Version 9.6
 —  Virtualized Services in CentraSite Control  —

Deploying Virtualized Services and Consumer Applications

This section describes how to deploy virtualized services and consumer applications to webMethods Mediator.


The Synchronous Deployment Model

Deployment refers to the process you use to send virtual services, virtual XML services, virtual REST services and consumer applications to the policy-enforcement points (PEPs) on which they are to be used for run-time governance. Instructions throughout the remainder of this guide use the term "virtualized service" when referring to all three virtual types in general.

Note:
This section provides information about deploying virtualized services and consumer applications to webMethods Mediator. If you are using a different kind of PEP, refer to its documentation for deployment procedures and information.

As shown in the following diagram, the deployment process is initiated from CentraSite and is carried out by the "deployer" service on Mediator.

The Deployment Process

graphics/DeployProcess.png

Step Description
1 An administrator initiates the deployment by selecting the assets that are to be deployed and specifies to which Mediator they are to be deployed.
2 The Deployment Manager on CentraSite prepares the asset for deployment (the specific preparation steps depend on the type of asset being deployed) and invokes the deployer service on the Mediator. The prepared asset is submitted as input to this service.
3 The deployer service deploys the asset in the Mediator.
4 If the deployment is successful, the deployer service returns a success message and data that is pertinent to the deployed asset. If the deployment is unsuccessful, the deployer service returns a failure message.
5 The Deployment Manager on CentraSite logs information about the deployment in the Deployment log. If the deployer service returned specific data about the asset, the asset's metadata is updated as needed in the registry/repository.

For more information, see What Happens When You Deploy a Virtualized Service?.

Top of page

Who Can Deploy Virtualized Services and Consumer Applications?

To deploy virtualized services and consumer applications, you must belong to a role with the following permissions:

For more information about roles and permissions, see the section About Roles and Permissions in Users, Groups, Roles and Permissions.

Note:
Mediator exposes several Web service operations to allow CentraSite to manage deployed assets. This Web service is invoked by CentraSite any time a user deploys or undeploys a virtual service or consumer application to Mediator. A Mediator target's configuration details page includes the User Name and Password fields which identify an Integration Server user who is permitted to execute the Integration Server services associated with Mediator's deployer service. After installation, only members of the Integration Server "Administrators" group are allowed to invoke these services. However, administrators have the flexibility to allow their own users or groups to invoke them. Access to these services is controlled by an ACL, called MediatorDeployer. Initially, only the predefined "Administrators" group is assigned to this ACL. An Integration Server administrator can remove this group and add other groups or individual users. For example, you can create your own deployer group, (for example, "MyDeployers") and add Integration Server user IDs to this group. Then, the user must update the MediatorDeployer ACL by removing the "Administrators" group and adding the "MyDeployers" group. Now, on the target's configuration detail page, you can specify any user ID that belongs to "MyDeployers" group.

Top of page

Conditions that Must be Satisfied for Effective Deployment of Virtualized Services

To deploy a virtualized service to a webMethods Mediator target, the following conditions must be met:

If these conditions are not satisfied, all or part of the deployment user interface controls will be disabled when you view the virtual service.

Top of page

What Happens When You Deploy a Virtualized Service?

When you deploy a virtualized service to one or more webMethods Mediator targets, keep the following points in mind.

Policy Validation

When you deploy a virtualized service, CentraSite automatically validates the service's run-time policy (or policies) to ensure that:

CentraSite will inform you of any violation, and you will need to correct the violations before deploying the service. For more information about dependencies and which actions can be included multiple times in a single policy, see the section Run-Time Governance Reference > Built-In Run-Time Actions Reference for Virtual Services .

What if You Need to Modify Deployed Assets?

If you need to modify a virtualized service or consumer application that is already deployed, you must modify it in CentraSite and then redeploy it to Mediator. Mediator does not monitor CentraSite for updates to deployed assets. If you make changes to a virtual service's processing steps, for example, you must manually redeploy the virtual service to put those changes into effect.

What if You Need to Modify the Run-Time Policy of a Virtualized Service?

You cannot make changes to a run-time policy while it is active. To make changes to a policy after it has been switched to the active state you must do one of the following:

  1. Switch the policy to the Suspended state (to deactivate it), update the policy and then switch it back to the Productive state (to reactivate it).

    OR

  2. Create a new version of the policy, make your changes to the new version of the policy and then switch the new version to the Productive state. Switching the new version of the policy to the Productive state will automatically Retire (and deactivate) the old version.

If you need to update a run-time policy that is already deployed with virtual services that are in production, always use the second method described above (i.e., create a new version of the policy). If you use the first method, which requires you to suspend the existing policy, your production services will be running without the policy while you are making your revisions to it.

Managing Endpoints of Virtualized Services

When you deploy a virtualized service to a Mediator target, CentraSite generates an XML document called a virtual service definition (VSD). The VSD defines the virtualized service for Mediator, and contains all the run-time policies and resources required to deploy the virtualized service to Mediator. In addition, CentraSite automatically updates the service’s CentraSite endpoint to its Mediator endpoint. You can view the Mediator endpoint on the virtualized service's detail page in CentraSite. Because the endpoint information for virtualized services is generated and updated by CentraSite, you should not manually edit the endpoint information for virtualized services. In other words, unlike with native services, you should not manually add endpoints to a virtualized service. Instead, simply allow CentraSite to generate and manage the endpoints for the virtualized services that you deploy.

However, you can deploy multiple virtualized services for a single native service, in order to make the service available over multiple transports and/or security mechanisms. For details, see the section Managing Endpoints in Implementation Concepts.

What Happens When Deployment Fails?

If Mediator encounters a problem deploying or redeploying a virtualized service, it sets the service's Deployment Status to “Failed” and sends a message to CentraSite describing the problem. This failure is also logged to Mediator. In this case, it is up to the CentraSite or Mediator administrator to take corrective action and redeploy the service manually from CentraSite.

If the reason for the failure is that the Mediator instance is unavailable, and then you restart the Mediator instance, it loads all information about any previously deployed assets.

Top of page

Deploying, Undeploying and Redeploying Virtualized Services

You can deploy, undeploy and redeploy virtualized services (of any type) to a webMethods Mediator target in any of the following ways:

If You Migrate Virtualized Services from a Pre-8.2 Release

If you have virtualized services that were created prior to version 8.2, those virtualized services will continue to hold the deployment metadata generated by CentraSite 8.0. Although this metadata is not applicable in CentraSite 8.2, and will not affect deployment in 8.2, we strongly recommend that you perform the following steps:

  1. Undeploy all virtualized services from CentraSite 8.0.

  2. Upgrade to CentraSite 8.2.

  3. Ensure that all target deployment URLs are configured correctly.

  4. Deploy all virtualized services from CentraSite 8.2.

Note:
Please be aware that the new synchronous deployment model does not support subscriptions and subscription services.

Deploying Virtualized Services from a Service's Detail Page

The following procedure describes how to deploy, undeploy and redeploy a single virtualized service to one or more Mediator targets, using the service's Deployment profile.

Start of instruction setTo deploy, undeploy or redeploy a virtualized service

  1. In CentraSite Control, display the virtualized service detail page. For procedures, see the section Viewing Details for an Asset in Using the Asset Catalog.

  2. Select the virtualized service's Policies profile and ensure that all of the service's run-time policies are Active. If not, activate them as described in Activating a Run-Time Policy.

  3. Ensure that the virtualized service has a design-time policy that includes the Change Deployment Status action and it is set to Yes. This action specifies whether the service is eligible for deployment. For more information, see the description of this action in the Built-In Design/Change-Time Reference.

  4. Make sure you switch the service to an active, ready-to-deploy state, as follows. (If you do not know which state to select, you will need to examine your organization’s lifecycle model for Service objects or consult an administrator.)

    1. In the Actions menu, select the Change Lifecycle State option.

    2. Select the lifecycle state to which you want to switch the asset and click OK. (The list will contain only the states that you are permitted to assign to the service.)

      If the state change requires approval, CentraSite will initiate an approval workflow and your request for a state change will be submitted to the appropriate approvers. While the request is awaiting approval, the service will appear in a pending state.

  5. After the lifecycle state has been successfully changed, select the virtualized service's Deployment profile.

    The Deployment profile will display the following information.

    Column Description
    Target The target on which the service is deployed.
    Target Type The type of target on which the service is deployed (e.g., webMethods ESB (Integration Server) or Insight).
    Description Description of the target.
    Deployment Status The deployment status of the service (e.g., Deployed or Failed).
    Date Deployed The date/time that the deployment occurred.
  6. Click the Deploy button, select the Mediator target(s) to which you want to deploy the virtualized service, and click OK.

  7. The deployment process is carried out by a synchronous mechanism between the CentraSite and the Mediator:

    1. CentraSite pushes the virtualized service that is ready for deployment to the webMethods Mediator target.

    2. Instantly, the Mediator deploys the virtualized service that was received from CentraSite (along with its effective run-time policy), and notifies CentraSite when the deployment process is complete.

    For more information, see What Happens When You Deploy a Virtualized Service?.

    Important:
    If the status shown in the Deployment Status column does not automatically switch to Deployed, click the Refresh button to determine whether CentraSite was able to deploy the virtualized service successfully. If the deployment process failed, identify and correct the error and then try deploying the virtualized service again.

  8. To undeploy the virtualized services, select the services' check boxes, and choose Undeploy from the Actions menu.

    If the undeployment is successful, Mediator's deployer service returns a success message, and data that is pertinent to the undeployed virtual service. In addition, CentraSite's Deployment Manager logs information about the undeployment in the Deployment log. If the undeployment is unsuccessful, the deployer service returns a failure message.

    Important:
    If the status shown in the Deployment Status column does not automatically switch to Undeployed, click the Refresh button to determine whether CentraSite was able to undeploy the virtualized services successfully. If the undeployment process failed, identify and correct the error and then try undeploying the virtualized services again.

  9. To redeploy the virtualized service, select the services' check boxes, and choose Redeploy from the Actions menu.

    Important:
    If the status shown in the Deployment Status column does not automatically switch to Deployed, click the Refresh button to determine whether CentraSite was able to redeploy the virtualized services successfully. If the redeployment process failed, identify and correct the error and then try redeploying the virtualized services again.

  10. Examine the deployment log that is displayed by CentraSite Control and check for any errors that occurred during the deployment process.

Deploying Virtualized Services from the Operations > Deployment Page

The following procedure describes how to deploy, undeploy and redeploy multiple virtualized services to a Mediator target in a single step.

Start of instruction setTo deploy, undeploy or redeploy a virtualized service

  1. In CentraSite Control, go to Operations > Deployment.

  2. On the Deployed Assets tab, click Deploy.

  3. In the Select a Target and Services to be Deployed on the Selected Target dialog box, perform a keyword or advanced search to display the virtualized services that are ready for deployment.

  4. Click OK.

  5. The deployment process is carried out by a synchronous mechanism between the CentraSite and the Mediator:

    1. CentraSite pushes the virtualized service that is ready for deployment to the webMethods Mediator target.

    2. Instantly, the Mediator deploys the virtualized service that was received from CentraSite (along with its effective run-time policy), and notifies CentraSite when the deployment process is complete.

    For more information, see What Happens When You Deploy a Virtualized Service?.

    The Deployed Assets tab will display the following information.

    Column Description
    Pending Changes Icons indicating the deployment status of the virtualized services.
    Icon
    Description
    graphics/circle_green_16.gif Service is deployed to the target.
    graphics/status_yellow_16.gif Service is pending deployment to the target.
    Deployment ID The deployment ID of the virtualized service.
    Name Name of the virtualized service.
    Status The deployment status of the virtualized service (e.g., Deployed or Failed).
    Date/Time The date/time that the deployment occurred.
    User ID The user-ID of the Integration Server user to be used for the deployment operation.
    Type Modification that is been performed on the deployed service.
    Label
    Description
    Processing Step Changes

    Reflects any change that is performed in the virtualized service's Processing Steps profile. For example, modifying the HTTP authentication mode.

    Runtime Policy Changes

    Reflects any change that is performed in the runtime policy associated to the virtualized service. For example, deactivating an associated runtime policy.

    WSDL Changes

    Reflects any change that is performed in the virtualized service's asset file. For example, modifying an existing asset file or uploading a new asset file.

    Important:
    If the status shown in the Status column does not automatically switch to Deployed, click the Refresh button to determine whether CentraSite was able to deploy the virtualized services successfully. If the deployment process failed, identify and correct the error and then try deploying the virtualized services again.

  6. To undeploy the virtualized services, select the services' check boxes, and choose Undeploy from the Actions menu.

    Important:
    If the status shown in the Status column does not automatically switch to Undeployed, click the Refresh button to determine whether CentraSite was able to undeploy the virtualized services successfully. If the undeployment process failed, identify and correct the error and then try undeploying the virtualized services again.

  7. To redeploy the virtualized service, select the services' check boxes, and choose Redeploy from the Actions menu.

    Important:
    If the status shown in the Status column does not automatically switch to Deployed, click the Refresh button to determine whether CentraSite was able to redeploy the virtualized services successfully. If the redeployment process failed, identify and correct the error and then try redeploying the virtualized services again.

  8. Examine the deployment log that is displayed by CentraSite Control and check for any errors that occurred during the deployment process.

Selecting a Target and Services to be Deployed on the Selected Target

The following procedure describes how to use CentraSite's Search feature to select target and services to be deployed on the selected target using keyword searches and advanced searches.

Keyword Search

The keyword search is an easy to use search facility in which you can specify arbitrary search patterns.

You can search for all virtualized services that contain one or more specified keywords (i.e., text strings) in the virtualized service's string attributes (virtualized service name, description, etc.).

Conventions for Keyword Searches

The conventions for keyword searches are as follows:

Wildcard Characters

The available wildcard characters are:

Character Usage
* or %

If you use the percent symbol ("%") or the asterisk ("*"), CentraSite replaces the wildcard symbol with as many characters as necessary to find a match. For example, an entry of "A%n" returns both "Amazon" and "American". If you enter "*al", then "CalcService", "Calendar" and "AustralianPostCode" all fit the search criteria.

? or _

If you use the question mark ("?") or the underscore ("_"), CentraSite replaces the wildcard symbol with a single character in order to find a match. Example: "AustralianPostCode?VService" matches any character for "?".

You can use a wildcard character at any point in the keyword text, and multiple times throughout the keyword text. If you enter a wildcard character in the middle of a string, for example "cat*dog", then at least one of the searched attributes must contain the string in order for the asset or supporting document to be included in the result set.

If a wildcard character between two words is surrounded by spaces, such as "word1 * word2", the wildcard will match one word.

Notes:

  1. Certain non-alphanumeric characters that can appear in the name of a virtualized service are currently ignored by CentraSite's wildcard mechanism when you include them in a keyword search. In particular, the hyphen ("-") is ignored. Thus, if you have created the virtualized services "AustralianPostCodeVService-1" and "AustralianPostCodeVService_1", the wildcard search for "AustralianPostCodeVService?1" will find "AustralianPostCodeVService_1" but not "AustralianPostCodeVService-1".
  2. The percent (%) character acts as a word delimiter when it appears in the text to be searched. Thus, for example, if the description field of a virtualized service contains the text "abc%def" (the characters a, b, c, %, d, e, f), this is treated by the search mechanism as two adjacent words "abc" and "def". A wildcard search such as "abc*def" looks for a single word beginning with "abc" and ending with "def", so the search will not find this asset.
Performing a Keyword Search

Start of instruction setTo search by keyword

  1. In CentraSite Control, go to Operations > Deployment.

  2. On the Deployed Assets tab, click Deploy. This opens up the Select a Target and Services to be Deployed on the Selected Target dialog.

  3. In the text box, type the keyword(s) to search for. You can use one or more wildcards to specify the keywords.

    If you leave the text box blank, or enter just a wildcard, the entire set of virtualized services is returned.

    CentraSite returns the virtualized services that match the search criteria. The search looks for the keyword(s) in the virtualized service's name, type and description attributes.

Advanced Search

CentraSite's advanced search capabilities allow you to search for virtualized services on the basis of service types and targets.

Performing an Advanced Search

Start of instruction setTo search using service type and target

  1. In CentraSite Control, go to Operations > Deployment.

  2. On the Deployed Assets tab, click Deploy.

  3. In the Select a Target and Services to be Deployed on the Selected Target dialog box, do the following:

    1. In the field Browse By, select a virtualized service type. As a result, only virtualized services that are classified with this service type will be displayed.

      • If you do not specify a virtualized service type in the field Browse by, CentraSite Control displays a list of all virtualized services belonging to the CentraSite.

      • If you specify a virtualized service type in the field Browse by, CentraSite Control displays a list of all virtualized services that belong to the specified service type.

      There are several generic entries in the drop-down list for the Browse by field. These are:

      • [All]
        This lists all virtualized services that are available in a deployable state.

      • [Virtual Service]
        This lists all virtual Web services that are available in a deployable state.

      • [Virtual REST Service]
        This lists all virtual REST services that are available in a deployable state.

      • [Virtual XML Service]
        This lists all virtual XML services that are available in a deployable state.

    2. In the field Target, select a target for deploying the selected services.

    3. Select the virtualized services that you want to deploy on the selected target.

  4. Click OK.

Deploying Virtualized Services from the Target's Detail Page

The following procedure describes how to deploy, undeploy and redeploy multiple virtualized services to a Mediator target, using that target's details page.

Important:
Ensure that the target's specified deployment URL is active and the user credentials of Integration Server are valid. To check this, go to the target's detail page and click the Check Connection button. If the connection is not active and valid, activate the deployment endpoint and modify the user credentials as required.

Start of instruction setTo deploy, undeploy and redeploy services to a target

  1. On the Target Details page, select the Services profile.

  2. Expand the plus button next to the Name column.

    The Services profile will display the following information.

    Column Description
    Name All services that are deployed to the target (or are pending deployment or have failed deployment), as well as all design/change-time policies associated with each service.

    Clicking the hyperlinked name displays the service's detail page.

    Description Descriptions of the services.
    Deployment Status The deployment status of the services (e.g., Deployed or Failed).
    Icons next to Name Icons indicating the deployment status of the virtualized services.
    Icon
    Description
    graphics/icon_StatusGreen.png Service is deployed to the target.
    graphics/icon_StatusRed.png Service deployment failed in the target.
  3. Click the Deploy button. A pop-up displays all services that are eligible to be deployed to the target.

  4. Select one or more services and click OK.

    The deployment process is carried out by a synchronous mechanism between the CentraSite and the Mediator:

    1. CentraSite pushes the virtualized service that is ready for deployment to the webMethods Mediator target.

    2. Instantly, the Mediator deploys the virtualized service that was received from CentraSite (along with its effective run-time policy), and notifies CentraSite when the deployment process is complete.

    For more information, see What Happens When You Deploy a Virtualized Service?.

  5. To undeploy the virtualized services, select the services' check boxes, and choose Undeploy from the Actions menu.

    Important:
    If the status shown in the Status column does not automatically switch to Undeployed, click the Refresh button to determine whether CentraSite was able to undeploy the virtualized services successfully. If the undeployment process failed, identify and correct the error and then try undeploying the virtualized services again.

  6. To redeploy the virtualized service, select the services' check boxes, and choose Redeploy from the Actions menu.

    Important:
    If the status shown in the Status column does not automatically switch to Deployed, click the Refresh button to determine whether CentraSite was able to redeploy the virtualized services successfully. If the redeployment process failed, identify and correct the error and then try redeploying the virtualized services again.

Deploying Virtualized Services Using Run-Time Commands

You can perform the following deployment tasks by executing commands in the command line interface CentraSiteCommand.cmd (Windows) or CentraSiteCommand.sh (UNIX) of Command Central. The tool is located in <CentraSiteInstallDir>/utilities.

If you start the command line tool with no parameters, you receive a help text summarizing the required input parameters.

The parameters of the command are case-sensitive, so for example the parameter "-url" must be specified as shown and not as "-URL".

Start of instruction setTo deploy virtualized services to a Mediator target using a run-time command

  1. Use a command of the following format:

    CentraSiteCommand deploy [-url <CENTRASITE-URL>] -user <USER-ID> -password
    <PASSWORD> -virtualService <VIRTUAL-SERVICE> -target <TARGET>

    The following table describes the complete set of input parameters that you can use with the deploy utility:

    Input Parameter Description
    -url
    The fully qualified URL (http://localhost:53307/CentraSite/CentraSite) for the CentraSite registry/repository.
    -user
    The user ID of a user who has the "CentraSite Administrator" role.
     -password
    The password of the user identified by the parameter -user.
    -virtualService
    The name of the virtual service.
    -target
    The target to which the virtual service identified by the parameter -virtualService is to be deployed.

    For example:

    CentraSiteCommand deploy [-url "http://localhost:53307/CentraSite/CentraSite"] -user "Administrator" -password
    "manage" -virtualService "VS1" -target "Target1"

Start of instruction setTo undeploy virtualized services to a Mediator target using a run-time command

  1. Use a command of the following format:

    CentraSiteCommand undeploy [-url <CENTRASITE-URL>] -user <USER-ID> -password
    <PASSWORD> -virtualService <VIRTUAL-SERVICE> -target <TARGET>

    The following table describes the complete set of input parameters that you can use with the undeploy utility:

    Input Parameter Description
    -url
    The fully qualified URL (http://localhost:53307/CentraSite/CentraSitee) for the CentraSite registry/repository.
    -user
    The user ID of a user who has the "CentraSite Administrator" role.
     -password
    The password of the user identified by the parameter -user.
    -virtualService
    The name of the virtual service.
    -target
    The target to which the virtual service identified by the parameter -virtualService is to be undeployed.

    For example:

    CentraSiteCommand  undeploy [-url "http://localhost:53307/CentraSite/CentraSite"] -user "Administrator" -password
    "manage" -virtualService "VS1" -target "Target1"

Start of instruction setTo synchronize consumers using a run-time command

  1. Use a command of the following format:

    CentraSiteCommand sync consumers [-url <CENTRASITE-URL>] -user <USER-ID> -password
    <PASSWORD>  -target <TARGET>

    The following table describes the complete set of input parameters that you can use with the sync consumers utility:

    Input Parameter Description
    -url
    The fully qualified URL (http://localhost:53307/CentraSite/CentraSite) for the CentraSite registry/repository.
    -user
    The user ID of a user who has the "CentraSite Administrator" role.
     -password
    The password of the user identified by the parameter -user.
    -target
    The target on which to synchronize the consumers.

    For example:

    CentraSiteCommand  sync consumers [-url "http://localhost:53307/CentraSite/CentraSite"] -user "Administrator" -password
    "manage" -target "Target1"

Start of instruction setTo "bulk deploy", "bulk undeploy", "bulk redeploy" and "bulk clean redeploy" virtual services using a run-time command

  1. Use a command of the following format:

    CentraSiteCommand bulk deploy [-url <CENTRASITE-URL>] -user <USER-ID> -password
    <PASSWORD>  -target <TARGET>
    CentraSiteCommand bulk undeploy [-url <CENTRASITE-URL>] -user <USER-ID> -password
    <PASSWORD>  -target <TARGET>
    CentraSiteCommand bulk redeploy [-url <CENTRASITE-URL>] -user <USER-ID> -password
    <PASSWORD>  -target <TARGET>
    CentraSiteCommand bulk cleanredeploy [-url <CENTRASITE-URL>] -user <USER-ID> -password
    <PASSWORD>  -target <TARGET>

    The following table describes the complete set of input parameters that you can use with these utilities:

    Input Parameter Description
    -url
    The fully qualified URL (http://localhost:53307/CentraSite/CentraSite) for the CentraSite registry/repository.
    -user
    The user ID of a user who has the "CentraSite Administrator" role.
     -password
    The password of the user identified by the parameter -user.
    -target
    The target to which the virtual service is to be deployed/undeployed/redeployed.

    For example:

    CentraSiteCommand bulk deploy [-url "http://localhost:53307/CentraSite/CentraSite"] -user "Administrator" -password
    "manage" -target "Target1"

Deploying Virtualized Services Using a Batch Process

Use Runtime.deployment.Deployer when you do not have access to a browser or graphical user interface environment, and you want to perform deployment tasks. You can also use Runtime.deployment.Deployer when you want to automate deployment tasks through batch processes.

An automated deployment through a batch mode can be initiated by configuring the DeploymentConfiguration.properties file located in the URL http://<host>:53307/CentraSite/CentraSite/ino:dav/ino:dav/projects/CentraSite/configuration.

Specifying a Deploy Batch Size

BatchSize is the maximum number of virtualized services to be pushed to a webMethods Mediator target before a syncpoint is taken. The default BatchSize is 50. To improve performance, you can set a BatchSize to define the maximum number of virtualized services to be pushed between two syncpoints using the property line:

com.softwareag.centrasite.runtime.deployment.DeployBatchSize=50

The BatchSize property can be set at any time. If a bulk deployment is already in progress, the current batch is sized according to the previous batch size. Subsequent batches use the new size. Suppose if the BatchSize is set to zero and changed while a deploy operation is already in progress, that operation loads the data as a single batch. Any subsequent deploy operations on the same CentraSite Control use the new BatchSize.

Specifying a Transaction Timeout

TransactionTimeout specifies the maximum time, in milliseconds, allowed for deployment operations (deployment, undeployment and consumer sync) that were pushed to a webMethods Mediator target to respond. Any such operations that do not respond before this timeout occurs are rolled back. The default TransactionTimeout is 6000 (ms). To improve performance, you can set a TransactionTimeout to define the maximum time for the deployment operations to respond using the property line:

com.softwareag.centrasite.runtime.deployment.TransactionTimeout=60000

For example, if a deployment operation attempts to set a transaction timeout of 360 seconds, and the TransactionTimeout setting is 300 seconds, the TransactionTimeout setting of 300 seconds is used. After the TransactionTimeout of 300 seconds the deployment operations roll back.

Note:
If set to 0, the transaction will not time out.

Top of page

Deploying, Undeploying and Redeploying Consumer Applications

You can deploy consumer application asset(s) to a policy enforcement point (PEP) such as webMethods Mediator in any of the following ways:

Deploying Consumer Applications from the Operations > Deployment Page

The following procedure describes how to deploy multiple consumer application assets to a Mediator target in a single step.

Start of instruction setTo deploy consumer applications

  1. In CentraSite Control, go to Operations > Deployment.

  2. On the Deploy Consumers tab, click the Synchronize button.

  3. In the Select a Target and Consumer Applications to be Deployed dialog box, perform a keyword or advanced search to display the consumer applications and the targets that are ready for deployment.

  4. Click OK.

  5. The deployment process is carried out by a synchronous mechanism between the CentraSite and the Mediator:

    1. CentraSite invokes the Mediator’s deployer service and pushes the consumer applications that are ready for deployment to the Mediator target.

    2. Instantly, Mediator deploys the consumer applications that were received from CentraSite and notifies CentraSite when the deployment process is complete.

    The Deploy Consumers tab will display the following information.

    Column Description
    Pending Changes Icons indicating the deployment status of the consumer applications.
    Icon
    Description
    graphics/circle_green_16.gif The consumer application is deployed to the target.
    graphics/status_yellow_16.gif The consumer application is pending deployment to the target.
    Rule ID The synchronization rule ID of the target (that is, webMethods Mediator or Insight).
    Target The name of the target on which the consumer application is deployed.
    Last Sync Date The date/time that the deployment occurred.
    Status The deployment status of the consumer application (e.g., Deployed or Failed).

    Important:
    If the status shown in the Status column does not automatically switch to Deployed or Failed, click the Refresh button to determine whether CentraSite was able to deploy the virtualized services successfully. If the deployment process failed, identify and correct the error and then try deploying the virtualized services again.

Deploying Consumer Applications Using a Script File

The deployment operation of a consumer application invoked between CentraSite and the webMethods Mediator target using command line utility, includes a main() method, which allows it to be called from a Windows batch file or from a UNIX shell script.

Creating a Script File to Invoke the Deployment Operation (for Windows)

Create a script file that looks as follows if CentraSite is running under Windows.

@echo off 
set JAVAEXE=fullPathToJava.exe
set REDIST=CentraSiteHomeDirectory\redist
set BASEDIR=%~dp0
cd /d %REDIST%

REM build CLASSPATH with all files from jar directory
set LOCAL_CLASSPATH= 
for %%I in (".\*.jar") do call "CentraSiteHomeDirectory\bin\cfg\lcp.cmd" %%I

%JAVAEXE% -cp %LOCAL_CLASSPATH% deployerClassName %*
cd /d %BASEDIR%

Where deployerClassName is the name of the deployer that you want to run.

Example

The following is an example of a script file that calls the Consumer Applications deployer:

@echo off 
REM
REM Run Consumer Applications deployer 
REM
set JAVAEXE=D:\software\java\jdk1.5.0_12\bin\java
set REDIST=C:\SoftwareAG\CentraSite\redist 
set BASEDIR=%~dp0
cd /d %REDIST%

REM build CLASSPATH with all files from jar directory
set LOCAL_CLASSPATH= 
for %%I in (".\*.jar") do call "C:\SoftwareAG\CentraSite\bin\cfg\lcp.cmd" %%I

%JAVAEXE% -cp %LOCAL_CLASSPATH% com.softwareag.centrasite.runtime.pep.util.VirtualServiceDeployer %* 
cd /d %BASEDIR%

Creating a Script File to Invoke the Deployment Operation (for UNIX)

Create a script file that looks as follows if CentraSite is running under Unix.

set javaexe="fullPathToJava.exe"
set redist="CentraSiteHomeDirectory/redist"
set mainjar="CentraSiteRuntimePEP.jar" 
set delim='\:'
cd "$redist" 
set cl="" 
foreach j ( 'ls *.jar' ) 
  if ($cl != "") set cl=${cl}${delim} 
  set cl=${cl}${j} 
end
setenv CLASSPATH ${mainjar}${delim}${cl}
$javaexe deployerClassName $*

Where deployerClassName is the name of the deployer that you want to run.

Example

The following is an example of a script file that calls the Consumer Applications deployer:

#!/bin/csh 
#
# Run Consumer Applications deployer 
#
set javaexe="/mydir/softwareag/cjp/v16/bin/java" 
set redist="/mydir/softwareag/CentraSite/redist" 
set mainjar="CentraSiteRuntimePEP.jar" 
set delim='\:' 
# build CLASSPATH with all files from jar directory
cd "$redist" 
set cl="" 
foreach j ( `ls *.jar` )
  if ($cl != "") set cl=${cl}${delim}
  set cl=${cl}${j}
end
setenv CLASSPATH ${mainjar}${delim}${cl} 
$javaexe com.softwareag.centrasite.runtime.pep.util.VirtualServiceDeployer $*

Top of page

Viewing the Deployment History Log

The Deployment History Log contains information about the virtualized services that CentraSite has pushed to the webMethods Mediator target for deployment.

To view the Deployment History Log, you must belong to a role that includes the "Manage Runtime Targets" permission. To see the list of predefined roles that include this permission, see About Roles and Permissions in the section Users, Groups, Roles and Permissions.

The following procedure describes how to view the deployment history log. To view this log, you must belong to a role that includes the "Manage Runtime Targets" permission.

Start of instruction setTo view the Deployment History Log

  1. In CentraSite Control, go to Operations > Deployment.

  2. Click the Deployment History tab to view the list of all virtualized services that are sent to the webMethods Mediator target.

  3. If you want to filter the list, type a partial string in the Search field. CentraSite applies the filter to the Name column. The Search field is a type-ahead field, so as soon as you enter any characters, the display will be updated to show only those virtualized services whose name contains the specified characters. The wildcard character "%" is supported.

    The Deployment History tab provides the following information about each virtualized service.

    Column Description
    Rule ID The synchronization rule-ID that CentraSite automatically generates up on creation of the webMethods Mediator Target in CentraSite Control.
    Name The name assigned to the virtualized service.
    Type The type of the virtualized service (say, Web Service, XML Service or REST Service).
    Version The user-assigned version identifier for the virtualized service.
    Target Name The name of the target on which the virtualized service is deployed.
    Action The deployment action of the virtualized service on the webMethods Mediator Target (e.g., Deployed, Undeployed).
    Status The deployment status of the virtualized service on the webMethods Mediator Target (e.g., Success, Failed).
    Date The date/time that the virtualized service has deployed, redeployed or undeployed.
  4. To view details of a particular deployment workflow, click the hyperlinked value in the Name column.

Top of page

Deleting a Deployment Activity Log

When you delete an activity log, keep the following points in mind:

You can delete a deployment activity log in any of the following ways:

Performing a Delete Operation Using the Deployed Assets Tab

You delete the "deployed" and "redeployed" activity logs of virtualized services via the Deployed Assets tab.

You can delete multiple activity logs in a single step.

Start of instruction setTo delete one or more activity logs

  1. In CentraSite Control, go to Operations -> Deployment.

  2. On the Deployed Assets tab, mark the checkbox next to the name of each activity log that you want to delete. (You can select multiple logs.)

  3. In the Actions menu, click Delete.

    When you are prompted to confirm the delete operation, click OK.

    Each selected log is permanently removed from the CentraSite registry/repository. The activity logs in the virtualized service's Deployment profile and target's Service profile are not affected.

Performing a Delete Operation Using the Deployment History Tab

You delete the "deployed", "undeployed", "redeployed" and "failed" activity logs of virtualized services and consumer applications via the Deployment History tab.

You can delete multiple activity logs in a single step.

Start of instruction setTo delete one or more activity logs

  1. In CentraSite Control, go to Operations -> Deployment.

  2. On the Deployment History tab, mark the checkbox next to the name of each activity log that you want to delete. (You can select multiple logs.)

  3. Choose Delete.

    When you are prompted to confirm the delete operation, click OK.

    Each selected log is permanently removed from the CentraSite registry/repository. The activity logs in the asset's Deployment profile and target's Service profile are not affected.

Top of page

Securing Communications with CentraSite for Synchronous Deployment

An administrator can configure CentraSite to use either of the following kinds of authentication:

Configuring CentraSite to use SSL authentication provides secure communications for the deployment.

This section explains how SSL works with CentraSite (which acts as the client) and Mediator (which acts as the server). This section also provides the information you need to configure both the client and server sides for SSL authentication.

Anatomy of a CentraSite SSL Connection

It is useful to conceptualize a CentraSite SSL connection in terms of a SSL client and a SSL server. The request for an SSL connection originates from a client.

During the SSL handshake process, the webMethods Mediator acting as the SSL server responds to the request for a connection by presenting its SSL credentials (an X.509 certificate) to the requesting CentraSite client. If those credentials are authenticated by the CentraSite client, either:

CentraSite and SSL Connection Type

The types of SSL connection referred to above are termed one-way and two-way SSL authentication:

CentraSite as an SSL Client

When the CentraSite submits a HTTPS request to the webMethods Mediator, CentraSite is the SSL client and the webMethods Mediator with which it is communicating acts as the SSL server.

graphics/CS_Client.png

CentraSite as an SSL Server

When the webMethods Mediator submits a request to CentraSite via HTTPS, and a two-way SSL connection is established, the webMethods Mediator acts as the SSL client and the CentraSite acts as the SSL server.

graphics/CS_Server.png

Roadmap for Configuring SSL

The following table provides a high-level roadmap for configuring SSL on CentraSite.

Task Activities Notes
Create CentraSite keys and certificates
  • Generate a public key/private key pair.

  • Generate a certificate signing request (CSR) and send to the certificate authority (CA) for signing.

  • Receive validated certificate from the CA.

  • Import signed certificate into a keystore.

Required for one-way and two-way SSL connections.

Refer to the documentation for Java keytool or your certificate management tool.

Create keystore and truststore for CentraSite
  • Create a keystore and import the signed certificate and private key.

  • Create a truststore and import the certificate of the signing CA.

  • Store the keystore and truststore in a secure CentraSite certificates directory.

Important:
If you use a Java keytool to create the keystore, you cannot import an existing private key. You can use other tools such as OpenSSL or Portecle.

Required for one-way and two-way SSL connections.

Refer to the documentation for your certificate management tool.

Obtain certificates of webMethods Mediator

Use the CentraSite truststore to save:

  • Signed certificate of the webMethods Mediator.

  • Signed certificate of the CA for the Mediator's SSL certificate.

Required for one-way and two-way SSL connections.

Creating CentraSite Keys and Certificates

Use a standard certificate management tool, such as OpenSSL or Portecle, to generate a private/public key pair for CentraSite. Then, place the public key in a certificate signing request (CSR).

After creating the CSR, send to the CA to sign the CSR. Request the certificate in DER format. If you receive a certificate in PEM format (or any format other than DER), you need to convert it to DER format.

The signing CA’s certificate attests to the identity of the CA that signed the digital certificate for the CentraSite. The CA should send this certificate to you when it sends you the digital certificate for the CentraSite.

Once you receive your signed certificate from the CA, you need to import the certificate into a keystore. You will then have an SSL certificate and private key to use with CentraSite.

Note:
The above process is described in general terms. The procedures may vary somewhat, depending upon the CA that you use.

Creating a Keystore and Truststore

Keystores and truststores are files that function as repositories for storage of keys and certificates necessary for SSL authentication, encryption/decryption, and digital signing/verification services. Keystores and truststores provide added layers of security and ease of administration, compared to maintaining the keys and certificates in separate files.

For information about creating keystores and truststores, importing keys and certificates into keystores and truststores, and other operations with these files, refer to the documentation for your certificate management tool.

For information about using CentraSite with keystores and truststores, see Keystores and Truststores.

Obtaining the Certificates and Keys of the webMethods Mediator

If your CentraSite will submit HTTPS requests to the webMethods Mediator, the CentraSite will be acting as a client and will receive certificates from this webMethods Mediator. In order for these transactions to work, your CentraSite must have copies of their public keys and signing CA certificates. For information on importing webMethods Mediator certificates to CentraSite and setting up client authentication, refer to the document Administering webMethods Integration Server.

Keystores and Truststores

CentraSite stores its private keys and SSL certificates in keystore files and the trusted roots for the certificates in truststore files. Keystores and truststores are secure files with industry-standard file formats.

Keystore File

CentraSite uses a special file called a keystore to store SSL certificates and keys.

A keystore file contains one or more pairs of a private key and signed certificate for its corresponding public key. The keystore should be strongly protected with a password, and stored (either on the file system or elsewhere) so that it is accessible only to administrators.

Keystore File Formats

The default, certificate file format for a CentraSite keystore is. JKS (Java keystore). Java keystore is a commonly used, standardized, certificate file format that provides a high degree of portability. PKCS#12 is another format you can use for a keystore. Other keystore types can be made available by:

HSM-Based Keystores

Under certain conditions, webMethods Mediator supports the use of keystore files stored on a Hardware Security Module (HSM). Integration Server supports HSM-based keystores for ports, but not for other components. You cannot use HSM-based keystores with remote server aliases, outbound certificates, an internal server port, WS-Security, or Integration Server public services.

Creating a Keystore

You can create and manage CentraSite keystores at the command line using keytool, a Java certificate editor.

You can also use other standard tools such as OpenSSL and Portecle.

Note:
Software AG does not provide its own set of keystore utilities for creating or managing keystore files.

Truststore File

CentraSite uses a truststore to store its trusted root certificates, which are the public keys for the signing CAs. Although a truststore can contain the trusted roots for entire certificate chains, there is no requirement for the organization of certificates within a CentraSite truststore. It simply functions as a database containing all the public keys for CAs within a specified trusted directory.

Truststore File Formats

CentraSite uses a truststore to store its trusted root certificates, which are the public keys for the signing CAs. Although a truststore can contain the trusted roots for entire certificate chains, there is no requirement for the organization of certificates within a CentraSite truststore. It simply functions as a database containing all the public keys for CAs within a specified trusted directory.

How CentraSite Uses a Keystore and Truststore

For a CentraSite service to be SSL authenticated, it must have a valid, authorized X.509 certificate installed in a keystore file and the private key and signing certificate for the certificate issuer (CA) installed in a truststore file. The following figure illustrates these requirements and the relationship between the two files.

Example Truststore File and Keystore File Showing Relationship

graphics/keystore_truststore_file_71.gif

As shown in the above figure, the same truststore file can contain multiple trusted root certificates (public keys for the signing CAs). These trusted roots might be associated with numerous keystore files. A keystore file can contain the key pairs for multiple CentraSite services, and the entire certificate chain required for a service’s authentication.

With a certificate chain, it is necessary to validate each subsequent signature in the list until a trusted CA certificate is reached. For CentraSite, you must include the entire chain of certificates in a keystore and truststore. Also, any root CA certificates in use by clients must be in a CentraSite truststore.

Protecting Keystore and Truststore Files

Keystore and truststore files exist within the file system of your operating system, and since these are critically important files, you want to maintain them in a secure directory path. If either of the these files cannot be located, CentraSite authentication will be disabled and no connection with the CentraSite can be made. It is recommended that only users serving as CentraSite administrators have access to these certificate files.

Configuring CentraSite to Use SSL

The configuration settings covered in this section deal with the CentraSite client side.

You can configure CentraSite client to use SSL in any of the following ways:

Configure CentraSite Client to Use One-way SSL

You perform the following procedure to configure CentraSite for one-way SSL authentication:

Start of instruction setTo configure one-way SSL

  1. Create at least one truststore centrasitetruststore.jks, in JKS format, in a desired location on the machine where CentraSite is running.

  2. Import the webMethods Mediator's self-signed certificate mediator.cer into the above created truststore or JAVA cacerts.

    When prompted for password, the default for truststores is "password".

    C:\deploykeystores\new>keytool -export -alias mediator -keystore mediatorkeystore.jks -rfc -file mediator.cer
    Enter keystore password:        
    Certificate stored in file <mediator.cer>
    
    C:\deploykeystores\new>keytool -import -alias mediator -keystore centrasitetruststore.jks -file mediator.cer
    Enter keystore password:        
    Re-enter new password:        
    Owner:
    Issuer:
    Serial number:
    Valid from:
    Certificate fingerprints:
                  Trust this certificate? [no]:  yes
    Certificate was added to keystore
    
    C:\deploykeystores\new>

    If opting to import certificate in to Java cacerts, the Java runtime needs to trust the certificates of the webMethods Mediator in order to establish the SSL connections. To do that, add the certificate to the trusted certificates of Java via the keytool utility that comes with Java. The following command will add the certificate located at a location (for example, c:\temp\server.crt) to the trusted certificates in the Java used by CentraSite:

    keytool.exe -import -v -trustcacerts -alias test -file "C:\temp\server.crt" 
    -keystore "<JDKInstallDir>\jre\lib\security\cacerts"

    When prompted for password, the default for Java is "changeit".

  3. Add the following Java system properties to the custom_wrapper.conf file in <SuiteInstallDir>/profiles/CTP/configuration folder. For information about setting Java system properties, see the webMethods cross-product document, Working with the webMethods Product Suite and the Java Service Wrapper.

    wrapper.java.additional.<n>=-Djavax.net.ssl.trustStore=<location_of_truststore>
    wrapper.java.additional.<n>=-Djavax.net.ssl.trustStorePassword=<password_for_truststore>
    

    In the settings above:

  4. Save and close the file.

  5. Restart the Software AG Runtime. All communication via the webMethods Mediator to the database should now be using SSL.

Configure CentraSite Client to Use Two-way SSL

You perform the following procedure to configure CentraSite for two-way SSL authentication:

Start of instruction setTo configure two-way SSL

  1. Using OpenSSL, create a self-signed certificate (centrasite.cer) with the following command:

    openssl req -new -x509 -days 2000 -sha1 -newkey rsa:1024 -nodes 
    -keyout server.key -out server.crt -subj "/O=Company/OU=Unit/CN=localhost"

    Whatever is specified in the CN section of the subject must match the hostname of the machine running the webMethods Mediator and is used to send requests to the Mediator.

  2. Create at least one keystore centrasitekeystore.jks, in PKCS#12 or JKS format, containing a CentraSite key pair to use for SSL.

    C:\deploykeystores\new>keytool -v -genkeypair -alias centrasite -keyalg RSA -validity 1000 -keystore centrasitekeystore.jks
    Enter keystore password:
    Re-enter new password:
    What is your first and last name?
    What is the name of your organizational unit?
    What is the name of your organization?
    What is the name of your City or Locality?
    What is the name of your State or Province?
    What is the two-letter country code for this unit?
    
    Enter key password for <centrasite>
                 <RETURN if same as keystore password>:
    [Storing centrasitekeystore.jks]
    
    C:\deploykeystores\new>
  3. Create at least one truststore centrasitetruststore.jks, in JKS format, in a desired location on the machine where CentraSite is running.

  4. Import the webMethods Mediator's self-signed certificate mediator.cer into the above created truststore or Java cacerts.

    When prompted for password, the default for truststores is "password".

    C:\deploykeystores\new>keytool -export -alias mediator -keystore mediatorkeystore.jks -rfc -file mediator.cer
    Enter keystore password:        
    Certificate stored in file <mediator.cer>
    
    C:\deploykeystores\new>keytool -import -alias mediator -keystore centrasitetruststore.jks -file mediator.cer
    Enter keystore password:        
    Re-enter new password:        
    Owner:
    Issuer:
    Serial number:
    Valid from:
    Certificate fingerprints:
                  Trust this certificate? [no]:  yes
    Certificate was added to keystore
    
    C:\deploykeystores\new>

    If opting to import certificate in to Java cacerts, the Java runtime needs to trust the certificates of the webMethods Mediator in order to establish the SSL connections. To do that, add the certificate to the trusted certificates of Java via the keytool utility that comes with Java. The following command will add the certificate located at a location (for example, c:\temp\server.crt) to the trusted certificates in the Java used by CentraSite:

    keytool.exe -import -v -trustcacerts -alias test -file "C:\temp\server.crt" 
    -keystore "<JDKInstallDir>\jre\lib\security\cacerts"

    When prompted for password, the default for Java is "changeit".

  5. Export the CentraSite's self-signed certificate centrasite.cer in to the webMethods Mediator's truststore.

  6. Add the following Java system properties to the custom_wrapper.conf file in <SuiteInstallDir>/profiles/CTP/configuration folder. For information about setting Java system properties, see the webMethods cross-product document, Working with the webMethods Product Suite and the Java Service Wrapper.

    wrapper.java.additional.5=-Djavax.net.ssl.keyStore=<location_of_keystore>
    wrapper.java.additional.6=-Djavax.net.ssl.keyStorePassword=<password_for_keystore>
    wrapper.java.additional.7=-Djavax.net.ssl.trustStore=<location_of_truststore>
    wrapper.java.additional.8=-Djavax.net.ssl.trustStorePassword=<password_for_truststore>
    

    In the settings above:

  7. Save and close the file.

  8. Restart the Software AG Runtime. All communication via the webMethods Mediator to the database should now be using SSL.

Using the CTP Server.xml File for SSL

Start of instruction setTo configure SSL using CTP server.xml file

  1. Open the server.xml file located in the following directory:

    <SuiteInstallDir>/profiles/CTP/configuration/tomcat/conf

  2. Enter the keystore information as specified below:

    graphics/ctpserverxml.png

  3. Add the mediator certificate (mediator.cer) into CentraSite JVM cacerts as below:

    graphics/jvmcacerts.png

Configuring webMethods Integration Server to Use SSL

The configuration settings covered in this section deal with the webMethods Integration Server side.

You configure an Integration Server to use one of the following:

Configure Integration Server to Use One-way SSL

You perform the following procedure to configure Integration Server for one-way SSL authentication:

Start of instruction setTo configure one-way SSL

  1. Using OpenSSL, create a self-signed certificate (mediator.cer) with the following command:

    openssl req -new -x509 -days 2000 -sha1 -newkey rsa:1024 -nodes 
    -keyout server.key -out server.crt -subj "/O=Company/OU=Unit/CN=localhost"

    Whatever is specified in the CN section of the subject must match the hostname of the machine running the webMethods Mediator and is used to send requests to Mediator.

  2. Create at least one keystore mediatorkeystore.jks, in PKCS#12 or JKS format, containing an Integration Server key pair to use for SSL and its corresponding key alias.

    C:\deploykeystores\new>keytool -v -genkeypair -alias mediator -keyalg RSA -validity 1000 -keystore mediatorkeystore.jks
    Enter keystore password:
    Re-enter new password:
    What is your first and last name?
    What is the name of your organizational unit?
    What is the name of your organization?
    What is the name of your City or Locality?
    What is the name of your State or Province?
    What is the two-letter country code for this unit?
    
    Enter key password for <mediator>
                 <RETURN if same as keystore password>:
    [Storing mediatorkeystore.jks]
    
    C:\deploykeystores\new>
  3. Export the webMethods Mediator's self-signed certificate mediator.cer into the CentraSite's truststore.

  4. Configure an HTTPS port and specify the client authentication to Username/Password. The server prompts the client for a user ID and password.

  5. On the Ports screen, click Edit to change the Access Mode. You may Set Access Mode to Allow by Default or Reset to default access settings.

    For more information on configuring ports and client authentication, refer to the document Administering webMethods Integration Server in the documentation set for webMethods Integration Server.

  6. Now restart the Integration Server.

Configure Integration Server to Use Two-way SSL

You perform the following procedure to configure Integration Server for one-way SSL authentication:

Start of instruction setTo configure two-way SSL

  1. Using OpenSSL, create a self-signed certificate (mediator.cer) with the following command:

    openssl req -new -x509 -days 2000 -sha1 -newkey rsa:1024 -nodes 
    -keyout server.key -out server.crt -subj "/O=Company/OU=Unit/CN=localhost"

    Whatever is specified in the CN section of the subject must match the hostname of the machine running the webMethods Mediator and is used to send requests to the Mediator.

  2. Create at least one keystore mediatorkeystore.jks, in PKCS#12 or JKS format, containing an Integration Server key pair to use for SSL.

    C:\deploykeystores\new>keytool -v -genkeypair -alias mediator -keyalg RSA -validity 1000 -keystore mediatorkeystore.jks
    Enter keystore password:
    Re-enter new password:
    What is your first and last name?
    What is the name of your organizational unit?
    What is the name of your organization?
    What is the name of your City or Locality?
    What is the name of your State or Province?
    What is the two-letter country code for this unit?
    
    Enter key password for <mediator>
                 <RETURN if same as keystore password>:
    [Storing mediatorkeystore.jks]
    
    C:\deploykeystores\new>
  3. Create at least one truststore mediatortruststore.jks, in JKS format, in a desired location on the machine where CentraSite is running.

  4. Export the webMethods Mediator's self-signed certificate mediator.cer into the CentraSite's truststore.

  5. Import the CentraSite's self-signed certificate centrasite.cer in to the mediator's truststore mediatortruststore.jks.

    C:\deploykeystores\new>keytool -export -alias 
    
    centrasite -keystore centrasitekeystore.jks -rfc -file 
    
    centrasite.cer
    Enter keystore password:        
    Certificate stored in file <centrasite.cer>
    
    C:\deploykeystores\new>keytool -import -alias 
    
    mediator -keystore mediatortruststore.jks -file 
    
    centrasite.cer
    Enter keystore password:        
    Re-enter new password:        
    Owner:
    Issuer:
    Serial number:
    Valid from:
    Certificate fingerprints:
                  Trust this certificate? [no]:  yes
    Certificate was added to keystore
    
    C:\deploykeystores\new>
  6. Create a keystore and truststore alias using the above created keystore (mediatorkeystore.jks) and truststore (mediatortruststore.jks) respectively. For more information on creating keystore and truststore aliases, refer to the document Administering webMethods Integration Server in the documentation set for webMethods Integration Server.

  7. Configure an HTTPS port and specify the client authentication to any of the following:

  8. On the Ports screen, click Edit to change the Access Mode. You may Set Access Mode to Allow by Default or Reset to default access settings.

  9. If chosen client authentication as Require Client Certificates above, map the client certificate to any valid user in the Integration Server.

    For more information on configuring ports and client authentication, refer to the document Administering webMethods Integration Server in the documentation set for webMethods Integration Server.

  10. Now restart the Integration Server.

Configuring webMethods Mediator to Use SSL

Configure your instance of webMethods Mediator as described in the section Configuring Mediator in the document Administering webMethods Mediator in the documentation set for webMethods Mediator.

Top of page