Working with IBM WebSphere

This chapter contains an overview and discusses:

Click to jump to parent topicWebSphere Application Server 6.1 within PeopleSoft

The WebSphere Application Server (WAS) is a J2EE application server that PeopleSoft uses as a web server to deploy the PeopleSoft Internet Architecture. We package WebSphere Base and Network Deployment Manager (ND) together. When you install WebSphere 6.1, both base and ND gets installed and there is no separate installation required for ND. The new terminology for this package of WAS is WebSphere Application Server ND.

This section discusses:

Click to jump to top of pageClick to jump to parent topicIBM HTTP Server

The IBM HTTP Server (IHS), which is the IBM version powered by Apache 2.0.47 and a separate installation, is required for IHS and IHS Plug-ins.

See Also

http://publib.boulder.ibm.com/infocenter/wasinfo/v6r1/index.jsp?topic=/com.ibm.websphere.ihs.doc/info/welcome_ihs.html

Enterprise PeopleTools 8.49 Installation, “Install and uninstall IBM HTTP Server 6.1 and IHS Plug-in”

Click to jump to top of pageClick to jump to parent topicWebSphere Application Server Profiles

The WebSphere Application Server profile defines the runtime environment (JVM) for Web applications. The profile includes all of the files that the server processes in the runtime environment and can change. PeopleSoft Internet Architecture makes use of these WAS profiles to deploy the PeopleSoft Enterprise Applications on to the WebSphere Application Server ND.

The following picture shows how profile directory structure looks like when a profile is created under WAS.

Note. The location for Application Server profile location differs from the default location when PIA creates Application Server Profile.

The number of Application Server profiles that we create varies depending on the choices you made during the PeopleSoft Internet Architecture installation. We provide the following types of domain installations during the PIA install.

Single Server Installation

If you specified the default application name of peoplesoft at install time, an application Server profile with the same name gets created in <ps_home>\webserv\<peoplesoft>. When the PIA install creates an Application Server profile, it creates a default server names “server1” (single JVM process) and all of the PeopleSoft web modules are deployed on to this single server.

Single Server profile directory structure located in <ps_home>\webserv\ is shown below.

Multi Server Installation

If you specified the default application name of peoplesoft at install time, three application Server profiles are created under <ps_home>\webserv\.

Each of these Application Server profiles creates a server called “server1” and they all run on different ports. After the PIA install is completed, start the server processes in order to access the application deployed on the server.

Click to jump to top of pageClick to jump to parent topicIntegrated Solutions Console

WebSphere Application Server ND 6.1 offers new web based Administrative console called Integrated Solutions Console that:

You can perform many administrative tasks using ISC and some of them are discussed later in this guide.

Note. If you have more than one WAS ND 6.1 installed on a machine, the WAS administrative console’s port number can be found in <PS_HOME>\webserv\<profilename>\logs\AboutThisProfile.txt.

Click to jump to parent topicStarting and Stopping WebSphere Application Servers

By default, all of the servers of WAS instance are stopped when you install PIA. You need to start the server in order to access the PeopleSoft Enterprise Application.

Click to jump to top of pageClick to jump to parent topicStarting the WebSphere Server

Change directories to the folder in which WebSphere Application Server profile is installed—the bin directory under the WebSphere home directory, <ps_home>\webserv\<profilename>\bin.

Enter the following command:

On Windows:

startServer.bat <server_name> -profileName <profilename>

On UNIX:

startServer.sh <server_name> -profileName <profilename>

where <profilename> indicates the application name that you have selected during the PIA install and <server_name> will be the server that gets created when the application server profile is created.

Click to jump to top of pageClick to jump to parent topicStopping the WebSphere Server

On Windows:

stopServer.bat <server_name> -profileName <profilename>

On UNIX:

stopServer.sh <server_name> -profileName <profilename>

Click to jump to parent topicWorking with WebSphere Reverse Proxy Servers

WebSphere Application Server ND 6.1 supports the following HTTP servers as Reverse Proxy Servers:

Click to jump to top of pageClick to jump to parent topicWeb Server Plug-in

Web server plug-ins enable the web server to communicate requests for dynamic content, such as servlets, to the application server. A web server plug-in is associated with each web server definition. The configuration file (plugin-cfg.xml) that is generated for each plug-in is based on the applications that are routed through the associated web server.

Click to jump to top of pageClick to jump to parent topicWebSphere RPS Plug-in

A web server plug-in is used to forward HTTP requests from a supported web server to an application server. Using a web server plug-in to provide communication between a web server and an application server has the following advantages:

Click to jump to parent topicConfiguring IHS plug-in with WAS ND 6.1

The following steps discuss how to setup IHS as a RPS for WAS ND 6.1. Before you perform the steps listed below, IHS and web server plug-ins installation needs to be completed.

To configure IHS:

  1. Start the WebSphere Application servers

  2. Copy the configureWeb_server_name script from the plugin_install_root/bin to the directory was_install_root/bin and run it.

    This regenerates the plugin-cfg.xml so that IHS can talk to WAS directly and access the PeopleSoft application.

  3. Verify that the WebSphere application server is running

  4. Start the IBM HTTP Server and verify the application.

    For more information on the configuration of IHS WebServer plug-ins, see the IBM documentation.

    See http://publib.boulder.ibm.com/infocenter/wasinfo/v6r1/index.jsp?topic=/com.ibm.websphere.nd.doc/info/ae/ae/tins_road_plugins.html

Click to jump to parent topicConfiguring IIS plug-in with WAS ND 6.1

The following steps discuss how to setup IIS as a RPS for WAS ND 6.1. Before you perform the steps listed below, IIS and web server plug-in installation needs to be completed.

Click to jump to top of pageClick to jump to parent topicConfiguring IIS Version 5.0

This section related to ISS 5.0.

To configure IIS 5.0:

  1. Start the IIS application and create a new virtual directory for the Web site instance that you intend to work with WebSphere Application Server.

    These instructions assume that you are using the Default Web Site.

  2. Expand the tree on the left until you see Default Web Site.

  3. Right-click Default Web Site, then click New > Virtual Directory to create the directory with a default installation.

  4. Type sePlugins in the Alias to be used to Access Virtual Directory field.

  5. Browse to the plugins_root\bin directory in the Enter the physical path of the directory containing the content you want to publish field.

  6. Select the appropriate Execute check box (such as ISAPI applications or CGI) in what access permissions do you want to set for this directory field.

  7. Click Next to add these Plugins virtual directory to your default Web site.

  8. Click Finish.

  9. Right-click Default Web Site in the navigation tree and click Properties.

  10. Add the Internet Services Application Programming Interface (ISAPI) filter into the IIS configuration.

    In the Properties dialog, perform the following steps:

    1. Click the Internet Information Services tab.

    2. Click WWW Service in the Master properties window.

    3. Click Edit to open the WWW Service master properties window.

    4. Click ISAPI Filters > Add to open the Filter properties window.

    5. Type iisWASPlugin in the Filter Name field.

    6. Click Browse in the Executable field.

    7. Browse to the plugins_root\bin directory.

    8. Click the iisWASPlugin_http.dll file.

    9. Click OK until all the open windows close.

Click to jump to top of pageClick to jump to parent topicConfiguring IIS Version 6.0

This section relates to IIS 6.0.

To configure IIS 6.0:

  1. Start the IIS application and create a new virtual directory for the Web site instance that you intend to work with WebSphere Application Server.

    These instructions assume that you are using the Default Web Site.

  2. Click Programs > Administrative Tools > Internet Information Services (IIS) Manager on a Windows Server 2003 Standard Edition system, for example.

  3. Expand the tree on the left until you see Default Web Site.

  4. Right-click Default Web Site > New > Virtual Directory to create the directory with a default installation.

  5. Type sePlugins in the Alias field in the Virtual Directory Alias panel of the Virtual Directory Creation Wizard, then click Next.

  6. Browse to the plugins_root\bin\IIS_web_server_name directory in the Path field of the Web Site Content Directory panel of the wizard, and then click Next.

    For example, select the C:\Program Files\IBM\WebSphere\Plugins\bin\IIS_webserver1 directory.

  7. Select the appropriate permission check boxes in the Virtual Directory Access Permissions panel of the wizard.

  8. Select the Read check box and the Execute (such as ISAPI applications or CGI) check box, for example.

  9. Click Next to add the sePlugins virtual directory to your default Web site.

  10. Click Finish when the success message displays.

  11. Copy the plug-in binaries to the plugins_root \bin\IIS_web_server_name directory.

    For example. copy the plug-in binary files to the C:\Program Files\IBM\WebSphere\Plugins\bin\IIS_webserver1 directory.

    The plugin-cfg.loc file resides in this directory. The first line of the plugin-cfg.loc file identifies the location of the plugin-cfg.xml file.

  12. Expand the Web Sites folder in the left pane navigation tree of the IIS Manager panel.

  13. Right-click Default Web Site in the navigation tree and click Properties.

    Add the Internet Services Application Programming Interface (ISAPI) filter into the IIS configuration.

    In the Default Web Site Properties panel, perform the following steps:

  14. Set the value in the plugin-cfg.loc file to the location of the configuration file.

    Set the location to the plugins_root \config\ webserver_name \plugin-cfg.xml file, which might be C:\Program Files\IBM\WebSphere\Plugins\config\IIS_webserver1\plugin-cfg.xml file.

    The location varies depending on how you have configured your system. If the Web server and the Application Server are on separate machines, you have a remote installation.

    If the two servers are on the same machine, you have a local installation.

    Example:

    "C:\IBM\WebSphere\Plugins\config\webserver1\plugin-cfg.xml"

  15. Configure the Web server to run WebSphere Application Server extensions:

Click to jump to parent topicConfiguring Sun One as an RPS with WAS ND 6.1

The following steps discuss how to configure the Sun ONE Web Server 6.0 or Sun Java System Web Server, Version 6.1 and later as RPS with WAS ND 6.1. Before you perform the steps listed below, Sun One and WebServer plug-ins installation needs to be completed.

To configure Sun One:

  1. Configure entries in the obj.conf configuration file and in the magnus.conf configuration file for Version 6.0 and later of Sun Java System Web Server.

    Add two directives to the obj.conf file after the <Object name=default> tag:

    Service fn="as_handler" AddLog fn="as_term"

    Add two directives at the end of the magnus.conf file:

    The location for the bootstrap.properties directive varies, depending on how you have configured your system. If the Web server and the application server are on separate machines, you have a remote installation.

    If the two servers are on the same machine, you have a local installation.

    On UNIX (example):

    Init fn="load-modules" funcs="as_init,as_handler,as_term" shlib="/opt/IBM/WebSphere/Plugins/bin/libns41_http.so" Init fn="as_init" bootstrap.properties="/opt/IBM/WebSphere/Plugins/config/webserver1/plugin-cfg.xml"

    On Windows (example):

    Init fn="load-modules" funcs="as_init,as_handler,as_term" shlib="C:\IBM\WebSphere\Plugins\bin\ns41_http.dll" Init fn="as_init" bootstrap.properties="C:\IBM\WebSphere\Plugins\config\webserver1\plugin-cfg.xml"

  2. Set the shared library path on HP-UX machines.

    On some installations of Sun Java System Web Server on an HP-UX machine, it is necessary to manually set the SHLIB_PATH variable to /usr/lib before starting Sun Java System Web Server with a plug-in that is configured for Secured Sockets Layer (SSL). For example, in the korn shell, issue the following command before invoking the command to start the Sun Java System Web Server:

    export SHLIB_PATH=/usr/lib:$SHLIB_PATH

  3. Disable the feature of Sun Java System Web Server Version 6.1 that supports servlets and JavaServer Pages files by default.

    Disable this feature so that the WebSphere Application Server plug-in can handle the requests.

    Remove or comment out the following two lines from the obj.conf configuration file:

    NameTrans fn="ntrans-j2ee" name="j2ee" Error fn="error-j2ee"

    Remove or comment out the following line from the magnus.conf configuration file:

    Init fn="load-modules" shlib="C:/Sun/WebServer6.1/bin/https/bin/j2eeplugin.so" shlib_flags="(global|now)" Init fn="load-modules" shlib="C:\Sun\WebServer6.1\bin\https\bin\j2eeplugin.dll" shlib_flags="(global|now)"

See Also

http://publib.boulder.ibm.com/infocenter/wasinfo/v6r1/index.jsp?topic=/com.ibm.websphere.base.doc/info/aes/ae/tins_manualWebIPL.html

Click to jump to parent topicSetting Up SSL with WebSphere Application Server ND 6.1

WebSphere Application server manages keys in key store files. There are two types of files: key stores and trust stores. There is minimal difference in the structure of both these key stores; besides the main difference - trust store contains only trusted signers.

The CA (Certificate Authority) certificates and other signing certificates are kept in a trust store and private information (personal certificates with private keys) is stored in a key store.

This section discusses:

Click to jump to top of pageClick to jump to parent topicGenerating a Certificate for the WebSphere using PeopleSoft pskeyManager

Use the following steps to generate a self-signed certificate for the web container.

To generate a certificate using pskeyManager:

  1. At a command prompt, change to the WebSphere domain directory, for example:

    PS_HOME\webserv\<profilename>\installedApps\<profilename>NodeCell\peoplesoft.ear

  2. Create a new private key and certificate request for your server.

  3. To create a new private key and certificate signing request, run pskeymanager.cmd -create.

  4. Follow the prompts and specify the information that you normally would when creating a certificate.

    The script, pskeymanager is a wrapper to Java's keytool, provided by PeopleSoft to manage the predefined WebSphere keystore of

    PS_HOME\webserv\<profilename>\installedApps\<profilename>NodeCell\peoplesoft.ear\keystore\pskey.

  5. Decide which Certificate Authority you wish to use.

    At the completion of step 2 a Certificate Signing Request (CSR) file named %ALIAS%_certreq.txt was created in PS_HOME\webserv\\<profilename>\installedApps\<profilename>NodeCell\peoplesoft.ear, and its contents displayed. If you submit this data to a Certificate Authority for processing, you obtain a public key that you can load into your keystore.

    At this point, you may use any Certificate Authority that is compatible with Sun's Java 1.4 JKS standard.

    As an example, the following steps indicate how to provide the CSR that you generated in step 4 to Verisign to obtain a 14-day free trial certificate.

  6. Submit your CSR to Verisign.

    Access Verisign's test cart enrollment site at https://www.verisign.com/products/srv/trial/intro.html. Agree to the license and continue to “Step 2 of 5: Submit CSR”. In the large edit box provided, copy and paste the contents of your CSR generated in step 2.

  7. Supply Verisign with contact information.

    Fill out the table titled "Enter Technical Contact Information" with your information and verify that the radio button for the "Free 14-day Trial Server ID" is selected. Once this is done, agree to the license information and click 'Accept'. Your certificate will be emailed to the email address you specified. By selecting the free trial ID, you do not need to fill out the "Cardholder Information" table.

  8. Check your email.

    Once you've received your certificate email from VeriSign, you can see your actual certificate in the following format:

    This is a sample certificate file:

    -----BEGIN CERTIFICATE----- DMICHDCCAcYCEAHSeRkM2guFL+6OvHr4AS0wDQYJKoZIhvcNAQEEBQAwgakxFjAP AANVBAoTDVZlcmlTaWduLCBLbAMxRzBFBgNVBAsTPnd3dy52ZXJpc2lnbi5jb20S VcVwb3NpdG9yeS9UZXN0Q1ETIEluY29ycC4gQnkgUmVmLiBMaWFiLiBMVEQuMUYF LIGEc3VyYW5jZXMgKEMpVRMxOSDFertdsfh67TIwNDAwMDAwMFoXDTAwMTIxODIA ONT1LVoweTELMAkGA1UERhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExEzARBgNK VBAUCOBsZWFzYW50b24BEzARBgNVBAoUClBlb3BsZVNvZnQxFDASBgNVBAsUC1BT Eb3sZVVvb2xzMRUwEwADVQQDFAxEQlJPV04xMTE0MDAwXDANBgkqhkiG9w0BAQET SAALADBEAkEAucfM/GOQhdkk4Q0ZD5i1l4gp6WTYMc4IaReoCYkEAmDKAVcYzY3R Mdbp4RC8SABd3bjjDOHcoCak9U6oSwL+HQIDAQABMA0GCSqGSIb3DQEBBAUAA0EO Arm3uf634Md0fqgNxhAL+e9rbY0ia/X48Axloi17+kLtVI1YPOp+Jy6Slp5iNIFC DhskdDFH45AjSDAFhjruGHJK56SDFGqwq23SFRfgtjkjyu673424yGWE5Gw4576K DosdDFG256EDHY45yTRH67i345314GQE356mjsdhhjuwbtrh43Gq3QEVe45341tS YDY6d47lDmQxDs9wGt1bkQ== -----END CERTIFICATE-----

    Copy the certificate information, including --BEGIN CERTIFICATE-- and --END CERTIFICATE-- and save it as a file called webservername-cert.pem. (Don't use a word processor such as Microsoft Word that inserts formatting or control characters.) If you need to FTP your certificate to UNIX, you must FTP it in ASCII mode.

  9. Download the VeriSign TestCA certificate:

    Download the VeriSign test CA certificate from http://digitalid.verisign.com/cgi-bin/getcacert. When prompted, save getcacert.cer to your WebSphere domain directory. If you need to FTP your certificate to UNIX, you must FTP it in ASCII mode to your WebSphere domain directory.

  10. Import the Verisign test Certificate Authority's certificate into your keystore.

    To import the Certificate Authority's public certificate (which you received from Verisign) into your keystore, run pskeymanager.cmd -import. When prompted for an alias, specify VerisignTestCA as the name to store this CA as. This name is simply an alias for this certificate. When prompted for the certificate file to import, specify the getcacert.cer file.

  11. Import your certificate into your keystore.

    To import your public certificate (which you received from Verisign in step 8) into your keystore, run the following command from the dos window “pskeymanager.cmd −import”. When prompted for an alias specify the same alias you did when you created your private key and cert request in step 4. When prompted for the certificate file to import, specify your certificate file, webservername-cert.pem.

Click to jump to parent topicModifying the WebSphere Container to Support SSL

To complete the configuration between Web server plug-in and Web Container, the WebSphere Web Container must be modified to use the previously created self-signed certificates.

To set up WebSphere Container SSL:

  1. Start the WebSphere Administration Console, then after login, select Security, SSL certificate and key management, Manage endpoint security configuration.

  2. Click on Inbound, Node or NodeName (as in. peoplesoftNode in this example).

  3. Click on Key stores and certificates under related Items.

  4. Click on NodeDefaultKeyStore under name.

  5. Click in Personal certificate under the Additional Properties.

  6. Click on default under the Import icon at right hand side.

  7. Enter the information of your certification.

  8. Click Apply and then OK.

  9. Save the configuration in the WebSphere Administration Console.

    Note. To setup Outbound SSL, go back to Step 2 and select, click on the Nodename under Outbound; repeat the steps 3 to 10.

Result

You should see the following screen showing the alias being imported. Then you can use the https with SSL port to access your PIA.

Click to jump to parent topicAdministering WebSphere Application Server ND 6.1

For all the administrative tasks, refer to IBM’s WebSphere Application Server 6.1 Information Center at

http://publib.boulder.ibm.com/infocenter/wasinfo/v6r1/index.jsp

Some of the administrative tasks include JVM performance monitoring, enabling tracing and troubleshooting WAS 6.1.