r10 - 2014-11-09 - 09:42:36 - Main.sbeardYou are here: TWiki >  Deployment Web > DeploymentInstallingUpgradingAndMigrating > InstallProxyServers > ConfigureCLMEnterpriseReverseProxywithWAS7

Configuring Enterprise CLM Reverse Proxies, Part 2: WebSphere 7 and IHS 7 Plugin method

Authors: SudhakarFrederick
Build basis: Collaborative Lifecycle Management 3.0.1

This part of the guide will explain how to setup and configure an example CLM environment using WebSphere Application Server (WAS), IBM HTTP Server(IHS) and the WAS web server plugins for IHS, such that users will be able to access the various CLM applications simply by changing the context root of a central URL which is processed by IHS. IHS will take care of sending the requests to the appropriate JTS/CCM/QM/RM application servers living behind the proxy.

Configuring the WebSphere and HTTP Server plugin method

There are two methods used to deploy the WAS Web Server plugins depending on whether IHS and the WAS profiles are local or remote. To demonstrate both methods, we will assume that the JTS, RM and CCM application server profiles are co-located with the IHS server (local), with the QM application on it's own server (remote).

The user accessible Public URIs (and the actual servers they redirect to) will be:
https://clm.example.org/qm (https://qmserver01.example.org:9443/qm)
https://clm.example.org/jts (https://clm.example.org:9447/jts)
https://clm.example.org/rm (https://clm.example.org:9448/rm)
https://clm.example.org/ccm (https://clm.example.org:9449/ccm)

We will also configure single sign-on with WAS such that a user only needs to log into one of the products and subsequent access to the other applications will not require re-authentication. The configuration will use an LDAP directory. Experienced WAS administrators will be aware that the WAS configuration steps in this guide can be carried out in different ways using "wsadmin" or the WAS Integrated Solutions console.

N.B. Note that all of the setup and configuration documented here MUST be done before running the JTS setup wizard to ensure that the public URIs are set correctly to the external URIs.

Example Server Configuration

For the purposes of this article we use two separate Windows 2008 servers configured as follows:

     Server 1 (Host-name: clm.example.org):

     IBM HTTP Server already installed, listening on port 80 with the IHS Administrative console on port 8008
     WAS profile with JTS, Admin and CLMHelp applications deployed (HTTPS port : 9447)
     WAS profile with CCM WAR deployed (HTTPS port : 9449)
     WAS profile with RM WAR deployed (HTTPS port : 9448)
     LDAP Server

     Server 2 (Host-name: qmserver01.example.org):

     WAS profile hosting QM (HTTPS port: 9443)

Prerequisites and Assumptions

  • Use the instructions provided in the CLM Infocenter to deploy the different applications
  • Each of the WAS profiles is configured to use LDAP domain "example.org" for authentication
  • IBM WebSphere plugin installation media is available
  • Administrative console access to each WAS profile is available
  • Username and password available for access to IHS Administrative console
  • Firewalls on the two servers are configured appropriate, allowing access to the internal ports only between the Server 1 and Server 2. In other words ports 9443, 9447, 9448, 9449, 8008 are not visible to the outside world
  • The firewall on Server 1 allows access to port 443 from the outside world

N.B.The Jazz platform currently does not support clustering, as a result the current tested and supported WebSphere platforms are Base only and do not included WebSphere ND. This means that for a multi-node deployment a manual merge of the plugin-cfg.xml file will be required.

Procedure

Create a key database and self-signed certificate for IHS

In this step we create a CMS keystore database file and a self-signed certificate which are needed to authenticate IHS during an SSL handshake. Note that Self-signed certificates should only be used for test/development scenarios. In production environments use the appropriate organizational certificates provided by a trusted certificate authority. We will later add the WAS certificates to this same keystore database.

Make sure the IHS Server is stopped
Run the "gsk7cmd" utility (alternatively use the ikeyman GUI) to create a new keystore database (ihskeys.kdb) and password stash file (ihskeys.sth) both of which will be created in the current directory (C:/IBM/HTTPServer/bin in this example).

gsk7cmd.bat -keydb -create -db ihskeys.kdb -pw secret -expire 365 -stash -type cms


  Create a self-signed certificate and add it to the the new keystore db

gsk7cmd.bat -cert -create -db ihskeys.kdb  -label clm.example.org -expire 365 -dn "CN=clm.example.org" -default_cert yes -pw secret


Enable SSL directives within the IBM HTTP Server's configuration file (httpd.conf)

In this step we need to first direct IHS to load the SSL support module (mod_ibm_ssl.so) and then direct IHS to listen for secure requests (on port 443 in this example). We also need to point IHS to the key database file (ihskeys.kdb) and password stash file (ihskeys.sth) that were created earlier.
Add (or uncomment) the following lines in httpd.conf, making sure that the values for the KeyFile and SSLStashFile directives match the names of the files generated in the previous section:

LoadModule ibm_ssl_module modules/mod_ibm_ssl.so

Listen 0.0.0.0:443
## Uncomment for IPv6 support:
#Listen [::]:443
<VirtualHost *:443>
SSLEnable
</VirtualHost>
KeyFile C:/IBM/HTTPServer/bin/ihskeys.kdb
SSLStashFile C:/IBM/HTTPServer/bin/ihskeys.sth
SSLDisable

Setup SSL Handshake Between the WAS profiles and IHS

N.B.This step can be scripted using the wsadmin AdminTask.createKeyStore and AdminTask.exportCertificatecommands. See the attached CLMReverseProxy.py for an example.

Now we need to proxy SSL requests from IHS to the WAS servers by exporting the WAS keys and importing them  into the IHS keystore database previously created.
  1. Login to the WAS Integration Solutions Console for the JTS profile.
  2. Navigate to Security -> SSL certificate and key management -> Key Stores and Certificates, create a new Key store with the following values:
    Name: jtswaskeys
    Path: jtswaskeys.kdb
    Type: CMSKS
    Password:secret
    Create JTS WAS Keys
     
  3. Click OK then Save. This will create the file <jtswasprofileroot>/etc/jtswaskeys.kdb.
  4. Navigate to SSL certificate and key management -> Key stores and certificates -> NodeDefaultKeyStore
  5. Choose "Personal certificates" from the right sidebar
  6. Check the default certificate and click Export.
  7. Specify the following values in the Export certificates pane:
    Key Store Password: WebAS (unless this has been changed)
    Select the "Key Store File" radio button
    Key File Name: jtswaskeys.kdb
    Type: CMSKS
    Password: secret
    exportjtswaskeys.png
  8. Click OK. This will export the default WAS personal certificates into <jtswasprofileroot>/etc/jtswaskeys.kdb.
  9. Add the certificates from the exported keystore (jtswaskeys.kdb) into the previously created IHS keystore(ihskeys.kdb).
cd C:\IBM\HTTPServer\bin
gsk7cmd -cert -import -db <jtswasprofileroot>/etc/jtswaskeys.kdb -pw secret -type cms -target ihskeys.kdb -target_pw secret -target_type cms -label default -new_label default_jtswas

Repeat the above steps, changing the value of Key File Name as appropriate for each of the CCM(ccmwaskeys.kdb), RM (rmwaskeys.kdb)and QM profiles (qmwaskeys.kdb). Note that since the QM WAS profile is not co-located with the IHS server, we first need to copy "qmwaskeys.kdb" to the IHS server.

Force WAS To Honor Host Headers

N.B.This step can be scripted using the wsadmin AdminConfig.list and AdminConfig.create commands. See the attached CLMReverseProxy.py for an example.

To avoid a problem with Jazz redirecting to :9443 ports on the IHS Server we need to set a couple of Web Container custom properties in WAS.
  1. Login to the WAS Integration Solutions Console for each WAS profile and navigate to Servers -> Server Types -> WebSphere application servers -> server1
  2. Under "Container Settings" expand Web Container Settings. Choose "Web Container".selectwebcontainer.png
  3. Add the following custom properties:
trusthostheaderport = true
com.ibm.ws.webcontainer.extracthostheaderport = true

webcontainercustom.png

Single Sign-On(SSO) with WAS

To allow sharing of authentication tokens between the different WAS profiles, we need to enable the SSO property in each WAS profile, export the LTPA (Lightweight Third Party Authentication) keys from one profile and import them into each of the other profiles.

Part I: Setup JTS profile for SSO and export keys

N.B.This step can be scripted using the wsadmin AdminTask.configureSingleSignon and AdminTask.exportLTPAKeys commands. See the attached CLMReverseProxy.py for an example.

  1. Login to the WAS Integration Solutions Console for the JTS WAS profile.
  2. Navigate to Global Security -> Web and SIP Security -> Single sign-on (SSO) and set the following properties:
    Enabled
    Domain name: example.org
    Requires SSL
    websipssosetting.png
  3. Click OK then Save.
  4. Navigate to Global Security,select LTPA and enter the following values:
    Password : secret
    Confirm Password : secret
    Fully qualified key file name : jtsssokey
  5. Click Export keys.
    LTPAexport.png
  6. Click OK then Save. This will create a file <jtswasprofileroot>/jtsssokey which we will import into the other WAS profiles.
  7. Stop and restart the JTS profile.

Part II: Setup RM, QM and CCM for SSO and import JTS keys

N.B.This step can be scripted using the wsadmin AdminTask.configureSingleSignon and AdminTask.importLTPAKeys commands.

  1. Copy the jtssokey generated above from <jtswasprofileroot> to <rmwasprofileroot>/jtsssokey
  2. Login to the WAS Integration Solutions Console for the RM WAS profile.
  3. Navigate to Global Security -> Web and SIP Security -> Single sign-on (SSO) and set the following properties:
    Enabled*
    *Domain name
    : example.org
    *Requires SSL*
    websipssosetting.png
  4. Click OK then Save.
  5. Navigate to Global Security,select LTPA and enter the following values:
    Password : secret
    Confirm Password : secret
    Fully qualified key file name : jtsssokey
  6. Click Import keys.
  7. Click OK then Save.
  8. Stop and restart the RM profile.

Repeat the above steps for each of the CCM and QM profiles, copying the jtsssokey file to the <ccmwasprofileroot> and <qmwasprofileroot> respectively.

Configure WAS IHS Plug-in for JTS (Server 1)

We will now use the WAS Web Server Plugin install wizard to configure IHS such that all requests to https://clm.example.org/jts, https://clm.example.org/admin and https://clm.example.org/clmhelp are redirected to https://clm.example.org:9447/jts, https://clm.example.org:9447/admin and https://clm.example.org:9447/clmhelp respectively. As noted before, for the purposes of this example, the WAS profile to which the JTS, Admin and CLMHelp applications have been deployed is co-located on the same server as IHS. We therefore use the procedure described in Configuring a Web server and an application server profile on the same machine.

The following steps are performed on "Server 1' which hosts both IHS and the WAS profile hosting the JTS, Admin and CLMHelp applications.

Generate the plugin configuration file

  1. Stop the JTS WAS profile.
  2. Stop IHS.
  3. Launch the Plug-ins installation wizard.
    webserverplugininstall01.png
  4. Clear the check box for the roadmaps and click Next.
  5. Read the license agreement and accept the agreement it if you agree to its terms. Click Next.
  6. Select "IBM HTTP Server V7" for Web server type and click Next.
    webserverplugininstall03.png
  7. Select WebSphere Application Server machine (local) and click Next.
    webserverplugininstall04.png
  8. Specify a location for the installation root directory for the plug-ins. Click Next. (Click Yes if prompted with a warning that the directory is not empty).
    webserverplugininstall05.png
  9. Specify the Application Server Installation Location root directory and click Next.
    webserverplugininstall06.png
  10. Select the profile that the JTS, Admin and CLMHelp applications are deployed to and click Next.
    webserverplugininstall07.png
  11. Click Browse to select the configuration file for IHS, verify that the Web server port is correct, and then click Next when you are finished.
    webserverplugininstall08.png
  12. Specify a unique nickname for the Web server. Click Next when you are finished.
    webserverplugininstall09.png
  13. Specify the location for the plugin-cfg.xml file to be generated and click Next.
    webserverplugininstall10.png
  14. Click Next on the pre-installation summary panel to begin the installation. The wizard begins installing the plug-ins and configuring the Web server and the application server. Note the path of the Plug-in configuration file, which we will use later.
    webserverplugininstall11.png
  15. Verify the success of the installation on the Installation summary panel and click Finish to exit the wizard.

Edit httpd.conf

  1. Open the IHS httpd.conf file in a text editor and verify that the following two lines have been added to the end of it.
    LoadModule was_ap22_module "C:\IBM\HTTPServer\Plugins\bin\32bits\mod_was_ap22_http.dll"
    WebSpherePluginConfig "C:\IBM\HTTPServer\Plugins\config\webserver1\plugin-cfg.xml"
    

  2. Open the generated plugin configuration file (C:\IBM\HTTPServer\Plugins\config\webserver1\plugin-cfg.xml in this case) and modify the keyring and stashfile properties of the HTTPS Transport attributes to use the IHS keyfile and SSL Stashfile.
    <Transport Hostname="clm.example.org" Port="9447" Protocol="https">
    <Property Name="keyring" Value="C:/IBM/HTTPServer/bin/ihskeys.kdb"/>
    <Property Name="stashfile" Value="C:/IBM/HTTPServer/bin/ihskeys.sth"/>
    </Transport>
    

  3. Start IHS and the JTS WAS profile.
First verify that you can access the JTS page using the "internal" URL: https://clm.example.org:9447/jts. Next verify that the IHS URL https://clm.example.org/jts displays the same page.

Configure WAS IHS Plug-in for RM and CCM applications (Server 1)

We will now use the WAS Web Server Plugin install wizard to configure IHS such that all requests to https://clm.example.org/rm and https://clm.example.org/ccm are redirected to https://clm.example.org:9448/rm and https://clm.example.org:9449/ccm respectively. As noted before, for the purposes of this example, the WAS profiles to which the RM and CCM applications have been deployed are co-located on the same server as IHS. We therefore use the procedure described in Configuring a Web server and an application server profile on the same machine.

This is similar to the procedure used for the JTS with the exception that we will need to manually merge some of the content from the plugin configuration file generated for the RM and CCM profiles into the plugin configuration file already created for the JTS.

The following steps are performed on "Server 1' which hosts both IHS and the WAS profile hosting the RM, and CCM applications.

Generate plugin configuration file

  1. Stop the RM WAS profile.
  2. Stop IHS.
  3. Launch the Plug-ins installation wizard on the machine.
    webserverplugininstall01.png
  4. Clear the check box for the roadmaps and click Next.
  5. Read the license agreement and accept the agreement it if you agree to its terms. Click Next.
  6. Select "IBM HTTP Server V7" for Web server type click Next.
  7. Select WebSphere Application Server machine (local) and click Next.
    webserverplugininstall04.png
  8. Specify the location for the installation root directory for the plug-ins. Click Next. (Click Yes if prompted with a warning that the directory is not empty).
    webserverplugininstall05.png
  9. Specify the Application Server Installation Location root directory and click Next.
    webserverplugininstall06.png
  10. Select the profile that the RM application is deployed to and click Next.
    selectRMprofile.png
  11. Click Browse to select the configuration file for IHS, and then click Next. Click OK when prompted that the HTTP Server configuration file already contains plugin entries.
    selectRMprofile01.png
  12. Specify a unique nickname for the Web server. Click Next when you are finished.
    selectRMprofile02.png
  13. Specify the location for the plugin-cfg.xml file and click Next.
    Note that the location for this should be different to that of the plugin configuration file previously generated for the JTS.
    selectRMprofile03.png
  14. Click Next on the pre-installation summary panel to begin the installation. The wizard begins installing the plug-ins and configuring the Web server and the application server. Note the path of the Plug-in configuration file, which we will use later.
    selectRMprofile04.png
  15. Verify the success of the installation on the Installation summary panel and click Finish to exit the wizard.

Edit httpd.conf

We pointed the wizard to the same httpd.conf file as when we configured the JTS profile and it will have modified it to use the new plugin configuration file generated for the RM profile. We need to edit it to revert it to the previous configuration where it uses the plugin configuration generated for the JTS. Open the IHS httpd.conf file, uncomment the following two lines.
LoadModule was_ap22_module "C:\IBM\HTTPServer\Plugins\bin\32bits\mod_was_ap22_http.dll"
WebSpherePluginConfig "C:\IBM\HTTPServer\Plugins\config\webserver1\plugin-cfg.xml"
and delete the following two lines:
LoadModule was_ap22_module "C:\IBM\HTTPServer\Plugins\bin\32bits\mod_was_ap22_http.dll"
WebSpherePluginConfig "C:\IBM\HTTPServer\Plugins\config\webserver_rm\plugin-cfg.xml"
Save the httpd.conf file.

Merge plugin directives

We now need to follow the procedure in Merging plugin-cfg.xml files from multiple nodes and manually merge in the appropriate sections from the plugin configuration generated for the RM profile into the plugin configuration generated for the JTS. Open the plugin configuration file generated when configuring the JTS profile (C:\IBM\HTTPServer\Plugins\config\webserver1\plugin-cfg.xml in this case) in a text editor. Also open the plugin configuration file generated when configuring the RM profile (C:\IBM\HTTPServer\Plugins\config\webserver_rm\plugin-cfg.xml in this case) in a separate text editor window. Copy and paste the following lines:
<VirtualHost Name="*:9085"/>
<VirtualHost Name="*:9448"/>
<VirtualHost Name="*:5071"/>
<VirtualHost Name="*:5070"/>
from the webserver_rm\plugin-cfg.xml to the <VirtualHostGroup> element in webserver1\plugin-cfg.xml, so that the <VirtualHostGroup> element now looks like
<VirtualHostGroup Name="default_host">
      <VirtualHost Name="*:9084"/>
      <VirtualHost Name="*:80"/>
      <VirtualHost Name="*:9447"/>
      <VirtualHost Name="*:5069"/>
      <VirtualHost Name="*:5068"/>
      <VirtualHost Name="*:443"/>
      <VirtualHost Name="*:9085"/>
      <VirtualHost Name="*:9448"/>
      <VirtualHost Name="*:5071"/>
      <VirtualHost Name="*:5070"/>
</VirtualHostGroup>
Next copy over the <ServerCluster>, <UriGroup> and <Route> elements from the webserver_rm\plugin-cfg.xml to the webserver1\plugin-cfg.xml, pasting them before the closing </config> tag. Also modify the keyring and stashfile properties of the HTTPS Transport attributes for port 9448 to use the IHS keyfile and SSLStashfile.
<Transport Hostname="clm.example.org" Port="9448" Protocol="https">
   <Property Name="keyring" Value="C:/IBM/HTTPServer/bin/ihskeys.kdb"/>
   <Property Name="stashfile" Value="C:/IBM/HTTPServer/bin/ihskeys.sth"/>
</Transport>
Save the webserver1\plugin-cfg.xml.
Start IHS and the RM WAS profile.
First verify that you can still access the JTS page using the IHS URL https://clm.example.org/jts.
Next verify that you can access the RM page using the "internal" URL: https://clm.example.org:9448/rm. Next verify that the IHS URL https://clm.example.org/rm displays the same page.

Repeat the above steps for the CCM profile, modifying the WAS profile used to "ccm", the webserver nickname to "webserver_ccm" and the plugin configuration file to "C:\IBM\HTTPServer\Plugins\config\webserver_ccm\plugin-cfg.xml".

Configure WAS IHS Plug-in for the QM application (Server 2)

We will now use the WAS Web Server Plugin install wizard to configure IHS such that all requests to https://clm.example.org/qm are redirected to https://qmserver01.example.org:9443/qm and. As noted before, for the purposes of this example, the WAS profile to which the QM application has been deployed is not co-located on the same server as IHS. We therefore use the procedure in Configuring a Web server and an application server on separate machines (remote). This is similar to the procedure used for the RM and CCM applications with the exception that we will use the IHS Admin console from the QM WAS profile to propagate the plugin configuration file to the IHS server.

The following steps are performed on "Server 1' which hosts IHS.

Generate manual plugin configuration script

  1. Stop IHS.
  2. Launch the Plug-ins installation wizard on the server where IHS is installed (Server 1).
    webserverplugininstall01.png
  3. Clear the check box for the roadmaps and click Next.
  4. Read the license agreement and accept the agreement it if you agree to its terms. Click Next.
  5. Select "IBM HTTP Server V7" for Web server type click Next.
  6. Select Web Server machine (remote) and click Next.
    webserverremote.png
  7. Specify the location for the installation root directory for the plug-ins. Click Next. (Click Yes if prompted with a warning that the directory is not empty).
    webserverplugininstall05.png
  8. Click Browse to select the configuration file for IHS, and then click Next. Click OK when prompted that the HTTP Server configuration file already contains plugin entries
    selectRMprofile01.png
  9. Specify a unique nickname for the Web server. Click Next when you are finished.
    webserver_qm.png
  10. Specify the location for the plugin-cfg.xml file and click Next.
    Note that the location for this should be different to that of the plugin configuration file previously generated for the JTS.
    webserver_qm_cfg.png
  11. Specify the host-name (qmserver01.example.org) of the server hosting the QM WAS profile.
    webserver_qm_hostname.png
  12. Click Next on the pre-installation summary panel to begin the installation. The wizard begins installing the plug-ins and configuring the Web server and the application server. Note the path of the Plug-in configuration file, which we will use later.
    webserver_qm_final.png
  13. Once the installation completes, the wizard generates a manual configuration script which must be run on the QM server. The path to the script is displayed in the installation summary panel.
    webserver_qm_summary.png
  14. Verify the success of the installation on the Installation summary panel and click Finish to exit the wizard.

Edit httpd.conf

We pointed the wizard to the same httpd.conf file as when we configured the JTS profile and it will have modified it to use the new plugin configuration file generated for the QM profile. We need to edit it to revert it to the previous configuration where it uses the plugin configuration generated for the JTS. Open the IHS httpd.conf file, uncomment the following two lines.
LoadModule was_ap22_module "C:\IBM\HTTPServer\Plugins\bin\32bits\mod_was_ap22_http.dll"
WebSpherePluginConfig "C:\IBM\HTTPServer\Plugins\config\webserver1\plugin-cfg.xml"
and remove the following two lines:
LoadModule was_ap22_module "C:\IBM\HTTPServer\Plugins\bin\32bits\mod_was_ap22_http.dll"
WebSpherePluginConfig "C:\IBM\HTTPServer\Plugins\config\webserver_qm\plugin-cfg.xml"

The following steps are performed on "Server 2' which hosts the WAS profile hosting the QM application.

Run manual configuration script on Server 2

We now copy the manual configuration script generated above (C:\ibm\HTTPServer\Plugins\bin\configurewebserver_qm.bat) to the <was_install_root /bin directory on Server 2. If the WAS profile hosting the QM application isn't already running start it. Run the configurewebserver_qm.bat script:
C:\ibm\WebSphere\AppServer\bin>configurewebserver_qm.bat  -profileName qm -user wasadminuser -password wasadminpassword
Using the profile qm
Using WebSphere admin userID wasadminuser
WASX7209I: Connected to process "server1" on node qm using SOAP connector;  
The type of process is: UnManagedProcess
WASX7303I: The following options are passed to the scripting environment and are
available as arguments that are stored in the argv variable: "[webserverqm, IHS, C:\\IBM\\HTTPServer, C:\\IBM\\HTTPServer\\conf\\httpd.conf, 
80, MAP_ALL, C:\\IBM\\WebSphere\\Plugins, unmanaged, clm.example.org-node, clm.example.org, windows]"
Input parameters:
   Web server name             - webserverqm
   Web server type             - IHS
   Web server install location - C:\IBM\HTTPServer
   Web server config location  - C:\IBM\HTTPServer\conf\httpd.conf
   Web server port             - 80
   Map Applications            - MAP_ALL
   Plugin install location     - C:\IBM\WebSphere\Plugins
   Web server node type        - unmanaged
   Web server node name        - clm.example.org-node
   Web server host name        - clm.example.org
   Web server operating system - windows
   IHS Admin port              - 8008
   IHS Admin user ID           - ""
   IHS Admin password          - ""
   IHS service name            - ""
....

Start saving the configuration.

Configuration save is complete.

Propagate the QM plugin configuration file to the IHS server

  1. Login to the WAS Integration Solutions Console for the QM WAS profile.
  2. Navigate to Servers -> Server Types -> Web Servers
  3. Click "webserver_qm" and click "Remote web server management"
    qm_remote01.png
  4. Specify the Port, Username and password to allow WAS to connect to the IHS Admin console. Click OK and Save.
    qm_remote02.png
  5. Select "webserver_qm" and click "Generate Plug-in".
    qm_webgenerate.png
  6. Once the plugin file has been generated, select webserver_qm and click Propagate Plug-in.
    qm_webgpropagate.png

If successful WAS will generate a message such as:

InformationPLGC0062I: The plug-in configuration file is propagated from 
C:\ibm\WebSphere\AppServer\profiles\qm\config\cells\qm\nodes\clm.example.org-node\servers\webserver_qm\plugin-cfg.xml 
to C:\IBM\HTTPServer\Plugins/config/webserver_qm/plugin-cfg.xml on the Web server computer.
InformationPLGC0048I: The propagation of the plug-in configuration file is complete for the Web server. 
qm.clm.example.org-node.webserver_qm.
Note the path displayed for the generated plugin configuration file on Server 1 which is the IHS Server:
C:\IBM\HTTPServer\Plugins/config/webserver_qm/plugin-cfg.xml

The following steps are performed on "Server 1' which hosts IHS.

Merge plugin directives

We now need to follow the procedure in Merging plugin-cfg.xml files from multiple nodes and manually merge in the appropriate sections from the plugin configuration generated for the QM profile into the plugin configuration generated for the JTS.
Open the plugin configuration file generated when configuring the JTS profile (C:\IBM\HTTPServer\Plugins\config\webserver1\plugin-cfg.xml in this case) in a text editor. Also open the plugin configuration file generated when configuring the QM profile (C:\IBM\HTTPServer\Plugins\config\webserver_qm\plugin-cfg.xml in this case) in a separate text editor window. Copy and paste the following lines
<VirtualHost Name="*:9080"/>
<VirtualHost Name="*:9443"/>
<VirtualHost Name="*:5061"/>
<VirtualHost Name="*:5060"/>
from the webserver_qm\plugin-cfg.xml to the <VirtualHostGroup> element in webserver1\plugin-cfg.xml, so that the <VirtualHostGroup> element now looks like
<VirtualHostGroup Name="default_host">
      <VirtualHost Name="*:9084"/>
      <VirtualHost Name="*:80"/>
      <VirtualHost Name="*:9447"/>
      <VirtualHost Name="*:5069"/>
      <VirtualHost Name="*:5068"/>
      <VirtualHost Name="*:443"/>
      <VirtualHost Name="*:9085"/>
      <VirtualHost Name="*:9448"/>
      <VirtualHost Name="*:5071"/>
      <VirtualHost Name="*:5070"/>
      <VirtualHost Name="*:9086"/>
      <VirtualHost Name="*:9449"/>
      <VirtualHost Name="*:5073"/>
      <VirtualHost Name="*:5072"/>
      <VirtualHost Name="*:9080"/>
      <VirtualHost Name="*:9443"/>
      <VirtualHost Name="*:5060"/>
      <VirtualHost Name="*:5061"/>
    
</VirtualHostGroup>   
Next copy over the <ServerCluster>, <UriGroup> and <Route> elements from the webserver_qm\plugin-cfg.xml to the webserver1\plugin-cfg.xml, pasting them before the closing </config> tag. Also modify the keyring and stashfile properties of the HTTPS Transport attributes for port 9448 to use the IHS keyfile and SSLStashfile.
<Transport Hostname="qmserver01.example.org" Port="9443" Protocol="https">
   <Property Name="keyring" Value="C:/IBM/HTTPServer/bin/ihskeys.kdb"/>
   <Property Name="stashfile" Value="C:/IBM/HTTPServer/bin/ihskeys.sth"/>
</Transport>
Save the webserver1\plugin-cfg.xml.
Start IHS.
First verify that you can still access the JTS page using the IHS URL https://clm.example.org/jts.
Also verify that you can still access the RM and CCM pages using the IHS URLs https://clm.example.org/rm and https://clm.example.org/ccm respectively.
Next verify that you can access the QM page using the "internal" URL: https://qmserver01.example.org:9443/qm. and then verify that the IHS URL https://clm.example.org/qm displays the same page.

Running the JTS Setup Wizard

Now that we have URLs that are server agnostic we can run the JTS setup wizard and use these URLs when registering the applications. Here are the discovery URLs that will be used:

Requirements Management: https://clm.example.org/rm/scr
Quality Management: https://clm.example.org/qm/scr
Change and Configuration Management: https://clm.example.org/ccm/scr
Lifecycle Project Administration: https://clm.example.org/admin/scr

Moving an application

Now suppose that we wish to redeploy the CCM application to it's own separate server (for example, ccmserver01.example.org) without affecting users' ability to access it through https://clm.example.org/ccm. Here is a summary of the steps, previously detailed, to be repeated:

  1. Deploy the CCM application to WAS on ccmserver01.example.org
  2. Follow the instructions in the CLM Infocenter, making sure to copy over the directory that contains the indexes and configuration files, located at /server/conf/ccm for the CCM application from the original server.
  3. Setup SSL Handshake Between WAS profile on ccmserver01.example.org and IHS on clm.example.org
    Follow the procedure detailed in Setup SSL Handshake Between the WAS profiles and IHS, creating a new "ccmwaskeys.kdb" keystore from the new WAS profile, copying this keystore over to the IHS server and using gs7cmd to import it into the IHS keystore (ihskeys.kdb).
  4. Force WAS To Honor Host Headers
    Follow the procedure in Force WAS To Honor Host Headers on the new WAS profile hosting the CCM application.
  5. Setup Single Sign-On(SSO) with WAS and import JTS keys Follow the procedure in Part II: Setup RM, QM and CCM for SSO and import JTS keys to set the domain name and import the keys from the jtsssokey key file.
  6. Configure WAS IHS Plug-in for the CCM application
    Follow the procedure in Configure WAS IHS Plug-in for the QM application (Server 2) to generate the plugin configuration script for the CCM profile, edit the httpd.conf file, copy the generated script to the new CCM server, run the script and propagate the plugin configuration back to the IHS server
  7. Replace plugin directives
    Finally follow the procedure in Merge plugin directives this time replacing the CCM application related entries in the merged plugin configuration file (C:\IBM\HTTPServer\Plugins\config\webserver1\plugin-cfg.xml) with the corresponding entries from the plugin configuration generated for the new CCM WAS profile.

References

  1. Collaborative Lifecycle Management 3.0.1 Information Center: Fully distributed CLM enterprise topology example
  2. jazz.net: Moving Jazz Servers and URI Stability with CLM 2011
  3. Collaborative Lifecycle Management 3.0.1 Information Center: Using a reverse proxy in your topology
  4. Rational Team Concert 3.0.1 English License Agreement
  5. WebSphere 7 Information Center
  6. Using content caching proxies for Jazz Source Control
  7. Automating SSL configurations using scripting
  8. Tip: Single Sign-on using WebSphere Application Server
  9. Example Jython script automating WAS setup for this article
  10. Guide to properly setting up SSL within the IBM HTTP Server
  11. Using iKeyman to create a key database file
Related topics: Proxy server installation, Understanding reverse proxy, Configuring Enterprise CLM Reverse Proxies: Apache and mod_proxy, Configuring Enterprise CLM Reverse Proxies: WebSphere 8.5 ND Proxy
Additional contributors: RosaNaranjo

Questions and comments:

Edit | Attach | Printable | Raw View | Backlinks: Web, All Webs | History: r10 < r9 < r8 < r7 < r6 | More topic actions
 
This site is powered by the TWiki collaboration platformCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Contributions are governed by our Terms of Use. Please read the following disclaimer.