HP WBEM Services Version A.02.09.10 Release Notes (5900-1767, September 2011)

Importing server certificates to trust store
CIM client applications must maintain a trust store in the <trust_store-name>.pem file. The
CIM client applications must import the certificates stored in /etc/opt/hp/sslshare/cert.pem
to a trust store file on the client machine from various CIM Server machines (machines that the
client wants to connect to).
With C++ CIM client libraries, the trust store should be in PEM format.
To import a server certificate, copy the public certificate from the server to the client application:
1. Copy the certificate (/etc/opt/hp/sslshare/cert.pem) from the system where HP
WBEM Services is installed.
NOTE: Do not copy the key in the /etc/opt/hp/sslshare/file.pem, copy only the
public certificate in the /etc/opt/hp/sslshare/cert.pem file.
2. Use the ssltrustmgr command to add the certificate (from cert.pem) to the trust store
<trust_store-name>.pem on the client machine.
NOTE: The wbemexec command uses the file /etc/opt/hp/sslshare/client.pem
as its trust store. Import the server certificates for this client into the /etc/opt/hp/sslshare/
client.pem file.
Standard conformance
This version of the HP WBEM Services product complies with the following standards:
CIM Operations over HTTP, Version 1.1
Representation of CIM in XML, Version 2.1
CIM Infrastructure Specification, Version 2.3
CIM Schema, Version 2.17.1
For more information, see the DMTF WBEM and CIM standards at http://www.dmtf.org.
Compatibility information
This section describes the compatibility information for HP WBEM Services Version A.02.09.10.
Compatibility for WBEM providers
Table 3 lists the product bundle and WBEM version information for HP-UX 11i v3. Use this table
to determine, which bundle is compatible with your version of HP-UX.
Use the swlist <product tag> command to view your product bundle version number.
10 HP WBEM Services Version A.02.09.10 Release Notes