-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Key ring configuration feedback #2953
Comments
Thanks for the feedbacks. For logging, I think in later v1 versions and v2, Zowe launch script will write the current Zowe level at the beginning of the log. Hope it helps. There are still a lot of works to clean up component logs. It could be a good topic for TSC to discuss what component should write to log, what shouldn't. I don't think v2 had fully solved the certificate problem. There are 2 changes in v2 may help in some way, mainly for the awareness of the roles involved during setup.
What kept from v1 is the
But the JCL itself is a little complicated, hard to read, in order to support 3 security managers. And some use cases are not fully covered. There were discussions related to this #2482 as well as security setup related #2451. They are not mature enough right now so no actions yet. |
Hello I totally agree with the comment below. The documentation explains to generate a certificate with ZOWE processes. I would like to connect my own keyring using the zowe.yaml but it doesn't work ( I use TOP SECRET not RACF ). /usr/lpp/zowe/bin/zwe init certificate -v -c testSAF.yaml --update-config |
Hello Guys, We tried already all possible Szenarions, different Syntax, it just won't work. Is there an Update on this so far? Regards |
@ZOSSYSPROG its been possible to bring-your-own-keyring with zowe for probably 2 years but I don't think the documentation points this out well. I hope that helps. |
Hello I can give you the process I use. @achmelo gave me advices and It works for me. I generate a pem file with the command : The conf file includes the CNAME, DNS ... and details about the certificates The csr file generates from the previous command is given to our PKI. The PKI generates a pem file I used the pem file in this command to generate a new p12 certificate file The p12 file is given to SAF Team to be install in a SAF keyring of the STC ZOWE owner. I hope it helps. Regards |
@1000TurquoisePogs @GilPen |
I would like to share the feedback from a customer who is trying to install and configure Zowe into production. The issues are related to Zowe v1 but I think they also partially apply to v2. I will also add my perception based on the feedback.
Zowe log does not contain a version. Components should not log a lot of details but focus on information important for admins. It is difficult to spot errors inside now.
Certificate configuration is difficult to understand and the documentation is not helpful. We were trying to configure key rings that were already prepared.
The certificate configuration scripts are trying to automate and simplify the whole process. This is great for keystores and also for the test environments but does not work well for key rings in production. The majority of customers are following IBM's recommended roles and processes in security.
See: https://www.ibm.com/docs/en/zos-basic-skills?topic=zos-roles-in-security
Separation of duties does not allow any individual to run the automation script. The documentation should contain numbered configuration steps that the users will easily follow and try to divide the sections by roles (sys prog, security admin ..). I think system programmers will appreciate automation and security admin would prefer just the SAF commands or JCL (different for each security package and simple as possible since they need to review it closely).
It would be also nice to prepare different steps the generate all certificates and different for using the existing key ring.
The text was updated successfully, but these errors were encountered: