NetscapeCommunications Corporation ("Netscape")and its licensors retain all ownershiprights to the software programs offeredby
Netscape (referred to herein as "Software") and related documentation. Use of the Software and related documentation i s governed
by the license agreement for the Software and applicable copyright law.
Your right to copy thisdocumentation is limitedby copyright law. Making unauthorizedcopies, adaptations or compilation works is
prohibitedand constitutes a punishable violation of the law. Netscape may revise this documentation from time to time without
notice.
THIS DOCUMENTATION IS PROVIDED " AS IS" WITHOUT WARRANTY OF ANY KIND. IN NO EVENT SHALL NETSCAPE BE
LIABLE FOR INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY KIND ARISING FROM ANY
ERROR IN THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION ANY LOSS OR INTERRUPTION OF BUSINESS,
PROFITS, USE, OR DATA.
This product includes software developed by Apache Software Foundation (http://www.apache.org/). Copyright (c) 1999 The
Apache Software Foundation. All rights reserved.
This product includes software developed by the University of California,Berkeley and its contributors. Copyright(c) 1990,1993,
1994 The Regents of the University of California. All rights reserved.
Netscapeand theNetscape N logo are registered trademarks of Netscape Communications Corporation in theUnited States and
other countries.Other Netscape logos, product names and service names are also trademarks of Netscape and may be registered in
some countries. Sun, Sun Microsystems, and the Sun logo, iPlanet, and the iPlanet logo are trademarks or registered trademarks of
Sun Microsystems, Inc. in the Un ited States and other countries. Other product and brand names are trademarks of their respective
owners.
The downloading, exporting, or reexporting of Netscape software or any underlying information or technology must be in full
compliance with all United States and other applicable laws and regulations. Any provision of N etscape software or d ocumentation
to the U.S. government is with restricted rights as described in the license agreement for that Software.
16Netscape Enterprise Server Administrator’s Guide • August 2002
About This Guide
This guide describes how to configure and administer Netscape® Enterprise
Server, Version 6.1. It is intended for information technology administrators in th e
corporate enterprise who want to extend client-server applications to a broader
audience through the W o rld Wide Web.
This preface includes the following sections:
• What’sInThisGuide?
•How This Guide Is Organized
•Conventions Used In This Guide
•Using the Enterprise Server Documentation
What’s In This Guide?
This guide explains how to configure and administer the Enterpris e Server. After
configuring your ser ver, use this guide to help maintain your server.
After you install the s erver, this guide is available in HTML format at
manual/https/ag in your serverroot directory. By default, the server root
directory is
C:\Netscape\Server6\ or /usr/netscape/server6.
17
How This Guide Is Organized
How This Guide Is Organized
This guide is divided into five parts, plus a glossary, and a comprehensive index. If
you are new to Netscape Enterprise Server 6.1, begin with Part I, “Server Basics”
for an overview of the product. If you are already familiar with this version of
Enterprise Server, skim the materialin Part I, “Server Basics” before goingon to
Part II, “Using the Adminis tr ation Server.”
Once you are familiar with the fundamentals of using the Administration Server,
you can refer to Part III, “Configuring, Monitoring, and Performance Tuning,”
which includes examples of how to configure and monitor your Enterprise Servers.
Part IV, “Managing Virtual Servers and Services” provides information for using
programsand configuration styles.
Finally, Appendices address specific reference topics that describe the various
topics, including: HyperText TransferProtocol (HTTP), server configuration files,
ACL files, internationalization issues, server extensions, and the Netscape
Enterprise Server user interface reference, which you may want to review. Note
that the user interface appendix is available in the online v ersion only.
Part I: Server Basics
This part providesan overviewof the Enterprise Server. The following chaptersare
included:
•Chapter 1, “In troduction to Enterprise Server” provides an overview of
Enterprise Server.
•Chapter 2, “Administering Enterprise Servers” describes how to manage your
Enterprise Server with the Adminis tration Server.
Part II: Using the Administration S erver
This part provides conceptual and procedural details abo ut using the
Administration Server to administer your Enterprise Servers. The following
chapters are included:
•Chapter 3, “Setting Administration Preferences” describes how t o use the
Administration Server Preferences and Global Settings forms to configure your
Enterprise Servers.
18Netscape Enterprise Server Administrator’s Guide • August 2002
How This Guide Is Organized
•Chapter 4, “Managing Usersand Groups” describes how to how to use the
Administration Server Users and Groups forms to configure your Enterprise
Servers.
•Chapter 5, “Securing Your Enterprise Server” describes how to configure your
Enterprise Server security. Note that before reading thischapter you shouldbe
familiar with the basic concepts of public-key crypt ography and the SSL
protocol. These concepts include encryption and decryption; keys; digital
certificates and signatures; CRLs and CKLs; and SSL encryption, ciphers, and
the major steps of the SSL handshake.
•Chapter 6, “M anaging Server Clusters” describes the concept of clustering
servers and explains how you can use them to shareconfigurations among
servers.
Part III: Configuring, Monitoring, and
Performance Tuning
This part includes examples of how to use the Server Manager to configure and
monitor your Enterprise Servers. The following chapters are included:
•Chapter 7, “Configuring Server Preferences” describes how to configure server
preferences for your E nterprise Server.
•Chapter 8, “Contr olling Access to Your Server” describes how to specify who
can access parts of your server.
•Chapter 9, “Using Log Files” describes how to m o nitor your Enterprise Server
using the HyperText Transfer Protocol (HTTP), by recording and viewing log
files, or by using the per formance monitoring tools provided with y our
operating system.
•Chapter 10, “Monitoring Ser vers” describes how to monitor your Enterprise
Server using SNMP (Simple Network Management Protocol).
•Chapter 11, “T uning Your Server for Performance” refers you to the NetscapeEnterprise Server Performance Tuning, Sizing, and Scaling Guide.
Part IV: M anaging Virtual Servers and Services
This part provides information for using the Server Manager to programs and
configuration styles. The following chapters are included:
About This Guide19
Conventions Used In This Guide
•Chapter 11, “Using Virtual Servers” describes how to set up and administer
virtual servers us ing your Enterprise Server.
•Chapter12, “Creating and Configuring Virtual Servers” describeshow you can
create and configure individual virtual servers.
•Chapter 13, “Extending Your Server With Programs” describes how to install
Java™ applets, CGI programs, and other plug-ins on to your server.
•Chapter 14, “C ontent Management” describes how you can configure and
manage your server’s content.
•Chapter 15, “Applying Configuration Styles” describes how to use
configuration styles with Enterprise Server.
Part V: Appendices
This section includes various appendices with reference material that you may
wish to review. T his section includes the following appendices:
•Appendix A, “Command Line Ut ilities” provides instructions for using
command line utilities in place of the user interface screens.
•Appendix B, “HyperText Transfer Protocol” provides a short introduction to a
few HTTP basic concepts.
•Appendix C, “ AC L File Syntax” describes the access-control list (ACL) files
and their syntax.
In addition, a glossary is included to define frequently used terms that may be
unfamiliar to Enterprise Server administrators.
Conventions Used In This Guide
The conventionsusedin this guide are as follows:
Italic
This typeface is used for book titles, emphasis, and any text thatis aplaceholder for
text you need t o replace for your system. For example, in a URL that contains a
reference to your server’s port number, the URL might contain portnumber in
italics. Replace the words in italics with the actual value for your server.
Monospaced font
20Netscape Enterprise Server Administrator’s Guide • August 2002
Using the Enterprise Server Documentation
This typeface is used for any text that you should type. It’s also used for functions,
examples, URLs, filenames, and directory paths.
Using the Enterprise Server Documentation
The following table lists the tasks and concepts that are described in the Enterprise
Server manuals and online RE ADME file. If you are trying to accomplish a specific
task or learn more about a specific concept, refer to the appropriate manual.
NOTE
Table 1
For information aboutSee the following
Late-breakinginformation about the software and the
documentation.
Installing Enterprise ServerNetscape Enterprise Server Installation
Administering one or more Enterprise Servers using the
Administration Server to manage and configure your servers and
to p erform the following tasks:
• Setting up server security.
• Monitoring your serversusing HTTP, v ia log files, SNMP, or via
the tools provided with your OS.
• Defining your server workload and sizing your system to meet
your p erformance needs.
• Installing Java applets, CGI programs, and other plug-ins onto
your server.
The administration server and global information on topics such as
encryption, access control, and performance monitoring.
Enterprise Server Documentation
Enterprise Server manuals are also availablein PDF and HTML format at
enterprise.netscape.com/docs.
NetscapeEnterprise Server Release Notes
and Migration Guide
Netscape Enterprise Server
Administrator’s Guide
Managing Servers with Netscape
Console
About This Guide21
Using the Enterprise Server Documentation
Table 1
For information aboutSee the following
Planning your directory service. How you can use the directory
server to support simple usage that involves only a few hundred
Enterprise Server Documentation (Continued)
NetscapeDirectoryServer Deployment
Manual
users and some key server applications, as well as how you can
scale the directory server to support millions of users. You are also
introduced to the basic directory service concepts and specific
guidelines that you will need to deploy a production-grade
directory service.
An overview of the programming technologies and APIs you can
use to extend and modify Enterprise Server, to dynamically
Netscape Enterprise Server
Programmer’s Guide
generate content in response to client requests, and to modify the
content of the server. Links are provided to the individual books
that discuss each API. Use thisbook as the starting place for
developer-level information for En terprise Server. The book also
discusses the purpose and use of the configuration files, and
provides a comprehensive list of the directives and functions that
can be used in these configuration files.
How to enable and implement servlets and JavaServer Pages™
(JSP) in Enterprise Server.
How to use Netscape Server Application P rogrammer’s Interface
(NSAPI) to build plugins to extend and mo dify the Enterprise
Netscape Enterprise Server
Programmer’s Guide to Servlets
Netscape Enterprise Server NSAPI
Programmer’s Guide
Server. It also provides a reference of the NSAPI functions you can
usetodefinenewplugins.
22Netscape Enterprise Server Administrator’s Guide • August 2002
Chapter 1, “Introduction to Enterprise Server”
Chapter 2, “Administering Enterprise Servers”
Part1
Server Basics
23
24Netscape Enterprise Server Administrator’s Guide • August 2002
Chapter1
Introduction to Enterprise Server
This chapter introduces Netscape Enterprise Server and discusses so me of the
fundamental server concepts. Read it to obtain an overview of how Enterprise
Server works.
This chapter includes the following sections:
•Enterprise Server
•Enterprise Server Architecture
•Enterprise Server Configuration
•Administration Server
•Server M anager
•ClassManager
•VirtualServerManager
Enterprise Server
Enterprise Server 6.1 is a multi-process, multi-threaded, secure w eb server built on
open standards. It provides high performa n ce, reliability, scalability, and
manageability for any size enterprise.
This section includes the following topics:
•Enterprise Server Features
•Administering and Managing Enterprise Servers
25
Enterprise Server
Enterprise Server Features
Enterprise Server is primarily designed to provide access to your business HTML
files. In addition, it offers the following features:
•Enterprise-wide manageability—Including dele gated administration, cluster
management, and LDAP (Lightweight Directory Access Protocol) support.
LDAP integration with Directory Server enables you to store users and g roups
in a centralized directory. In addition, you can monitor your server in real-time
by using the Simple Network Management Protocol (SNMP). SNMP is a protocol
used to exchange data about network activity.
Note that in orderto addusersand groups to Enterprise Server, you musthave
a directoryserver installed,such asDirectoryServer.See the Netscape EnterpriseServer Installati on and Migration Guide for more information.
•Security—Users can establish encrypted and authenticated transactions
between clients and t he server through the Secure Sockets Layer (SSL) 3.0
protocol. In addition, Enterprise Server employs the following security-based
standards: Public Key Cryptog raphy Standard (PKCS) #11, which defines the
interface used for communication between SSL and PKCS #11 module s;
Federal Information Processing Standards (FIPS)-140; and special certificates
that w ork with 56, 128, or 168 bits, depending on the capability of the cli ent.
•Access control—You can protect confidential files or directories by
implementing access control (viewing or editing) by user name, password,
domain name, IP address, and user certificates. This feature also represents
another aspect of the NSAPI Content Management plug-in, w hich enables an
end user (the owner of a document)to set access control ona document,rather
than having to ask the administrator to accomplish the task.
•High performance—Delivers high performance fo r dynamic and secure
content with features s uch as HTTP1.1, multi-threading, and support for SSL
hardware accelerators.
•Standards-based—E nterprise Server includes support for a wide range of web
software standards, including: JDK 1.2; Servlet 2.3; JavaServer Pages™ 1.2;
HTTP 1.1; and various security-basedstandards, in cluding PKCS #11,
FIPS-140, and 168-bit step-up certificates.
•Server-side Java Servlet and JavaServer Pages support—enables
development of dynamic content, presentation logic, and JDBC database
access.
•Additional features—Support for multiple processes and process monitors,
failover, automatic recovery, and dynamic log rotation.
26Netscape Enterprise Server Administrator’s Guide • August 2002
Enterprise Server Architecture
Administering and Managing Enterprise Servers
You can manage your Enterprise Server(s) via the following user interfaces:
•Enterprise Server Administration Server
•Server M anager
•ClassManager
•VirtualServerManager
In previous releases, the Enterprise Server and other Netscape servers were
administered b y a single server, called the Administration Server. In a previous
release, the “administration server” became simply an additiona l instance of the
Enterprise Server, called Enterprise Server Administration Server, or
AdministrationServer. You usethe AdministrationServer to administerall ofyour
Enterprise Server instances.For more information,see “AdministrationServer,” on
page 36.
NOTEYou can also perform administrative tasks manually by editing the
configuration file s or by using command-line utilities.
For managing in dividual instances of Enterprise Server, you ca n use the Server
Manager. For more information, see “Server Manager,” on page 37.
To manage virtual servers, use the Class Manager. For more information, see
“Virtual Server Configuration,” on page 35.
Enterprise Server Architecture
Enterprise Server incorporates a modular architecture that integrates seamlessly
with all of the products in the Netscape family of servers. In addition, Enterprise
Server includes an administration server interface for coordinating administrative
functions across all of yo ur web servers. Note that this administrative interface is
itself another instance of Enterprise Server.
Enterprise Server includes the following software modules:
•Content Engines
•Server Extensions
•Runtime Environments
Chapter 1Introduction to Enterprise Server27
Enterprise Server Architecture
•Application Services
These server modules are described in the following sections.
Content Engines
Enterprise Server content engines are designed for manipulating customer data.
The following content engines make up the content layer of the Enterprise Server
architecture:
•The HTTP (Web Server) engine represents the core of the Enterprise Server.
•The Content Management engineenables you to manage your server's content.
Server Extensions
From a functional perspective, the rest of the Enterprise Server architecture
resideson top of this engine for performance and integration functionality.
You create and store HTML pages, JavaServer Pages, and other files such as
graphics, text, sound, or video on your server. When clients connect to your
server,theycanviewyourfilesprovidedtheyhaveaccesstothem.
The Enterprise Server extensions enableyou to extend orreplace the function of the
server to better suit your business operations. The following server extensions are
part of the core Enterprise Server architecture:
•Common Gateway Interface (CGI)
•Netscape Server Application Programming Interface (NSAPI)
•Java Servlets a nd JavaServer Pages
Common Gateway Interface (CGI) is a stand-alone application development
interface that enables you to create programs that process your client requests
dynamically.
Netscape Server Application Programming Interface (NSAPI) is used to
implement the functions the server calls when processing a request (Server
Application Functions) which provide the core and extended f unctionality of the
Enterprise Server. It allows the server’s processing of requests to be divided into
small steps w hich may be arranged in a variety of ways for speed and flexible
configuration.
28Netscape Enterprise Server Administrator’s Guide • August 2002
Enterprise Server Configuration
Java Servletsand JavaServer P ages extensions enable all Java servlet and
JavaServer page meta-functions, including instantiation, initialization, destruction,
access from other components, and configuration management. Java servlets and
JavaServer pages are reusable Java applications that run on a web server rather
than in a web browser.
Runtime Environments
In ad dition to the various server extensions, Enterprise Server includes a set of
runtime environments which s upport the server extensions. These runtime
environments include the following:
•CGI Processor
•NSAPIEngine
•Java Virtual Machine (JVM)
• ParsedHTML(Server-SideIncludes)
Application Services
Finally, the Enterprise Server architecture includes a set of application services for
various application-specific functions. These application services include the
following:
•Security&AccessControl
•SessionManagement Service
•File System Service
Enterprise Server Configuration
Enterprise Server is configured to enable you to turn on or off various features,
determine ho w to respond to individual client requests, and write programs that
run on and interactwith the server’s operation. The instructions (called directives)
which identify these options are stored in configuration files. Enterprise Server
reads the configuration files on startup and during client requests to map your
choiceswith thedesired server activity. Formore information about thesefiles, see
“Enterprise Server Configuration Files,” on page 30.
Chapter 1Introduction to Enterprise Server29
Enterprise Server Configuration
The server includes a number configuration files which are stored in
server_root/https-server_id/config and server_root/https-admserv/config when
installed on yourcomputer.
This section includes the following topics:
•Enterprise Server Com ponent Options
•Enterprise Server Configuration Files
•Single-Server Configuration
•Multiple-Server Configuration
Enterprise Server Component Options
The following com ponent options are available w hen you install Enterprise Server:
•Enterprise Server Core
•JavaRuntimeEnvironment
•JavaandServlets
•SNMP Support
Enterprise Server Configuration Files
Enterprise Serve r includes a variety of configuration files that enable you to se t
various global variables, and to customize how the server responds to specific
events and client requests. You can modify the configuration files automatically
using theAdminis trator Ser ver, Serve r Manager, and Class Manager user interface,
or by editing the files directly using a text editor.
The main Enterprise Server configuration files are:
mime.types,andserver.xml. These configuration files are described in this
section.
NOTEThere are a number of configuration files Enterprise Server u ses
when your server is set up as part of a cluster of Enterprise Servers
(these files include a .
regarding how you can configure a cluster of Enterprise Server,
including important guidelines, see “About Clusters,” on page 139.
30Netscape Enterprise Server Administrator’s Guide • August 2002
magnus.conf, obj.conf,
clfilter file extensio n). For more information
Enterprise Server Configuration
magnus.conf: contains global server configuration information (such as security
and default language selection). This file sets the values for variables that configure
the server during initialization. Enterprise Server reads this file and executes the
variable settings on startup. The server does not read this file again until it is
restarted, so you must restart the server every time you make changes to this file.
For more information, see the Netscape Enterprise Server NSAPI Programmer’s Guide.obj.conf: object configuration file. There is one
class, or grouping of virtual servers. Whenever this guide refers to “the
obj.conf file foreach virtualserver
obj.conf
file,” it refers to all obj.conf filesortotheobj.conf file for the virtual server class
being described. All the
They are typically named vsclass
obj.conf files are lo cated in server_root/server_id/config .
.obj.conf,wherevsclassis the virtual server class
name.
The
obj.conf file contains settings for server customization, and instructions that
theserverusestoprocessrequestsfromclients(suchasbrowsers).Eachvirtual
server referenc es this information every tim e it processes a client request.
For more information about the actual file syntax and the specific directives used
by the
obj.conf and magnus.conf configuratio n files, see the Netscape Enterprise
Server NSAPI Programmer’s Guide.
server.xml: configur es the addresses and ports that the server listens on and
assignsvirtual server classes and virtual servers to these listensockets. Formore
information, see the Netscape Enterprise Server NSAPI Program mer’s Guide.
mime.types:the MIME ( Multi-purpose Internet Mail Extension) type configuration
file. This file maps file extensions to MIME types, to enable the server to determine
the t ype of content being requested. For example, requests for resources with .
html
extensions indica te that the client is requesting an HTML file, while requests for
resources with
.gif extensions indicate that the client is requ esting an image file in
GIF format.
For more information, see “Specifying a Default MIME Type,” on page 314.
Dynamic Reconfiguration
Dynamic reconfiguration allows you to make configuration changes to a live web
server without having to s top and restart the web server for the changes to take
effect. You can dynamically change all configuration settings and attributes in
server.xml and its associated files without restarting the server.
Chapter 1Introduction to Enterprise Server31
Enterprise Server Configuration
To access the dyna mic reconfiguration s creen and install a new configuration
dynamically, click the Apply link found in the upper right corner of the Server
Manager, C lass Manager, and Virtual Server Manager pages, then click the Load
Configuration File s button on the Apply Changes page. If there are errors in
installing the new configuration, the previous configuration is restored.
Single-Server Configuration
If you have installed En terprise Server on a single server machine, the installation
process places all the files under the s erver root directory that you specified during
installation.
All P latforms
For all platforms, the following directories are created under the server root
directory:
•alias contains the key and certificatefiles forall Netscape servers (for example,
•bin contains the binary fi les for the server, such as the actual server, the
https-admserv-server_id-cert7.db and secmod.db).
AdministrationServer forms, and so on. Inaddition,this directoryincludesthe
https/install folder that contains files neede d for migrating server settings
and default configuration files needed for backward compatibility.
•docs is the server’s default primary docum ent directory, where your server’s
content files are usually kept. If you are migrating settings from an existing
server, this directory doesn’t appear until you finish the migration process.
•extras c ontains the log analyzer and log analysis tools.
❍The flexanlg directory contains a command-line log analyzer. This log
analyzer analyzes files in flexlog format.
❍The log_anly directory contains the log analysis tool that runs thro u gh the
Server Manager. T his log analyzer analyzes files in c ommon log format
only.
•httpacl contains the files that store access control configuration information in
the
generated.server-id.acl and genwork.server-id.acl files. The file
generated.server-id.acl conta ins c ha nge s yo u make using the Server
Manager access control forms after saving your changes;
genwork.server-id.acl contains your changes befo re you save your changes.
•https-admserv contains the directories for the AdministrationServer. This
directory has the following subdirectories and files:
32Netscape Enterprise Server Administrator’s Guide • August 2002
Enterprise Server Configuration
❍This directory contains shellscripts to start, stop, and restart the server,
start JVM, and a script to rotate log files.
❍ClassCache contains classes and Java files, generated as result of the
compilation of JavaServer Pages.
❍conf_bk contains backup copies of the Administration Server’s
configuration files.
❍config contains the server’s configuration files: admpw, admin.conf,
see the Netscape Enterprise Server NSAPI Programmer’s Guide.
❍logs contains any error or access log files.
❍SessionData contains session database data from MMapSessionManager.
❍startsvr.bat is the script that starts the Server M anager on Windows
NT® and W indows® 2000 machines. T he Server Manager lets you
configure all servers installed in the server root directory.
❍stopsvr.bat is the script that s tops the Server Manager on Windows NT
and Windows 2000 machines.
•https-server_id.domain are the directories for each server you have installed
on the machine. Each server directory has the f ollowing subdirectories and
files:
❍ClassCache contains classes and Java files, generated as result of the
compilation of JavaServer pages.
❍conf_bk contains backup copies of the server’s configuration files.
❍config contains the server instance configuratio n files.
❍logs contains the server instance log files.
❍reconfig is the script used to reconfigure the server dynamically. If you
make non-global change s to the server, you can use this script to
reconfigure the server without stopping and starting it. Note that changes
to
magnus.conf require you to stop and restart the server.
Chapter 1Introduction to Enterprise Server33
Enterprise Server Configuration
•manual contains the online manuals for the product.
•plugins contains directories for Java and other plugins. This directory has the
❍restart is the script that restarts the server.
❍rotate rotates server log files without affecting users who may be
connected to the server.
❍SessionData contains session database data from MMapSessionManager.
❍startsvr.bat is the script that starts the Server Manager. The Server
Manager lets you configure all servers installed in the server root
directory.
❍stopsvr.bat is the script that s tops the Server Manager.
following subdirectories:
❍htaccess contains server plugin for .htaccess access control and
htconvert,an.nsconfig to .htaccess converter.
❍digest contains the Digest Authentication Plugin for Netscape Directory
Server, as well as information about the plugin.
❍samples contains samples a nd example components, plugins and
technologies supported by t he Enterprise Server servlet engine. This
includes binaries , all code, and a build envirom ent.
❍servlets contains information about and examples of web-apps
applications.
❍include contains various include files.
❍lib contains shared libraries.
❍nsacl contains information for your server’ s a ccess control lists.
❍loadbal containstherequiredfilesfortheResonateload-balancer
integration plugin.
❍nsapi contains header files and example code for creating your own
functions using NSAPI.
❍snmp contains information for your server ’s SNMP plugins.
•setup contains the various Enterprise Server setup files, including
and uninstall.inf.
•userdb conta ins user databases and related informa tion.
•LICENSE.txt is the license file.
34Netscape Enterprise Server Administrator’s Guide • August 2002
setup.log
Enterprise Server Configuration
•README.txt is the readme file that contains a link to the Netscape Enterprise
Server Release Not es .
UNIX and Linux Platforms
In addition to the files and directories described in “All Platforms,” on page 32 the
following files are created at the
platforms:
•startconsole launches a browser to the Administration Server page.
server-root directory for UNIX® and Linux®
The following files are created under the
server-root/https-admserv directory for
UNIX and Linux platforms:
❍ClassCache contains classes and Java files, generated as result of the
compilation of JavaServer pages.
❍conf_bk contains backup copies of the server’s configuration files.
❍config contains the Admini stra tion Server configura tio n files.
❍logs contains the Administration Server log files.
❍SessionData contains session database data from MMapSessionManager.
❍restart is the script that restarts the Server Manager.
❍start is the script that s tarts the Server Manager. The Server M anager lets
you configure all servers installed in the server root directory.
❍stop is the script that stops the Server Manager.
Virtual Server C onfiguration
Virtual servers allow you, with a single installed server, to offer companies or
individuals domain names, IP addresses, and some server administration
capabilities. You can configure virtual servers using the Virtual tab of the Se rver
Manager, as well as the Class Mana ge r interface and the
settings for virtual servers are stored inthe
server_root/https-server_id/
config directory.
server.xml file, found in the
server.xml file. The
For more information, see Chapter 11, “Using Virtual Ser vers.”
Chapter 1Introduction to Enterprise Server35
Administration Server
Multiple-Server Configura tion
You can have multiple web servers running on the same server machine. Multiple
web servers can be configured from a single-server administration interface called
the Administration Server.
Administration Server
The Administration Server is a web-based server that contains the Java forms you
use to configure all of your Enterprise Servers.
After installing Enter prise Server, you use your browser t o navigate to the
AdministrationServer page and use its forms to configureyour Enterprise Servers.
When you submit the forms, the Administration Se rver modifies the configuration
for the server you w ere a dministering.
The URL you use to navigate to the Admi nistration Server page depends on the
computer host name and the port number you choose for the Administration
Server when you install Enterprise Server. For example, if you installed the
Administration Server on port 1234, the URL would look like this:
http://myserver.example.com:1234
Before you can get to any form s, the Administration Server prompts you to
authenticate yourself. This means you need to type a user name and password.
You set up the “s uperuser” user name and password when you install Enterprise
Server on your computer. After installation, you can use distributed administration
to give multiple people access to different forms in the Adm inistration Server. For
more information about distributed administration, see “Allowing Multiple
Administrators,”on page 52.
The first page yo u see when you access the Administration Server, is called
Servers. Y ou u se the buttons on this page to manage, add, remove, and migrate
your Enterprise Servers. The Administration Server provides the following tabs for
your administration-leveltasks:
•Servers
•Preferences
•GlobalSettings
•Users and Groups
•Security
36Netscape Enterprise Server Administrator’s Guide • August 2002
•Cluster Mgmt (Cluster Management)
NOTEEnterprise Server requires a browser that supports frames and has
JavaScript and cookies enabled.
For more information on using the Administration Server, including information
regarding these administration-level tasks, see C hapter 2, “Administering
Enterprise Servers.”
Server Manager
The Server Manager is a web-based interface that contains the forms you use to
configure individual instances of Enterprise Server.
You can access the Server Manager for Enterprise Server by performing the
following steps:
1.Install and start your Enterprise Server.
The Administration Server displays the Servers page.
Server Manager
2.In t he Manage Servers area, select the desired server and click Manage.
The Enterprise S erver Administration Server displays the Server Manager
Preferences page.
NOTEEnterprise Server requires a browser that supports frames and has
JavaScript and cookies enabled.
You use the links on the Preferences page to manage options such as thread pool
settings, and to turn the web server on and off.
In addition, the Server Manager provides the following tabs for additional
Enterprise Server managerial tasks:
•Security
•Logs
•Monitor
•Virtual Server Class
•Java
Chapter 1Introduction to Enterprise Server37
Server Manager
•Legacy Servlets
For more information, see the Ser ver Manager in the online help.
Using the Resource Picker
Most of the Server Manager and Class Manager pages configure the entire
Enterprise Server or an entire class. However, some pages can configure either the
entire server (or class) or files and directories that the server (or class) maintains.
These pages include the Resource Picker, shown in Figure 1-1, at the top.
Figure 1-1Resource Picker
The Resource Picker a ppears on a number of pages, including the Server
Manager’s Log Preferences page and most screens accessible from the Class
Manager’s Content Management tab.
To use the Resource Picker, choose a resource from the drop-down list for
configuration. Click Browse to browse your primary document directory; clicking
Options allows you t o choose other directories. Click Wildcard to configure files
with a specific extension.
Wildcards Used in the Resource Picker
In many parts of the s erver configuration, you specify wildcard patterns to
represent o ne or more items to configure. Please note that the wildcards for access
control may be different from those discussed in this section.
Wildcard pat terns use special characters. If you want to use one o f these characters
without the special meaning, precede it with a backslash (\) character.
38Netscape Enterprise Server Administrator’s Guide • August 2002
Class Manager
The Class Manager is a web-based interface that co ntains the Ja va forms you use to
configure your virtual Enterprise Servers. The user interface for virtual servers has
two parts, the Server Manager and the Class Manager. The Class Manager contains
settings that affect a single class or single virtual server. You can set services for the
classintheClassManager,aswellasaddvirtualservers(membersoftheclass)
and configure settings for an individual virtual serve r.
You can access the Class Manager for Enterprise Server by performing the
following steps:
1.From the Server Manag er, click the Virtual Server Class tab.
The Server Manager displays the Select a Class of Virtual Server page.
2.From the drop-down list, select a virtual server class and click Manage.
Enterprise Server displays the Class Manager’s Select a Virtual Server page.
You can also access the Class Manager by simply clicking the Clas s Manage r link in
the upper right-hand corner of the browser window.
•Styles
For more information, see the Class Manager in the online help.
Virtual Server Manager
To access the Virtual Server Manager, go to the Virtual Servers tab in the Class
Manager, then select a virtua l server from the list on the Manager Vir tual Servers
page and click Manag e, or click on the link to a virtual server under the tree view.
The pages provided in the Virtual Server Manager allow you to check the status
and settings,set the Java web applications state to on, and generate reports for the
selected virtual server.
Chapter 1Introduction to Enterprise Server39
Virtual Server Manager
The Virtual server Manager provides the following tabs to manage your Enterprise
Server virtual servers:
•Preferences
•Logs
•Web Applications
40Netscape Enterprise Server Administrator’s Guide • August 2002
Chapter2
Administering Enterprise Servers
This chapter describes how to administer Netscape Enterprise Server with the
EnterpriseServerAdministrationServer.Using the Administration Server,you can
manage servers, ad d and remove servers, and migrate serversfrom a previous
release.
This chapter includes the following sections:
•Accessing the Administration Server
•Running Multiple Servers
•Installing Multiple Instances of the Server
•RemovingaServer
•MigratingaServer
Accessing the Administration Server
This section describes how to access the Administration Server for UNIX/Linux
and Windows NT/Windows 2000 platforms.
UNIX/Linux Platforms
To access the Administration Server in UNIX or Linux platforms, go to the
server_root/https-admserv/ directory(for example,
/usr/netscape/server6/https-admserv/)andtype./start. This com mand
starts the Adm inistration Server using the port number you specified during
installation.
41
Accessing the Administration Server
Windows NT/Windows 2000 Platforms
The Enterprise S erver installation program creates a program group with several
icons for Windows N T/Windows 2000 platforms. The program group includes the
following icons:
•Release Notes
•Start Administration Server
•Uninstall Enterpr ise Server 6.1
•Administer Enterprise Server
Note that the Admi nistration Server runs as a services applet; thus, you can also
use the Control Panel to start this servicedirectly.
To access the Administration Server in Windows NT/Windows 2000, perform the
following steps:
1.Double-click the “Start Ad ministration Server” icon, or type the following URL
for starting the administration server in your browser:
http://hostname.domain_name:administration_port
Enterprise Server then displays a window prompting you for a user name and
password.
2.Type the administration user name and password you specified during
installation.
Enterprise Server displays the Administration Server page.
For more information, s ee Administration Server in the online help.
NOTEEnterprise Server requires a browser that supports frames and has
JavaScript and cookies enabled.
Since the Administrator Server is accessed through a browser, you can access it
from any machine that can reach the server over the network.
42Netscape Enterprise Server Administrator’s Guide • August 2002
Running Multiple Servers
There are two ways you can have multiple web servers running on your system:
•Use virtual servers
•Install multiple instances of the server
Virtual Se rv er s
Virtual servers allow you, with a single installed server, to offer companies or
individuals domain names, IP addresses, and some server administration
capabilities. For the users, it is a lmost as if they have their own web server, though
you provide the hardware and basic web server maintena nce.
Running Multiple Servers
The settings for virtual servers are stored in the
server_root/
use virtual servers, but if you would like to learn more about this file, see the
Netscape Enterprise Server NSAPI Programmer’s Guide.
For more information about virtual servers, see Chapter 11, “Using Virtual
Servers.”
https-server_id/config directory. You do not need t o edit this file to
server.xml file, found in the
Installing Multiple Instances of the Server
In past releases of Enterprise Server, virtualservers did not have unique
configuration informa tion. The only way to have servers with sep arate
configuration informa tion was to create a new server instance. However, with
Enterprise Server 6.1, virtual servers have separate configuration information,so
multiple server instances are no lon g er required. They are still supported, but
virtual servers are the preferred way to have multiple servers.
If you choose to install multiple server instances, you can use the Enterprise Server
Administration Server to:
•Install mu ltiple copies of the server as separate instances, each with a different
IP address.
•Configure a set o f servers that all use the same IP address, but different port
numbers.
If your system is configured t o listen to multiple IP addresses enter one of the IP
addresses that your system is hosting for each server you install.
Chapter 2Administering Enterprise Servers43
RemovingaServer
If you installed your server before configuring your system to host multiple IP
addresses, configure yo ur system to respond to different IP addresses. Then you
can either install IP virtual servers or change the server’s bind address using the
Server Manager and install separate in stances of the server for each IP address.
To add another server instance, perform the following steps:
1.Access the Administration Server and choose the Servers tab.
2.Click the Add Server link.
3.Enter the desired inf ormation for the specified fields.
Note that the server identifier cannot start with a digit and only Latin-1
characters should be used in instance names.
For more information, s ee The Add Server Page in the online help.
Removing a Server
You can remove a server from your system using the Administration Server. Be
sure that you don’t need t he server anymore before you remove it, since this
process cannot be und one.
NOTEWindows NT/Windows 2000 servers have an uninstall program
that you can use to remove a server and its associated
administration server.
To remove a s er ver from your machine, perform the following steps:
1.Access the Administration Server and choose the Servers tab.
2.Click Remove Server.
The Administration Server s ubse quently deletes the server’s configuration files,
Server Manager forms, and the following directory (and any subdirectories):
server_root
/https-server-id
For more information, s ee The R em o ve Server Page in the online help.
44Netscape Enterprise Server Administrator’s Guide • August 2002
Migrating a Server
You can migrate a server instance from iPlanet™ Web Server 4.x to Enterprise
Server 6.1. Your iPlanet Web Server 4.x server in stance is preserved, and a new
Enterprise Server 6.1 server using the s am e settings is created.
You should stop running iPlanet Web Server 4.x before migrating settings. Make
sure you have a compatible version of a web browser installed on your computer
before migrating settings.
For a complete description of how to migrate a server, see the Netscape Enterprise
46Netscape Enterprise Server Administrator’s Guide • August 2002
Using the Administration Server
Chapter 3, “Setting Administration Preferences”
Chapter 4, “Managing Users and Groups”
Chapter 5, “Securing Your Enterprise Server”
Part2
Chapter 6, “Managing Server Clusters”
47
48Netscape Enterprise Server Administrator’s Guide • August 2002
Chapter3
Setting Administration Preferences
You can configure your Netscape Enterprise Server Admin ist ra tion Server using
the pages on t he Preferences and Global Settings tabs. Note that you must enable
cookies and JavaScript in your browser to configure your server.
This chapter includes the following sections:
•Shutting Down the Enterprise Server Administration Server
•EditingListen Socket Settings
•Changing the User Ac count (UNIX/Linux)
•Changing the Superuser Settings
•Allowing Multiple Administrators
•Specifying Log File Options
•ConfiguringDirectoryServices
•Restricting Server Access
•Configuring JRE/JDK Paths
Shutting Down the Enterprise Server
Administration Server
Once the server is installed, it runs constantly, listening for and accepting HTTP
requests.Youmightwanttostopandrestartyourserverif,forinstance,youhave
just installed a Java Development Kit (JDK) or Netscape Directory Server, or if you
have changed listen socket settings.
49
Editing Listen Socket Settings
You can stop the server using one of the following methods:
•Access the Administration Server, choosethe Preferences tab, select the Shut
•Use the Services window in the Control Panel (Windows NT /W indows 2000).
Down link, and click “Shut down the admini stra tion server button!”.
For more information, see The Shut Down Pagein the online help.
•Use
After you shut down the server, it may take several seconds for the server to
complete its shut-down process and for the status to change to “Off.”
stop, which shuts do wn the server completely, interrupting service until it
is restarted.
Editing Listen Socket Settings
Before the server can process a request, it must accept t he request via a listen
socket, then direct the request to the correct c onnection group and virtual server.
When you install Enterprise Server, one listen socket,
This listen socket use s the IP address 0.0.0.0 (equivalent to any address the machine
is configured to) and the port number you specified as your HTTP server port
number during installation. (The default is 8888.) You cannot delete the default
listen socket.
You can edit your serve r’s listen socket settings using the Administration Server’s
Listen Sockets T able. To access the table, perform the following steps:
1.Access the En terprise Server Administration Server and click the Pr eferences
tab.
2.Click the Edit Listen Sockets link.
3.Make the desired c hanges and click OK.
ls1, is created automatically.
For more information, see Chapter 11, “Using Virtual Servers” and the online help
for The Edit L isten Sockets Page.
Changing the User Account (UNIX/Linux)
The Server Settings page allows yo u to c hange the user account for your web
server on UNIX and Linux machines. All the server’s processes run as this user.
50Netscape Enterprise Server Administrator’s Guide • August 2002
Changing the Superuser Settings
You do not need to specify a server user if you chose a port number greater than
1024 an d are not running as the
logged on as
root to start the s erver). If you do not specify a user account her e, the
root user (in this case, you do not need to be
server runs with the user accou nt you start it with. Make sure that when you start
theserver,youusethecorrectuseraccount.
NOTE
Even if you start the server as
If you do not know how to create a new u ser on your system, contact your
system administrator or consult your system documentation.
root, you should not run the server as root all the
time. You want the server to have restricted access to your system resources and
run as a non-privileged u ser. The user name you enter as the server user should
already exist as a normal UNIX/Linux user ac count. After the server starts, it runs
as this user.
If you want to avoid c reating a new user account, you can choose the user
or an account used by another HTTP server running on the same host. On some
systems, however, the user
nobody can own files but not run programs.
To access the Server Settings page, perform the following s teps:
1.Access the Administration Server and choose the Preferences tab.
2.Click the Server Settings link.
3.Make the desired c hanges and click OK.
Changing the Superuser Settings
You can c onfigure superuser access for your Administration Server. T hese settings
affect only the superuser account. That is, if your Administration Server u ses
distributed administration, you need to set up additional access controls for the
administrators you allow.
nobody
CAUTION
If you useDirectory Server to manage users and groups, you need to update
the superuser entry in the directory before you change the su peruser user
name or password.If you don’t update the directoryfirst, you won’tbe able
to access the Users & Groups forms in the Administration Server. To fix this,
you’ll need to either access the Administration Server with an administrator
accountthat does have access to the directory, oryou’ll need to update the
directory using the Directory Server’s Console or configuration files.
Chapter 3Setting Administration Preferences51
Allowing Multiple Administrators
To change the superuser settings for the Administration Server, perform the
following steps:
1.Access the Administration Server and choose the Preferences tab.
2.Click the Superuser Access Control link.
3.Make the desired c hanges and click OK..
The superuser’s user n a me and password are kept in a file called
server_root/https-admserv/config/admpw. If you fo rget the user name, you
can view this file to obtain the actu al name; however, note that the password is
encrypted an d unreadable. The file has the format
forget the password, you can edit the
password. You can then go to the Server Manager forms and spec if y a n e w
password.
username:password.Ifyou
admpw file and simply delete the encrypted
CAUTION
Because you can edit the admpw file, it is very important that you keep the
server computer in a secure place and restrict access to its file system:
• On UNIX/Linux systems, consider changing t he file ownership so that
it’s writable only by root or whatever system user ru ns the
Administration Server daemon.
• On Windows NT/Windows 20 00 systems, restrict the file owne rship to
the user account Administration Server uses.
Allowing Multiple Administrators
Multiple administrators can change specific parts of the server through distributed
administration. With distributed administration you have three levels of users:
•superuser is the user listed in the file
server_root/https-admserv/config/admpw. This is the user name (and
password) you specified during installation. This user has full access to all
forms in the Administration Server, except the Users & Groupsforms, which
depend on the superuser having a valid account in an LDAP server such as
Directory Server.
•administrators go directly to the Server Manager forms fo r a specific server,
including the A dministration Server. The forms they see d epend on the access
control rules set up for them (usually done by the superuser). Administrators
can perform limited administrative tasks and can make changes that affect
other users, such as adding users or changing access control.
52Netscape Enterprise Server Administrator’s Guide • August 2002
Allowing Multiple Administrators
•end users can view read-only data stored in the database. Additionally, end
users may be granted access permissions to change only specific data.
For an in-depth discussion of access control for Enterprise Server, see “What Is
Access Control?,” on page 161.
NOTE
Before you can enable distributed administration, you must install a
Directory Server. For more information, see the Netscape Enterprise Server
Installation and Migration Guide and the Netscape Directory Server
Administrator’s Guide.
To enable distributed administration, perform the following s t eps:
1.Verify that you have installed a Directory Server.
2.Access the Administration Server.
3.One you’ve installed a Directory Server, you may also need to create an
administration group, if you have not previouslydone so.
To create a gro up, perform the following steps:
a.Choose the Users & Groups tab.
b. Click the New Group link.
c.Create an “administrators” group in the LDAP directory and add the
names of the users you want to have permission to configure the
Administration Server, or any of the servers installed in its server root. All
users in the “administrators” group have full access to the Administration
Server, but you c an use access control to limit the servers and forms they
will be allowed to configure.
CAUTION
4.Choose the Preferences tab.
5.Click the Distributed Admin link.
6.Make the desired c hanges and click OK.
Once you create an access-control list, the distributed administration group
is added to that list. If you change the name of the “administrators” group,
you m u st manually edit the access-control list to change the group it
references.
For more information,see The Distributed Administration Pagein the online help.
Chapter 3Setting Administration Preferences53
Specifying Log File Options
Specifying Log File Options
The Enterprise Server Administration Server log files record data about the s erver,
including the types of errors encountered and information about server access.
Viewing these logs allows you to monitor server activity and troubleshoot
problems by providing data like the type of er ror encountered and the time certain
files were ac cessed.
You can specify the type and format of the data recorded in the Enterprise Server
Administration Server logs using the Log Preferences page. For instance, you can
choose to log data about every client who accesses the AdministrationServer or
you canomit certain clients from the log. In addition, you can choose the Common
Logfile Format, which provides a fixed amount of information about the server, or
you can create a c ustom log file format that better suits your requirements.
Access the Administration Server Log Prefere nces page by choosing the
Preferences tab, then clicking the Logging O ptions link.
For more information, see The Logging Options Page in the online help, and
Chapter 9, “Using Log Files.”
Viewing Log Files
The Administration Server log files are located in
server_root
NT/Windows 2000, the path to your log files might look like
c:\Netscape\server6\https-admserv\logs. You can view both the error log
and the access log through the Enterprise Serve r Administration Server console or
using a text editor.
The Access Log File
The access log records information about requests to and responsesfrom the
server.
To view the a c cess log file, perform the following steps:
1.Accessthe Enterprise Server AdministrationServer andchoose the Preferences
2.ClicktheViewAccessLoglinkandclickOK.
For more information, see The View Error Log Page in the online help and “Using
Log Files,”on page 207.”
54Netscape Enterprise Server Administrator’s Guide • August 2002
/https-admserv/admin/logs. For exam ple, on Windows
tab.
Specifying Log File Options
TheErrorLogFile
The error lo g lists all the errors the server has encountered since the log file was
created. It also contains informationalmessages about the server, such as when the
server was started and who tried unsuccessf ully to log in to the server.
To view the error log file, perform the following steps:
1.Accessthe Enterprise Server AdministrationServer andchoose the Preferences
tab.
2.Click the View Error Log link and click OK.
For more information, s ee The View Access Log Page in the online help, and
“Using Log Files,” on page 207.”
Archiving Log Files
You can set up your log files to be automatically archived. At a certain time, or after
a specified interval, Enterprise Server rotates your access logs. Enterprise Server
saves the old log files and stamps the saved file with a name that includes the date
and time they were saved.
Access log r otation is initialized at server startup. If rotation is turned on,
Enterprise Server createsa time-stamped access log file and rotation startsat server
startup.
Once the rotation starts, Enterprise Server creates a new time stamped access log
file when there is a request that needs to be logged to the access log file and it
occurs after the previously-scheduled “next rotate time.”
Using Cron-based Log Rotation (UNIX/Linux)
You can configure several features of your Enterprise Server to operate
automaticallyand set to begin at specific times. The cron daemon checks the
computer clock and then spawns processes at certain times.(These settings are
stored in the
This cron daemon co ntrols scheduled tasks for your Enterprise Server and can be
activatedand deactivated from the Administration Server. Thetasks performed by
the cron pr ocess depends on the various servers. (Note that on Windows NT and
Windows 2000 platforms, the scheduling occurs within the individual servers .)
Some of the tasks that can be controlled by cron daemo ns include scheduling
collection main tenance and archiving log files. You need to restart cro n control
whenever you change the settings fo r scheduled tasks.
ns-cron.conf file.)
Chapter 3Setting Administration Preferences55
Configuring Directory Services
To restart, start, or stop cron control, performthe following steps:
1.Access the Enterprise Server Administration Server and choose the Global
Settings tab.
2.Click the Cron Control link.
3.Click Restart, Start, or Stop to change the cron controls.
Note that any time you add a task to cron, you n eed to restart the daemon.
Configuring Directory Services
You can store and manage information such as the names and p asswords of your
users in a single Directory Server using an open-systems server protocol called the
Lightweight Directory AccessProtocol (LDAP). You can also configure the server
to allow your users to retrieve directory information from multiple, easily
accessible netw ork locations.
To configure the directory services preferences, perform the fol low ing steps:
1.Access the Enterprise Server Administration Server and choose the Global
Settings tab.
2.Click the Configure Directory Service link.
3.Make the desired c hanges and click OK.
For more information, see The Configure Directory Service Page in the online help.
Restricting Server Access
You can control access to the entire server or to parts of the server (that is,
directories, files, file types). When the server evaluates an incoming request, it
determines ac cess based on a hierarchy of rules called access-control entries
(ACEs), and then it uses the matching entries to determine if the request is allowed
or denied.Each ACE specifies whether or not the server should continue to the
next ACE in the hierarchy. The collection of ACEs is called an acces s-control list
(ACL). When a request comes in, the server determines access by checking
vsclass.
an appropriate ACL. By default, the server has one ACL file that contains multiple
ACLs.
56Netscape Enterprise Server Administrator’s Guide • August 2002
obj.conf (where vsclass is the virtual server class name)for a reference to
Configuring JRE/JDK Paths
You can set access control globallyfor all servers through the Enterprise Server
Administration Server or for a resource within a specific server instancethrough
the Server Manager. For more information about setting access control for a
resource,see “Setting Access Control,” on page 173.
NOTE
You must turn on distributed administration before you can restrict server
access for the Enterprise Server Administration Server.
To restrict accessto your EnterpriseServer Administration Server, perform the
following steps:
1.Access the Enterprise Server Administration Server and choose the Global
Settings tab.
2.Click the Restrict Access link.
3.Select the desired server and click Edit ACL.
The Enterprise Server Ad mi nistration Server displays the access control rules
for the server you s pecified.
4.Make the desired access control change s a nd click OK.
For more information, s ee The R es trict Access Page in the online help.
Configuring JRE/JDK Paths
When you install Enterprise Server, you can choose to install the Java Runtime
Environment (JRE), which is bundled with Enterprise Server. You can also specify
a path to the Java Development Kit (JDK), which you must install separately. See
the Nets cape Enterprise Server Installation and Migration Guide for more information.
Regardless of whether you chooseto install the JRE or specify a path to the JDK
during installation, you can tell the Enterprise Server to switch to using either the
JRE or JDK at any time by performing the following steps:
1.Access the Enterprise Server Administration Server.
2.Select the Global Settings tab.
3.Click the Configure JRE/JDK Paths link.
The Configure JR E/JDK Paths page appears.
Chapter 3Setting Administration Preferences57
Configuring JRE/JDK Paths
4.Click the radio button corresponding to the feature to enable.
5.Enter the appropriate information andclick OK.
For instance, click JDK to supply the path to the Java D evelopment Kit inst alled
on your machine.
You must restart your server for changes to become effective.
See The Configure JRE/JDK Paths Page in the online help for more
information.
58Netscape Enterprise Server Administrator’s Guide • August 2002
Chapter4
Managing Users and Groups
This chapter describes how to add, delete, and edit the users and groups who ca n
access your Netscape Enterprise Server.
This chapter includes the following sections:
•Using Directory Services to Manage Users and Groups
•CreatingUsers
•Managing Users
•CreatingGroups
•Managing Groups
•Creating OrganizationalUnits
•Managing Organizational U nits
•Managing a Preferred Language List
Using Directory Services to Manage Users and
Groups
The Enterprise Server Administration Server provides access to your application
data about user accounts, group lists, access privileges, organization units, and
other user- and group-specific information.
User and group information is stored in a directory server such as Netscape
Directory Server, which supports Lightweight Directory Access Protocol (LDAP).
LDAP is an open directory access protocol that runs over TCP/IP and is scalable to
a global size and millions of entries.
59
Using Directory Services to Manage Users and Groups
Since Enterprise Serverdoes not support local LDAP, you must have a directory
server installed before you can add users and groups.
Understanding Distinguished Names (DNs)
Use the Users and G roups tab of the Administration Server to create or modify
users, groups, and organizational u nits. A user is an individual in your LDAP
database, such as an employee of your company. A group is two or more users
who share a common attribute. An organizational unit is a subdivision within your
company that uses the
organizational units are described further la ter in this chapter.
Each user and group in your enterprise is represented by a Distinguished Name
(DN) attribute. A DN attributeis a text string that containsidentifying information
for an associated user, group, or object. Youuse DNs whenever you make changes
to a user or group directory entry. For example, you need to specify DN
information each time you create or modify directory entr ies, set up access
controls, and set up user a ccounts for applications such as mail or publishing. The
users and groups i nterface of Netscape Consolehelps you create or modify DNs.
The following example represents a typical DN for an employee of Example
Corporation:
organizationalUnit object class.Users, groups, and
The abbrevia tio n s before each equal sign in this example have the follo wing
meanings:
•uid:userID
•e: email address
•cn: the user’s common name
•o: organization
•c:country
DNs may include a variety of name-value pairs. They are used to identify both
certificate subjects and entries in directories that support LDAP.
60Netscape Enterprise Server Administrator’s Guide • August 2002
Using LDIF
If you do not currently have a directory,or if you want to add a new subtree to an
existing directory, you can use the Directory Server’s Administration Server LDIF
import function. This function accepts a file containing LDIF and attempts to build
a directory or a new s ubtree from the LDIF entries. You can also export your
current directory to LDIF using the Directory Server’s LDIF export function. This
function creates an LDIF-formatted file that represents your directory. A dd or edit
entries using the ldapmodify command along with the a ppropriate LDIF update
statements.
To add entries to the database using LDIF, first define the entries in an LDIF file,
then import the LDIF file from Directory Server. For m ore information, see
“Formatting LDIF Entries,” on page 331.
Creating Users
Use the Users and Groups tab of the Enterprise Server Administration Server to
create or modify user entries. A user entry contains information about an
individualperson or object in the database.
Creating Users
This section includes the following topics:
• GuidelinesforCreatingUserEntries
•How to Create a New User Entry
•Directory Ser ver User Entries
Guidelin es for Creating User Entries
Consider the follo wing guidelines whe n using the administrator for ms to create
new user entries:
•If you enter a given name (or first name) and a surname,then the form
automaticallyfills in the user’s full name and user ID for you. The user ID is
generated as the first initial of the user’s first name followed by the user’s last
name. For example, if the user’s name is Babs Jensen, then the user ID is
automatically set to bjensen.YoucanreplacethisuserIDwithanIDofyour
own choosing if you wish.
Chapter 4Managing Users and Groups61
CreatingUsers
•The user ID must be unique. The Administration Server ensures that the user
ID is unique by searching the entire directory from the search base (base DN)
down to see if the user ID is in use. Be aware, however, that if you use the
Directory Server
ldapmodify command line utility (if available) to create a
user, that it does not ensure unique user IDs. If duplicate user IDs exist in your
directory, the affected users will not be able to authenticate to the directory.
•Note that the base DN specifies the distinguished name where directory
lookups will occur by default, and where all Netscape Web Administration
Server’s entries are placed in your directory tree. A “DN” is the string
representation for the name of an entry in a Directory Server.
•Note that at a minimum, you must specify the following user information
when creating a new us er entry:
❍surname or last name
❍full name
❍user ID
•If any organizational units have been defined for your directory, you can
specify where you want the new user to be placed using the Add New User To
list. The default location is your directory’s base DN (or root point).
NOTE
The user edit text fields for international information differs between the
Administration Server and Netscape Console. I n Netscape Console, in
addition to the untagged cn fields, there is a preferred language cn field
whichdoesn’texistintheAdministrationServer.
HowtoCreateaNewUserEntry
To create a user entry, read the guidelines outlined in “Guidelines for Creating
User Entries,” on page 61, then perform the following steps:
1.Access the Administration Server and choose the Users & Groups tab.
2.Click the New User link and add the associated informat ion to the displayed
page.
For more information, see The New User Page in the online help.
62Netscape Enterprise Server Administrator’s Guide • August 2002
Creating Users
Directory Server User E ntries
The following user entry notes may be of interest to the d irectory administrator:
•User entries use the
inetOrgPerson, organizationalPerson,andperson
object classes.
•By default, the distinguis he d name for users is of the form:
For ex ample, if a user entry for Babs Jensenis created within the organizational
unit Marketing, and the directory’s base DN is o=Example Corporation, c=US,
then the person’s DN is:
However, note that you can change this format to a uid-based d istinguished
name.
•The values on the us er form fields are stored as the following LDAP attributes
(note that a ny stored information other than ‘user’ and ‘gr oup’ requires a full
Directory Server license):
Table 4-1LDAP Attributes
User FieldCorresponding LDAP Attribute
Given NamegivenName
Surnamesn
Full Namecn
User I Duid
PassworduserPassword
Email Addressmail
The following fields are also available when editing the user entry:
Table 4-2User Entry LDAP Attributes
User FieldCorresponding LDAP Attribute
Titletitle
TelephonetelephoneNumber
Chapter 4Managing Users and Groups63
Managing Users
•Sometimes a user’s name can be more accurately represented in characters of a
language other than the default language. You can select a preferred language
for usersso that their names will display in the characters of the t hat language,
even when the default language is English. For more information regarding
setting a user’s preferred language, see The Manage Users Page in the online
help.
Managing Users
You edit user attributes from the Enterprise Server Administration Server Manage
Users form. From this form you can find, change, rename, and de lete user entries;
manage user licenses; and potentially change product-specific information.
Some,butnotall,Netscapeserversaddadditionalformstothisareathatallowyou
to manage product-specific information. For example, if a messaging server is
installed under you r Administration Server, then an additional form is added that
allows you to edit me ss aging server-specific information. See the server
documentation for details on these additional management capabilities.
This section includes the following topics:
•Finding User Information
•EditingUserInformation
•Managing a User’s Password
•Managing U ser Licenses
•RenamingUsers
•Removing Users
Finding User Information
Before you can edit a user entry, you must display the associated information. To
find the specific user inf ormation, perform th e following steps:
1.Access the Enterprise Server Administration Server and choose t he Users &
Groups tab.
2.Click the Manage Users link.
3.In the Find User field, enter some descriptive value for the entry that you want
to edit. Yo u can enter any of the following in the search field:
64Netscape Enterprise Server Administrator’s Guide • August 2002
Managing Users
❍A name. Enter a full name or a partialname. All entries that eq ually match
the search string will be returned. If no such entries are found, all entries
that contain the search string will be found. If no such entries are found,
any entries that sounds like the search string are found.
❍AuserID.
❍A telephone number. If you enter onl y a partial number, any entries that
have telephone numbers ending in the search number will be returned.
❍An email address. Any search string containing an at (@) symbol is
assumed to be an email address. If an exact match cannot be found, then a
search is performed to find all email addresses that begin with the search
string.
❍An asterisk (*) to see all of the entries currently in your directory. You can
achieve the same effect by si mply leaving the field blank.
❍Any LDAP search filter. Any string that contains an equal sign (=) is
considered a search filter.
As an alternative, use the pu ll down menus in the Find all users whose field to
narrow the results of your search.
4.In the Look within field, select the organizational u nit u nder which you want
to search for entries.
The default is the directory’s root point (or top most entry).
5.In t he Format field, choose either On-Screen or Printer.
6.Click Find.
All the users in the selected organizational unit are displayed.
7.In the resulting table, click the name of the entry that you want to edit.
The user edit form is displayed.
8.Change the d isplayed fields as desired and click Save Changes.
Thechangesaremadeimmediately.
Building Custom Search Queries
The “Find all users whose” field allows you to build a custom search filter. Use this
fieldtonarrowdownthesearchresultsreturnedbya“Finduser”search.
The Find all users whose field provides the following search criteria:
Chapter 4Managing Users and Groups65
Managing Users
•The left-most pull-down list allows yo u t o specify the attribute on which the
search will be based.
The available search attribute options are described in t he following table:
Table 4-3Search Attribute Options
Option NameDescription
full nameSearch each entry’s full name for a match.
last nameSearch each entry’s last name, or surnamefor a
match.
user idSearch each entry’s user id for a match.
phonenumberSearcheachentry’sphonenumberforamatch.
email addressSearch each entry’s email address for a match.
unit nameSearch each entry’sname for a match.
descriptionSearch each organizational unit entry’s
description for a match.
•In the center pull-down list, select the type of search you want to perform.
The available search type options are described in the following table:
Table 4-4Search Type Options
Option NameDescription
containsCauses a substring search to be performed. Entries with attribute
values containing the specified search string are returned. For
example, if you know a user’s name probably contains the word
“Dylan,” use this option with the search string “Dylan” to find the
user’s entry.
isCauses an exact match to be found. That is, this option specifies an
equality search. Use this option when you know the exact value of a
user’s a ttribute. For example, if you kn ow the exact spelling of the
user’s name, use this option.
isn’tReturns all the entries whose attribute value does not exactly match
the search string. That is, if you want to find all the users in the
directory whose name is not “John Smith,” use this option. Be aware,
however, thatuse of this option can cause an extremely large number
of entries to be returned to you.
66Netscape Enterprise Server Administrator’s Guide • August 2002
Managing Users
Table 4-4Search Type Options
Option NameDescription
sounds likeCauses an approximate, or phonetic, search to be performed. Use this
optionif you knowan attribute’svalue,but you are unsure of the
spelling. For example, if you are not sure if a user’s name is spelled
“Sarret,” “Sarette,” or “Sarett,” use this option.
starts withCauses a substring search to be performed. Returns all the entries
whose attribute value starts with the specified search string. For
example, if you know a user’s name starts with “Miles,” but you do
not know the rest of the name, use this option.
ends withCauses a substring search to be performed. Returns all the entries
whose attribute value ends with the specified search string. For
example, if you know a user’s name ends with “Dimaggio,” but you
do not know the rest of the name, use this option.
•In the right-most text field, enter your search string.
To display all of the users entries contained in the Look Within directory, enter
either an asterisk (*) or simply leave this text field blank.
Editing User Informati on
To change a user’s entry, perform the following steps:
1.Access the Enterprise Server Administration Server and choose t he Users &
Groups tab.
2.Display t he user entry as described in “Finding User Information,” on page 64.
3.Edit the field corresponding to the attribute that you wish to change.
NOTEIt is possible that you will want to change an attribute valu e t hat is
not displayed by the edit user form. In this situation, use the
Directory Server
ldapmodify command line utility, if available.
Chapter 4Managing Users and Groups67
Managing Users
In ad dition, note that you can change the user’s first,last, and full name field from
this form, but to fully rename the entry (including the entry’s distinguished name),
you need to use the Rename User form. For moreinformation on how to renamean
entry, see “Renaming Users,” on page 69.
Managing a User’s Password
The password you set for user entries is used by the various servers for user
authentication.
To change or c reate a user’s password, perform the following steps:
1.Access the Enterprise Server Administration Server and choose Users &
Groups tab.
2.Display the user entry as described in “Finding User Inform ation,” on page 64.
NOTEYou can change the Enterprise Server Administration Server user
from root to another user on the operating system to enable
multiple users (belo nging to the group) to edit/manage the
configuration files. H owever, note that while on UNIX/Linux
platforms, the installer can give “rw” permissions to a group for the
configuration file s, on Windows NT/Windows 2000 platforms, the
user must belong to the “Administrators”group.
You can also disable the user’s password by clicking the Disable Password button.
Doing this prevents the user f rom logging into a server without deleting the user’s
directory entry.You can allow access for the user again by using the Password
Management Form to enter a new password.
Managing User Licenses
Enterprise Server Administration Server enables you to track which Netscape
server products your users are licensed to use.
To manage the licenses available to the user, perform the following steps:
68Netscape Enterprise Server Administrator’s Guide • August 2002
Managing Users
1.Access the Enterprise Server Administration Server and choose t he Users &
Groups tab.
2.Display the user entry as described in “Finding User Inform ation,” on page 64.
3.Click the Licenses link at the top of the User Edit form.
The rename feature changes only the user’s name; all other fie lds are left intact. In
addition, t he user’s old name is still preserved so searches against the old name
will still find the new entry.
When you rename a user entry, you can only change the user’s name; you cannot
use the rename feature to move the ent ry f ro m one organizational unit to another .
For example,suppose you have organizational units for Marketing and
Accounting and an entry named “Babs Jensen” under the Marketing
organizational unit. You can rename the entry from
but you cannot rename the entry such that
organizational unit becomes
Babs Jensen under the Accounting organizational
Babs Jensen under the Marketing
unit.
Babs Jensen to Bob Jensen,
To rename a user entry, perform the following steps:
1.Access the Enterprise Server Administration Server and choose t he Users &
Groups tab.
2.Display t he user entry as described in “Finding User Information,” on page 64.
Note that if you are using common name-based DNs, specify the user’s full
name.If you are using uid-based distinguishedn ames, enter thenew uid value
that you want to use for the entry.
3.Click the Rename User button.
4.Change the G iven Nam e, Surname, Full Name, or UID fields as is appropriate
to match the new distinguished name for the entry.
5.You can specify that the Administration Server no longer reta ins the old full
name or
keepOldValueWhenRenaming parameter to false. You can find this parameter
uid values when you rename the entry by setting th e
A group is an object that describes a set of objects in an LDAP database. A n
Enterprise Servergroup consists of users who share a common attribute. For
instance, the s et of objects might be a number of employees who work in the
marketing division of your company. Th ese employees might belong to a group
called Marketing.
There are two ways to define membership of a group: statica lly and dynamically.
Static groups e numerate their member objects explicitly. A sta tic group is a CN and
contains
For static groups, t he members do not share a common attribute except for the
CN=<Groupname> attribute.
Dynamic groups allow you to use a LDAP URL to define a set of rules that match
only for group members. For Dynamic Groups, the members do share a c o mmo n
attribute or set of attributes that are defined in the
you need a group that contains all employees in Sales, and they are already i n the
LDAPdatabase under “
group with the following
This group would subsequently contain all objects that have an uid attribute in the
tree below the “
70Netscape Enterprise Server Administrator’s Guide • August 2002
ou=Sales,o=example” point; thus, all the Sales members.
memberURL filter. For example, if
Creating Groups
For static and dynamic groups, members canshare a common attribute from a
certificate if you use the
if the ACL uses the SSL method.
Once you create a new group, you can add users, or members, to it.
This section inc ludes the following top ics for creating groups:
•StaticGroups
•DynamicGroups
memberCertDescription. Note that these will only w ork
Static Groups
The Enterprise Server Administration Server enables you to create a static group by
specifying the same group attribute in the DNs o f any number of users. A static
group doesn’t change unless you add a user to it or delete a user from it.
Guidelines for Creating Static Groups
Consider the following guidelines when using the Enterprise Server
AdministrationServer formsto createnew static groups:
•Static groups can contain other static or dynamic groups.
•You can optionally also add a description for the new group.
•If any organizational units have been defined for your directory, you can
specify where you want the new group to be placed using the Add New Group
To l ist. The default location is yourdirectory’s root point, or top-most entry.
•When you are finished entering the desired information, click Create Group to
add the group and imme diately return to the New Group form. Alternatively,
click Create and Edit Group to add the group and then proceed to the Edit
Group form for the group you have just added. For information on editing
groups, see “Editing Group Attributes,” on page 77.
ToCreateaStaticGroup
To create a st atic group entry, perform the following steps:
1.Access the Enterprise Server Administration Server and choose t he Users &
Groups tab.
2.Click the New Group link.
3.Enter the required information and click OK.
Chapter 4Managing Users and Groups71
CreatingGroups
For more information, see The New Group Pagein the online help.
Dynamic Groups
A dynamic group has an objectclass of groupOfURLs, and has z e ro or more
memberURL attributes, each of which is a LDAP URL that describes a set of objects.
Enterprise Server enables you to create a dynamic group when you want to group
users automatically based on any attribute, or when you want to apply ACLs to
specific groups which con tain matching DNs. For example, you can create a group
that automatically includes any DN that contains the attribute
department=marketing. If you apply a search filter for department=marketing,
the search returns a group including all DNs containing the attribute
department=marketing. You can then define a dynamic group from the search
results based o n this filter. Subsequently, you can define an ACL for the resulting
dynamic group.
This section includes the following topics:
•How Enterprise Server Implements Dynamic Groups
•Groups Can Be Static and Dynamic
•Dynamic G roup Impact on Server Performance
•Guidelines for Creating Dynamic Groups
•ToCreateaDynamicGroup
How Enterprise Server Implements Dynamic Groups
Enterprise Server im plements dynamic groups in the LDAP server schema as
objectclass = groupOfURLs.AgroupOfURLS class can have multiple memberURL
attributes, each one consisting of an LDAP URL that enumerates a set of objects in
the directory. The members of the group would be the u nion of these sets. For
example, the following grou p contains just one member URL:
ldap:///o=example.com??sub?(department=marketing)
This example d escribes a set that consists of all objects below “o=example.com”
whose department is “marketing.”
TheLDAPURLcancontainasearchbaseDN,ascopeandfilter,however,nota
hostname and port. This means that you can only refer to object s on t he same
LDAP server. All scopes are supported.
72Netscape Enterprise Server Administrator’s Guide • August 2002
Creating Groups
The DNs are included automatica lly, without your having to add each individual
to the group. The gr ou p changes dynamically, because Enterprise Server performs
an LDAP server s earch each time a group lookup is needed for ACL verification.
The user and group names used in the ACL file correspond to the
cn attribute of
the objects in the LDAP database.
NOTE
Enterprise Server uses the cn (commonName) attribute as group name for
ACLs.
The mapping from an ACL to an LDAP database is defined both in the
dbswitch.conf configuration file (which associates the ACL database names with
actual LDAP database URLs) and the ACL file (which d efines which databases are
to be used fo r which ACL). For example, if you want base access rights on
membership in a group named “s taff ,” the A CL s yste m looks up an object that has
an object class of
groupOf<anything> and a CN set t o “staff.” The object d efines
the members of the group, either by explicitly enumerating the member DNs (as is
done for
example,
A group object can h ave both objectclass = groupOfUniqueMembers and
objectclass = groupOfURLs; therefore, both “uniqueMember”and“memberURL”
attributes are valid. The group’s membership is the union of its static and dynamic
members.
Dynamic Group Impact on Server Performance
There is a server performance impact when using dynamic groups. If you are
testinggroup membership, and the DN is not a member of a static group,
Enterprise Server checks all dynamic groups in the database’s baseDN. Enterprise
Serveraccomplishesthistaskbycheckingifeach
its baseDN and scope against the DN of the user, and then performing a base
search using the user DN as baseDN and the filter of the
procedure can amount to a large number of individual searches.
memberURL matches by checking
memberURL.This
Guidelines for Creating Dynamic Groups
Consider the following guidelines when using the Enterprise Server
AdministrationServer forms to create new dynamic groups:
•Dynamic groups can not contain other groups.
Chapter 4Managing Users and Groups73
CreatingGroups
•Enter the group’s LDAP URL using the following format (without host and
port info, since these parameters are ignored):
ldap:///<basedn>?<attributes>?<scope>?<(filter)>
The required parameters are described in the following table:
Table 4-5Dynamic Groups: Required P arameters
Parameter NameDescription
<base_dn>The D istinguished Name (DN) of the search base, or point from
which all searches are performed in the LDA P directory. This
parameter is often set to the su ffix or root of the directory,such as
“o=example.com”.
<attributes>A list of the attributes to be returned by the search. To specify
more than one, use commas to delimit the attributes (for example,
“cn,mail,telephoneNumber”); if no a ttributes are specified, all
attributes are returned. Note that this parameter is ignored for
dynamic group membership checks.
<scope>The scope of the search, which can be one of these values:
• base retrieves information only about the distinguished
name (<base_dn>) specified in the URL.
• one retrieves information about entries one level below the
distinguished name (<base_dn>) specified in the URL. The
base entry is not included in this scope.
• sub retrieves information about entries at all levels below the
distinguished name (<base_dn>) specified in the URL. The
baseentryisincludedinthisscope.
This parameter is required.
<(filter)>Search filter to apply to entries within the specified scope of the
search. If you are using the Admin istration Server forms, you
must specify this attribute. Note that the parentheses are required.
This parameter is required.
Note that the
<attributes>, <scope>,and<(filter)> parameters are
identified by their positions in the URL. If you do not want to specify any
attributes, you still need to include the questio n marks delimiting that field.
•You can optionally also add a description for the new group.
74Netscape Enterprise Server Administrator’s Guide • August 2002
Managing Groups
•If any organizational units have been defined for your directory, you can
specify where you want the new group to be placed using the Add New Group
To l ist. The default location is yourdirectory’s root point, or top-most entry.
•When you are finished entering the desired information, click Create Group to
add the group and imme diately return to the New Group form. Alternatively,
click Create and Edit Group to add the group and then proceed to the Edit
Group form for the group you have just added. For information on editing
groups, see “Editing Group Attributes,” on page 77.
To Create a Dynamic Group
To create a d ynam ic group entry within the directory, perform the fo llowing steps:
1.Access the Enterprise Server Administration Server and choose t he Users &
Groups tab.
2.Click the New Group link.
3.Select Dynamic Group from the Type of Group dropdown list.
4.Enter the required information and click OK.
For more information, see The New Group Pagein the online help.
Managing Groups
The Enterprise Server Administration Server enables you to edit groups and
manage group memberships from the Manage Group form. This section describes
the following topics:
•Finding Group Entrie s
•Editing Group Attributes
•AddingGroupMembers
• AddingGroupstotheGroupMembersList
•Removing Entries from the Group Members List
•Managing O wners
•Managing See Alsos
•RemovingGroups
•RenamingGroups
Chapter 4Managing Users and Groups75
Managing Groups
Finding Group Entries
Before you can edit a group entry, first you must find and display the entry.
To find a group entry, perform the following steps:
1.Access the Enterprise Server Administration Server and choose t he Users &
Groups tab.
2.Click the Manage Groups link.
3.Enter the name of the group that you want to find in the Find Group field.
You can enter any of the following values in the search field:
❍A name. Enter a full name or a partialname. All entries that eq ually match
the search string arereturned. If no such entries are found, all entries that
contain the search strin g w ill be found. If no such entries are found, a ny
entriesthat sounds like the search string are found.
❍An asterisk (*) to see all of the groups currently residing in your directory.
You can achieve the same effect by simply leaving the field blank.
❍Any LDAP search filter. Any string that contains an equal sign (=) is
considered to be a search filter.
As an alternative, use the pull down menus in “Find all groups whose” to
narrow the results of your search.
4.In the Look within field, select the organizational u nit u nder which you want
to search for entries.
The default is the directory’s root point, or to p-most entry.
5.In t he Format field, choose either On-Screen or Printer.
6.Click Find.
All the groups matching your search criteria are displayed.
7.In the resulting table, click the name of the entry that you want to edit.
The “Find all groups whose” Field
The “Find all groups whose” field allows you to build a custom search filter. Use
this field to narrow down the search results that are o therwise returned by Find
groups.
To display all of the group entries contained in the Look Within directory, enter
either an asterisk (*) or simply leave this text field blank.
76Netscape Enterprise Server Administrator’s Guide • August 2002
Managing Groups
For more information regarding how to build a cu stom search filter, see “Building
Custom Search Queries,” on page 65.
Editing Group Attributes
To edit a group entry, perform the following steps:
1.Access the Enterprise Server Administration Server and choose t he Users &
Groups tab.
2.Click the Manage Groups link.
3.Locatethe group you want to edit, and type the desired changes.
For more information regarding how to find specific entries, refer to the
concepts outlined in “Finding Group Entries,” on page 76.
For more informationabout editing group attributes,see T he Manage Groups Page
in the online help.
NOTE
It is possible that you will want to change an attribute value that is not
displayed by the group edit form. I n this situation, use the
Server
ldapmodify command line utility, if available.
Directory
Adding Group Members
To add members to a group, perform the following steps:
1.Access the Enterprise Server Administration Server and choose t he Users &
Groups tab.
2.Click the Manage Groups link.
3.Locate the group you want to manage as described in “Finding Group
Entries,” on page 76, and click the Edit button under Group Members.
Enterprise Server displays a new form that enables you to search for entries. If
youwanttoadduserentriestothelist,makesureUsersisshownintheFind
pull-down menu. If you want to add group ent ries to the group, make sure
Group is shown.
4.In the right-most text field, enter a search string. Enter any of the following
options:
Chapter 4Managing Users and Groups77
Managing Groups
❍A name. Enter a full name or a partial name. All entries whose name
matches the search string is returned. If no such entries are found, all
entries that contain the search string are found. If n o such entries are
found, any entries that sounds like the search string are found.
❍AuserIDifyouaresearchingforuserentries.
❍A telephone number. If you enter onl y a partial number, any entries that
have telephone numbers ending in the search number are returned.
❍An email address. Any search string containing an at (@) symbol is
assumed to be an email address. If an exact m atch cannot be found, then a
search is performed to find all email addresses that begin with the search
string.
❍Enter either an ast erisk (*) or simply leave this text field blank to see all of
the entries o r gr oups currently residing in your directory.
❍Any LDAP search filter. Any string that contains an equal sign (=) is
considered to be a search filter.
5.Click Find and Add to find all the matching entries and add them to the group.
If the search returns any entries that you do not want add to the group, click
the box in the Remove from list? column. You can also construct a search filter
to match the entries you want removed and then click Find and Remove.
6.When the l ist of group members is complete, click Save Changes.
The currently displayed entries are now members of the group.
For more information about adding groups members, see The Edit M embers Page
in the online help.
Adding Groups to the Group Members List
You can add groups (instead of individual members) to the group’s members list.
Doing so causes a ny users belonging to the included group to become a me mber of
the receiving group. For ex ampl e, if Bob Smith is a member of the Engineering
Managers group, and you make the Engineering Managers group a member of the
Engineering Personnel group, then Bob Smith is also a member of the Engineering
Personnel group.
To add a group to the members list of another group, add the group as if it were a
user entry. For more information, see “Adding G roup Members,” on page 77.
78Netscape Enterprise Server Administrator’s Guide • August 2002
Managing Groups
Removing Entries from the Group Members List
To delete an entry from the group members list, perform the following steps:
1.Access the Enterprise Server Administration Server and choose t he Users &
Groups tab.
2.Click the Manage Groups link, locate the group you want to manage as
described in “Finding Group Entries,” on page 76, and click the Edit button
under Group Members.
corresponding box under the Remove from list? column.
Alternatively, you can construct a filter to find the entries you want to remove
and click the Find and Remove button. For more information on cr e ating a
search filter, see “Adding Group Members,” on page 77.
4.Click Save Changes. The entry(s) are deleted from the group member s list.
Managing Owners
You manage a group’s owners list the same way as you manage the group
members list. The following table identifies which section to read fo r more
information:
Table 4-6AdditionalInformation
Task You Want to CompleteRead Section
Add owners to the group“Adding Group Members,” on page 77.
Add groups to the owners list“Adding Groups to the Group Members List,” on
page 78.
Remove entries from the owners
list
“Removing Entries from the Group Members List,”
on page 79.
Managing See Alsos
“See alsos” are references to other directory entries that may be relevant to the
current group. They a llow users to easily find entries for people and other groups
that are related to the current group.
Chapter 4Managing Users and Groups79
Managing Groups
Youmanageseealsosthesamewayasyoumanagethegroupmemberslist.The
following table shows you which section to read for more information:
Table 4-7AdditionalInformation
Task You Want to CompleteRead Section
Add users to see alsos“Adding Group Members,” on page 77.
Add groups to see alsos“Adding Groups to the Group Members List,” on
page 78.
Remove entries from see alsos“Removing Entries from the Group Members List,”
on page 79
Removing Groups
To delete a gr ou p, perform the following steps:
1.Access the Enterprise Server Administration Server and choose t he Users &
Groups tab.
2.Click the Manage Groups link, locate the group you want to manage as
described in “Finding Group Entries,” on page 76, and click Delete Group.
NOTE
80Netscape Enterprise Server Administrator’s Guide • August 2002
The Enterprise Server Administration Server does not remove the
individual members of the group(s) you remove; only the group entry is
removed.
Creating Organizational Units
Renaming Groups
To rename a group, perform the following steps:
1.Access the Enterprise Server Administration Server and choose t he Users &
Groups tab.
2.Click the Manage Groups link and locate the group you want to manage as
Whenyourenameagroupentry,youonlychangethegroup’sname;youcannot
use the Rename Group feature to move the entry from one org anizational unit to
another. For example, a business might have the following organizations:
•organizational units for Marketing and Product Management
•a group named Online Sales under the Marke ting organizational unit
In this example, you can rename the group from Online Sales to Internet
Investments, but you cannot rename the entry such that Online Sal es under the
Marketing organizational unit becomes Online Sales under the Product
Management organizational unit.
Creating Organizational Units
An organizational unit can include a number of groups, and it usually r epresents a
division, department, or other discrete business group. A DN can exist in more
than one organizational unit.
To create an organizational unit, perform the following steps:
1.Access the Enterprise Server Administration Server and choose t he Users &
Groups tab.
2.Click the New Organizational Unit link and enter the required information.
For more information, s ee The New Organizational Unit Page in the online help.
The following notes may be of interest to the directory administrator:
•New organizational u nits are created using the
class.
•The distinguished name for new organizational units is of the form:
You edit and manage organizational units from the Organizational Unit Edit form.
This section describes the following tasks:
•Finding Organizational Units
•Editing OrganizationalUnit Attributes
•Renaming Organizational Units
•Deleting Organizational Units
Finding Organizational U nits
To find organizational units, perform the following st eps:
1.Access the Enterprise Server Administration Server and choose t he Users &
Groups tab.
2.Click the Manage Organizational Units link.
3.Type the name of the unit you want to find in the Find organizational unit
field. You can enter any of the following in the search field:
❍A name. Enter a full name or a partialname. All entries that eq ually match
the search string will be returned. If no such entries are found, all entries
that contain the search string will be found. If no such entries are found,
any entries that sounds like the search string are found.
❍An asterisk (*) to see all of the groups currently residing in your directory.
You can achieve this same result by simply leaving t he field blank.
❍Any LDAP search filter. Any string that contains an equal sign (=) is
considered to be a search filter.
82Netscape Enterprise Server Administrator’s Guide • August 2002
Managing Organizational Units
As an alternative, use the pull down menus in the Find all units whose field to
narrow the results of your search.
4.In the Look within field, select the organizational u nit u nder which you want
to search for entries.
The default is the root point of the directory.
5.In t he Format field, choose either On-Screen or Printer.
6.Click Find.
All the organizationalunits matching your search criteria are displayed.
7.In the resulting table, click the name of the organiza tional unit that you want to
find.
The “Find all units whose” Field
The Find all units whose field allows you to build a custom search filter. Use this
field to narrow d own the search results that are otherwise returned by Find
organizational unit.
To display all of the group entries contained in the Look Within directory, enter
either an asterisk (*) or simply leave this text field blank.
For more information regarding how to build a cu stom search filter, see “Building
Custom Search Queries,” on page 65.
Editing Organizational Unit Attributes
To change a organizational unit entry, access the Enterprise Server Administration
Server and per form the following steps:
1.Locate the organizational unit you want to edit as described in “Finding
Organizational Units,” on page 82
The organizational unit edit form is displayed.
2.Change the d isplayed fields as desired and click Save Changes.
Thechangesaremadeimmediately.
NOTE
It is possible that you will want to change an attribute value that is not
displayed by the organizational unit edit form. In this situation, use the
Directory Server ldapmodify command line utility, if available.
Chapter 4Managing Users and Groups83
Managing Organizational Units
Renaming Organizational Units
To rename an organizational unit entry, access the Enterprise Server
Administration Server and perform the following steps:
1.Make sure no other entries exist in the directory under the organizational unit
2.Locate the organizational unit you want to edit as described in “Finding
3.Click the Rename button.
4.Enter the new organiz ational unit name in the result ing dialog box.
that you want to rename.
Organizational Units,” on page 82.
NOTE
When you rename an organizational unit entry, you can only change the
organizational unit’s name; you cannot use the rename feature to move the
entry from one organizational unit to another.
Deleting Organizational Units
To delete an organizational unit entry, access the AdministrationServer and
perform the following s teps:
1.Make sure no other entries exist in the directory under the organizational unit
that you want to rename.
2.Locate the organizational unit you want to delete as described in “Finding
Organizational Units,” on page 82.
3.Click the Delete button.
4.Click OK in the resulting confirmation box.
The organizational unit is immediately deleted.
84Netscape Enterprise Server Administrator’s Guide • August 2002
Managing a Preferred Language List
Enterprise Server enables you to di splay and maintain the list of preferred
languages.
To manage the preferred language list, perform the following steps:
1.Access the Enterprise Server Administration Server and choose t he Users &
Groups tab.
2.Click the Manage Preferred Langu age List link.
3.In the Dis play Language Selection List field, click Yes or No to specify whether
Enterprise Server displays the Language Selection List.
4.In t he Languages in the Selection List field, click t he Add to List checkbox to
add each language you want specified as part of the Preferred Language List.
5.Click the default value for the language y ou want to specify as the default
language in the Preferred Language List.
6.Click Save Changes.
Managing a Preferred Language List
Chapter 4Managing Users and Groups85
Managing a Preferred Language List
86Netscape Enterprise Server Administrator’s Guide • August 2002
Chapter5
Securing Your Enterprise Server
This chapter describes how to activate the various s ecurity features designed to
safeguard your data, deny intruders access, and allow access to those you want.
Netscape Enterprise Server 6.1 incorporates the security architecture of all
Netscape servers: it’sbuilt on industry standards and public protocols for
maximum interope rability and consistency.
Before reading this chapter you should be familiar with the basic concepts of
public-key cryptography. These concepts include encryption and decryption;
public and privat e keys; digital certificates; and the encryption protocols.
The processof s ecu ring your web server will be explained indetail in the following
sections:
•Requiring Authentication
•Creating a Trust Database
•Requesting and Installing a VeriSign Certificate
•Requesting and Installing Ot her Server Certificates
•Migrating Certificates When You Upgrade
•Managing C ertificates
•Installing and M anaging CRLs and CKLs
•ConfiguringRemoteCRLs
•Setting Security Preferences
•Using ExternalEncryption Modules
•Setting Client Security Requirements
•Setting Stronger Ciphers
87
Requiring Authentication
•Considering Additional Security Issues
Requiring Authentication
Authentication is the processof confirming an identity. In the context of network
interactions, authentication is the confident identification of one party by another
party. Certifica tes a re one way of supporting authentication.
Using Certificates for Authentication
A certificate consists of digital data that specifies the name of an individual,
company, or other entity, and certifies that the public key, included in the
certificate, belongs to that entity. Both clients and servers can have certificates.
A certificate is issued and digitally signed by a Certificate Au thority, or CA. The
CA can be a company that sells certificates over the Internet, or it can be a
department responsible for issuing certificates for your company’s intranet or
extranet. You decide which CAs you trust enough to serve as verifiers of other
people’s identities.
In addition to a public key and thename of the entityidentifiedby the certificate,a
certificate also includes an expiration date, the name of the CA that issued the
certificate, and the “digital signature” of the issuing CA.
NOTEA server certificate must be installed before encryption can be
activated.
Server Authentication
Server authenticationrefers to the confident identification of a server by a client;
that is, identification of the organizatio n assumed to be responsible for the server at
a particular network address.
Client Authentication
Client authentication refers to the confident identificationof a client by a server;
that is, identificatio n of the person assumed to be using the client software. Clients
can have multiple certificates, much like a person m igh t have several different
pieces of identification.
88Netscape Enterprise Server Administrator’s Guide • August 2002
Virtual Server Certificates
You can have a different certificate database per virtual server. Each virtual server
database can contain multiple cert ificates. Virtual servers can also have different
certificates within each instance.
Creating a Trust Database
Before requesting a server certificate,you must create a trust database. In
Enterprise Server the Administration Server and each server instance can have its
own trust database. The trust database should only be created on your local
machine.
When you create the trust database, you specify a password that will be used for a
key-pair file. You will also need this password to start a server using encrypted
communications.For a listof guidelines to consider when changing a password,
see “Changing P asswords or PINs,” on page 132
In the trustdatabaseyou create and store the publicand private keys,r eferred to as
your key-pair file. The key-pair file is used for SSL encryption. You will use the
key-pair file when you r e qu est and install your server certific ate. The certificate is
stored in the trust database after installation. The key-pair file is stored encrypted
in the following directory:
Creating a Trust Database
server_root/alias/<serverid-hostname>-key3.db.
The Enterprise Server Administration Server can only have one trust database.
Eachserverinstance can haveitsown trust database.Virtual serversare covered by
the trust database created for their server instance.
Creating a Trust Database
To create a trust database, perform the following s teps:
1.Access either the Enterprise Server Administration Ser ver or the Server
Manager and choose the Security ta b .
For the Server Manager you must firs t select the server instance from t he
drop-down list.
2.Click on the Create Database link.
3.Enter a password for the database.
4.Repeat.
5.Click OK.
Chapter 5Securing Your Enterprise Server89
Creating a Trust Database
6.For the Server Manager, click Apply, and t hen Restart for changes to take
After creating a certificate trust database for your s erver, you can request a
certificate and submit it to a Certificate Autho rity (CA). If your company has its
own internal CA, request your certificate from them. If you plan to purch ase your
certificate from a commercial CA, choose a C A and ask for the specific format of
the information they require. A list of availablecertificate authorities including
links to their sites, is available on the Request a Certificate pag e. For more
information on what CAs may require , a list of C ertificate Authorit ies is available
through both Server Administrator , and Server Manager Sec urity Pages under
Request a Certificate.
The Administration Server can have only one server certificate. Each server
instance c an have its own server certificate. You can select a server i nstance
certificate for each virtual server.
Using password.conf
Normally, you cannot start an UNIX SSL-enabled server with the /etc/rc.local
or the /etc/inittab files, because the server requires a password before starting.
By default, the web server prompts the administrator for the key database
password before starting up. If you must be able to start/restart an unattended
web server, you can save the password ina
recommended. Only do thisif your system is adequately protected so that this file
and the key databases are not compromised. The server’s
should be owned by
should have read or write access.
effect.
password.conf file, bu t this is not
password.conf file
root or the user who installed the server, and only the owner
On UNIX, leaving t he SSL-enabled server's password in the
asecurityrisk.AnyonewhocanaccessthefilehasaccesstotheSSL-enabled
server’s password. Consider the security risks before keeping the SSL-enabled
server’s password in the
password.conf file.
On Windows NT/Windows 2000, if you have an NTFS file system,you should
protect the directory that contains the
even if you do not use the file. The directory should have read/write per missions
for the administration server user and the w eb server user. Protecting the directory
prevents others from creating a false
directories or files on FAT file systems by restricting access to them.
90Netscape Enterprise Server Administrator’s Guide • August 2002
password.conf file is
password.conf file by restricting its access,
password.conf file. You cannot protect
Requesting and Installing a VeriSign Certificate
Start an SSL-enabled Server Automatically
If security risks are not a concern for you, follow these steps to start your
SSL-enabled server automatically:
1.Make sure SSL is on. See “Turning Security On,” on page 109.
2.Create a new password.conf file in the config subdirectory of the server
instance.
❍If you are using the internal PKC S#11 software encryption mo dule that
comes with the server, enter the following information:
internal:your_password
❍If you are using a different PKC S#11 module (for hardware encryption or
hardware accelerators), specify the name of the PKCS#11 module, followed
with the password. For example:
nFast:your_password
3.Stop and restart your server for the new setting to take effect.
You will always be prompted to supply a password when starting the web server,
even after the
password.conf file has been created.
Requesting and Installing a VeriSign Certificate
VeriSign® is Enterprise Server’s preferred certificate authority. VeriSign’s VICE
protocol simplifies the certificate request process. VeriSign has the adv antage of
being able to return their certificate directly to your server.
Requesting a VeriSign Certificate
To request a VeriSign C ertificate, perform the following steps:
1.Access either the Enterprise Server Administration Ser ver or the Server
Manager and choose the Security ta b .
For the Server Manager you must firs t select the server instance from t he
drop-down list.
2.Click the Request VeriSign Certificate link.
3.Review the steps required.
4.Click Get Certificate.
Chapter 5Securing Your Enterprise Server91
Requesting and Installing Other Server Certificates
5.Follow the VeriSign pr o cedure.
Installing a VeriSign Certificate
If you request and receive approval for a VeriSign certificate, it should appear in
the drop-down list of t he Install VeriSign Certificate page in one to three d ays. To
install a VeriSign Certif icate, perform the following steps:
1.Access either the Enterprise Server Administration Ser ver or the Server
Manager and choose the Security ta b .
For the Server Manager you must firs t select the server instance from t he
drop-down list.
2.Click the Install VeriSign Certificate link.
3.Choose internal (software) from the drop-down listfor cryptographic module,
unless you will use an external encryption mod ule.
4.Enter your Key Pair File Password or PIN.
5.Select the TransactionID to Retrieve from the drop-down list.
You will usually want the last one.
6.Click Install.
7.For the Server Manager, click Apply, and t hen Restart for changes to take
effect.
Requesting and Installing Other Server
Certificates
Besides VeriSign, you can request and install certificates from other certificate
authorities. A list of CAs is available through both Server Administrator, and
Server Manager Security Pages und er Request a Certificate. Your company or
organization may provide its own internal certificates. This section describes how
you would request and install these other types of server certificates.
92Netscape Enterprise Server Administrator’s Guide • August 2002
Requesting and Installing Other Server Certificates
Required CA Information
Before you begin the request process, make sure you know what information your
CA requires.Whether you are requesting a server certificate from a commercial CA
or an internal CA, you need to provide the following information:
•Common Name must be the fully qualif ied hostname used in DNS lookups
(for example,
browser uses to connect to your site. If these two names don’t match, a client is
notified t hat the certificate name doesn’t match the site name, creating doubt
about the authenticity of your certificate. Some CAs might have d ifferent
requirements, so it’s important to check with them.
You can also enter wildcard and regular expressions in this field if you are
requesting a certificate from an internal CA. Most vendors would not approve
a certificate request with a wildcard or regular expression entered for common
name.
•Email Address is your business email address. This is used for correspondence
between you and the CA.
•Organization is the official, legal name of your company, ed ucational
institution, partnership, a nd so on. Most CAs require that you verify this
information with legal documents (such as a copy of a business license).
www.example.com). This is the hostname in the URL that a
•OrganizationalUnit is an optional field that describes an organization within
your company. This can also be used to note a less formal company name
(without the Inc., Corp., and so on).
•Locality is an optional field that usually describes the city, p rincipality, or
country for the organization.
•State or Province is usually required, but can be optional for some CAs. Note
that most CAs won’t accept abbreviations, but check with them to be sure.
•Country is a required, two-character abbreviation of your country name (in
ISO format). The country code for the United States is US.
All this informati on is combined as a series of attribute-value pairs called the
distinguished name (DN), which uniquely identifies the subject of the cert ificate.
If you are purchasing your certificate from a commercial CA, you must contact the
CA to find out what additionalinformationthey require before they issue a
certificate. Mos t CAs require that you prove your identity. For example, they want
to verify yourcompany nameand who is authorizedby t he company to administer
the server, and they might ask whether you have the legal right to use the
information you provide.
Chapter 5Securing Your Enterprise Server93
Requesting and Installing Other Server Certificates
Some commercial CAs offer certificates with greater detail and veracity to
organizations or individuals who pro vide more thorough identification. For
example, you might be able to purchase a certificate stating that the CA has not
only verified that yo u are the rightful administ ra tor of the
computer, but that y ou are a company that has been in business for three years,
and have no outstanding customer litigation.
Requesting Other Server Certificates
To request a c ertificate, perform the following st eps:
1.Access either the Enterprise Server Administration Ser ver or the Server
Manager and choose the Security ta b .
For the Server Manager you must firs t select the server instance from t he
drop-down list.
2.Click the Request a Certificate link.
3.Select if this is a new certificate or a certificate renew al.
Many certificatesexpire after a set period of time, such as six months or a year.
Some CAs will automatically send you a renewal.
www.example.com
4.Perform the following steps to specify how you want to submit the request for
the certificate:
❍If the CA expects to receive the request in an email message, checkCA
Email and enter t he email address of the CA. For a list of CAs, click List of
available certificate authorities.
❍If you are requesting the certificate from an internal CA that is using
Netscape Certificate Server, click CA URL and enter the URL for the
Certificate Server. This URL should point to the certificate server’s
program that handles certificate requests. A sample URL might be:
https://CA.example.com:444/cms.
5.Select the cryptographic module for the key-pair file you want to use when
requesting the certificate from the drop-down list.
drop-down list. Choose a key size of 1024 or 2048 bits.
This key is used in RSA operations. Larger keys can provide improved
security, but the computation time associated with this key is proportional to
the square of the modulus. For example, a key size of 2048 bits takes four times
longer to processthan a 1024-bit key size.
94Netscape Enterprise Server Administrator’s Guide • August 2002
Requesting and Installing Other Server Certificates
NOTEThere are many factors that affect SSL performance, such as server
load, operatingsystem and SSL hardware accelerators. Also, older
browsers might have problems with the larger key size. Do not
change the key size without first determining if it is necessary for
your environment.
7.Enterthepasswordforyourkey-pairfile.
This is the password you specified when you created thetrust d atabase, u nless
you selected a cryptographic module other than the internalmodule. The
server uses the password to get your private key and encrypt a message t o the
CA. The server then sends both your public key andtheencryptedmessageto
the CA. The CA uses the public k ey to decrypt your message.
8.Enter your identification information.
The format o f this information varies by CA. For a general description of these
fields, alist of Certificate Authorities is available through both Server
Administrator, and Server Manager Security Pages under Request a
Certificate. N ot e that most of this information usually isn’t required for a
certificate renewal.
9.Double-check your work to ensure accuracy.
The more accurate the information, the faster your certificate is likely to be
approved. If y our request is going to a certificate server, you’ll be pr ompted to
verify the form information before the request is submitted.
10. Click OK.
11. For the Server M anager, click Apply, and then Restart for cha nge s to take
effect.
The server generates a certificate request that contains your information. The
request has a digital signature created with your pr ivate key. The CA uses a digital
signature to verify that the request wasn’t tampered with during routing from your
server machine t o the CA. In the rare event that the request is tampered with, the
CA will usually contact you by phone.
If you choose to email the request, the server composes an email message
containing the request and sends the message to the CA. Typically, the certificate is
then returned to you via email.If insteadyou specifieda URL to a certificate server,
your server uses the URL to submit the request to the CertificateServer. You might
get a response via email or other means depending on the CA.
Chapter 5Securing Your Enterprise Server95
Requesting and Installing Other Server Certificates
The CA will notify you if it agrees to issue you a certificate. In most cases, the CA
will send you r certificate via email. If your organization is using a certificate server,
you may be able to search for the certificate by using the certificate server’s forms.
NOTENot everyone who requests a certificate from a commercial CA is
given one. Many CAs require you to prove your identity before
issuingyou a certificate.Also,it can take anywhere from one day to
two months to g et approval. You are responsible fo r promptly
providing all the ne cessary information to the CA.
Onceyou receivethe certificate,you can install it. In themeantime, you canstilluse
your server without SSL.
Installing Other Server Certificates
When you receive your certificate back from the CA, it will be encrypted with your
public key so that only you can decrypt it. Only by entering the correct password
for your trust database can y ou decrypt and install your certificate.
There are three types of certificates:
•Your own server’s certificate to present to clients
•A CA’s own certificate for use in a certificate chain
•A trusted CA’s certificate
A certificate chain is a hierarchical series of certificates signed by successive
certificate authorities. A CA certificate identifies a certificate authority (CA) and is
used to sign certificates issued by that authority. A CA certificate can in turn be
signed by the CA certificate of a parent CA, and so on, up t o a root CA.
NOTEIf your CA doesn’t automatically send you their ce rtificate, you
should request it. Many CAs include their certificate in the email
with your certificate, and your server installs both certificates at the
same time.
The server will use the key-pair fil e password you specify to decrypt the certificate
when you install it. You can either save the email somewhe re accessible to the
server, or copy the text of the email and b e ready to paste the text into the Install
Certificate form, as described here.
96Netscape Enterprise Server Administrator’s Guide • August 2002
Requesting and Installing Other Server Certificates
Installing a Certificate
To install a certificate, perform the following steps:
1.Access either the Enterprise Server Administration Ser ver or the Server
Manager and choose the Security ta b .
For the Server Manager you must firs t select the server instance from t he
drop-down list.
2.Click the Install Certificate link.
3.Check the type of certific ate you are installing:
❍This Server is for a s ingle certificate associated only with your server.
❍Server Certificate Chain is for a CA’s certificate to include in a certificate
chain.
❍Trusted Certificate Authority (CA) is for a certificate of a CA that you want
to accept as a trusted CA for client authentication.
4.Select the Cryptographic Module from the drop-down list.
5.Enter the Key-Pair File Password.
6.Leave the a nam e for the certificate field blank if it will be the only one used for
this server instance, unless:
❍Multiple certificates will be used for virtual servers
Enter a certificate name unique within the server instance
❍Cryptographic module s o ther than internal are used
Enteracertificatenameuniqueacrossallserverinstanceswithina
single cryptographic module
If a name is entered, it will be displayed in the Manage Certificates l ist, and
should be descriptive. For example, “Unit ed States Postal Service CA” is the
name of a CA, and “VeriSign Class 2 Primary CA” describes botha CA and the
type of certificate. When no certificate name is entered, the default value is
applied.
7.Select either:
❍Message is in this file and enter the full pathname to the saved email
❍Message text (with headers) and paste the email text
Chapter 5Securing Your Enterprise Server97
Migrating Certificates When You Upgrade
If you copy and paste the text, be sure to include the headers -Begin
Certificate-
and -End Certificate-, including t h e beg inning and
ending hyphens.
8.Click OK.
9.Select either:
❍Add Certificate if you are installing a new certifica te.
❍Replace Certificate if you are installing a certificate renewal.
10. For the Server M anager, click Apply, and then Restart for cha nge s to take
effect.
The certificate is stored in the server’s certificate database. The filename will be
<alias>-cert7.db. For example:
https-serverid-hostname-cert7.db
Migrating Certificates When You Upgrade
Key-pair files and certificates are migrated only if your server has security enabled.
You can also migrate key s and certificates by themselves using the Security tabs in
the Enterprise Server Administration Server page and the Server Manager page.
In Enterprise Server 6.1, the Enterprise Server Administration Server and each
server instance has its own certificate and key-pair file, referred to as a trust
database inst ead of an alias.
You manage the trust database and its constituent certificates, including the server
certificate and all the included Certificate Authorities, from the Enterprise Server
Administration Server for itself, and from the Server Manager for server instances.
The certificate and key-pair databasefiles are now named after the server instance
that uses them. If in the previous version, multiple se rver instances shared the
same alias,when migrated the certificate and key-pair file are renamed for the new
server instance.
The entire trust database associated with the server instance is migrated. All the
Certificate Authorities listed in your previous database are m igrated to the
Enterprise Server 6.1 database. If duplicate CAs occur, use the previous CA until it
expires. Do not attempt to delete duplicate CAs.
Migrating a Certificate
To migrate a certificate, perform the fo llowing steps:
98Netscape Enterprise Server Administrator’s Guide • August 2002
Migrating Certificates When You Upgrade
1.From your local m achine, access either the Administration Server or the Server
Manager and choose the Security ta b .
For the Server Manager you must firs t select the server instance from t he
drop-down list.
2.Choose:
❍Migrate 3.X Certifica tes link from the Administration Server
❍Migrate Certificate link from the Server Manager.
3.Enterthe3.6ServerRoot.
4.Enter the Alias.
5.Enter the Password.
6.Click OK.
7.For the Server Manager, click Apply, and t hen Restart for changes to take
effect.
Using the Built-in Root Certificate Module
The dynamically loadable root certificate module included with Enterprise Server
6.1 contains the root certificates for many CAs, including VeriSign. The root
certificate module allows you to upgrade your root certificates to newer versions in
a much easierway than before. In the past, you were required to delete the oldroot
certificates one at a time, then installthe new ones one at a time.To install
well-knownCA certificates, you can nowsimply update the root certificate module
file to a newer version as it becomes available through future versions of Enterprise
Server or in Service Packs.
Because the root certificate is implemented as a PKCS#11 cryptographic module,
you can never delete the root certificates it contains,and the option to delete will
not be offered when managing these certifica tes. To remove the root certificates
from your server instances, you can disable the root certificate module by deleting
the following in t h e server’s
•
libnssckbi.so (on most UNIX platforms)
•
libnssckbi.sl (on HP-UX)
•
nssckbi.dll (on Windows NT/Windows 2000)
alias subdirectory:
Chapter 5Securing Your Enterprise Server99
Managing Certificates
If you later wish to restore the root certificate module, you can copy the extension
from
bin/https/lib (UNIX and HP-UX) or bin\https\bin (Windows
NT/Windows 2000) back into the
You can modify the trust information of the root certificates. The trust information
is written t o the certificate database for the server instance being edited, not back to
the root certificate module itself.
Managing Certificates
You can view, delete, or edit the trust settings of the various certificates installed on
your server. This includes your own certificate and certificates from CAs.
To manage certificate lists, perform the fo llowing steps:
1.Access either the Enterprise Server Administration Ser ver or the Server
Manager and choose the Security ta b .
For the Server Manager you must firs t select the server instance from t he
drop-down list.
2.Click the Manage Certificates link.
alias subdirectory.
❍If you are managing a certificate for a default configuration using the
internal cryptographic module, a list of all installed certificates with their
type and expira tion date is displayed. All certificates are stored in the
directory
❍If you are using an external cryptographic module, such as a hardware
server_root/alias.
accelerator, you will first need to enter your password for each specific
module and click OK. The certificate list will update to include certificates
in the module.
3.Click the Certificate Name you wish to manage.
An Edit Server Certificate page appears w ith management options for that type
of certificate. Only CA certificates will allo w you to set or unset client trust.
Some external cryptographic modules will not allow certificates to be deleted.
4.In the Edit Server Certificate window you may select:
❍Delete Certifica te or Quit for certificates obtained internally
❍Set client trust, Unset server trust, or Quit for CA certificates
5.Click OK.
100Netscape Enterprise Server Administrator’s Guide • August 2002
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.