Creating a certificate for the IBM Workload Scheduler agent
Perform the following steps to create certificates that are signed
by a local common trusted CA on every IBM Workload Scheduler agent
in your network.
- Enter the following command to create a default CMS key database client.kdbˮ with password
“password02ˮ that expires after 1000 days. The password is also stored in stash
file “client.sthˮ.
gsk7capicmd -keydb -create -db client.kdb -pw password02 -stash -expire 1000 -fips - Enter the following command to add the CA certificate as trusted in the CMS key database. The
label “CA certificate clientˮ is used to address that certificate.
gsk7capicmd -cert -add -db client.kdb -pw password02 -label "CA certificate client" -trust enable -file CA.crt -format ascii -fips - Enter the following command to create the client certificate request based on 2048 bits key,
with label “Client WA95 Certificateˮ and distinguish name
“CN=Client WA95,O=IBM,OU=TWS,C=ITˮ. The certificate
request “client.csrˮ is generated and the private key is created in the key
database client.kdb.
gsk7capicmd -certreq -create -db client.kdb -pw password02 -label "Client WA95 Certificate" -size 2048 -file client.csr –dn "CN=Client WA95,O=IBM,OU=TWS,C=IT" -fips - Enter the following command so that the CA signs the client's certificate request and
generates a new signed in file “client.crtˮ.
gsk7capicmd -cert -sign -db ca.kdb -pw password00 -label "CA certificate" -target client.crt -expire 365 -file client.csr -fips - Enter the following command to import the signed certificate “client.crtˮ in the CMS key
database “client.kdbˮ.
gsk7capicmd -cert -receive -db client.kdb -pw password02 -file client.crt -fips