System information
Chapter 2. i5/OS consoles under System i5 41
Configure your Linux product
To configure your Linux product, do the following steps:
1. Create a new session by using the setup5250 configuration program.
2. In the 5250 Emulator Connection window, type the HMC TCP system name or IP address
in the AS/400 Host Name field.
3. Select Advanced 5250 Connection.... The Advanced 5250 Emulator Connection window
is displayed.
4. Type 2300 into the Telnet Port number field.
5. Type Emulator User ID and Emulator Password fields.
6. Open the 5250 emulator and select the language you want to see on the interface.
7. Log in using your HMC user ID and password.
8. Select the managed system that contains the logical partition to which you want to
connect.
9. Select the logical partition to which you want to connect.
10.If you select Shared, you must enter a session key that can be used by another user with
another 5250 emulator. If you are the first user, the session key is entered twice to verify
accuracy.
System Manager Security
System Manager Security ensures that the HMC can operate securely in client/server mode.
Servers and clients communicate over the Secure Sockets Layer (SSL) protocol, which
provides server authentication, data encryption, and data integrity. Each System Manager
server has its own private key and a certificate of its public key signed by a certificate
authority (CA) that is trusted by the System Manager clients. The private key and the server
certificate are stored in the server's private key ring file. Each client must have a public key
that contains the certificate of the trusted CA.
A Certificate Authority (CA) is a trusted central administrative entity (a local HMC in this
situation) that can issue digital certificates to clients and servers (HMC4 in Figure 2-11). The
trust in the CA is the foundation of trust in the certificate as a valid credential. A CA uses its
private key to create a digital signature on the certificate that it issues to validate the
certificate's origin. Others, such as System Manager clients, can use the CA certificate's
public key to verify the authenticity of the certificates that the CA issues and signs.
Every digital certificate has a pair of associated cryptographic keys. This pair of keys consists
of a public key and a private key. A public key is part of the owner's digital certificate and is
available for anyone to use. A private key, however, is protected by and available only to the
owner of the key. This limited access ensures that communications that use the key are kept
secure.
The owner of a certificate can use these keys to take advantage of the cryptographic security
features that the keys provide. For example, the certificate owner can use a certificate's
private key to “sign” and encrypt data sent between clients and servers, such as messages,
documents, and code objects. The recipient of the signed object can then use the public key
contained in the signer's certificate to decrypt the signature. Such digital signatures ensure
the reliability of an object's origin and provide a means of checking the integrity of the object.
Note: If you select Dedicated, other users are not able to share the session with you. If
you select Details, you can view which users are connected to this partition.