Previous Topic

Next Topic

Book Contents

Book Index

Control-M/EM

This section describes communications for Control-M/EM.

  1. Display the sslcmd -k gtwkey.kdb menu (see sslcmd menu).
  2. Select 2 Add CA. At the prompt, enter the full path and name of the CA certificate.
  3. Select 1 Generate key to generate a public-private key pair. At the prompt, enter alias name CODN.
  4. Select 3 Generate CSR. Enter the output path and file name for the generated CSR. The generated CSR can be submitted to a CA to obtain a digital certificate.
  5. Select 4 Add cert to add the digital certificate to the SSL key database.

    When the following prompt is displayed: Enter certificate file name, enter the full path and file name for the digital certificate.

    The certificate for Control-M/EM is installed in the key database.

  6. Display the sslcmd -k cmsgkey.kdb menu (see sslcmd menu).
  7. Select 2 Add CA. At the prompt, enter the full path and name of the CA certificate.
  8. Select 1 Generate key to generate a public-private key pair. At the prompt, enter alias name CADN.
  9. Select 3 Generate CSR. Enter the output path and file name for the generated CSR. The generated CSR can be submitted to a CA to obtain a digital certificate.
  10. Select 4 Add cert to add the digital certificate to the SSL key database.

    When the following prompt is displayed: Enter certificate file name, enter the full path and file name for the digital certificate.

    The certificate for Control-M/EM is installed in the key database.

  11. For Control-M/EM client/server communications using CORBA only: Enter 17 (Export key pair) to export the certificate in pkcs#12 file format.
  12. Follow the same steps to update the emkey.kdb key database for the encryption of the Control-M/EM administrator password. Use the alias name CODN.

Parent Topic

SSL communication parameters