Autosys EEM Implementation Guide
Autosys EEM Implementation Guide
Manager
Implementation Guide
Release 12.0
This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as
the “Documentation”) is for your informational purposes only and is subject to change or withdrawal by CA at any time.
This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without
the prior written consent of CA. This Documentation is confidential and proprietary information of CA and may not be disclosed
by you or used for any purpose other than as may be permitted in (i) a separate agreement between you and CA governing
your use of the CA software to which the Documentation relates; or (ii) a separate confidentiality agreement between you and
CA.
Notwithstanding the foregoing, if you are a licensed user of the software product(s) addressed in the Documentation, you may
print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your
employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced
copy.
The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable
license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to
certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed.
TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY
KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE,
DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST
INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE
POSSIBILITY OF SUCH LOSS OR DAMAGE.
The use of any software product referenced in the Documentation is governed by the applicable license agreement and such
license agreement is not modified in any way by the terms of this notice.
The manufacturer of this Documentation is CA.
Provided with “Restricted Rights.” Use, duplication or disclosure by the United States Government is subject to the restrictions
set forth in FAR Sections 12.212, 52.227-14, and 52.227-19(c)(1) - (2) and DFARS Section 252.227-7014(b)(3), as applicable, or
their successors.
Copyright © 2011 CA. All rights reserved. All trademarks, trade names, service marks, and logos referenced herein belong to
their respective companies.
Contact CA Technologies
Contact CA Support
For your convenience, CA Technologies provides one site where you can access the
information you need for your Home Office, Small Business, and Enterprise CA
Technologies products. At http://ca.com/support, you can access the following:
■ Online and telephone contact information for technical assistance and customer
services
■ Information about user communities and forums
■ Product and documentation downloads
■ CA Support policies and guidelines
■ Other helpful resources appropriate for your product
Updates have been made to the following areas since the last release of this
documentation: Implementing CA EEM Server, Post-Installation Consideration Tasks,
Upgrading CA EEM Server, and Uninstalling CA EEM Server
Contents 5
FIPS 140-2 Overview ........................................................................................................................................... 41
Supported Security Modes in CA EEM ................................................................................................................ 42
Configuring CA EEM Server in FIPS-only Mode ................................................................................................... 42
Configure Your Application in FIPS-only Mode ................................................................................................... 46
Disaster Recovery Configuration ................................................................................................................................ 48
Overview ............................................................................................................................................................. 48
File System Back Up ............................................................................................................................................ 49
Back up and Restore CA EEM Data...................................................................................................................... 50
Failover Configuration ................................................................................................................................................ 56
Prerequisites ....................................................................................................................................................... 56
How to Set Up a Failover Environment ............................................................................................................... 56
How to Delete a Secondary Server ..................................................................................................................... 59
Chapter 7: Appendix 71
Ports Used by CA EEM ................................................................................................................................................ 71
CA EEM Services ......................................................................................................................................................... 71
6 Implementation Guide
Chapter 1: Understanding CA EEM
This section contains the following topics:
Overview (see page 7)
Functions (see page 7)
Features (see page 8)
Overview
CA Embedded Entitlements Manager (CA EEM) allows applications to share common
access policy management, authentication, and authorization services.
Functions
CA EEM provides a set of security services. The following security services are available:
■ Configuration services:
– Registering and unregistering application instances
– Administrative scoping of application administrators
– Delegating administrative rights
– Managing users and groups
■ Administration security services:
– Managing access, event, and obligation policies
– Managing calendars
■ Run-time security services:
– Authenticating users
– Authorizing access
– Logging security events
Features
CA EEM consists of the following features:
General
■ Policy isolation lets each registered application instance to use its own space for
storing its application-specific data
■ Run-time SDK available for Java, C++, and C#
■ Administrative SDK available for Java, C++, and C#
■ Command line interface support for administrative functions
(insert/modify/remove objects):
– XML export and import
– Run-time checks
– Migration tools
■ Web interface support for standalone and launch-in-context access
■ Secure HTTP communications
■ Integration with SiteMinder to retrieve user and group information from SiteMinder
data store
Identity Management
■ Shared global users and attributes for all applications
■ Support for different modes for global users
– Internal global users, complete with password policy management
– External global users from LDAP directory servers
■ Support for portable session export and import for single sign-on
Access Management
■ Access management covers both Access Control Lists (ACLs) and business policies
■ Policy language allows the use of user, session, environment, and resource
attributes in making policy decisions
■ Built-in administrative scoping of all objects
■ Built-in support for delegated administration
■ Built-in support for custom obligation checks requiring application-specific actions
– Local in-process evaluation of permission checks
– SDK and Web interface for defining access policies, ACLs, administrative
scoping policies, and delegated authority
8 Implementation Guide
Chapter 2: Implementing CA EEM Server
This section contains the following topics:
Installation Prerequisites (see page 9)
Operating System Support (see page 11)
System Requirements (see page 11)
Install Considerations (see page 12)
Windows Installation (see page 13)
UNIX Installation (see page 16)
CA EEM Server Installation Structure (see page 20)
Verify Installation (see page 20)
Installation Prerequisites
■ Verify that the computer that hosts the CA EEM Server meets the minimum
operating system and system requirements.
■ Gather the required information about the installation options for the CA EEM
Server.
■ Verify that the following do not contain non-english letters in the names:
– Host name of the computer where you want to install CA EEM server
– Installation folders used by CA EEM
– Temporary folder path
CA supports these operating systems for the duration of their life cycle (as determined
by the operating system's manufacturer or until CA announces that we are dropping
support). Visit our website http://ca.com/support for the latest information about
supported operating systems.
System Requirements
The following section describes the CA EEM Server system requirements.
Windows
The minimum system requirements are as follows:
■ An Intel Pentium processor
■ 4GB RAM
■ 10 GB of hard disk free space
■ At least 300 MB disk space required under the temporary directory %temp%
(C:\Documents and Settings\Administrator\Local Settings\Temp\) where the CA
EEM installation files are extracted during installation
■ Windows Installer v3 or later
■ Winsock-compatible TCP/IP installed and configured
Windows administrator access to the system
■ Internet Browser to run the Web components (Microsoft Internet Explorer 7.0 or
higher, or Mozilla Firefox 3.0 or higher)
Install Considerations
Review the following installation considerations before you install the CA EEM Server.
CA EEM does not support FIPS-only mode with SAML and SELinux operating systems.
12 Implementation Guide
Windows Installation
Windows Installation
You can install CA EEM using one of the following methods:
■ Manual Installation using the CA EEM install wizard
■ Silent Installation using the CA EEM response file
Installation Worksheet
Before you install CA EEM, gather the information in the following table. After you
complete the worksheet, you can use it as you work through the installation prompts.
More information:
More information:
14 Implementation Guide
Windows Installation
More information:
CA EEM creates a Response File with default values. You can use the Response File with
the default values or edit the Response File to silently install the CA EEM server.
Note: You can also use the command line parameters with the silent installation.
UNIX Installation
You can install CA EEM using one of the following methods:
■ Manual Installation using the CA EEM installer
■ Silent Installation using the CA EEM response file
Installation Worksheet
Before you install CA EEM, gather the information in the following table. After you
complete the worksheet, you can use it as you work through the installation prompts.
16 Implementation Guide
UNIX Installation
Note: During silent installation, you can prefix a parameter with -D and pass on the
parameters through a command prompt. For example, -DEIAMADMIN_PASSWORD.
More information:
More information:
More information:
18 Implementation Guide
UNIX Installation
CA EEM creates a response file with default values. You can use the response file with
the default values or edit the response file to silently install the CA EEM server.
Note: You can also use the command line parameters with the silent installation.
Verify Installation
To determine if the installation is successful, log on to the CA EEM admin GUI. Successful
login to CA EEM indicates that the installation is successful.
20 Implementation Guide
Chapter 4: Post-Installation Configuration
Tasks
This section contains the following topics:
User Access Permissions (see page 21)
CA EEM Server User Stores Configuration (see page 23)
Certificate Validation (see page 35)
FIPS 140-2 Support Configuration (see page 40)
Disaster Recovery Configuration (see page 48)
Failover Configuration (see page 56)
Note: By default, EiamAdmin has all the permissions to manage the CA EEM server.
22 Implementation Guide
CA EEM Server User Stores Configuration
You can use the settings on this page to configure the global users and groups settings.
Store in internal datastore
Specifies that the global users and global groups data is stored in an internal
datastore in CA Embedded Entitlements Manager. Using this configuration, you can
perform the following tasks:
■ Manage the global users and global groups
■ Authenticate users
■ Assign access permissions to CA Embedded Entitlements Manager application
policies
■ Manage user passwords
■ Manage password policies
Reference from an External Directory
Specifies that the global users and global groups data is referenced from an external
LDAP directory. Using this configuration, you can retrieve global users and global
groups from an external LDAP directory to perform the following tasks:
■ Authenticate users
■ Assign access permissions to CA Embedded Entitlements Manager application
policies
You cannot manage the global users and global groups, manage passwords, or
password policies.
Reference from CA SiteMinder Policy Server
Specifies that the global users and global groups data is referenced from a CA
SiteMinder Policy Server. Using this configuration, you can retrieve global users and
global groups from a CA SiteMinder Policy Server to perform the following tasks:
■ Authenticate users
■ Assign access permissions to CA Embedded Entitlements Manager application
policies
You cannot manage the global users and global groups, manage passwords, or
password policies.
More information:
You can perform the following tasks on the Directory Information pane:
■ Add an external LDAP directory
■ Update an external LDAP directory
■ Delete an external LDAP directory
24 Implementation Guide
CA EEM Server User Stores Configuration
Specifies that CA EEM resolves the global users and global groups across the configured
Active Directory domains or forest. CA EEM supports the following Active Directory
configurations:
Active Directory Domain
Specifies that CA EEM resolves domain-qualified global users and global groups
across the individually configured domains.
Active Directory Forest
Specified that CA EEM resolves domain-qualified global users and global groups
across all the domains within the configured forest.
In a multiple Active Directory domain, verify that you do the following tasks:
■ When authenticating and authorizing a user, use a user principal name in the
following format:
domain\username
■ When defining access policies, use the principal name of a global user or global
group to assign permissions, and use PrincipalName attribute to define filters.
You can configure an Active Directory Domain by performing the following steps:
1. Select Multiple Microsoft Active Directory from Configuration Type.
2. Click Add external LDAP directory.
3. Enter the external LDAP directory details in the LDAP Directory Configuration page.
You can configure an Active Directory Domain by performing the following steps:
1. Select Microsoft Active Directory Forest from Configuration Type.
2. Click Add external LDAP directory.
3. Enter the external LDAP directory details in the LDAP Directory Configuration page.
You can configure CA EEM to refer from a new external LDAP directory.
26 Implementation Guide
CA EEM Server User Stores Configuration
Specifies a hostname of the external LDAP directory, and an LDAP port for
CA EEM to communicate with the external LDAP directory host. When you
enter a hostname and port, click the arrow to add the entered details into
Selected Hostnames. You can specify multiple host configurations, which
can act as failover servers. When you specify multiple host configurations,
you can use the up and down arrows in Selected Hostnames to arrange the
order of failover servers.
Protocol
Specifies an LDAP protocol used to connect to the external LDAP directory.
Select one of the following protocols:
LDAP
Specifies an LDAP connection over unsecured connection.
LDAP + TLS
Specifies an LDAP connection over Transport Layer Security. Type the
relative location of the certificate file from the CA EEM Installation
Directory.
LDAPS
Specifies an LDAP connection over Secure Sockets Layer. Type the relative
location of the certificate file from the CA EEM Installation Directory
Base DN
Specifies the Distinguished Name of the external LDAP directory from
where the search for global users and global groups begins. Only global
users and global groups discovered underneath this DN are mapped into
CA EEM. Enter a value without spaces.
User DN
Specifies the Distinguished Name of a user to connect to the external LDAP
directory. Do not enter a comma in the cn of the User DN. For example, if
your User DN is cn=firstname,middlename,dc=foo,dc=com, prefix the
comma with a backslash to make the User DN as
cn=firstname\,middlename,dc=foo,dc=com.
Password and Confirm Password
Specifies the password associated with the user in User DN.
Advanced Configuration
The following appear under the advanced configuration section:
Follow LDAP Referrals
Specifies that CA EEM must follow LDAP referrals. If you enable this option
and search for an object that does not exist in the LDAP directory, the
LDAP server provides a reference to a location that might hold the object.
Max Bind Connections
28 Implementation Guide
CA EEM Server User Stores Configuration
You can use custom mapped directory configuration to map external LDAP directory
attributes to CA EEM attributes. This configuration lets you work with CA EEM attributes
without having knowledge about the underlying LDAP attribute definitions.
You can use the settings on this page to configure a custom mapped directory.
Mapping Label
Specifies a name for the mapping label to connect to an external LDAP directory.
Delete
Deletes the selected label.
30 Implementation Guide
CA EEM Server User Stores Configuration
To enable the protocol between the agent and server, the agent must have a unique
name and a shared secret key along with information to define a connection between
the client application and the policy server.
For information on parameters to define between the client application and the policy
server, see Online Help.
32 Implementation Guide
CA EEM Server User Stores Configuration
If you use an application that has an existing SiteMinder session to access an CA EEM
enabled application, CA EEM recognizes the SiteMinder session ticket and creates an CA
EEM session without re-authentication.
The following is the basic flow of events for application created using CA EEM with
SiteMinder integration:
A web application using CA EEM with web server pages protected by SiteMinder is
considered.
1. A user accesses a web application.
2. SiteMinder prompts for user authentication and the user submits credentials and is
authenticated.
3. The user tries to access the original web application created using CA EEM.
4. Servlet code accesses the HTTPServletRequest context and sends the SiteMinder
session token to the CA EEM using authenticateWithArtifact.
5. CA EEM Server validates the SiteMinder session against the SiteMinder Policy
Server.
6. An CA EEM session is created and the user identity is loaded, if validation succeeds.
The following process describes how authentication is performed using SiteMinder APIs:
■ A user calls the authenticateWithPassword method by providing the username and
password.
■ CA EEM sends this information to the CA EEM Server.
■ Based on the information, the authentication is performed by calling the SiteMinder
APIs.
■ The group and user information is loaded for the authenticated user.
Note: When CA EEM is connected to a SiteMinder user directory, the search calls use
the SiteMinder APIs instead of the CA EEM search calls.
You can reference to a global user or global group from a CA SiteMinder Policy Server.
34 Implementation Guide
Certificate Validation
Certificate Validation
After the embedding application has verified that the caller has the private key
corresponding to the public key of the certificate, you can use CA EEM to perform the
following steps:
1. Validate a certificate against trusted Certification Authorities (CAs)
2. Validate the revocation status of the certificate using the following revocation
mechanisms:
■ Certificate Revocation List (CRL)
■ CRL Distribution Point (CRLDP)
■ Online Certificate Status Protocol (OCSP)
Prerequisites
Before you validate a certificate, perform the following steps:
■ Create a jks file that contains a list of trusted CA.
■ If you want to use a subordinate CA, add the entire CA hierarchy to the keystore.
■ Verify that all the CA certificates including the intermediate CAs are trusted.
■ Store the jks file in the relative path from the CA EEM installation directory.
■ Configure server.xml with the location and password of the jks file.
More information:
36 Implementation Guide
Certificate Validation
Map CA EEM with a keystore for CA EEM to search for the certificates in the keystore.
You can select one or more revocation mechanisms. If you enable all three mechanisms,
CA EEM validates the certificates in the following order of priority:
■ Online Certificate Status Protocol (OCSP)
■ CRL Distribution Point (CRLDP)
■ Certificate Revocation List (CRL)
CA EEM proceeds to validate a certificate with the next mechanism only if the validation
with the previous mechanism fails.
38 Implementation Guide
Certificate Validation
CA EEM extracts a user mapping attribute after validating a certificate. You can use the
extracted user mapping attribute to map the certificate with a user from the configured
external LDAP directory.
If you want to extract the user DN cn=user, ou=org, o=com from a certificate, perform
the following steps:
1. Select subject from User mapping.
2. Type the following regular expression:
(.*)
3. Click Save.
If you want to extract cn of the User DN cn=user, ou=org, o=com from a certificate,
perform the following steps:
1. Select subject from User mapping.
2. Type the following regular expression:
cn=(.*), ou.*
3. Click Save.
If you have configured a custom mapping for an external LDAP directory, you can use
the extracted user mapping attribute to map the certificate with a user from the
external LDAP directory.
8. Click Save.
The certificate is mapped with a user.
40 Implementation Guide
FIPS 140-2 Support Configuration
CA EEM Java SDK uses a FIPS-compliant version of the BSAFE Crypto-J 4.0 cryptographic
library from RSA. CA EEM C++ SDK embeds ETPKI 4.1.x, which uses RSA cryptography
libraries.
Computer products that use FIPS 140-2 accredited cryptographic modules in their
FIPS-accredited mode can only use FIPS approved security functions such as AES
(Advanced Encryption Algorithm), SHA-1 (Secure Hash Algorithm), and higher level
protocols such as TLS v1.0 as explicitly allowed in the FIPS 140-2 standard and
implementation guides.
Review the following prerequisites before configuring the CA EEM Server in FIPS-only
mode:
Verify the minimum operating system and hardware requirements needed for the
FIPS-only mode.
42 Implementation Guide
FIPS 140-2 Support Configuration
Verify that the other CA products using iGateway such as CA ITM, CA ELM, and so
on, are in FIPS-only mode. iGateway cannot be initialized both in FIPS-only mode
and non-FIPS mode. When iGateway is initialized in FIPS-only mode, all products
using iGateway must be in FIPS-only mode. Open the iGateway.conf file and verify
the value for the following tag:
FIPSMode
If the value of this tag is set to False, it means that product using iGateway is in
non-FIPS mode. Based on the existing configuration of iGateway decide
appropriately if you want to enable CA EEM in FIPS-only mode.
Upgrade your CA EEM Sever.
Verify if the communication channel between the CA EEM Server and the external
LDAP directory is encrypted.
Verify that your environment meets the minimum requirements before migrating the
environment to use FIPS-only mode. Print the following to use as a checklist:
Upgrade your CA EEM Sever to CA EEM r8.4 SP3 or later versions.
Verify that the products that are integrated or connected with CA EEM are
configured to use FIPS-only mode.
When you configure the CA EEM Server in FIPS-only mode, CA EEM uses only FIPS 140-2
compliant cryptographic libraries to encrypt and decrypt sensitive data.
Note: The following procedure is also valid for changing the security mode of the CA
EEM Server from FIPS-only to non-FIPS or non-FIPS to FIPS -only.
Note: To change the mode from FIPS-only to non-FIPS, set FIPSMode tag to OFF.
3. Start the iGateway service.
The CA EEM server is configured in a FIPS-only mode.
In FIPS-only mode, use IE7 (or above) or Firefox 3.0 (or above) to view the CA EEM
admin GUI.
Note: For more information about how to configure Firefox in FIPS 140-2 mode, see the
Firefox support site.
To use nCipher PKCS#11 devices with the CA EEM Server or the CA EEM SDK, configure
the nCipher device and set the following property is set as follows:
CKNFAST_OVERRIDE_SECURITY_ASSURANCES=all
Note: For more information about how to configure the nCipher device with a hard
token, see the nCipher documentation.
To configure the CA EEM Server to use certificates stored in a PKCS#11 devices, do the
following:
1. Stop the iGateway service.
2. Open the iGateway.conf file and edit the <Connector name="defaultport"> CA
Portal5250</port> tags to set the following values:
certType
Defines the type of certificate to be used. Supported certificate types are p12,
pem, and p11.
Default: pem
Type: Childnode
44 Implementation Guide
FIPS 140-2 Support Configuration
CA EEM supports P12, PEM, and PKCS#11 certificates with the following considerations:
■ P12 support is disabled (not available) under FIPS-only mode. As an alternative, in
FIPS-only mode, PEM and PKCS#11 certificate support has been added.
Note: CA EEM C# SDK supports only PEM certificates in FIPS-only mode, P12 and PEM
certificates in non-FIPS mode.
So, if you are using any P12 certificates, migrate these certificates to one of the
supported certificate formats in the FIPS-only mode. Use the igwCertUtil utility to
convert P12 certificates to pem certificates. The igwCertUtil is a utility to convert,
create, or delete certificates. The igwCertUtil is located in the following folder:
Windows
%IGW_LOC%
UNIX and LINUX
$IGW_LOC
46 Implementation Guide
FIPS 140-2 Support Configuration
-version version
Specifies the version of igwCertUtil used when creating, converting, copying, or
deleting certificates. Version is used for backward compatibility. If igwCertUtil is
modified, the version tag gets the old behavior.
-cert inputcert-parms
Specifies the certificate as an XML string when creating, converting, or copying
certificates.
-issuer issuercert-parms
Specifies the certificate that is used to sign the newly generated certificate when
creating a certificate. If no certificate is specified, a self-signed certificate is created.
-target newcert-parms
Specifies the configuration for the new certificate when converting (or copying) an
existing certificate.
-cert cert-parms
-debug
(Optional) Turns on debugging for igwCertUtil.
-silent
(Optional) Turns on silent mode for igwCertUtil.
The CA EEM SDK can be initialized in the FIPS-only mode by configuring the eiam.config
file. To configure the eiam.config file, see the chapter, Configuring CA EEM SDK.
Overview
Backing up the following CA EEM data ensures that you can restore CA EEM Server
installations if they are corrupted:
■ Configuration files and folders
■ CA EEM data stored in the internal datastore
48 Implementation Guide
Disaster Recovery Configuration
Restore Procedures
Note: If you have connected the CA EEM Server to an external LDAP directory, the
global users are not stored in the internal data store.
The CA EEM Server data is stored in a directory namespace with the following DSA
name:
itechpoz
Where, DSA is a process that manages the internal data store's namespace. The
itechpoz DSA manages the CA EEM Server data.
The backup process involves dumping the data from this DSA to an LDIF file. And, the
restore process involves loading the backed up LDIF file into the DSA.
50 Implementation Guide
Disaster Recovery Configuration
You can take a consistent snapshot copy of the datastore of a running DSA (an online
dump). The DSA completes any updates before carrying out the online dump and does
not start any more updates until the copy is finished.
Note: Each dump overwrites the previous dump. If you want to save the online dump,
copy it to another location before the next dump.
You can create a backup of an online dump using the following process:
1. Generate an online dump from the dsa console port on demand (see page 51).
Or
Schedule an online dump.
2. Convert the online dump to an LDIF file (see page 54).
To generate the online dump from the DSA console, you must do the following:
1. Set a local DSA console port.
2. Connect to a local DSA and dump the data store.
Set Local DSA Console Port
2. Open the itechpoz.dxc configuration file and add the local console port entry
immediately after the snmp-port entry:
console-port = 10510
local-port-number
Specifies the console port number of the DSA to which you want to connect.
3. Enter the following command:
dump dxgrid-db;
52 Implementation Guide
Disaster Recovery Configuration
You can schedule the CA EEM Server to generate an online dump at a specifc time or to
create the online dump at regular intervals.
Note: Each dump overwrites the previous backup file. Create a cron job on UNIX or a
scheduled task on Windows to copy the backed up file to a safe location before the next
dump.
2. Open the itechpoz.dxc configuration file and add the following lines:
dump dxgrid-db period <start> <period>
where
period start period
(Optional) Specifies that the online dump is performed at regular intervals.
start
Defines the number of seconds from Sunday 00:00:00 a.m. GMT.
Note: The start time is defined using GMT and not your local time.
period
Defines the number of seconds between online dumps.
Note: The start time is relative to the period and should be lower than it. If you
specify a start time that is greater than the period, the actual start is start - period.
For example, if the period is 3600 seconds (one hour) and start is 3610 seconds, the
online dump starts 10 seconds from midnight GMT and continues every hour from
then on.
3. Save the itechpoz.dxc file.
4. Start the local DSA services using the following commands:
Windows
dxserver start dsaname
The following command takes a snapshot copy of the datastore every hour:
The following command takes a snapshot copy of the datastore every night at 3 a.m. in
a GMT+10:00 time zone:
In this example, the start time is the number of seconds from Sunday midnight GMT to
the first 3 a.m. slot, corrected by the time zone value, as follows:
To create a backup of the data store from an online dump, you must convert the .ZDB
files to an LDIF file.
-f filename
Specifies the file path and name of the LDIF file.
-z
Specifies that DXdumpdb dumps from the online dump.
dsaname
Specifies the name of the DSA.
The LDIF file is created at the specified path.
54 Implementation Guide
Disaster Recovery Configuration
An offline backup requires that you stop and start the DSA services every time you take
a backup.
-f filename
Specifies the file path and name of the LDIF file.
4. Start the local DSA services using the following commands:
Windows
dxserver start dsaname
The LDIF file is created at the specified path and the offline backup is successful.
Failover Configuration
CA EEM provides a command line tool for automating the failover configuration process.
Prerequisites
Before you execute the failover tool, perform the following steps:
■ Synchronize the system time of all servers in the failover setup.
■ Verify that all CA EEM Servers are configured in the same security mode, non-FIPS
or FIPS-only.
■ Verify that DNS lookup resolves hostnames of all the servers in the failover setup.
■ Set the following environment variable:
EIAM_HOME=<installation_path_of_CA EEM>
set PATH=%EIAM_HOME%/jre/bin;%PATH%
UNIX
export JAVA_HOME=$EIAM_HOME/jre
export PATH=$EIAM_HOME/jre/bin:$PATH
56 Implementation Guide
Failover Configuration
More information:
Note: You must reset a primary server only once in a failover setup.
The primary server is reset and is configured.
You can use the failover tool to add a secondary server to the primary server.
58 Implementation Guide
Failover Configuration
You must synchronize the configuration of the primary server with the secondary
servers in a failover setup. After synchronization, the configuration of each secondary
server in the failover setup is overwritten with the configuration of the primary server.
The primary server and the available secondary servers are displayed. A message
"select hostname" appears.
4. Type the number corresponding to the current hostname, and press Enter.
The failover tool starts synchronization. A confirmation message "Are you sure you
want to continue? [Y/N]" appears.
5. Type Y and press Enter.
The failover tool starts validating the synchronization process. After validation, the
secondary server is synchronized with the primary server.
6. Repeat the steps 1–5 on each secondary server in the failover setup to synchronize
all secondary servers with the primary server.
More information:
Delete a Secondary Server from the Primary Server (see page 60)
Synchronize Secondary Servers with the Primary Server (see page 59)
You can use the failover tool to delete a secondary server from the primary server.
60 Implementation Guide
Failover Configuration
You must synchronize the configuration of the primary server with the secondary
servers in a failover setup. After synchronization, the configuration of each secondary
server in the failover setup is overwritten with the configuration of the primary server.
The primary server and the available secondary servers are displayed. A message
"select hostname" appears.
4. Type the number corresponding to the current hostname, and press Enter.
The failover tool starts synchronization. A confirmation message "Are you sure you
want to continue? [Y/N]" appears.
5. Type Y and press Enter.
The failover tool starts validating the synchronization process. After validation, the
secondary server is synchronized with the primary server.
6. Repeat the steps 1–5 on each secondary server in the failover setup to synchronize
all secondary servers with the primary server.
Upgrade Considerations
You can upgrade from CA EEM r8.3 Server or higher to CA EEM r12.0 Server. Before you
upgrade:
■ Back up CA EEM server data, configuration files, CA Directory and iTechnology
folders.
■ In a failover setup, verify that you have performed the following tasks in the CA
Directory knowledge file:
– Set all the failover servers to use the same DSA password (dsa-password). If the
CA Directory knowledge file does not contain a dsa-password, you must add a
password.
– Set auth-levels to anonymous, clear-password.
# eiam repository
dsa-password =
"{SHA512}0bZCU81wqw/kbpXuCHQF6Q38S9ZG+K+CZcOerUYEwbHTIz2tcL4CU3KNWugdy9jStW5GFBNV
NI7n5N6nxB4Ztg=="
dsp-idle-time = 120
dsa-flags = multi-write
link-flags = ssl-encryption-remote
};
Note: For more information about how to back up your CA EEM data and configuration
files, see Back Up and Restore CA EEM Data.
64 Implementation Guide
Upgrade CA EEM Server
■ CA Directory
66 Implementation Guide
Upgrade CA EEM Server
Perform the following steps on the unsupported operating system where you installed
an older version of CA EEM server.
UNIX
su - dsa -c "dxserver stop all"
UNIX
/opt/CA/SharedComponents/iTechnology/S99igateway stop
UNIX
su - dsa -c "dxdumpdb -x createTimestamp,modifyTimestamp -f
iTechPoz-export.ldif iTechPoz-current_hostname"
CA EEM r8.3
Windows
For CA EEM MDB version
dxdumpdb -p "cn=iTechPoz" -f iTechPoz-export.ldif mdb
UNIX
Perform the following steps on the computer where you installed CA EEM r12.0 on a
supported operating system.
68 Implementation Guide
Chapter 6: Uninstalling CA EEM Server
You can install CA EEM using one of the following methods:
■ Manually
■ Silently
Before you uninstall a CA EEM server, verify that no applications are registered with the
CA EEM server. You must unregister all applications before you proceed to uninstall the
CA EEM server. For information about unregistering an application, see the Online Help.
Note: If you want to forcefully uninstall a CA EEM server when an application is still
registered with the CA EEM server, you can execute the command eiamunstall
-DFORCE_UNINSTALL=true at the command prompt. This forceful uninstallation deletes
the data of all the application that are registered with the CA EEM server.
70 Implementation Guide
Chapter 7: Appendix
This section contains the following topics:
Ports Used by CA EEM (see page 71)
CA EEM Services (see page 71)
CA EEM Services
The following services are installed with the CA EEM Server:
Windows
■ CA Directory - itechpoz—Embedded CA Directory DSA (directory service agent) for
the CA EEM LDAP repository.
■ CA iTechnology iGateway 4.7— iTechnology iGateway service that handles the
requests coming from CA EEM clients, processes the requests, and sends responses
to the clients.
UNIX
■ For CA Directory:
– dxserver start itechpoz
■ For iGateway:
– ./igateway –b
– /bin/sh ./WDigateway.sh
Chapter 7: Appendix 71