Version# | Date | Modified By | Description of Modification |
---|---|---|---|
1.0 | 03/14/2013 | Matt Tiller | Initial version |
1.1 | 04/01/2013 | Matt Weaver | Added clarification regarding keystores on the classpath. |
1.2 | 04/05/2013 | Deepthi Rodrigues | Updated wiki links for source instructions(4.1) and Exchange certificate configuration page |
1.3 | 04/12/2013 | Deepthi Rodrigues | Updated note related to 4.0 support being deprecated with 4.1 release |
1.4 | 05/14/2013 | Naresh Subramanyan | Updated DataSources section providing clarification regarding perfrepo_pool data source. |
1.5 | 07/30/2013 | Matt Weaver | Updates for 4.2. |
1.6 | 03/12/2014 | Chris May | Link updates for 4.3. |
1.7 | 03/21/2014 | Kerry Chin | Review for formatting, style, grammar, etc. |
1.8 | 10/30/2014 | Christopher May | Updated for Admin GUI, Direct Config, and Direct QOS |
1.9 | 07/01/2015 | Naresh Subramanyan | Updated CONNECT and Admin GUI deploy section |
1.10 | 07/21/2016 | Daniel Fernandez | Updated Admin GUI deploy section. |
1.11 | 06/09/2017 | Minh-Hai Nguyen | Update for 5.0. |
1.12 | 01/24/2018 | Tabassum Jafri | Updated Admin GUI deploy section for 5.1 |
1.13 | 10/26/2018 | Paul Tambellini | Updated Keystores keysize and Generic JVM arguments |
CONNECT 5.2.x requires IBM JDK version 1.8 or higher to run the application. The server JDK can be configured from Administrator Console > Server Configuration > Java SDKs, or using the managesdk command line tool.
If Direct will be deployed with CONNECT, the Java Cryptography Extension must be installed. Please see the IBM Documentation.
Create a folder to put configuration files in. For example:
mkdir /home/connect/nhinc |
Make sure the folder you just created is reflected in -Dnhinc.properties.dir in the system properties.
Copy/transfer configuration files to the config folder. In the binary distribution, these files can be found in the Properties directory of the zip. If using the source code:
cp -pr Product/Production/Common/Properties/src/main/resources/* /home/connect/nhinc |
If Admin GUI will be deployed, set the "directconfigwsclient" bean in AdminGUIProxyConfig.xml to "directconfigcontainerwsclient" (for release 4.7 and below):
<alias alias="directconfigwsclient" name="directconfigcontainerwsclient" /> |
Create the keystores in the /home/connect/nhinc directory or ${WAS_PROPS_DIR} as following:
Deploying CONNECT from Binaries#certkeystore
From WebSphere 8.5 Administrator Console > server1 > Process Definition > Java Virtual Machine:
Set the following under "Generic JVM Arguments":
-Xmx8000m -XX:PermSize=1024m -XX:+PrintGCTimeStamps -XX:NewRatio=3 -Dnhinc.properties.dir=/home/connect/nhinc -Djavax.net.ssl.keyStorePassword=changeit -Djavax.net.ssl.trustStorePassword=changeit -Djavax.net.ssl.keyStore=/home/connect/nhinc/gateway.jks -Djavax.net.ssl.keyStoreType=JKS -Djavax.net.ssl.trustStoreType=JKS -Djavax.net.ssl.trustStore=/home/connect/nhinc/cacerts.jks -DCLIENT_KEY_ALIAS=gateway -Dcom.ibm.websphere.webservices.DisableIBMJAXWSEngine=true |
Additionally, set the Classpath to the value used previously for nhinc.properties.dir, e.g.:
/home/connect/nhinc |
Set up the following data sources using the WebSphere Administration Console:
Data Source Name | JNDI Name | Database Name |
---|---|---|
adminguidb_pool | jdbc/adminguidb_datasource | adminguidb |
assigningauthoritydb_pool | jdbc/assigningauthoritydb_datasource | assigningauthoritydb |
asyncmsgs_pool | jdbc/asyncmsgs_datasource | asyncmsgs |
auditrepo_pool | jdbc/auditrepo_datasource | auditrepo |
configdb_pool | jdbc/configdb_datasource | configdb |
docrepository_pool | jdbc/docrepository_datasource | docrepository |
eventdb_pool | jdbc/eventdb_datasource | eventdb |
messagemonitoringdb_pool | jdbc/messagemonitoringdb_datasource | messagemonitoringdb |
patientcorrelationdb_pool | jdbc/patientcorrelationdb_datasource | patientcorrelationdb |
patientdb_pool | jdbc/patientdb_datasource | patientdb |
transrepo_pool | jdbc/transrepo_datasource | transrepo |
For example, when creating a data source for MySQL the following custom properties with the respective values should be set:
CONNECT requires keystores and truststores for both SSL as well as SAML/Digital Signatures. Either add the keystore and truststore to the classpath or provide absolute paths in the signature and truststore properties files. See Exchange Certificate Configuration Details for more details.
From WebSphere 8.5 Administrator Console > server1 > Process Definition > Java Virtual Machine, prepend the folder containing the keystore and truststore to the classpath, using a colon as the separator. For example:
/path/to/certs:<original classpath> |
Update signature.properties and truststore.properties to contain absolute paths, as shown in the following two code blocks:
org.apache.ws.security.crypto.provider=org.apache.ws.security.components.crypto.Merlin org.apache.ws.security.crypto.merlin.keystore.type=jks org.apache.ws.security.crypto.merlin.keystore.password=changeit org.apache.ws.security.crypto.merlin.keystore.alias=gateway org.apache.ws.security.crypto.merlin.file=<absolute path to gateway.jks> org.apache.ws.security.crypto.merlin.keystore.private.password=changeit |
org.apache.ws.security.crypto.provider=org.apache.ws.security.components.crypto.Merlin org.apache.ws.security.crypto.merlin.keystore.type=jks org.apache.ws.security.crypto.merlin.keystore.password=changeit org.apache.ws.security.crypto.merlin.truststore.file=<absolute path to cacerts.jks> |
These keystores and truststores can be managed by the WebSphere Admin Console under Security > SSL certificate and key management > Key stores and certificates.
Using the WebSphere Administrator Console, configure the WebSphere server to require the client certificate during SSL handshakes.
Alternately, an adopter can also do the above steps using the WebSphere command line tool wsadmin. Please refer to the WebSphere 8.5 Admin Guide for more information.