HP XP P9000 Command View Advanced Edition Suite Software 7.6.1-00 Administrator Guide

NOTE:
If the message The compilation of the MOF file failed. appears, collect all the files
at the following location, and then contact maintenance personnel:
In Windows:
installation-folder-for-the-Device-Manager-server\Server\wsi\server\
jserver\mof\
In Linux:
installation-directory-for-the-Device-Manager-server/Server/wsi/server/
jserver/mof/
Related topics
Starting services, page 317
Stopping services, page 318
Configuring an SSL server and clients (CIM client)
To use SSL server authentication for object operations, you need to create a server certificate in the
Device Manager server, and then import it into the CIM client. To use two-way authentication, you
need to create a client certificate in the CIM client, and then import into the Device Manager server.
To use SSL server authentication for event indications, you need to create a server certificate in the
CIM client, and then import it into the Device Manager server. To use two-way authentication, you
need to create a client certificate in the Device Manager server, and then import it into the CIM client.
Creating a key pair and self-signed certificate for a CIM client
To create a key pair and self-signed certificate from a CIM client, use the keytool utility.
Operations to complete in advance
Install Java (JDK 1.5) onto a CIM client.
To create a key pair and self-signed certificate for a CIM client:
1. Execute the following command to create a key pair and self-certificate:
keytool -genkey -keystore keystore-file-name -storepass keystore-password
-alias alias -dname entity-distinguished-name -validity
validity-of-certificate -keypass private-key-password -keyalg
key-algorithm -sigalg signature-algorithm -keysize key-size
Do not use the following symbols in the file name:
: , ; * ? " < > |
Specify the file name as a character string of no more than 255 bytes.
Do not include double quotation marks (") in the alias or password.
For the storepass option and the keypass option, specify the same password.
2. Execute the following command to check the contents of the created key pair and self-signed
certificate:
keytool -list -keystore keystore-file-name -storepass keystore-password
Administrator Guide 233