IBM E02HRLL-G Administration Guide - Page 56

WebSphere Partner Gateway Hub Configuration Guide, For complete certpath building and validation

Page 56 highlights

Digital signatures are calculations based on an electronic document using public-key cryptography. Through this process, the digital signature is tied to the document being signed and to the signer, and cannot be reproduced. With the passage of the federal digital signature bill, digitally signed electronic transactions have the same legal weight as transactions signed in ink. WebSphere Partner Gateway uses digital certificates to verify the authenticity of business document transactions between the internal partners and external partners. They are also used for encryption and decryption. You can specify a primary and a secondary certificate to ensure that the document exchange is not interrupted. The primary is used for all transactions. The secondary is used if the primary is expired. Digital certificates are uploaded and identified during the configuration process. If a certificate is expired or revoked, it is disabled and is reflected as such in the console. However, this is not applicable to the certificates uploaded as Root/Intermediate certificates. If the primary certificate is expired, it is disabled and the secondary certificate will be set as the primary. An event is generated when a certificate is found to be expired. The Certificate Usage option is available based on the certificate type selected. In the Hub Operator profile, Certificate Usage can be set for Digital Signature, Encryption, or SSL Client certificate. In the partner profile, Certificate Usage can be set for Encryption certificate. If the same certificate is to be used for different purposes, for example, for Digital Signature and Encryption in Hub Operator profile, it has to be loaded twice, once for the Digital Signature, and again for the Encryption certificate. However, if the certificate is used for Digital Signature and for SSL Client, then the corresponding check boxes can be set in the same certificate entry. Secondary certificates can also be loaded twice, once for Digital Signature and again for SSL Client. If so, the same pattern has to be followed for the secondary certificates. For example, if the primary certificates were loaded as different certificates for Digital Signature and for SSL Client, then secondary certificates has to be loaded as different certificate entries (even though the certificate may be the same). For complete certpath building and validation, you are required to upload all of the certificates in the certificate chain. For example, if the certificate chain contains certificates A -> B -> C -> D, where A -> B means A is the issuer of B, then certificates A, B, and C should be uploaded as root certificates. If one of the certificates is not available, the certpath is not built and the transaction is unsuccessful. The CA certificates can be obtained from the Certificate Repositories maintained by the Certificate Authorities. Root and intermediate certificates can only be uploaded in the Hub Operator profile. Note: Before you can use the procedures in the following sections, the certificates must be loaded into the system. For more information about loading the certificates, see the WebSphere Partner Gateway Hub Configuration Guide. The Certificate Management view allows you to modify certificate sets that are used for a specific participant connection. An option to filter is provided. Modify the certificate sets that are used in the connection. Alternatively, this can be done from the participant connection itself. Steps to manage Certificates sets: 50 IBM WebSphere Partner Gateway Enterprise and Advanced Editions: Administration Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268

Digital signatures are calculations based on an electronic document using
public-key cryptography. Through this process, the digital signature is tied to the
document being signed and to the signer, and cannot be reproduced. With the
passage of the federal digital signature bill, digitally signed electronic transactions
have the same legal weight as transactions signed in ink.
WebSphere Partner Gateway uses digital certificates to verify the authenticity of
business document transactions between the internal partners and external
partners. They are also used for encryption and decryption.
You can specify a primary and a secondary certificate to ensure that the document
exchange is not interrupted. The primary is used for all transactions. The
secondary is used if the primary is expired.
Digital certificates are uploaded and identified during the configuration process.
If a certificate is expired or revoked, it is disabled and is reflected as such in the
console. However, this is not applicable to the certificates uploaded as
Root/Intermediate certificates. If the primary certificate is expired, it is disabled
and the secondary certificate will be set as the primary. An event is generated
when a certificate is found to be expired.
The Certificate Usage option is available based on the certificate type selected. In
the Hub Operator profile, Certificate Usage can be set for Digital Signature,
Encryption, or SSL Client certificate. In the partner profile, Certificate Usage can be
set for Encryption certificate. If the same certificate is to be used for different
purposes, for example, for Digital Signature and Encryption in Hub Operator
profile, it has to be loaded twice, once for the Digital Signature, and again for the
Encryption certificate. However, if the certificate is used for Digital Signature and
for SSL Client, then the corresponding check boxes can be set in the same
certificate entry.
Secondary certificates can also be loaded twice, once for Digital Signature and
again for SSL Client. If so, the same pattern has to be followed for the secondary
certificates. For example, if the primary certificates were loaded as different
certificates for Digital Signature and for SSL Client, then secondary certificates has
to be loaded as different certificate entries (even though the certificate may be the
same).
For complete certpath building and validation, you are required to upload all of
the certificates in the certificate chain. For example, if the certificate chain contains
certificates A -> B -> C -> D, where A -> B means A is the issuer of B, then
certificates A, B, and C should be uploaded as root certificates. If one of the
certificates is not available, the certpath is not built and the transaction is
unsuccessful. The CA certificates can be obtained from the Certificate Repositories
maintained by the Certificate Authorities. Root and intermediate certificates can
only be uploaded in the Hub Operator profile.
Note:
Before you can use the procedures in the following sections, the certificates
must be loaded into the system. For more information about loading the
certificates, see the
WebSphere Partner Gateway Hub Configuration Guide
.
The Certificate Management view allows you to modify certificate sets that are
used for a specific participant connection. An option to filter is provided. Modify
the certificate sets that are used in the connection. Alternatively, this can be done
from the participant connection itself. Steps to manage Certificates sets:
50
IBM WebSphere Partner Gateway Enterprise and Advanced Editions: Administration Guide