IBM Platform Symphony 5.2 Fix Patch #229037 Readme File
Description
This patch provides a new feature.
This feature enables user-definable AES-128 key for password encryption. Use this
feature to perform the following functions:
¡¤
Generate
an AES-128 key. Once you have properly defined the EGO_KEYFILE parameter, you
can use the egogenkey command-line tool to generate the key. (You can
also create the key using an alternative method); egogenkey is provided as
convenience.
¡¤
Customize
the AES-128 key to encrypt or decrypt the passwords of users defined in the users.xml file.
¡¤
Apply
the generated key to refresh all passwords based on the new key through the egoapplykey
command-line tool.
This fix patch applies only to the following platforms:
¡¤
Windows 64-bit
¡¤ Linux x86_64
Readme file for: IBM® Platform Symphony
Product/Component Release: 5.2
Update Name: Fix pack
Fix ID: sym-5.2-build229037-All
Publication date: 17th Jan 2014
Last modified date: 17th Jan 2014
Contents:
1. Download location
2. Products or components affected
3. System requirements
4. Installation and configuration
5. List of fixes
6. List of files
7. Copyright and trademark information
1. Download location
Search Fix ID in http://www.ibm.com/eserver/support/fixes/
2. Products or components affected
Product/Component Name, Platform, Fix ID:
Platform Symphony/vemkd, Windows 64-bit & Linux x86_64,
sym-5.2-build229037-All
Platform Symphony/egogenkey, Windows 64-bit & Linux x86_64,
sym-5.2-build229037-All
Platform Symphony/egoapplykey, Windows 64-bit & Linux x86_64, sym-5.2-build229037-All
Platform Symphony/egostashpass-AD, Windows 64-bit, sym-5.2-build229037-All
Platform Symphony/sec_ego_default, Windows 64-bit & Linux x86_64,
sym-5.2-build229037-All
Platform Symphony/sec_ego_ext_ad, Windows 64-bit, sym-5.2-build229037-All
3. System requirements
None
4. Installation and configuration
4.1
Before
installation
Attention: If you have patched package which is newer than this package, please use the correspond newer binaries from the newer package.
1. Shut down the cluster:
Log on to the master host as the cluster administrator and run:
¡¤
Windows
C:\>soamcontrol app disable all
C:\>egosh service stop all
C:\>egosh ego shutdown all
¡¤
Linux
> source $EGO_TOP/cshrc.platform
> soamcontrol
app disable all
> egosh
service stop all
> egosh
ego shutdown all
2. Back up files:
For Linux, on each management host in the cluster, back up the following
binaries that will be replaced by this patch:
$EGO_TOP/1.2.6/linux2.6-glibc2.3-x86_64/etc/vemkd
$EGO_TOP/1.2.6/linux2.6-glibc2.3-x86_64/lib/sec_ego_default.so
$SOAM_HOME/5.2/linux2.6-glibc2.3-x86_64/lib/sec_ego_default.so
4.2 Installation steps
1. Installation Instructions
1) On Windows
Copy the appropriate EGO MSP package and SOAM MSP package to each management host in the cluster.
¡¤ Interactive installation:
1) Double-click the EGO MSP package to run the EGO installer.
For
example, if you are upgrading EGO on a Windows 64-bit management host, download and install ego1.2.6_win-x64-229037.msp.
2)
Double-click the SOAM MSP package to run the SOAM installer.
¡¤ Silent installation:
1) Run the EGO installers from the command line using the following commands:
C:\>msiexec /update <EGO_package_name_path> /l*v <ego_install_log> /norestart /quiet REINSTALLMODE=omus
Where:
¡¤ EGO_package_name_path is the fully qualified filename of the EGO MSP package in this release.
¡¤ ego_install_log is the log file for the EGO upgrade.
For example, to update a Windows 64-bit management host, run the following commands:
C:\>msiexec /update C:\ego1.2.6_win-x64-229037.msp /l*v updateEGO.log /norestart /quiet REINSTALLMODE=omus
2) Run the SOAM installers from the command line using the following commands:
C:\>msiexec /update <SOAM_package_name_path> /l*v <soam_install_log> /norestart /quiet REINSTALLMODE=omus
Where:
¡¤ SOAM_package_name_path is the fully qualified filename of the SOAM MSP package in this release.
¡¤ soam_install_log is the log file for the SOAM upgrade.
For example, to update a Windows 64-bit management host, run the following commands:
C:\>msiexec /update C:\soam5.2.0_win-x64-229037.msp /l*v updateSOAM.log /norestart /quiet REINSTALLMODE=omus
2) On Linux
1. Copy the tar file sym5.2.0_lnx26-lib23-x64-229037.tar to the $EGO_TOP directory on each management host in the cluster.
2. On each linux
management node, replace the old binaries with the update binaries by command
¡°tar ¨Cxvf sym5.2.0_lnx26-lib23-x64-229037.tar¡±
4.3 After installation
1. Verify the installation
Run the vemkd -V command, you should see the following output:
>vemkd
-V
Platform EGO
1.2.6.229037, Jan 10 2014
Copyright
Platform Computing Inc., an IBM Company, 1992-2012.
US
Government Users Restricted Rights - Use, duplication or disclosure restricted
by GSA ADP Schedule Contract with IBM Corp.
binary type: linux2.6-glibc2.3-x86_64
notes:
fixes:
Run the egoapplykey -V command, you should see the following
output:
>egoapplykey
-V
Platform EGO
1.2.6.229037, Jan 10 2014
Copyright
Platform Computing Inc., an IBM Company, 1992-2012.
US
Government Users Restricted Rights - Use, duplication or disclosure restricted
by GSA ADP Schedule Contract with IBM Corp.
binary type: linux2.6-glibc2.3-x86_64
notes:
fixes:
Run the egogenkey -V command, you should see the following output:
>egogenkey
-V
Platform EGO
1.2.6.229037, Jan 10 2014
Copyright
Platform Computing Inc., an IBM Company, 1992-2012.
US
Government Users Restricted Rights - Use, duplication or disclosure restricted by
GSA ADP Schedule Contract with IBM Corp.
binary type: linux2.6-glibc2.3-x86_64
notes:
fixes:
2. Start the upgraded cluster
Log on to the master host as the
cluster administrator and run:
¡¤
Windows
C:\>egosh ego start
C:\>egosh user logon ¨Cu <username> -x <password>
C:\>soamcontrol app enable
<appName>
¡¤
Linux
> source $EGO_TOP/cshrc.platform
> egosh
ego start
> egosh
user logon ¨Cu <username> -x <password>
> soamcontrol
app enable <appName>
4.4
Configuration, Usage and Trouble Shooting
¡¤
Configuration
Edit
the $EGO_CONFDIR/ego.conf file (on
your Platform Symphony management host) to define the EGO_KEYFILE parameter,
which defines the absolute path to the location where the generated key file is
stored. For file
access, place the key
file
in a secure location. Only management hosts in
the cluster require access to the key file. For file permissions, for security reasons, set permissions for
the key file. Set ownership and permission as owner=os_clusteradmin, permission=600.
Use the following syntax:
EGO_KEYFILE=keyfile_location
For example, EGO_KEYFILE=/tmp/seckey.conf.
The EGO_KEYFILE parameter is not defined by default. If a value is not
specified or the parameter is not defined, the built-in key is used.
Once you have properly configured the EGO_KEYFILE parameter, you can use the egogenkey tool to easily generate an AES-128 key.
¡¤
Usage
Customize an AES-128 key to encrypt or decrypt passwords of EGO users
(defined in the users.xml file). This feature enables you to do the following:
1) Generate an AES-128 key to encrypt or decrypt passwords from the egogenkey tool.
You can use the egogenkey
tool as a means to conveniently create the key, if you have set up the
EGO_KEYFILE parameter properly.
2) Apply
the generated key to encrypt all passwords from the egoapplykey tool.
To enable password encryption with an AES-128 key:
1.
Stop the cluster:
a.
Log on to the master host as the cluster
administrator.
b.
Run the following commands to stop the cluster:
> egosh service stop all
> egosh ego shutdown
2.
Define
the EGO_KEYFILE parameter in $EGO_CONFDIR/ego.conf. Refer to the Configuration section above for details.
3.
Run egogenkey to generate the key, which is temporarily stored
in a location that you specify. For example:
> egogenkey
>Enter
location to store temporary key file:/tmp/key.tmp
Attention: The
temporary file location specified here can NOT be same with the file location
configured by EGO_KEYFILE in ego.conf.
1.
Run egoapplykey to apply the generated key file and store it in
the location specified by EGO_KEYFILE. Ensure that you back up $EGO_CONFDIR/users.xml and the key file specified by EGO_KEYFILE to enable
database recovery in case of fatal errors. If egoapplykey runs successfully,
and you do not need to roll back to the old password used for encrypted
passwords in users.xml, you can
delete the backed up files.
Here is an example of running egoapplykey:
> egoapplykey
To
enable database recovery in case of fatal errors, back up users.xml
and the key file specified by EGO_KEYFILE before proceeding. Continue Y/N? y
Enter
location of temporary key file: /tmp/key.tmp
Enter Admin password: Admin
Applying
temporary key file to generate new encryption key...
New encryption
key has been applied successfully and saved to location specified by
EGO_KEYFILE.
2.
If you have configured the AD plug-in as the security
plug-in, use the following commands to stash the ¡°Admin¡± password:
¡¤
AD plug-in: egostashpass-AD
3.
Start the cluster with the following command:
> egosh
ego start
1.
If egosc cannot start up successfully
and the VEMKD log includes the following message: Failed
to create credential for EGO default Cluster Administrator, it may
be because the VEMKD process failed to load the correct encryption password key
from EGO_KEYFILE. Usually, this issue is caused by permission control settings.
Ensure EGO LIM is started as the cluster administrator account and that the
cluster administrator can access EGO_KEYFILE on Windows.
2.
If the user cannot log on to the SD but can log on to
EGO successfully, before changing the encryption password key, ensure that you
stop the cluster including EGO services.
3.
Ensure EGO has permissions to access the key file
defined by the EGO_KEYFILE parameter. If failover is not set up, the shared
directory is not configured on management hosts, and the key file is stored in
the UNC path (which could be the same as a shared directory), the VEMKD process
uses the default encryption key, in which case authentication may not work
well. This occurs because the local system user account does not have
permissions to access the key file. In this case, use Windows administrative
tools to configure EGO LIM to start as the cluster administrator; then, ensure
that the cluster administrator can access EGO_KEYFILE.
4.5 Uninstalling
1. Shut down the cluster
Log on to the master host as the cluster administrator and run:
¡¤ Windows:
C:\>soamcontrol app disable all
C:\>egosh service stop all
C:\>egosh ego shutdown all
¡¤ Linux:
> source $EGO_TOP/cshrc.platform
> soamcontrol
app disable all
> egosh
service stop all
> egosh
ego shutdown all
2.
Roll back installation
¡¤ Windows:
1) Get the EGO msp package and SOAM msp package for Symphony 5.2
2) On each management host in the cluster, use the following command to roll back EGO:
C:\>msiexec /uninstall <EGO_SP_path> /package <EGO_5.2_path> /norestart /quiet /l*v <ego_rollback_log> MASTERHOST=<masterhost> CLUSTERADMIN=<domain\admin> LICENSEFILE=<lincense_path>
Where:
¡¤ EGO_SP_path is the fully qualified filename of the EGO MSP package in this release.
¡¤ EGO_5.2_path is the fully qualified filename of the EGO msp package for Symphony5.2.
¡¤ ego_rollback_log is the log file for the EGO rollback.
¡¤ masterhost is the master host of the cluster that is being rolled back.
¡¤ domain\admin is the domain and username of the cluster¡¯s administrator.
¡¤ license_path is the fully qualified filename of
the license file.
3) On each management host in the cluster, use the following command to roll back SOAM:
C:\>msiexec /uninstall <SOAM_SP_path> /package <SOAM_5.2_path> /norestart /quiet /l*v <soam_rollback_log> MASTERHOST=<masterhost> CLUSTERADMIN=<domain\admin> LICENSEFILE=<lincense_path>
Where:
¡¤ SOAM_SP_path is the fully qualified filename of the SOAM MSP package in this release.
¡¤ SOAM_5.2_path is the fully qualified filename of the SOAM msp package for Symphony5.2.
¡¤ soam_rollback_log is the log file for the SOAM rollback.
¡¤ masterhost is the master host of the cluster that is being rolled back.
¡¤ domain\admin is the domain and username of the cluster¡¯s administrator.
¡¤ license_path is the fully qualified filename of the license file.
¡¤
Linux:
Restore the backup files on each management host
3. Start the cluster
Log on to the master host as the
cluster administrator and run:
¡¤
Windows
C:\>egosh ego start
C:\>egosh user logon ¨Cu <username> -x <password>
C:\>soamcontrol app enable
<appName>
¡¤
Linux
> source $EGO_TOP/cshrc.platform
> egosh
ego start
> egosh
user logon ¨Cu <username> -x <password>
> soamcontrol
app enable <appName>
5. List of fixes
<APAR#>:
P100265
Description:
Support configurable encryption key for stored password.
6. List of files
1. ego1.2.6_win-x64-229037.msp
The file lists of ego1.2.6_win-x64-229037.msp:
1.2.6/etc/vemkd.exe
1.2.6/etc/vemkd.pdb
1.2.6/bin/egoapplykey.exe;
1.2.6/bin/egogenkey.exe;
1.2.6/bin/egostashpass-AD.exe
1.2.6/lib/sec_ego_default.dll
1.2.6/lib/sec_ego_default.pdb
1.2.6/lib/sec_ego_ext_ad.dll
1.2.6/lib/sec_ego_ext_ad.pdb
2. soam5.2.0_win-x64-229037.msp
The file lists of soam5.2.0_win-x64-229037.msp:
soam/5.2/w2k3_x64-vc7-psdk/lib/sec_ego_default.dll
soam/5.2/w2k3_x64-vc7-psdk/lib/sec_ego_ext_ad.dll
3. sym5.2.0_lnx26-lib23-x64-229037.tar
The file lists of sym5.2.0_lnx26-lib23-x64-229037.tar:
1.2.6/linux2.6-glibc2.3-x86_64/etc/vemkd
1.2.6/linux2.6-glibc2.3-x86_64/bin/egogenkey
1.2.6/linux2.6-glibc2.3-x86_64/bin/egoapplykey
1.2.6/linux2.6-glibc2.3-x86_64/lib/sec_ego_default.so
soam/5.2/linux2.6-glibc2.3-x86_64/lib/sec_ego_default.so
7. Copyright and trademark information
© Copyright IBM Corporation 2014
IBM®, the IBM logo and ibm.com® are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.