKLM development team. He is a passionate innovator with 10
                patents and an enthusiastic speaker at various conferences, colleges, schools.
                Aditi Prasad is an Advisory Software Engineer at IBM. She joined IBM in 2008 and is
                working with the IBM Security Guardium Key Lifecycle (GKLM) team since 2012. She is the
                Level 3 support lead for GKLM. She has about 13 years of experience with more than 7 years
                in Security Domain. She holds a Masters degree in Computer Science from Pune University,
                India.
                Shiv Jha is a Test Lead and Project Manager for IBM Security Guardium Key Lifecycle
                Manager (GKLM) product in IBM. He joined IBM in 2013 and has a total of 17 years of
                experience. He is working with GKLM team for last 7 years. Shiv holds a Masters degree in
                Computer Science from BITS Pilani, India.
                Alka Acharya has been working in the IBM Software Labs as an Information Developer since
                November 2018. She is responsible for authoring and delivering the customer-facing
                documentation for IBM Security Guardium Key Lifecycle Manager. She has about 15 years of
                experience in delivering product and training documentation. She holds a Bachelor's degree
                in Engineering (Computer Science) from the University of Pune, India.
                An Chen
                Client Technical Specialist, IBM Australia
                Bert Dufrasne
                Project Leader, IBM Redbooks, San Jose Center
                Find out more about the residency program, browse the residency index, and apply online at:
                ibm.com/redbooks/residencies.html
Comments welcome
                Your comments are important to us!
                We want our books to be as helpful as possible. Send us your comments about this book or
                other IBM Redbooks publications in one of the following ways:
                 Use the online Contact us review Redbooks form found at:
                   ibm.com/redbooks
                 Send your comments in an email to:
                   redbooks@us.ibm.com
                 Mail your comments to:
                   IBM Corporation, IBM Redbooks
                   Dept. Security Mail Station P099
                   2455 South Road
                   Poughkeepsie, NY 12601-5400
1.1 Overview
              IBM Security Guardium Key Lifecycle Manager provides key storage, key serving, and key
              lifecycle management for storage devices, tape drives, databases, and applications from IBM
              and other vendors. For more information, see IBM Documentation (formerly IBM Knowledge
              Center).
              IBM Security Guardium Key Lifecycle Manager supports the following methods for
              communicating with client devices and applications to manage and serve cryptographic keys:
               Key Management Interoperability Protocol (KMIP): You can use KMIP operations for
                secure communication between the IBM Security Guardium Key Lifecycle Manager server
                and the self-encrypting devices that are KMIP compatible. For Example: Spectrum Scale,
                VMware, and so on.
               IPP: Some self-encrypting devices uses IBM proprietary Protocol (IPP) to communicate
                with IBM Security Guardium Key Lifecycle Manager server for Cryptographic keys. For
                example, LTO tape drives, DS8000® data at rest, and so on.
               REST APIs: You can use IBM Security Guardium Key Lifecycle Manager REST key
                serving interface to manage and serve Cryptographic keys for applications that support
                REST APIs. For example, Cloud Apps.
              Before installing the IBM Security Guardium Key Lifecycle Manager Traditional Edition,
              complete the following prerequisite tasks:
               Ensure that the hardware and operating system meet the prerequisites that are provided
                in the IBM Security Guardium Key Lifecycle Manager Support Matrix document.
               Ensure that you follow the guidelines that are listed in the Installation guidelines topic
                in the IBM Documentation (formerly IBM Knowledge Center).
               Run the prerequisite check script to ensure that the system requirements are met. For
                more information, see Checking prerequistes.
                  Download the following installation files from the IBM Passport Advantage website:
                  – SGKLM_4.1_FOR_WINDOWS_SERVER_1OF2.zip
                  – SGKLM_4.1_FOR_WINDOWS_SERVER_2OF2.zip
               Extract the files to a temporary directory on your system such that disk1 and disk2 are in
                same folder, as shown in Figure 2-1.
               After files are extracted, go to the disk1 folder and ensure that the launchpad.bat script is
                extracted to the disk1 directory, as shown in Figure 2-2.
                2. Pre-requisite checker checks required availability for CPU and RAM, as shown in
                   Figure 2-4.
3. The installation GUI is displayed if there are no issues from the pre-requisite checker.
                         Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation   7
8472_ch_Installation_te.fm                                    Draft Document for Review June 11, 2021 12:08 pm
4. All components are required for an installation, as shown in Figure 2-5. Click Next.
              5. Review and accept the terms in the license agreement, as shown in Figure 2-6. Click
                 Next.
                6. Specify the installation path for the Shared Resources Directory and IBM Installation
                   Manager, as shown in Figure 2-7 on page 9. Click Next.
Figure 2-7 Shared Resources Directory and Installation Manager installation path
                7. Specify the installation path or keep default path for the IBM Db2, IBM WebSphere®
                   Application Server and IBM Security Guardium Key Lifecycle Manager as shown in
                   Figure 2-8. Click Next.
                         Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation   9
8472_ch_Installation_te.fm                                   Draft Document for Review June 11, 2021 12:08 pm
                10.Specify the credentials and home directory for the Db2 instance owner account and the
                   Db2 port, as shown in Figure 2-11. If the Db2 Administrator ID specified does not exist, a
                   new user will be created. Ensure to record credentials, Db2 port and other information for
                   future use. Click Next.
                11.Specify the credentials for the WebSphere Application Server (WAS) administrator
                   wasadmin account, WAS Port, IBM Security Guardium Key Lifecycle Manager
                   administrator SKLMAdmin account and the IBM Security Guardium Key Lifecycle
                   Manager Ports, as shown in Figure 2-12. Ensure to record credentials and port
                   information for future use. Click Next.
                        Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation   11
8472_ch_Installation_te.fm                                    Draft Document for Review June 11, 2021 12:08 pm
              12.Do not select the Migrate Encryption Key Manager (EKM) option unless the installation
                 is intended for a migration from EKM, as shown in Figure 2-13. Click Next.
              13.Review the installation summary and click Install to start installation of IBM Security
                 Guardium Key Lifecycle Manager, as shown in Figure 2-14 on page 12.
                14.After a successful installation, select the None option and click Finish to exit the
                   installation wizard, as shown in Figure 2-15.
                  Important: IBM Security Guardium Key Lifecycle Manager V4.1.0.1 by default uses port
                  9443 for GUI and REST API’s.
                        Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation   13
8472_ch_Installation_te.fm                                   Draft Document for Review June 11, 2021 12:08 pm
              3. After login to IBM Security Guardium Key Lifecycle Manager GUI, Welcome page is
                 displayed, as shown in Figure 2-17
Figure 2-17 IBM Security Guardium Key Lifecycle Manager Welcome page
              4. Click the question mark in the upper right corner and select About option from the menu,
                 as shown in Figure 2-18.
              5. Verify the installed version of IBM Security Guardium Key Lifecycle Manager and its
                 components, as shown in Figure 2-19.
Figure 2-19 IBM Security Guardium Key Lifecycle Manager Version Information
                2. After you extract the files, the installation script silent_install.sh is extracted to the disk1
                   directory, as shown in Example 2-2.
                         Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation   15
8472_ch_Installation_te.fm                                    Draft Document for Review June 11, 2021 12:08 pm
              3. To perform a fresh installation, edit and update all the user inputs such as repository
                 location where install binaries are present, installation directory, user credentials , and so
                 on, in the input response file SKLM_Silent_Linux_Resp.xml.
                   Note: Installation binaries bundle sample response files for performing a fresh
                   installation as well as for performing data migration from existing installed version of
                   IBM Security Guardium Key Lifecycle Manager. For a fresh installation, the sample
                   response filename is SKLM_Silent_Linux_Resp.xml
                 b. Using any editor e.g. vi, open the response file SKLM_Silent_Linux_Resp.xml for
                    editing, as shown in Example 2-4.
                 c. Update the repository location to point to the local directory where the installation
                    package has been extracted in Step 1, as shown in Example 2-5.
                 d. Update the IBM Installation Manager installLocation to install IBM Installation Manager
                    at specified location, as shown in Example 2-6.
                 e. Update the IBM Db2 location to install IBM Db2 database at specified location, as
                    shown in Example 2-7.
                  Important: The plain-text password for Db2 Administrator user must meet the operating
                  system password complexity requirements. In case this requirement is not met the
                  installation for IBM Security Guardium Key Lifecycle Manager will fail.
                    h. To convert password from plain-text to encrypted format acceptable for IBM Installation
                       manger use the imcl utility provided under the im/tools folder, as shown in
                       Example 2-10.
                    i. Update the home directory of the IBM Db2 user specified above in Step f, as shown in
                       Example 2-11.
                    l. Update the value for DB2_LOCATION to the installation location for Db2 database, as
                       shown in Example 2-14. Ensure this value is same as value for parameter IBM Db2
                       location specified above in Step e.
                        Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation   17
8472_ch_Installation_te.fm                                     Draft Document for Review June 11, 2021 12:08 pm
                 m. Update the value for DB2_DB_LHOME to the home location for Db2 database user, as
                    shown in Example 2-15. Ensure this value is same as value for parameter
                    DB2_DB_HOME location specified above in Step i.
                 n. Update the value of the user group under which the Db2 user will be created. The
                    group name should not be longer than 8 characters, as shown in Example 2-16.
                 o. Update the installation location for IBM WebSphere Application Server to install IBM
                    WebSphere Application Server at specified location, as shown in Example 2-17.
                 p. Update the installation location for IBM Security Guardium Key Lifecycle Manager to
                    install GKLM at a specified location, as shown in Example 2-18.
              Example 2-20 Update password for WAS Administrator user in encrypted format
                 <data key='user.WAS_ADMIN_PASSWORD,com.ibm.sklm41.linux'
                 value='e9PjN93MeQxwnSs9VXJFMw=='/>
                     <data key='user.WAS_ADMIN_CONF_PWD,com.ibm.sklm41.linux'
                 value='e9PjN93MeQxwnSs9VXJFMw=='/>
                Example 2-22 Update password for WAS Administrator user in encrypted format
                    <data key='user.SKLM_ADMIN_PASSWORD,com.ibm.sklm41.linux'
                    value='9YTRJMRIydDSdfhaHPs1ag=='/>
                        <data key='user.SKLM_ADMIN_CONF_PWD,com.ibm.sklm41.linux'
                    value='9YTRJMRIydDSdfhaHPs1ag=='/>
                    u. Update the value of the GKLM Application port on which GKLM will listen for requests
                       on a secure channel, as shown in Example 2-23.
                    v. Update the value of the WAS Administrator port on which WAS will listen for requests
                       on a secure channel. Users can access the WAS GUI console by connecting to this
                       port, as shown in Example 2-24.
                    w. Update the value of the GKLM Application port on which GKLM will listen for requests
                       on a non-secure channel, as shown in Example 2-25.
                    x. Save all the changes made so far and close the file.
                4. On the command prompt run the following command to perform silent installation, as
                   shown in Example 2-26.
                        Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation   19
8472_ch_Installation_te.fm                                      Draft Document for Review June 11, 2021 12:08 pm
              5. GKLM installer will start performing installation beginning with running pre-requisite
                 checker. If all the necessary pre-requisites are met then it continues with the installation of
                 GKLM. See Example 2-27.
                 The Installation process may display on console a warning message before showing final
                 success message. This warning message is related to 64-bit version of Installation
                 Manger not being supported. This is a known issue and can be safely ignored.
                 In case any pre-requisite is not met but is not a mandatory pre-requiste(e.g. Db2 kernel
                 settings) it will display a warning and ask user input before continuing with further
                 installation, as shown in Example 2-28
              Explanation: The 64-bit version of Installation Manager checks each package for
              64-bit support. If a package does not support the 64-bit version, you receive a
              warning.
              User Action: Use a 32-bit version of Installation Manager to install the package.
              Installation process is complete. Please look into Installation Manager logs for
              details.
              [root@sklm41ga1 disk1]#
2.5 Installing fix pack for IBM Security Guardium Key Lifecycle
Manager Traditional Edition
                The IBM Fix Central website provides fixes and updates for the software, hardware, and
                operating system. IBM Security Guardium Key Lifecycle Manager fix packs are published at
                the IBM Fix Central.
                The following section covers steps to install fix pack FP0001 over IBM Security Guardium Key
                Lifecycle Manager V4.1.0.0. Back up the current WebSphere Application Server and IBM
                Security Guardium Key Lifecycle Manager configuration before installing the fix pack. The
                backup and restore operation for the IBM Security Guardium Key Lifecycle Manager
                configuration is covered in Chapter 5.2, “Backing up and restoring IBM Security Guardium
                Key Lifecycle Manager” on page 68.
                To install the fix pack for IBM Security Guardium Key Lifecycle Manager, complete the
                following steps:
                1. Back up the WebSphere Application Server files as shown in Example 2-29.
                Files\IBM\WebSphere\AppServer\profiles\KLMProfile\logs\server1\stopServer.log
                ADMU7702I: Because server1 is registered to run as a Windows Service, the
                           request to stop this server will be completed by stopping the
                           associated Windows Service.
                ADMU0116I: Tool information is being logged in file C:\Program
                Files\IBM\WebSphere\AppServer\profiles\KLMProfile\logs\server1\stopServer.log
                ADMU0128I: Starting tool with the KLMProfile profile
                        Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation     21
8472_ch_Installation_te.fm                                      Draft Document for Review June 11, 2021 12:08 pm
NOTE: It will take sometime to create compressed file using above command.
              Files\IBM\WebSphere\AppServer\profiles\KLMProfile\logs\server1\startServer.log
              ADMU7701I: Because server1 is registered to run as a Windows Service, the
                         request to start this server will be completed by starting the
                         associated Windows Service.
              ADMU0116I: Tool information is being logged in file C:\Program
              Files\IBM\WebSphere\AppServer\profiles\KLMProfile\logs\server1\startServer.log
              ADMU0128I: Starting tool with the KLMProfile profile
              ADMU3100I: Reading configuration for server: server1
              ADMU3200I: Server launched. Waiting for initialization status.
              ADMU3000I: Server server1 open for e-business; process id is 4572
              2. Create the C:\sklminstall_fp directory, transfer the fix pack package downloaded from
                 IBM Fix Central to the folder. Extract the fix pack package and run the updateSKLM.bat
                 script to start the update wizard (the script requires executable permission), as shown in
                 Example 2-30.
Directory of C:\sklminstall_fp
                Files\IBM\WebSphere\AppServer\profiles\KLMProfile\logs\server1\stopServer.log
                ADMU0128I: Starting tool with the KLMProfile profile
                ADMU3100I: Reading configuration for server: server1
                ADMU3201I: Server stop request issued. Waiting for stop status.
                ADMU4000I: Server server1 stop completed.
                Launching InstallManager...
                "C:\Program Files\IBM\Installation Manager"\eclipse\IBMIM.exe -input
                C:\sklminstall_fp/updateSKLM.xml
                3. The wizard identifies the current installed version and fix pack level. Select IBM Security
                   Guardium Key Lifecycle Manager V4.1.0 and click Next to continue, as shown in
                   Figure 2-20 on page 23.
4. Select the fix pack to be installed and click Next to continue, as shown in Figure 2-21.
                        Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation   23
8472_ch_Installation_te.fm                                Draft Document for Review June 11, 2021 12:08 pm
              5. Review and accept the terms in the license agreement and click Next to continue, as
                 shown in Figure 2-22.
6. Select the features to be installed and click Next to continue, as shown in Figure 2-23.
                7. Provide the passwords for the wasadmin, SKLMadmin, and sklmdb41 accounts, click
                   Validate Credentials, as shown in Figure 2-24.
                8. When provided passwords are validated successfully, Next button will become active.
                   Click Next to continue, as shown in Figure 2-25.
                .
                        Chapter 2. IBM Security Guardium Key Lifecycle Manager Traditional Edition installation   25
8472_ch_Installation_te.fm                                    Draft Document for Review June 11, 2021 12:08 pm
              9. Confirm the installation details and click Update to install the fix pack, as shown in
                 Figure 2-26.
              10.After a successful installation, review the installation summary and click Finish to exit the
                 wizard, as shown in Figure 2-27.
              11.Login to the IBM Security Guardium Key Lifecycle Manager GUI and click the question
                 mark in the upper right corner, then select About to verify the installed software details, as
                 shown in Figure 2-28.
Figure 2-28 IBM Security Guardium Key Lifecycle Manager version info
3.1 Pre-requisite
              Before you begin the deployment of IBM Security Guardium Key Lifecycle Manager in a
              Red Hat OpenShift Container platform you need to complete below given steps.
              1. Obtain the container installation files (eImages) and license activation file.
                 a. Obtain the container installation files (eImages) and license activation file for IBM
                    Security Guardium Key Lifecycle Manager container from IBM Passport Advantage.
                    User should download following files:
                     License File - SGKLM_4.1_CONTAINER_LICENSE_MP.zip
                     Container image for x86-64 platform - SGKLM_4.1_CONTAINER_LIC_LN64_BIT.tar
                      Tip: You can avoid downloading the container installation files if you plan to pull the
                      container image directly from the Docker Hub repository.
              Kubernetes commands
              # kubectl get pods --namespace ibm-common-services
              # kubectl get service --namespace ibm-common-services
              # kubectl get secret ibm-licensing-token -o jsonpath={.data.token} -n
              ibm-common-services | base64 -d
                 c. Update the following parameters in the values.yaml bundled with sample Helm charts
                    (openShift-helm.zip / k8s-helm.zip), as shown in Example 3-2.
                         Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation   29
8472_ch_Installation_ce.fm                                     Draft Document for Review June 14, 2021 5:30 pm
                 d. Copy the Login command that is displayed under Log in with this token section as
                    shown in Figure 3-4.
                 e. Use the copied command to login to the OCP server by using the command line tool
                    (oc), as shown in Example 3-3.
              Example 3-3 Login to OpenShift Container Platform cluster with OC command line tool
              oc login --token=sha256~za6Se4Lpj5YI7-lIkt2n_APVHqH7sE_i2NoQV4nQXhY
              --server=https://api.xgklmocp.cp.fyre.ibm.com:6443
              Logged into "https://api.xgklmocp.cp.fyre.ibm.com:6443" as "kube:admin" using the
              token provided.
              You have access to 60 projects, the list has been suppressed. You can list all
              projects with 'oc projects'
                2. Navigate to the openshift-helm directory and apply the Security Context Constraint (SCC)
                   with the following command, as shown in Example 3-4.
                3. Create the WebSphere service account and bind the ibm-websphere-scc to the
                   namespace (project) sklm, as shown in Example 3-5.
                4. Update the values.yaml file and modify the parameter values in the file as per your
                   requirement.
                5. Run the helm install command, as shown in Example 3-6.
                         Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation   31
8472_ch_Installation_ce.fm                                    Draft Document for Review June 14, 2021 5:30 pm
b. Provide the appropriate values for route Name e.g. sklm-route, as shown in Figure 3-7.
d. Specify the Insecure Traffic as Redirect and click Create, as shown in Figure 3-9.
3.2.2 Activate the license and login to IBM Security Guardium Key Lifecycle
Manager
                1. Launch Web Browser.
                2. Log in to IBM Security Guardium Key Lifecycle Manager by going to the following URL and
                   using SKLMAdmin user and password set during the installation.
                    https://<ip address/hostname>:<port>/ibm/SKLM/login.jsp
                         Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation   33
8472_ch_Installation_ce.fm                                 Draft Document for Review June 14, 2021 5:30 pm
                   Note: Use the port number in above URL which is mapped in Route details, as shown
                   in Figure 3-8 on page 33.
              3. On the Configuration page that appears, select the I accept the terms in the License
                 Agreements, as shown in Figure 3-10.
              4. Click Activate License, upload the IBM Security Guardium Key Lifecycle Manager license
                 activation file from the local file-system, as shown in Figure 3-11.
               Note: You must download the license activation file from IBM Passport Advantage Site as
               described in Step 4a under Chapter 3.2, “Installing IBM Security Guardium Key Lifecycle
               Manager on Red Hat OpenShift” on page 29.
                5. Once you upload the license file it will show the success message, as shown in
                   Figure 3-12.
6. Click Close. This will re-direct the user back to Login page as shown in Figure 3-13.
                7. Login to the IBM Security Guardium Key Lifecycle Manager graphical user interface with
                   SKLMAdmin user and verify that license is activated. Once license is activated, user will see
                   the GKLM welcome page, as shown in Figure 3-14 on page 35.
                         Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation   35
8472_ch_Installation_ce.fm                                   Draft Document for Review June 14, 2021 5:30 pm
              Once you are done with the Db2U installation, run the following command to get port details,
              as shown in Example 3-7.
                     Note: The infrastructure node has public IP and the details of which are provided with
                     the OpenShift cluster creation
3. Open the haproxy.cfg file with vi or similar editor, as shown in Example 3-9.
                4. Update the file with entries for each route defined for IPP and KMIP ports, as shown in
                   Example 3-10 and save the changes.
                     Note: Depending on the OpenShift cluster configuration, the number of Master and
                     Worker nodes varies. You need to replace all Master and Worker nodes private ip for
                     backend entry in the given example.
                backend IPP-route
                        balance source
                        mode tcp
                        server worker0 10.17.91.228:33801 check
                        server worker1 10.17.94.243:33801 check
                        server worker2 10.17.95.61:33801 check
                         Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation   37
8472_ch_Installation_ce.fm                                  Draft Document for Review June 14, 2021 5:30 pm
              frontend IPP-secure-route
                      bind *:31441
                      default_backend IPP-secure-route
                      mode tcp
                      option tcplog
              backend IPP-secure-route
                      balance source
                      mode tcp
                      server worker0 10.17.91.228:31441 check
                      server worker1 10.17.94.243:31441 check
                      server worker2 10.17.95.61:31441 check
              frontend KMIP-route
                      bind *:35696
                      default_backend IKMIP-route
                      mode tcp
                      option tcplog
              backend KMIP-route
                      balance source
                      mode tcp
                      server worker0 10.17.91.228:35696 check
                      server worker1 10.17.94.243:35696 check
                      server worker2 10.17.95.61:35696 check
                3. Verify the upgrade of deployment with helm list command, as shown in Example 3-13, the
                   REVISION show updated value ( 2, in our example).
                 Describe Pod
                    This command helps to get the details of a particular pod, (mentioned the pod-id obtained
                    by above command oc get pod). This command gives the complete details of the pod
                    right from the pod creation as shown in Example 3-15.
                           Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation   39
8472_ch_Installation_ce.fm                                   Draft Document for Review June 14, 2021 5:30 pm
               Pod Logs
                 This command helps viewing the pod logs during deployment of GKLM, so that you can
                 identify the root cause of deployment as shown in Example 3-17.
                3. Open the values.yaml file and modify the parameter values in the file as per your
                   requirement. The file has information about the mandatory parameters to be updated and
                   description of all the parameters.
                4. Navigate to k8s-helm directory and run the command as shown in Example 3-18 with
                   name and chartname as sklm and sklm respectively.
                5. Run the command as shown in Example 3-19 to know the available node port assigned to
                   service.
                6. Launch the IBM Security Guardium Key Lifecycle Manager graphical user interface with
                   following url:
                    https://master_server_IP_address:port/ibm/SKLM/login.jsp
                    Where,
                    master_server_IP_address is the IP address of the master server on the Kubernetes
                    cluster.
                    port is the node port of sklmapp service, 30443 in this case.
                7. To activate the license and verify the login. See “Activate the license and login to IBM
                   Security Guardium Key Lifecycle Manager” on page 33.
                         Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation   41
8472_ch_Installation_ce.fm                                    Draft Document for Review June 14, 2021 5:30 pm
              3. Verify the upgrade with helm list command, the revision column shows the updated value,
                 as can be seen in Example 3-21.
               Describe Pod
                 This command helps to get the details of the pod from the time the pod is being created as
                 shown in Example 3-23.
                 Pod Logs
                    This command helps to get the logs for GKLM pod during deployment. The pod id is
                    obtained from the kubectl get pods command as shown in Example 3-24.
3.4.1 Installing IBM Security Guardium Key Lifecycle Manager on zCX with
PostgreSQL
                To install the IBM Security Guardium Key Lifecycle Manager on zCX environment with
                PostgreSQL, perform the following tasks.
                1. Install the PostgreSQL database with a docker command as shown in Example 3-26.
                2. Create an environment variable list file (gklmenvz.txt) with the parameters, as shown in
                   Example 3-27 for the IBM Security Guardium Key Lifecycle Manager container.
                         Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation   43
8472_ch_Installation_ce.fm                                     Draft Document for Review June 14, 2021 5:30 pm
              3. Install the IBM Security Guardium Key Lifecycle Manager container as shown in
                 Example 3-28.
              4. Launch the IBM Security Guardium Key Lifecycle Manager graphical user interface with
                 following URL.
                 https://IP_address/Hostname:port/ibm/SKLM/login.jsp
                 Where,
                 IP_address/Hostname is the IP address or FQDN of the IBM Security Guardium Key
                 Lifecycle Manager server.
                 port is the port number that IBM Security Guardium Key Lifecycle Manager server listens
                 on for requests.
              5. To activate the license and verify the login, see “Activate the license and login to IBM
                 Security Guardium Key Lifecycle Manager” on page 33.
3.4.2 Installing IBM Security Guardium Key Lifecycle Manager with Db2 for
z/OS
              To install the IBM Security Guardium Key Lifecycle Manager on zCX environment with Db2 for
              z/OS, perform the following tasks.
              1. Install Db2 for z/OS. For more information, see Installing or migrating to Db2.
              2. Create a database, using the parameter values, as shown in Example 3-29.
Note: Make sure the Db2 user has appropriate permission to create tablespace, tables
              3. Obtain the container installation files (eImages) and license activation file for IBM Security
                 Guardium Key Lifecycle Manager and for Db2 for z/OS (db2jcc_license_cisuz.jar).
                4. Create a file (Dockerfile) with the content and save the file in the same directory where
                   you saved the license file for Db2 for z/OS (db2jcc_license_cisuz.jar) on the host
                   system, as shown in Example 3-30.
                5. Log in to the host system and navigate to the directory where you saved the eImage,
                   license, and Docker files, as shown in Example 3-31.
                6. Extract the Docker image of the Guardium Key Lifecycle Manager application from the
                   image file, as shown in Example 3-32 on page 45.
7. Verify the docker image is listed in local repository, as shown in Example 3-33.
                8. Build the Docker image of the Guardium Key Lifecycle Manager application by using the
                   Docker file to include the Db2 license file, as shown in Example 3-34.
                         Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation   45
8472_ch_Installation_ce.fm                                  Draft Document for Review June 14, 2021 5:30 pm
              9. Create an environment variable list file (gklmenvz.txt) with the parameters, as shown in
                 Example 3-35 for the IBM Security Guardium Key Lifecycle Manager container.
              10.Run the IBM Security Guardium Key Lifecycle Manager Docker container, as shown in
                 Example 3-36.
              11.Launch the IBM Security Guardium Key Lifecycle Manager graphical user interface with
                 below URL.
                 https://IP_address/hostname:port/ibm/SKLM/login.jsp
                 Where,
                 IP_address/hostname is the IP address or FQDN of the IBM Security Guardium Key
                 Lifecycle Manager server.
                 Port is the port number that IBM Security Guardium Key Lifecycle Manager server listens
                 on for requests.
              12.To activate the license and verify the login, see “Activate the license and login to IBM
                 Security Guardium Key Lifecycle Manager” on page 33.
2. Kill the GKLM Container without deleting the volume, as shown in Example 3-38.
                3. Start the IBM Security Guardium Key Lifecycle Manager container pointing to same
                   volume with docker command, as shown in Example 3-39.
                4. Once the IBM Security Guardium Key Lifecycle Manager container deployment is
                   successful, login to graphical user interface and verify the version.
                         Chapter 3. IBM Security Guardium Key Lifecycle Manager Container Edition installation   47
8472_ch_Installation_ce.fm                         Draft Document for Review June 14, 2021 5:30 pm
Supported migration paths and migration methods are shown in Figure 4-1.
                  Note: Migration from IBM Tivoli® Key Lifecycle Manager and Encryption Key Manager
                  (EKM) is not covered in this section. For more information, see the following resources:
                   Migrating from Encryption Key Manager
                   Migrating from IBM Tivoli Key Lifecycle Manager
                2. Review the installation summary and click Install to install the product, as shown in
                   Figure 4-3 on page 52.
              3. After a successful installation, select the None option and click Finish to exit the
                 installation wizard, as shown in Figure 4-4.
                4. Log on to the IBM Security Guardium Key Lifecycle Manager portal to confirm the version
                   and that the previous data is migrated, as shown in Figure 4-5.
                5. You can now install fix pack, as shown in Chapter 2.5, “Installing fix pack for IBM Security
                   Guardium Key Lifecycle Manager Traditional Edition” on page 21.
              2. Transfer the corresponding version of the utility directory to the server where IBM Security
                 Key Lifecycle Manager V3.0.0.0 is installed (in this case, it is the sklmv30 directory), as
                 shown in Figure 4-7 on page 54.
              3. Modify the backup.properties file to include the actual WAS_HOME, JAVA_HOME paths and
                 correct credentials for the sklmdb30(Db2 user for source system) and wasadmin accounts.
                 as shown in Example 4-1.
                4. Run the backupV30.sh script to generate the cross-platform migration file. The migration
                   file is in the backup directory within the utility directory, as shown in Example 4-2.
                5. Transfer the migration file to the destination server where IBM Security Key Lifecycle
                   Manager V4.1.0.1 is installed, as shown in Figure 4-8.
                6. In the IBM Security Guardium Key Lifecycle Manager V4.1.0.1 modify the
                   restore.properties file to include the actual WAS_HOME, JAVA_HOME and RESTORE_FILE
                   paths and correct password for the Backup, Db2 user, and wasadmin accounts as shown
                   in Figure 4-9.
                    To be able to restore the user accounts along with their passwords from source GKLM
                    version to GKLM V4.1.0.1 set RESTORE_USER_ROLES=y. If the destination GKLM
                    system is configured with HSM, uncomment the line for parameter pkcs11.cfg and set its
                    value to point to the actual path of HSM configuration file.
              Credentials for same user accounts that exist on both source and target servers
              are not migrated.
              Restore completed, Please refer to restore.log for more details.
              For the changes to take effect, restart the IBM Security Guardium Key Lifecycle
              Manager server.
c:\Program Files\IBM\SKLMV41\migration\utilities\sklmv30>
                   Note: In IBM Security Guardium Key Lifecycle Manager V4.1.0.1, user credentials for
                   the user accounts that exist on both source and target servers are not migrated. In that
                   case if user SKLMAdmin exist on IBM Security Key LifeCycle Manager V3.0.0.0 then its
                   user credentials will not be migrated to IBM Security Guardium Key Lifecycle Manager
                   V4.1.0.1. User SKLMAdmin will be able to login using the same password that was set
                   before the data migration operation was initiated.
              8. Check restore.log for presence of any error or exception during the restore operation.
              9. Restart the WebSphere Application Server from the Windows services console as
                 described in Figure 4-10
              10.Log in to the IBM Security Guardium Key Lifecycle Manager GUI and verify the data has
                 been migrated successfully.
               Important: IBM Security Guardium Key Lifecycle Manager v4.1.0.1 by default uses port
               9443 for GUI and REST API’s.
              After login to IBM Security Guardium Key Lifecycle Manager GUI, you can create Server
              certificate for TLS communication. Server certificate can be of two types:
               Type-1: Self-Signed Certificate. See “Creating a self-signed server certificate” on page 61
                for more details.
               Type-2: Third-party CA Signed Certificate. See “Creating a Third-party CA signed server
                certificate” on page 63 for more details.
                2. Select Create a self-signed certificate option and fill the details as shown in Figure 5-3.
                   The validity period determines how long the certificate is valid. By default, IBM Security
                   Guardium Key Lifecycle Manager creates 2048-bit RSA public-private key pair for Server
                   certificates.
6. Validate the status from Welcome page as well, as shown in Figure 5-6.
              7. Restart the IBM Security Guardium Key Lifecycle Manager by select sklmadmin user in
                 the upper right corner, click Restart Server as shown in Figure 5-7 on page 62.
                     Note: The most recently created server certificate from the IBM Security Guardium Key
                     Lifecycle Manager GUI becomes the active certificate for the server, which might break
                     the communication between the configured devices and the server. Plan carefully when
                     you need a new server certificate.
                 The server certificate with Pending status is shown with a question mark. The certificate
                 signing request file is automatically created in the GKLM data directory as shown in
                 Figure 5-10, which is as follows:
                 Linux: /opt/IBM/WebSphere/AppServer/products/sklm/data
                 Windows: C:\Program Files\IBM\WebSphere\AppServer\products\sklm\data
              5. The CSR file can be download from IBM Security Guardium Key Lifecycle Manager GUI
                 by clicking on the download link, as shown in Figure 5-9 or directly from the data directory
                 using file copy tools like scp, sftp.
              6. Get the certificate signing request file signed from the trusted CA.
              7. Upload the signed certificate in GKLM data directory again, as shown in Figure 5-11.
              8. Go to Welcome page in the IBM Security Guardium Key Lifecycle Manager GUI and
                 check the Action Items.
              9. Click on link for Third-party certificates pending import, as shown in Figure 5-12.
                10.On the Import page, select the Pending certificate, and click Import as shown in
                   Figure 5-13.
              14.After importing the signed certificate, status of the server certificate is changed to Valid, as
                 shown in Figure 5-17.
              15.Restart the IBM Security Guardium Key Lifecycle Manager Server, as shown in Figure 5-7
                 on page 62.
              Complete the following steps to export and download the TLS/KMIP Server certificate.
              1. Login to IBM Security Guardium Key Lifecycle Manager GUI and navigate to Advanced
                 Configuration → Server certificates page.
              2. Select the server certificate which is marked in Use.
              3. Click on download icon as shown in Figure 5-18.
              3. Click Browse to specify the backup repository location. the default location is GKLM data
                 directory. Click Create button, as shown in Figure 5-21.
              4. In the Create Backup window as shown in Figure 5-22 on page 69, enter the password for
                 the backup, provide appropriate description and, click Create Backup button. This
                 password is required to restore this backup.
                7. Backup file is shown in the table. Click on download icon to download this backup. as
                   shown in Figure 5-24. This backup file should be protected and can be used for recovery
                   during disaster situation.
                6. Read instruction carefully which is shown in confirmation window and Click OK, as shown
                   in Figure 5-27. The restore process might take some time to complete depending on the
                   size of the data.
                     Note: All the data previously present in the IBM Security Guardium Key Lifecycle
                     Manager server will be erased when backup is restored. IBM Security Guardium Key
                     Lifecycle Manager Server will be restarted after successful restore and server will
                     remain unavailable for key serving during restart process.
              The data replication enables cloning of IBM Security Guardium Key Lifecycle Manager
              environments to multiple servers in a manner that is independent of operating systems and
              directory structures of the servers.
              The master server is the primary system that is replicated, and the replication process is
              triggered only when new keys or devices are added or modified on the master server. Each
              clone server is identified by an IP address or host name, and a port number. The server uses
              the properties in the ReplicationSKLMConfig.properties file to control the replication
              process.
              IBM Security Guardium Key Lifecycle Manager Replication can be configured in three modes:
              1. Master-Clone Full Replication: In this mode, full data backup of master server will be
                 replicated on the clone server. Default replication schedule is 1 day and minimum
                 schedule can be 1 hour.
              2. Master-Clone Incremental Replication: In this mode, data created on master server will
                 be replicated on the clone server since last backup instead of full data replication. Default
                 replication schedule is 1 minute which is minimum as well. Incremental replication is near
                 real-time synchronization.
                 Incremental Replication can only be configured along with Full Replication.
              3. Master only for scheduled backup: This mode is also called scheduled backup. In this
                 mode, only a master server is configured with no clone. This mode will take full automated
                 backup at the scheduled time only if new keys or certificates are created.
              Here are the actions performed by IBM Security Guardium Key Lifecycle Manager replication
              server during Full Replication:
              1. Check if backup is required at the scheduled time.
              2. If no backup is required (means no keys are created), then replication will be skipped.
              3. If backup is required (means new keys are created), then IBM Security Guardium Key
                 Lifecycle Manager replication master server will trigger replication process.
              4. Replication master server will start a secure TLS 1.2 communication with clone servers.
              5. Replication master server will transmit backup file created above.
              6. Replication clone server will restore the backup.
              7. Replication clone server will send the status to Replication master.
              8. Replication clone server will be restarted at the end of the process.
2. Select the Master role, and click OK, as shown in Figure 5-30.
                3. From the list, select any certificate to be used for the replication, provide Passphrase for
                   protecting backup files, Click Add Clone to add the clone servers, save the replication
                   configuration, and then click Start Replication Server, as shown in Figure 5-31 on
                   page 74.
                   Notes:
                    Any available certificates, regardless of whether they are being used or not, can be
                     used for replication. However, the chosen certificate must exist on the clone servers.
                    The host name of the clone server must be resolvable either by using the
                     /etc/hosts file or DNS.
                    Make sure that the firewall is configured to allow communication between Master
                     and Clones on configured ports.
                    Make sure to use mapped ports of Clone if using IBM Security Guardium Key
                     Lifecycle Manager Container edition.
              4. Click OK to save the master server configuration. Click Ok in the confirmation dialog box.
              5. Click Start Replication Server, as shown in Figure 5-32 on page 75.
                6. A confirmation window will be shown when the Replication server is started, as shown in
                   Figure 5-33.
                7. Navigate to Welcome page and check the status of replication server, as shown in
                   Figure 5-34 on page 76.
This step completes the configuration of master server for full replication.
                4. Select checkbox for Incremental replication frequency (in seconds): option and click
                   OK, as shown in Figure 5-36.
                To configure the clone server for replication, complete the following steps:
                1. Login to the master server and take a backup. For more information, see “Backing up IBM
                   Security Guardium Key Lifecycle Manager” on page 68.
                2. Copy the backup file created in step-1 above to clone server.
              3. Login to the clone server and restore backup file. For more information, see “Restoring
                 IBM Security Guardium Key Lifecycle Manager” on page 70.
              4. The clone server will restart automatically after successful restore.
                   Note: It is very important that same server certificate is available on all masters and
                   clones in a replication cluster. If a certificate which is configured on Replication master
                   configuration page is not available on clones then replication will not work. If a server
                   certificate on the master is replaced due to expiration or any other reason then make
                   sure that the same server certificate is copied to clone servers with private key. This
                   action can be done in one of the following ways:
                    Backup from the master and restore on the clone. This is preferable option.
                    Use Key Export REST API to export public-private key pair on the master server and
                     and use Key Import REST API to import public-private key pair on the clone servers.
                8. A success message is displayed when the Replication clone server is started successfully,
                   as shown in Figure 5-40.
                9. Navigate to the Welcome page to see the Replication clone status, as shown in
                   Figure 5-41.
              You can use the IBM Security Guardium Key Lifecycle Manager Multi-Master configuration for
              data transmission to achieve the following objectives:
               Ensure consistent and continuous data availability of IBM Security Guardium Key Lifecycle
                Manager across the organization.
               Avoid a single point of failure by using the HA solution.
               Place master servers at several physical sites, that is, distributed across the network.
              To set up HADR, you must configure the necessary Db2 parameters in the IBM Security
              Guardium Key Lifecycle Manager master servers with a primary database and a standby
              database. Figure 5-42 shows a simple deployment of IBM Security Guardium Key Lifecycle
              Manager and Db2 HADR for a Multi-Master environment where four instances (master
              servers) of Db2 HADR and N instances of IBM Security Guardium Key Lifecycle Manager are
              configured.
               Note: The Multi-Cluster setup is more suitable in a dynamic environment, which requires
               frequent key or certificate creation or modification. For a relatively static environment, the
               backup/restore and replication approach is recommended.
                Primary
                The server where the database is currently up and applications are able to connect and
                update data. All servers in HADR cluster point to this database. There can be only one
                primary server in the cluster at a time.
                Principal Standby
                The standby server of the HADR cluster that is target for the defined SYNCMODE from the
                primary server. Only one standby may be the principal standby at a time.
                Auxiliary Standby
                Any standby server of the HADR, which is not the principal standby. The only syncmode
                supported for Auxiliary standby is SUPERASYNC. Any server in the HADR cluster beyond
                the first two is an Auxiliary standby. This server is for disaster recovery (DR) purpose, and as
                such is generally placed in a geographically dispersed data center.
               Db2 user names and passwords must be same on all masters servers of IBM Security
                Guardium Key Lifecycle Manager Multi-Master cluster.
                 For more information about requirements for Multi-Master configuration, see IBM
                 Documentation (formerly IBM Knowledge Center).
              You must ensure that your computer host name is configured correctly before you set up
              IBM Security Guardium Key Lifecycle Manager master servers for a Multi-Master
              configuration. You can resolve an IP address to a host name by editing the /etc/hosts file.
              For Db2 HADR configuration, you must update the /etc/hosts file in the primary and standby
              master servers of the cluster to enable host name to IP address mapping, as shown in
              Example 5-1.
              Example 5-1 The /etc/hosts file on the primary master and standby master servers
              Primary Master
              [root@manumits1 ~]$ cat /etc/hosts
              127.0.0.1   localhost localhost.localdomain localhost4 localhost4.localdomain4
              ::1         localhost localhost.localdomain localhost6 localhost6.localdomain6
              10.41.4.87 manumits1.fyre.ibm.com manumits1
              10.41.5.152 abjectly1.fyre.ibm.com abjectly1
              Standy Master
              [root@abjectly1 ~]# cat /etc/hosts
              127.0.0.1   localhost localhost.localdomain localhost4 localhost4.localdomain4
              ::1         localhost localhost.localdomain localhost6 localhost6.localdomain6
              10.41.5.152 abjectly1.fyre.ibm.com abjectly1
              10.41.4.87 manumits1.fyre.ibm.com manumits1
                 For more information about setting up kernel parameters, see IBM Documentation
                 (formerly IBM Knowledge Center).
              2. Log on to the IBM Security Guardium Key Lifecycle Manager portal on the primary master
                 server, and add a server certificate on the primary master server. For more information,
                 see 5.1, “Configuring an TLS/KMIP certificate for IBM Security Guardium Key Lifecycle
                 Manager” on page 60.
                4. Click Add Master to add the standby master server, and specify the details in the Basic
                   Properties tab, as shown in Figure 5-45.
              5. Select Advanced Properties and then select Yes to make the server that is added a
                 standby master. Keep the defaults for HADR port and Standby priority index, as shown
                 in Figure 5-46.
              6. Click Check Prerequisites to verify whether the standby master server meets the
                 requirement, as shown in Figure 5-47.
                7. Click Add to add the standby master server. The process might take some time to
                   complete. A confirmation message is shown when the standby server is successfully
                   added, as shown in Figure 5-48.
8. Verify the HADR status on the master and standby servers, as shown in Example 5-3.
                                               HADR_ROLE     =   PRIMARY
                                             REPLAY_TYPE     =   PHYSICAL
                                           HADR_SYNCMODE     =   SYNC
                                              STANDBY_ID     =   1
                                           LOG_STREAM_ID     =   0
                                              HADR_STATE     =   PEER
                                              HADR_FLAGS     =   TCP_PROTOCOL
                                     PRIMARY_MEMBER_HOST     =   manumits1.fyre.ibm.com
                                        PRIMARY_INSTANCE     =   sklmdb41
                                          PRIMARY_MEMBER     =   0
                                     STANDBY_MEMBER_HOST     =   abjectly1.fyre.ibm.com
                                        STANDBY_INSTANCE     =   sklmdb41
                                          STANDBY_MEMBER     =   0
                                     HADR_CONNECT_STATUS     =   CONNECTED
output omitted......
                                                HADR_ROLE    =   STANDBY
                                              REPLAY_TYPE    =   PHYSICAL
                                            HADR_SYNCMODE    =   SYNC
                                               STANDBY_ID    =   0
                                      LOG_STREAM_ID         =   0
                                         HADR_STATE         =   PEER
                                         HADR_FLAGS         =   TCP_PROTOCOL
                                PRIMARY_MEMBER_HOST         =   manumits1.fyre.ibm.com
                                   PRIMARY_INSTANCE         =   sklmdb41
                                     PRIMARY_MEMBER         =   0
                                STANDBY_MEMBER_HOST         =   abjectly1.fyre.ibm.com
                                   STANDBY_INSTANCE         =   sklmdb41
                                     STANDBY_MEMBER         =   0
                                HADR_CONNECT_STATUS         =   CONNECTED
              output omitted......
              9. The IBM Security Guardium Key Lifecycle Manager portal for both primary and standby
                 server would also reflect the Multi-Master status on the welcome page, as shown in
                 Figure 5-49 and Figure 5-50.
                 Agent service status is disabled by default when you install IBM Security Guardium Key
                  Lifecycle Manager.
                 The notification area on the Welcome page also indicates if the Agent certificate has
                  expired or will expire soon, as shown in Figure 5-52.
                 Click on the Expiring or expired certificates link to see which certificate has expired or
                  will expire soon.
              For more information on how to recover a cluster from a read-only state see, Recovering
              Multi-Master cluster from read-only state.
              If you see a scenario where primary database is down, complete the following steps:
              1. When the primary database is unreachable, the cluster goes in read-only state. The
                 read-only state ensures that key serving is not impacted. You can confirm that the standby
                 database is connected in read-only state from the Welcome → Multi-Master section on
                    the IBM Security Guardium Key Lifecycle Manager graphical user interface, as shown in
                    Figure 5-55.
                2. In this state, the whole cluster will remain in read-only mode and no new crypto objects
                   can be created. Already created crypto objects can continue to be served.
                3. Do not perform any takeover operations, until it is known that you cannot recover the
                   original primary server.
                4. As long as any takeover operations are not performed the cluster remains operating in
                   read-only mode. and your key serving is not affected. You can wait for the database of the
                   primary master server to be reachable again, so that the cluster restores its healthy state.
                1. If the primary server will be unreachable or completely down, cluster will operate in
                   read-only state. Auto Takeover is not applicable starting GKLM V4.1.0.1.
              2. Once the network between the primary server and principal standby is restored or the
                 primary server is brought up. The cluster will become healthy and recover from read-only
                 state.
              3. If the primary server is unavailable or unreachable for a longer duration, and you need to
                 perform write operations on the cluster, you will have to promote the principal standby
                 server as primary. Run the following command to promote the current principle standby
                 server to become new primary using the sklmTakeoverHADR.sh/.bat script, as shown in
                 Example 5-4.
                   Note: The HADR state shows disconnected as the primary master server in the cluster
                   is still unreachable.
              4. Once the connectivity is restored and the original primary server is reachable again, and
                 you have promoted the principal standby server as primary, you need to recover the
                 Multi-Master cluster from possible split-cluster scenario, see, Recover from Split
                 Cluster.
                You might need to restore the following data to the state it was before the LDAP configuration
                steps were run:
                 WebSphere Application Server configuration data for IBM Security Guardium Key
                  Lifecycle Manager
                 IBM Security Guardium Key Lifecycle Manager application data
                  Note: Make sure to change the value for property in backupPassword. This is the
                  password used while creating the IBM Security Guardium Key Lifecycle Manager
                  application backup.
5.5.2 LDAP configuration database and updating the data source for WIM
              To create the database for the LDAP configuration and update the data source for
              WebSphere Identity Manager (WIM), complete the following steps:
              1. Create the database for the LDAP configuration (example: USERDB41) and connect to
                 USERDB41 to verify successful creation, as shown in Example 5-6.
3. Update the database name from SKLMDB41 to USERDB41, as shown in Figure 5-58.
              5. Select the WIM Data Source and click on Test Connection to ensure the connection is
                 working, as shown in Figure 5-59.
6. Copy the Db2 driver and license to the WAS_HOME/lib folder, as shown in Example 5-7.
               Note: Make sure the db2jcc* jars under the WAS_HOME/lib directory have Db2 admin
               (sklmdb41) as the owner of the files.
                Example 5-8
                [root@manumits1 LDAPIntegration]# cat
                /opt/IBM/WebSphere/AppServer/profiles/KLMProfile/properties/soap.client.props |
                grep com.ibm.SOAP.requestTimeout
                com.ibm.SOAP.requestTimeout=0
                /opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/stopServer.log
                ADMU0128I: Starting tool with the KLMProfile profile
                ADMU3100I: Reading configuration for server: server1
                ADMU3201I: Server stop request issued. Waiting for stop status.
                ADMU4000I: Server server1 stop completed.
                /opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/startServer.log
                ADMU0128I: Starting tool with the KLMProfile profile
                ADMU3100I: Reading configuration for server: server1
                ADMU3200I: Server launched. Waiting for initialization status.
                ADMU3000I: Server server1 open for e-business; process id is 52786
              CWWIM5046W Each configured repository must contain at least one base entry. Add a
              base entry before saving the configuration. For LDAP repository, add the LDAP
              server before adding the base entry.
              Created DB Repository - SKLMDBRepos...CWWIM5046W Each configured repository must
              contain at least one base entry. Add a base entry before saving the configuration.
              For LDAP repository, add the LDAP server before adding the base entry.
              Adding DB Repository base entry...
              CWWIM5028I The configuration is saved in a temporary workspace. You must use the
              "$AdminConfig save" command to save it in the master repository.
              Added DB Repository base entry - o=sklmrepdb.ibm...CWWIM5028I The configuration
              is saved in a temporary workspace. You must use the "$AdminConfig save" command to
              save it in the master repository.
              Adding base entry to realm...
              CWWIM5028I The configuration is saved in a temporary workspace. You must use the
              "$AdminConfig save" command to save it in the master repository.
              Added base entry to realm - o=sklmrepdb.ibm...CWWIM5028I The configuration is
              saved in a temporary workspace. You must use the "$AdminConfig save" command to
              save it in the master repository.
              Saving Config...
              4. Verify that the database-based repository was created and listed in the realm, as shown in
                 Figure 5-60.
                5. Run the sklmLDAPConfigure.sh script to configure the IBM Security Guardium Key
                   Lifecycle Manager (GKLM) with the LDAP server, shown in Example 5-11. This script also
                   removes the GKLM application groups from file based repository and adds them to
                   database-based repository. It also updates WebSphere federated repository with LDAP
                   based repository and maps the administrator role to klmGUICLIAccessGroup for
                   integrating IBM Security Guardium Key Lifecycle Manager with LDAP user repositories.
                Example 5-12 WebSphere and IBM Security Guardium Key Lifecycle Manager backups
                WebSphere profile backup:
                [root@manumits1 /]# ls -al
                /opt/IBM/WebSphere/AppServer/products/sklm/data/WASProfile*
                -rw-r--r-- 1 root root 133068355 May 13 16:46
                /opt/IBM/WebSphere/AppServer/products/sklm/data/WASProfile_Backup
              7. Verify that the IBM Security Guardium Key Lifecycle Manager is configured with the LDAP
                 server from the WebSphere Integrated Console, as shown in Figure 5-61 on page 98.
              8. For any LDAP users and groups that need IBM Security Key Lifecycle Manager admin
                 access, the user must be made a member of klmSecurityOfficerGroup too, as shown in
                 Example 5-13.
              9. Log on to the IBM Security Guardium Key Lifecycle Manager portal with the above
                 configured LDAP account to verify the configuration, as shown in Figure 5-62 on page 99.
                Figure 5-62 Logging on to the IBM Security Guardium Key Lifecycle Manager portal with an LDAP
                account
Figure 5-63 IBM Security Guardium Key Lifecycle Manager Containerized Edition portal
              2. On the User Management panel, click on Configuration and then click on Update
                 button, as shown in Figure 5-64.
                4. Once all the details have been updated, you will be logged out of the graphical user
                   interface.
                5. Log in to the portal as SKLMAdmin, go to User Management panel, Users tab. and click
                   on Add, search for the user that needs to added as the administrator. Select that user and
                   click on Select. as shown in Figure 5-66.
              6. Assign the correct roles and groups to the LDAP user by selecting on Assign Roles and
                 Assign Groups tabs.
              7. Click on Assign Roles and assign the klmSecurityOfficer role to the LDAP user, as
                 shown in Figure 5-67 on page 102.
                9. You can verify your configuration by logging in to the IBM Security Guardium Key Lifecycle
                   Manager portal with the LDAP account configured as the administrator, as shown in
                   Figure 5-69.
                Figure 5-69 Logging on to the Container Edition IBM Security Guardium Key Lifecycle Manager portal
                with LDAP account
                10.In the Containerized edition of IBM Security Guardium Key Lifecycle Manager you can still
                   continue to login using the SKLMAdmin account (file based repository) until you have the
                   Enable File-based Authentication, checked under the Configure User Authentication
                   on User Management Panel, as shown in Figure 5-70.
                11.Once you disable the File-based Authentication, only LDAP account will be active to login
                   to the IBM Security Guardium Key Lifecycle Manager.
                  Note: Unlike in traditional edition, you can continue to use your SKLMAdmin account to
                  login to the IBM Security Guardium Key Lifecycle Manager along with the LDAP user
                  account.
              5. Send the request to a signing authority, upload the signed certificate and the root
                 certificate of the signing authority to the <WAS HOME>/profiles/KLMProfile/etc directory,
                 and click on NodeDefaultKeyStore → Personal certificates → Receive from a
                 certificate authority. to import the signed certificate, as shown in Figure 5-76 on
                 page 106.
                6. Specify the file name of the signed certificate to import, click OK, and save the
                   configuration, as shown in Figure 5-77.
                7. Select the NodeDefaultKeyStore > Signer certificates to import the root certificate and
                   intermediate certificates, as shown in Figure 5-78.
              8. Select Add and specify the details of the root certificate, click OK, and save the
                 configuration, as shown in Figure 5-79.
              9. Select NodeDefaultKeyStore > Personal certificates to verify that the certificates are
                 imported correctly, as shown in Figure 5-80 on page 108.
                10.Select the default certificate and click Replace to replace the default with the signed
                   certificate, as shown in Figure 5-81.
                11.Select the certificate from the drop-down menu, click OK, and save the configuration, as
                   shown in Figure 5-82.
              12.Restart the WebSphere Application Server and add the signer to the truststores, as shown
                 in Example 5-14.
              /opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/stopServer.log
              ADMU0128I: Starting tool with the KLMProfile profile
              ADMU3100I: Reading configuration for server: server1
              ADMU3201I: Server stop request issued. Waiting for stop status.
              ADMU4000I: Server server1 stop completed.
              /opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/startServer.log
              ADMU0128I: Starting tool with the KLMProfile profile
              ADMU3100I: Reading configuration for server: server1
              ADMU3200I: Server launched. Waiting for initialization status.
              ADMU3000I: Server server1 open for e-business; process id is 19702
              [root@sklm ~]# /opt/IBM/WebSphere/AppServer/bin/stopServer.sh server1 -username
              wasadmin -password Change@Password123
              ADMU0116I: Tool information is being logged in file
              /opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/stopServer.log
              ADMU0128I: Starting tool with the KLMProfile profile
              ADMU3100I: Reading configuration for server: server1
              Here is the signer information (verify the digest value matches what is displayed
              at the server):
                redisplayed if (y) is entered, which indicates the signer has already been added
                to the truststore.
                ADMU3201I: Server stop request issued. Waiting for stop status.
                ADMU4000I: Server server1 stop completed.
                /opt/IBM/WebSphere/AppServer/profiles/KLMProfile/logs/server1/startServer.log
                ADMU0128I: Starting tool with the KLMProfile profile
                ADMU3100I: Reading configuration for server: server1
                ADMU3200I: Server launched. Waiting for initialization status.
                ADMU3000I: Server server1 open for e-business; process id is 20182
13.Open the browser to verify that the connection is secured, as shown in Figure 5-83.
Related publications
                The publications that are listed in this section are considered suitable for a more detailed
                description of the topics that are covered in this book.
IBM Redbooks
                The following IBM Redbooks publication provides more information about the topics in this
                book:
                IBM DS8000 Encryption for data at rest, Transparent Cloud Tiering, and Endpoint Security
                (DS8000 Release 9.1), REDP-4500
                You can search for, view, download, or order this document and other Redbooks, Redpapers,
                web docs, drafts, and additional materials, at the following website:
                ibm.com/redbooks
Online resources
                These websites are also relevant as further information sources:
                 IBM Security Key Lifecycle Manager:
                    https://www.ibm.com/docs/en/sgklm/4.1?topic=quick-start-guide
                 IBM Security Key Lifecycle Manager Dashboard:
                    https://www.ibm.com/support/pages/node/876126
                 IBM Security Key Lifecycle Manager Support Matrix:
                    https://www.ibm.com/support/pages/node/296957
SG24-8472-01
ISBN DocISBN
Printed in U.S.A.
                                                                                        ®
                                                               ibm.com/redbooks