IBM Endpoint Manager For Remote Control Installation Guide
IBM Endpoint Manager For Remote Control Installation Guide
This edition applies to version 9, release 1, modification level 0 of IBM Endpoint Manager and to all subsequent
releases and modifications until otherwise indicated in new editions.
Contents
Chapter 1. IBM Endpoint Manager for Installing broker support . . . . . . . . . . 66
Remote Control Installation Guide . . . 1 Installing Windows broker support . . . . . 67
Audience . . . . . . . . . . . . . . . 1 Installing Linux broker support. . . . . . . 67
Versions . . . . . . . . . . . . . . . . 1
Terms used in this guide . . . . . . . . . . 1 Chapter 5. Utility for extracting the
component installation files . . . . . 69
Chapter 2. Overview of the IBM Endpoint Using the additional setup utility . . . . . . . 69
Manager for Remote Control system . . 3
Using this guide . . . . . . . . . . . . . 5 Chapter 6. Managing the component
IBM Endpoint Manager for Remote Control operating services . . . . . . . . . . . . . . 71
requirements . . . . . . . . . . . . . . 5 Starting, stopping, or restarting the Windows
A Basic installation . . . . . . . . . . . 6 components . . . . . . . . . . . . . . 71
Installation with support for firewall and NAT Starting, stopping, or restarting the Linux
traversal . . . . . . . . . . . . . . . 7 components . . . . . . . . . . . . . . 71
Installation with support for remote control
sessions over the internet . . . . . . . . . 8 Chapter 7. Performing required
Server requirements . . . . . . . . . . . 9
configuration . . . . . . . . . . . . 73
Server environment guidelines . . . . . . . 10
Enabling email . . . . . . . . . . . . . 73
Controller requirements . . . . . . . . . 13
Configuring LDAP . . . . . . . . . . . . 73
Target requirements . . . . . . . . . . 14
Setting up LDAP synchronization . . . . . . 74
Gateway requirements . . . . . . . . . . 14
Verifying connection information . . . . . . 75
Broker requirements . . . . . . . . . . 15
Configuring connection credentials . . . . . 76
Connection Security . . . . . . . . . . 77
Chapter 3. Getting started . . . . . . 17 Setting user authentication properties. . . . . 79
Importing Active Directory Groups . . . . . 82
Chapter 4. Installing the IBM Endpoint Testing the Connection . . . . . . . . . 83
Manager for Remote Control Verifying that groups have been imported . . . 84
components . . . . . . . . . . . . 19 Sample LDAP Configuration File . . . . . . 85
Obtain the installation files . . . . . . . . . 19
Installing the server . . . . . . . . . . . 20 Chapter 8. Federal Information
Setting up the database . . . . . . . . . 21 Processing Standard (FIPS 140-2)
Installing by using the server installer . . . . 25 compliance in IBM Endpoint Manager
Installing on WebSphere Application Server for Remote Control . . . . . . . . . 91
version 8.5: deploying the war file . . . . . . 32
Enabling FIPS compliance on the server . . . . . 93
Installing from the IBM Endpoint Manager
Enabling FIPS compliancy on a server installation
console . . . . . . . . . . . . . . . 40
with a stand-alone Websphere Application Server 93
Installing the target . . . . . . . . . . . . 40
Enabling FIPS compliance on an automated
Installing the Windows target . . . . . . . 40
server installation . . . . . . . . . . . 94
Installing the Linux target . . . . . . . . 51
Enabling FIPS compliance on the controller. . . . 95
Installing the target by using the SPB file . . . 52
Enabling FIPS compliance on the target . . . . . 97
Running a target custom install. . . . . . . 52
Enabling FIPS compliance on a Windows target 97
Installing the controller . . . . . . . . . . 59
Enabling FIPS compliance in Linux or UNIX
Installing the controller on a Windows system . . 59
based operating systems . . . . . . . . . 98
Installing the Linux controller . . . . . . . 60
Enabling FIPS compliance on the gateway . . . . 98
Installing the controller in other supported
Enabling FIPS compliance on the broker . . . . . 99
operating systems . . . . . . . . . . . 60
Installing a preconfigured controller component 61
Installing the command line tools . . . . . . . 63 Chapter 9. NIST SP800-131A
Installing the cli tools on a Windows system . . 63 compliance in IBM Endpoint Manager
Installing the tools in Linux . . . . . . . . 65 for Remote Control . . . . . . . . . 101
Installing gateway support in IBM Endpoint Enabling NIST SP800-131A compliance on the
Manager for Remote Control . . . . . . . . 65 server . . . . . . . . . . . . . . . . 102
Installing Windows gateway support . . . . . 65 Enabling NIST SP800-131A compliance during
Installing Linux gateway support . . . . . . 66 the server installation. . . . . . . . . . 102
iii
Enabling NIST SP800-131A compliance on a Application welcome page does not display . . 115
server with a stand-alone WebSphere DB2 connection error when database options are
Application Server . . . . . . . . . . 102 verified . . . . . . . . . . . . . . 115
Enabling NIST SP800-131A compliance after you Cannot see targets contacting the server . . . 116
install the server . . . . . . . . . . . 103 Errors when using Oracle as the database . . . 117
Enabling NIST SP800-131A compliance on the Errors when trying to connect to the Microsoft
controller . . . . . . . . . . . . . . . 105 SQL database in FIPS compliancy mode . . . 118
Enabling NIST SP800-131A compliance in the
stand-alone controller . . . . . . . . . 105 Chapter 12. Uninstalling the
NIST SP800-131A compliance on the target . . . 105 components . . . . . . . . . . . . 119
Enabling NIST SP800-131A compliance in a
Uninstalling the server . . . . . . . . . . 119
Windows target . . . . . . . . . . . 106
Uninstalling the server by using the installer 119
Enabling NIST SP800-131A compliance on Linux
Uninstalling the server application in IBM
or UNIX based targets . . . . . . . . . 107
Websphere Application Server . . . . . . . 119
Enabling NIST SP800-131A compliance on the
Uninstalling the server using Add or Remove
gateway . . . . . . . . . . . . . . . 107
programs . . . . . . . . . . . . . . 120
Enabling NIST SP800-131A compliance on the
Uninstalling the target on Windows systems . . . 120
broker . . . . . . . . . . . . . . . . 107
Uninstalling the target on Linux systems . . . . 120
Enabling NIST SP800-131A compliance on the CLI
tools . . . . . . . . . . . . . . . . 108
Enabling NIST SP800-131A compliance when Chapter 13. Upgrading from previous
you install the Windows cli tools . . . . . . 108 versions . . . . . . . . . . . . . 123
Enabling NIST SP800-131A compliance on the Upgrading the gateway component . . . . . . 123
cli on Linux or UNIX based targets . . . . . 108 Upgrading the broker component . . . . . . 123
Upgrade the server component . . . . . . . 124
Chapter 10. Verifying the server Upgrading the target component . . . . . . . 125
Upgrading the controller component . . . . . 125
installation . . . . . . . . . . . . 109
Chapter 14. Maintaining the target
Chapter 11. Recovering from
installation . . . . . . . . . . . . 127
installation errors. . . . . . . . . . 111
Recovery steps . . . . . . . . . . . . . 111
Errors during installation . . . . . . . . . 111 Appendix. Support . . . . . . . . . 129
Not enough memory . . . . . . . . . . 111
DB2 connection error when database options are Notices . . . . . . . . . . . . . . 131
verified . . . . . . . . . . . . . . 112 Programming interface information . . . . . . 133
Oracle pre checks . . . . . . . . . . . 112 Trademarks . . . . . . . . . . . . . . 133
libstdc++.so.5 error when installing the server Terms and conditions for product documentation 134
using the installation program . . . . . . . 113
Errors after installation . . . . . . . . . . 113 Index . . . . . . . . . . . . . . . 135
Out of memory error . . . . . . . . . . 113
Database connection authorization failure . . . 115
Using the IBM Endpoint Manager for Remote Control administration Web
interface, you can view and control a remote desktop, including its keyboard and
mouse, anywhere on your network. You can also chat, transfer files, remotely
guide the users, administer the policies to be applied to different users and target
groups, and much more. These features can help provide more efficient and
effective analysis of user problems from the administrators desktop, without the
added cost of dispatching a technician or relying on user descriptions over the
phone. Use IBM Endpoint Manager for Remote Control to deliver better support,
more flexibility, and richer security, using robust features that include enhanced
central logging and video capture of the sessions and full data stream encryption.
Audience
This guide is for administrators and IT managers who want to install and
administer IBM Endpoint Manager for Remote Control. It details the system
requirements for each of the components and provides installation instructions that
allow you to deploy the program in your environment. It also includes information
about configuring and maintaining IBM Endpoint Manager for Remote Control.
Versions
The guide includes the functions introduced in IBM Endpoint Manager for Remote
Control, Version 9.1.0 © Copyright IBM Corp. 2014.
1
2 IBM Endpoint Manager for Remote Control Installation Guide
Chapter 2. Overview of the IBM Endpoint Manager for Remote
Control system
The IBM Endpoint Manager for Remote Control system includes the following
main components:
IBM Endpoint Manager for Remote Control Target
The target is installed on every computer that you want to control
remotely with IBM Endpoint Manager for Remote Control. It listens for
connection requests that come from the controller. The target can also be
used to start a remote control session over the internet, by using a broker.
Targets that are outside of your intranet can be configured to register their
details with the server. Sessions with these targets are managed by server
policies. The targets must be deployed with the Managed property set to
Yes. The ServerURL and BrokerList properties must also be configured.
Targets can also be configured so that they do not send their details to the
server. These targets are classed as unregistered targets. There are two
ways to configure unregistered targets. You can install the target software
and set the Managed property to No. The BrokerList property must also be
set. You can also use the on-demand target features to start a remote
control session with a computer that does not have any target software
preinstalled. Server policies are used to manage the on-demand sessions.
The target software is deleted at the end of the session.The IBM Endpoint
Manager for Remote Control target can run in Windows, Linux, and Solaris
operating systems.
IBM Endpoint Manager for Remote Control Controller
Can be installed by using the Fixlet or installer that is provided for use in
peer to peer sessions. It can also be launched in context from the remote
control server or the IBM Endpoint Manager console. In all instances, the
controller can be used to allow the user to control a remote computer on
which the remote control target is installed. The controller delivers an
interface to several actions, available to the controller user, like remote
control, guidance, chat, file transfer, collaboration, and many more. IBM
Endpoint Manager for Remote Control controller supports JRE versions:
Sun 1.6, Oracle 1.6, 1.7 or IBM® 1.5, 1.6, 1.7.
IBM Endpoint Manager for Remote Control Server
A web application that manages all the deployed targets that are
configured to be in managed mode and to point to the IBM Endpoint
Manager for Remote Control Server 's URL. The server is a web
application that can be deployed on an existing WebSphere® server, or
installed through the installer package along with an embedded version of
WebSphere. The server listens for HTTP or HTTPS connections by default.
When it is installed with the embedded WebSphere option, it listens on
ports 80 and 443. When it is deployed on top of an existing WebSphere
server, the IBM Endpoint Manager for Remote Control server listens on
ports 9080 and 9443. The server requires a database server: embedded
Derby, only for proof of concept deployments, DB2®, SQL Server, and
Oracle are the supported options. Additionally, it can also be configured to
synchronize and authenticate user and group data from an LDAPv3 server,
like Active Directory or Tivoli Directory Server. This deployment scenario
has the same networking characteristics as peer to peer. Therefore, direct
TCP connectivity is required between all the controllers and all the targets.
3
However, the IBM Endpoint Manager for Remote Control server provides a
method of centralized, and finer, policy control, where targets can have
different policies that are determined by the user who is trying to start the
remote control session. The Server also provides for centralized audit and
storage of full session automatic recordings. In this scenario, the controller
is not a stand-alone application.but is started as a Java™ Web Start
application from the IBM Endpoint Manager for Remote Control server's
web interface to start the remote control session.
Note: Peer to peer and managed are not exclusive modes. The IBM
Endpoint Manager for Remote Control target can be configured in the
following ways.
v Configured to be strictly managed.
v Configured to fail back to peer to peer mode when the server is not
reachable.
v Configured to accept both peer to peer and managed remote control
sessions.
For the sake of readability and generality, this guide assumes the following
restrictions:
v Each IBM Endpoint Manager for Remote Control server must have access to one
of the supported database servers, located locally on the server machine or
remotely on a separate server. The supported database systems are DB2, Oracle
and MS SQL. It is also possible to install the server using the embedded Derby
database provided by the installer but this configuration is not supported for
production deployments.
v In managed environments, each controller can make an HTTP or HTTPS
connection to the IBM Endpoint Manager for Remote Control server.
v In managed environments, each IBM Endpoint Manager for Remote Control
target computer in the network must be able to make an HTTP or HTTPS
connection to a server, a gateway or a broker on the specified ports.
If your network configuration does not match any of the scenarios in that chapter,
contact a support technician for more options.
The initial deployment of a minimal managed IBM Endpoint Manager for Remote
Control system (server and a few targets) should take about an hour to complete.
Several steps in the IBM Endpoint Manager for Remote Control installation depend
on the completion of prior steps. For this reason, it is recommended that you
follow this guide in the order presented.
Chapter 2. Overview of the IBM Endpoint Manager for Remote Control system 5
A Basic installation
The most basic installation requires the IBM Endpoint Manager for Remote Control
target and controller components. Use the two components to start a peer to peer
remote control session, for which the policies are defined only at target level.
The server component provides a single interface where controller users can easily
search for targets. They can also organize the targets that are most frequently
accessed and view their session history. For an administrator, a managed
environment provides the following extra capability.
v Centralized management of users and targets: Users can be organized into
groups with similar profiles. They can be organized manually, by using the IBM
Endpoint Manager for Remote Control server interface, or by importing users
and groups from LDAP. Similarly, targets can be organized into groups manually
or by setting target membership rules to automatically assign a target to a
specific group. For more details of target membership rules, see the IBM
Endpoint Manager for Remote Control Administrator's Guide.
v Centralized policy management: When a session is started from the server
interface, the permissions that are set for the session are derived from the target
and controller properties. Provides more flexibility to define different levels of
access, against a single target, for different users in your organization.
v Centralized auditing and recording repository: Administrators can use the IBM
Endpoint Manager for Remote Control server interface to browse and examine
audit information. They can also view recordings that are associated with a
specific remote control session. Administrators can search the existing session
history. For example, by user ID or computer name.
v Access request management: Administrators can grant temporary access, or
increase the level of access, to a target or group of targets. Temporary access can
be granted to IBM Endpoint Manager for Remote Control registered and
unregistered users.
v Reporting capabilities
Chapter 2. Overview of the IBM Endpoint Manager for Remote Control system 7
Installation with support for remote control sessions over the
internet
There can be occasions when the target that requires support is out of network
sight in some internet location. For example, in a hotel or an airport lounge.
Use the broker component to enable remote control sessions to these computers by
bridging the target and controller communication. The broker must be placed in
the DMZ and a gateway is required to provide secure communication to the server
in the intranet.
In this scenario, the controller user can start a broker connection and obtain a
connection code from the server. The user who requires assistance enters the
connection code by using the appropriate menu option in the target UI. When the
session details are validated by the server, the session is connected.
Server requirements
The hardware that is required by the server component depends on the number of
computers that are administered and the frequency that is defined for their status
updates.
The distributed architecture of IBM Endpoint Manager for Remote Control allows a
single server to support hundreds of thousands of computers.
Note: IBM Endpoint Management for Remote Control includes entitlement for
DB2 v10.5 and WebSphere v8.5.
The computer on which you install the IBM Endpoint Manager for Remote Control
server must have the minimum following items or capability:
1. 1 Quad core or two dual core processors. 2.40 GHz with supported OS.
2. A minimum of 4 GB of memory.
3. A minimum of 2 GB of storage or hard disk space to install, and an average of
2 MB per client in the database.
4. A minimum screen resolution of 800 by 600 pixels is required when you
perform an automated server installation.
5. Adequate space for storing session video recordings. Recordings are stored on
the hard disk and their size can vary depending on the duration and screen
Chapter 2. Overview of the IBM Endpoint Manager for Remote Control system 9
activity of the session. On average a 5-minutes session, 8-bits mode, can use
about 2 MB of space. In true color 24-bit mode, recordings can take more space.
6. A network card that supports TCP/IP.
7. A supported browser.
8. When you use an Oracle database you must use the 10.2 g JDBC 4 drivers for
Oracle. Alternatively, if you are using the Oracle 11g drivers,
oracle.increment.keys.off=1 must be set in the trc.properties file. Restart
the server service.
Platform Support
The following platforms are supported when you use the installation tasks
Note: Derby 10.10 provides support only up to Windows Server version 2008.
v Windows Server 2003.
v Windows Server 2003 R2.
v Windows Server 2008.
v Windows Server 2008 R2.
v Windows Server 2012.
v Windows Server 2012 R2.
v Red Hat Enterprise Linux 5.0.
v Red Hat Enterprise Linux 6.0.
v SuSE Enterprise Linux Server 10.
v SuSE Enterprise Linux Server 11.
v CentOS 5.0.
v CentOS 6.0.
Supported Architectures
v Intel IA-32 (also known as x86, x86-32)
v Intel 64 or AMD64 (also known as x64, x86-64, EM64T)
Note: Server installation types 1 and 2 are only available when using Windows or
Linux operating systems.
Note: Server installation type 1 should only be used in Proof of Concept or test
deployments.
Note: Installation type 1 is suitable for demos or pilot projects. Installation type 2
can give better performance, which might be preferred for production systems in
these environments.
Chapter 2. Overview of the IBM Endpoint Manager for Remote Control system 11
performance, installation type 2 is suitable. However with installation type 3 you
can also use the admin functions of the installed WAS.
Note: In this type of environment ensure that the target deployment is performed
in stages. A staged deployment can avoid overload in the server when the targets
try to register with the server. Give the RegistrationDelay target property a value
that will distribute the target machine registration evenly through the staged
deployment. Distribute the target registration to avoid too many machines trying
to register at the one time.
v Optional: 2 network cards, one for target communications and one for database
communications which could aid in performance tuning.
Note: The database administrator should tune the database for performance as is
appropriate.
The following guidelines should also be taken into consideration when using large
reports as some performance degradation can be experienced.
v Ensure that the All targets report is not the default home page report.
v Ensure staged deployment of the targets to avoid overload in the server when
they try to register.
Note: Give the RegistrationDelay target property a value that will distribute
the target machine registration evenly through the staged deployment. Distribute
the target registration to avoid too many machines trying to register at the one
time.
Note: If you have configured LDAP and LDAP synchronization is enabled, set a
reasonable frequency for the synchronization. If your LDAP configuration is set up
to import a large number of users and groups, set the frequency to 24 hours. For
more details about configuring LDAP, see “Configuring LDAP” on page 73.
Controller requirements
The Controller is a Java based application that can run on any operating system
with the following prerequisites:
v Java Run Time environment: Sun 1.6, Oracle 1.6, 1.7 or IBM® 1.5, 1.6, 1.7
Chapter 2. Overview of the IBM Endpoint Manager for Remote Control system 13
Note: Sun Java and Oracle Java are not supported in FIPS or NIST SP800-131a
mode. You must use the IBM Java in this mode.
v Web Browser: either Microsoft Internet Explorer 9, 10, 11 or Mozilla Firefox ESR
24.
Target requirements
The computer on which you install the IBM Endpoint Manager for Remote Control
target must have the minimum following items or specification:
1. At least a 1 GHz Intel® or AMD processor.
2. A minimum of 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit).
3. A minimum of 50 MB hard disk space.
4. Adequate space for storing session video recordings. Recordings are stored on
the hard disk and their size can vary depending on the duration and screen
activity of the session. On average a 5-minutes session, 8-bits mode, can use
about 2 MB of space. In true color 24-bit mode, recordings can take more space.
Platform Support
Supported Architectures
v Intel IA-32 (also known as x86, x86-32)
v Intel 64 or AMD64 (also known as x64, x86-64, EM64T)
Gateway requirements
The computer on which you install the IBM Endpoint Manager for Remote Control
gateway must have the minimum following items or specification:
1. At least a 1 GHz Intel® or AMD processor.
2. A minimum of 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
3. A minimum of 50 MB hard disk space.
Supported Architectures
v Intel IA-32 (also known as x86, x86-32)
v Intel 64 or AMD64 (also known as x64, x86-64, EM64T)
Broker requirements
The computer on which you install the IBM Endpoint Manager for Remote Control
broker must have the minimum following items or specification:
1. At least a 1 GHz Intel® or AMD processor.
2. A minimum of 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
3. A minimum of 50 MB hard disk space.
4. Adequate space for storing session video recordings. Recordings are stored
temporarily on the hard disk and their size can vary depending on the duration
and screen activity of the session. On average a 5-minutes session, 8-bits mode,
can use about 2 MB of space. In true color 24-bit mode, recordings can take
more space.
Platform Support
Chapter 2. Overview of the IBM Endpoint Manager for Remote Control system 15
v Windows Server 2012 R2.
v Red Hat Enterprise Linux 5.0.
v Red Hat Enterprise Linux 6.0.
v SuSE Enterprise Linux Server 10.
v SuSE Enterprise Linux Server 11.
v CentOS 5.0.
v CentOS 6.0.
Supported Architectures
v Intel IA-32 (also known as x86, x86-32)
v Intel 64 or AMD64 (also known as x64, x86-64, EM64T)
* In a managed environment, the controller user starts remote control sessions from
the IBM Endpoint Manager for Remote Control server interface. Starting sessions
this way does not require the controller component to be installed separately. The
IBM Endpoint Manager for Remote Control server interface starts a Java Web Start
controller console, in context.
17
18 IBM Endpoint Manager for Remote Control Installation Guide
Chapter 4. Installing the IBM Endpoint Manager for Remote
Control components
The IBM Endpoint Manager for Remote Control components can be installed in
two ways. If you have access to the IBM Endpoint Manager for Remote Control
console use the deployment fixlets to install the components. For more details see
the IBM Endpoint Manager for Remote Control Console User's Guide.
Alternatively use the component installation files.
There are various ways that you can obtain the installation files, choose the
appropriate method for obtaining the required files. There is no specific order in
which the different components must be installed.
Passport Advantage®
To install the IBM Endpoint Manager for Remote Control components, use the
following images from Passport Advantage.
Table 6. Parts required for installing IBM Endpoint Manager for Remote Control
Part number File name
IEM_Rem_Cntrl_V91_Image_1.zip
Windows operating system
CITM7ML - IBM Endpoint Manager
for Remote Control V9.1 Image 1.
IEM_Rem_Cntrl_V91_Image_2.tar
Linux operating system
CITM8ML - IBM Endpoint Manager
for Remote Control V9.1 Image 2.
IEM_Rem_Cntrl_V91_Image_3.tar
Windows, Linux, AIX®, Solaris operating
systems
CITM9ML - IBM Endpoint Manager
for Remote Control V9.1 Image 3.
Depending on the operating system, and the component that you are installing,
determines which image file you require.
IEM_Rem_Cntrl_V91_Image_1.zip
Extract the installation files for the Windows operating system components
from this image file. The Windows operating system executable files are in
the \windows directory.
IEM_Rem_Cntrl_V91_Image_2.tar
Extract the installation file for the Linux server component from this image
file. The trc_server_setup.bin file is in the \linux directory. Use the
IEM_Rem_Cntrl_V91_Image_3.tar file to access the installation files for the
other Linux components.
19
IEM_Rem_Cntrl_V91_Image_3.tar
Extract the additional setup utility files, trc_additional_setup.exe, and
trc_additional_setup.bin from this image file. Use the files to extract the
installation files for Windows, Linux, and other supported operating
system components. Go to the \Disk1\InstData\platform\VM directory
where platform is relevant to your operating system. For more information
about running the additional setup utility, see “Using the additional setup
utility” on page 69.
The installation DVD contains the installation files that are required for installing
the components.
Windows installation files
Go to the \trc\windows directory to access the required component
installation file.
Linux server component
Go to the \trc\linux directory to access the trc_server.bin file, for
installing the server. For all other component installation files, go to the
\Disk1\InstData\platform\VM directory where platform is relevant to your
operating system. Use the additional setup utility files
trc_additional_setup.exe or trc_additional_setup.bin to extract the
required installation files. For more information about running the
additional setup utility, see “Using the additional setup utility” on page 69.
If you have the IBM Endpoint Manager for Remote Control server installed, you
can download the installation files for the target, controller, and cli components.
The controller installation file is for the standard controller. For the FIPS-compliant
installation file, use the additional setup utility.
v Click Tools > Downloads.
v Select Agent Downloads.
v Select the relevant component file.
Setting up DB2
To perform the database setup for DB2 complete the following steps. If you are
using a Windows operating system, begin from step 2. If you are using Linux
operating system or AIX operating systems, begin from step 1:
1. To verify that DB2 and the instance are ready for remote connectivity using
TCP/IP complete the following steps:
a. Run db2 get database manager configuration and verify that the value of
svcename is a valid port.
for example 50000
With the blank database created and ready to use, the next step is to set up the
WebSphere server, see “Setting up the application server” on page 32. It is possible
to verify that the database is set up properly by using a DB2 client to connect to
the database from another host. For more details see the DB2 Infocenter.
Setting up Oracle
To set up Oracle to use with IBM Endpoint Manager for Remote Control, create the
database and then set up the database permissions.
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 21
To create the Oracle database that will be used for IBM Endpoint Manager for
Remote Control, complete the following steps:
1. Run the Oracle database configuration assistant.
Windows systems
For example, Select Start > All Programs > Oracle > Configuration
and Migration Tools > Database Configuration Assistant.
UNIX-based systems
Enter the command dbca from the $ORACLE_HOME/bin directory.
2. Click Next on the welcome screen.
3. Step 1: Select Create a Database. Click Next.
4. Step 2: Select General Purpose for the template. Click Next.
5. Step 3:
a. Specify a name for the database. For example, TRCDB.
b. Specify an SID to be used to reference the database. For example, TRCDB.
Click Next.
6. Step 4: Select the database management option that you require. For example,
Use Database Control for Database Management. Click Next.
7. Step 5: Specify a password for the database and confirm the password. For
example, dboracle. Click Next.
8. Step 6: Specify where the database will be stored. For example, File System.
Click Next.
9. Step 7: Specify locations for the database files. For example, Use Database
File Locations from Template. Click Next.
10. Step 8: Select the recovery options for the database. Click Next.
11. Step 9: On the Database Content window, click Next.
12. Step 10: On the Initialization Parameters screen select the Character Sets tab.
a. Select the required Database Character Set
b. Click Next.
13. When you are using Oracle 11g, the following two steps are also required.
a. Security Settings, accept the enhanced 11g default security settings.
b. Automatic Maintenance Tasks, enable automatic maintenance tasks.
14. Step 11: On the Database Storage window click Next.
15. Step 12: Select the required Creation Options. Click Finish.
16. On the Confirmation screen, click OK to start the database creation.
Note: This may take some time as it goes through the different stages.
17. Click Exit when the database creation is complete.
The Oracle database that will be used for IBM Endpoint Manager for Remote
Control is created.
When you have created the Oracle database that will be used for IBM Endpoint
Manager for Remote Control you will need to configure its permissions.
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 23
c. GRANT UNLIMITED TABLESPACE TO ASSET;
d. GRANT CONNECT TO ASSET;
e. GRANT CREATE INDEXTYPE TO ASSET;
f. GRANT CREATE SEQUENCE TO ASSET;
g. GRANT CREATE TABLE TO ASSET;
h. GRANT CREATE TRIGGER TO ASSET;
i. GRANT CREATE INDEXTYPE TO ASSET;
j. GRANT CREATE PROCEDURE TO ASSET;
k. GRANT CREATE VIEW TO ASSET;
l. GRANT ANALYZE ANY TO ASSET;
Create a separate user ID to log on to IBM Endpoint Manager for Remote
Control
Create 2 users. User 1 must be called Asset. This user has no specific
permissions and is used only as a schema name. User 2 is the main
user and can be called anything you require. This user is used by IBM
Endpoint Manager for Remote Control to create and logon to the
database, and use the database. Use the assistant tool to create user
TRCDBU.
Complete the following steps to create the required permissions for
user TRCDBU.
a. GRANT UNLIMITED TABLESPACE TO ASSET;
b. GRANT UNLIMITED TABLESPACE TO TRCDBU;
c. GRANT ALTER ANY INDEX TO TRCDBU ;
d. GRANT ALTER ANY INDEXTYPE TO TRCDBU ;
e. GRANT ALTER ANY PROCEDURE TO TRCDBU ;
f. GRANT ALTER ANY SEQUENCE TO TRCDBU ;
g. GRANT ALTER ANY TABLE TO TRCDBU ;
h. GRANT ALTER ANY TRIGGER TO TRCDBU ;
i. GRANT COMMENT ANY TABLE TO TRCDBU ;
j. GRANT CREATE ANY INDEX TO TRCDBU ;
k. GRANT CREATE ANY INDEXTYPE TO TRCDBU ;
l. GRANT CREATE ANY SEQUENCE TO TRCDBU ;
m. GRANT CREATE ANY TABLE TO TRCDBU ;
n. GRANT CREATE ANY TRIGGER TO TRCDBU ;
o. GRANT CREATE INDEXTYPE TO TRCDBU ;
p. GRANT CREATE PROCEDURE TO TRCDBU ;
q. GRANT CREATE SEQUENCE TO TRCDBU ;
r. GRANT CREATE TABLE TO TRCDBU ;
s. GRANT CREATE TRIGGER TO TRCDBU ;
t. GRANT CREATE VIEW TO TRCDBU ;
u. GRANT DELETE ANY TABLE TO TRCDBU ;
v. GRANT INSERT ANY TABLE TO TRCDBU;
w. GRANT DROP ANY INDEX TO TRCDBU ;
x. GRANT DROP ANY INDEXTYPE TO TRCDBU ;
y. GRANT DROP ANY PROCEDURE TO TRCDBU ;
z. GRANT DROP ANY SEQUENCE TO TRCDBU ;
Setting up MSSQL
To set up MS SQL to use with IBM Endpoint Manager for Remote Control, create
the database and then set up the database permissions.
Note: During the installation of MS SQL, mixed mode authentication should have
been set up.
1. Click Connect.
2. Right-click the server tree and click properties.
3. Select security.
4. Ensure that SQL server and authentication mode is selected.
5. Expand the server tree.
6. Right-click databases.
7. Select Create New Database.
8. Enter a name for the database. For example, TRCDB. Click OK.
The default owner of the database is user sa, the system administrator. Create a
new user, to be the owner of the database being used with IBM Endpoint Manager
for Remote Control.
Database permissions
The default system administrator is the owner of the database and therefore has
the required permissions for using the database. If you have created a new user,
they also have the required permissions if they have been assigned as the owner of
the database.
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 25
Note: Click Cancel at any time to end the installation.
Note: During the file copy phase of the server installation, a backup copy of any
existing installation is saved. This feature is useful if there are any problems with
the installation when you are upgrading. The following directory is deleted if it
exists.
[INSTALLDIR]/trcserver.bak.
You can access the backup directory to restore or recover anything from the
previous installation.
To install the IBM Endpoint Manager for Remote Control server application,
complete the following steps:
1. Run the server installation file relevant to your operating system.
Windows systems
trc_server_setup.exe
Linux systems
trc_server_setup.bin
To obtain the installation file see “Obtain the installation files” on page 19.
2. Choose the language and click OK.
3. At the Introduction window click Next.
4. Click to accept both the IBM and non-IBM terms, click Next.
5. Accept the default location or click Choose to define a location for the
installation files, click Next.
Note:
a. For a Windows operating system, the DB2 default port is
50000. For a Linux operating system, the default port is
50000.
b. A remote DB2 installation is limited to type four
connections. A local installation can use type two or four.
For type two connections, set the port value to 0.
Administrator Userid
Specify the administrator user ID that is used for logging on
to the database. The user ID requires admin access to the
database. If you select create database, the user ID must have
administrator access for DB2.
Administrator password
Specify the administrator password for connecting to the
database.
Database Name
Specify a name for the database. For example, TRCDB.
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 27
to do so. In a Windows operating system, the user must be
db2admin, in Linux they must be a member of db2grp1.
Note:
Linux systems
The directory must be a directory for which the admin
user ID has read and write permissions.
Windows systems
Specify a hard disk letter.
Oracle
Database server
The IP address or host name of your database server.
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 29
click for https / unclicked for http
Select whether the server and target software communicates by using
http or https.
Note: If you are using https, you must use a fully qualified domain
name for the server name.
Upload data to server
The fully qualified name for the IBM Endpoint Manager for Remote
Control server. For example, trcserver.example.com
Note: You must make sure that you enter the fully qualified name.
The name is used for creating the URL in the trc.properties file that
is passed to the target after it contacts the server for the first time. If
the fully qualified name is incorrect, the target might not be able to
contact the server successfully when it is next due to contact it.
Web path of URL
Specify the web path for the server URL. For example, /trc.
Server port on Webserver (default 80)
Specify a port for the server.
SSL Port (default 443)
Specify a port for SSL.
Administrator email
Specify an administrator email address. For example,
[email protected].
Note: To use the email function, you must have a mail server
installed. Edit the trc.properties file after you install the IBM
Endpoint Manager for Remote Control server. See the IBM Endpoint
Manager for Remote Control Administrator's Guide for details of
editing the properties files.
Enable FIPS
Select this option to enable FIPS compliance on the server. For more
information about enabling FIPS compliance, see Chapter 8, “Federal
Information Processing Standard (FIPS 140-2) compliance in IBM
Endpoint Manager for Remote Control,” on page 91.
Enable NIST SP800-131A Compliance (Enables FIPS)
Select this option to enable NIST SP800-131A compliance on the
server. For more information about enabling NIST SP800-131A
compliance, see Chapter 9, “NIST SP800-131A compliance in IBM
Endpoint Manager for Remote Control,” on page 101.
9. Select options for your SSL certificate and click Next. The certificate
configuration is stored in the ssl.xml file.
Use an auto generated certificate store
Select this option to use a self-signed certificate that is generated by
the installer.
Note: If the following options are not enabled, click Use an auto
generated certificate store to enable them.
Note: Product icons do not work when you are using Linux.
11. In the Summary window click Install.
12. Click DONE to complete the installation.
The IBM Endpoint Manager for Remote Control server software is installed
including a set of properties files. These files can be edited to configure your
environment.
Note:
1. It is important to make sure that the URL property in the trc.properties file
contains the correct URL for the IBM Endpoint Manager for Remote Control
server. This property is used when targets contact the server and for
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 31
determining the server during a remote target installation. If the URL property
value is not correct, the remote targets are not able to contact the server
successfully. Therefore, you might have problems when you start remote
control sessions with the targets.
2. If the IP address of the server changes at any time, make sure that you update
the URL property in trc.properties. Restart the server service because the
targets try to contact to the old IP address until the change to the property is
made.
This license can be used for installations on AIX systems since the option of using
the embedded Liberty profile is not available for these systems. However, this
option is also available to customers that prefer to use the WebSphere Application
Server on Windows systems or Linux systems too.
Note: It is necessary to create the Websphere profile in a folder that does not
include any spaces in its path. Failure to do this will cause irrecoverable issues
when deploying the application war file.
Use the Websphere Integrated Solution Console to carry out the configuration.
DB2 configuration:
Credentials to use for the database connection need to be established and added as
a new entry to the JAAS-J2C authentication data.
Verify that the correct values are defined by completing the following steps:
1. Select Environment / WebSphere Variables.
2. Click DB2UNIVERSAL_JDBC_DRIVER_PATH and verify that this points to
the DB2 libraries.
Local DB2 database
If you have installed the DB2 database locally the files are located in
Windows systems
\Program Files\ibm\sqllib\java
Linux systems
/opt/ibm/db2/VERSION/java
where VERSION is the DB2 version number
for example: /opt/ibm/db2/V8.1/java
Remote DB2 database
If you are using a remote DB2 database you must copy the jar files
from the remote system to a location on your local system and put the
path to the local files here.
3. Click OK.
4. Click Save.
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 33
To create the data source complete the following steps:
1. Select Resources > JDBC > Data Sources.
2. Select the scope from the drop down menu that includes the node and the
server. For example, Node=TEST-2008Node02, Server=server1.
3. Click New.
4. Specify the data source information.
a. Enter basic data source information
Data source name
Specify a name for the data source. This can be any required name.
JNDI Name
This should be set to jdbc/trcdb
Click Next.
d. Setup security aliases
1) From the Component-managed authentication alias list, select your
node/DB2 where your node is the node you previously created for DB2.
2) Accept the default of none in the remaining lists.
3) Click Next.
e. Review the summary and click Finish.
5. To save the configuration changes, click Save.
Oracle configuration:
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 35
7. Click Finish.
8. Click Save.
Click Next.
b. Select JDBC provider
Click Select Existing JDBC provider and select Oracle JDBC Driver. Click
Next.
c. Enter database specific properties for the data source.
URL url=jdbc:oracle:thin@dbserver:1521:SID
where dbserver is the IP address of the server.
SID is the Oracle database SID.
Data store helper class name
Accept the default Data store helper class name, Oracle 11g.data
store helper.
MS SQL configuration:
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 37
The JDBC Provider uses WebSphere environment variables to define the paths to
the JDBC driver JAR files. The correct jdbc driver software must be downloaded
from Microsoft. The following version is recommended:
Download the SQL Server jdbc driver and copy it to the root drive of the server.
Run the file to extract the driver. The sqljdbc4.jar file is extracted to the
following directory structure:
C:\extract_path\sqljdbc_4.0\enu\
where extract_path is the directory chosen when you unzipped the file.
Verify that the correct values are defined by completing the following steps:
1. Select Environment / WebSphere Variables.
2. Click MICROSOFT_JDBC_DRIVER_PATH and verify that this points to the
Microsoft SQL Server JDBC driver, sqljdcb4.jar file that you extracted.
3. Click OK.
4. Click Save.
Note:
1. The heap size should be set to at least 512 MB for this type of installation.
Note: Make sure that the correct value for the server IP address or server name
is set in the URL field in the trc.properties file, to ensure that the targets
connect to the correct server. If you are using HTTPS, the hostname or IP
address that is set in the URL property must exactly match the value of the CN
field of the SSL certificate installed on the server.
IBM Endpoint Manager for Remote Control provides two ways to install the target
component. If you have access to the IBM Endpoint Manager console, use the
deployment fixlets to deploy the target. For more details, see the IBM Endpoint
Manager for Remote Control Console User's Guide. Alternatively use the IBM
Endpoint Manager for Remote Control target installation files.
For details of how to obtain the Windows component installation files see,
Chapter 4, “Installing the IBM Endpoint Manager for Remote Control
components,” on page 19. Choose the appropriate method for obtaining the file.
1. Run the trc_target_setup.exe file.
2. Click Next at the welcome screen.
3. Accept the License Agreement. Click Next.
4. Accept the default location for the installation files, or click Change to select a
different location.
5. Specify the host name of the IBM Endpoint Manager for Remote Control
server that the target will connect to. For example trcserver.example.com. .
Note: Select secure connections if you selected to us https during the server
installation.
6. For advanced settings click Advanced settings
Server port
This should match the value entered for the Server port on Webserver
parameter during the server installation.
Note: Your operating system may have a firewall installed by default. The
inbound firewall rule for target port will default to 888. Incoming TCP
connections to that port have to be open. If another port is configured instead
for the IBM Endpoint Manager for Remote Control sessions, the same applies.
Also traffic on the localhost loopback address 127.0.0.1 between trc_base,
trc_gui and trc_dsp on arbitrary ports needs to be allowed.
10. Enable failover to peer to peer mode if required by selecting one of the
following options :
Regardless of server status
A peer to peer session can be established between a controller and this
target directly if the server is available or not. Click Peer to Peer
policies to set the local policies that the target will use during a peer
to peer session. Click Next to move through the peer to peer policies
screens.
Only when server is down or unreachable
A peer to peer session can only be established between a controller
and this target directly if the server is down or the target cannot
connect to the server. Click Peer to Peer policies to set the local
policies that the target will use during a peer to peer session. Click
Next to move through the peer to peer policies screens.
Never A peer to peer session is not allowed directly between a controller and
this target. If you select this option, continue from step 11 on page 51
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 41
Peer to Peer policies
Session Policies options
Table 8. Session policies option
Installation
option Target Property Default Value Description
Active AllowActive selected Determines whether the target can take part in active peer to peer
sessions. For more information about the different types of remote
control session that can be started, see the IBM Endpoint Manager for
Remote Control Controller User's Guide.
selected The target can take part in active peer to peer sessions
and the Active option is available in the session type list
in the controller window. The Open connection window
also displays an Active option.
not selected
The target cannot take part in active peer to peer sessions
and the Active option is not available in the session type
list in the controller window.
Guidance AllowGuidance selected Determines whether the target can take part in guidance peer to
peer sessions. For more information about the different types of
remote control session that can be started, see the IBM Endpoint
Manager for Remote Control Controller User's Guide.
selected The target can take part in guidance peer to peer sessions
and the Guidance option is available in the session type
list in the controller window. The Open connection
window also displays a Guidance option.
not selected
The target cannot take part in guidance peer to peer
sessions and the Guidance option is not available n in the
session type list in the controller window.
Monitor AllowMonitor selected Determines whether the target can take part in monitor peer to
peer sessions. For more information about the different types of
remote control session that can be started, see the IBM Endpoint
Manager for Remote Control Controller User's Guide .
selected The target can take part in monitor peer to peer sessions
and the Monitor option is available in the session type
list in the controller window. The Open connection
window also displays a Monitor option.
not selected
The target cannot take part in monitor peer to peer
sessions and the Monitor option is not available in the
session type list in the controller window.
Enable true color EnableTrueColor not selected Determines whether true color is used as the initial color depth to
display the target desktop, in the controller window at the start of
a session. Used along with Lock color depth.
selected The target desktop is displayed in true color 24-bit mode
at the start of the session.
not selected
The target desktop is displayed in 8-bit color mode at the
start of the session. This value is the default value.
Policies options
Table 9. Peer to peer policy descriptions -
Installer screen Default
names Target Property Value Description
Disable chat DisableChat not selected Determines whether you can start a chat session with the target and
also chat to the controller user during a peer to peer session.
selected If ChatOnly is chosen as the connection type on the open
connection screen the session is refused. During the session
the chat icon is not available in the controller window.
not selected
A Chat Only session can be started from the open
connection window. During the session the chat icon is
available in the controller window.
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 43
Table 9. Peer to peer policy descriptions - (continued)
Installer screen Default
names Target Property Value Description
Save chat AutoSaveChat not selected Determines whether the chat messages entered during a chat session
messages are saved.
selected The chat messages are saved as an html file with name
starting chat, in the working directory of the target. The
location is defined by the target property WorkingDir. For
example on a Windows system, a file named
chat-m15.html saved to the following location
c:\Documents and Settings\All Users\Application
Data\IBM\Tivoli\Remote Control
not selected
The chat messages are not saved to a file.
Disable file DisableFilePull not selected Determine whether files can be transferred from the target to the
transfer from controller during the session.
target to controller
selected Files can be transferred from the target to the controller.
not selected
Files cannot be transferred from the target to the controller.
Disable file DisableFilePush not selected Determines whether files can be transferred from the controller to
transfer from the target during the session.
controller to target
selected Files can be transferred from the controller to the target.
not selected
Files cannot be transferred from the controller to the target.
Disable clipboard DisableClipboard not selected Determines the availability of the clipboard transfer menu. Use this
transfer menu option to transfer the clipboard content between the controller
and target during a remote control session.
selected The clipboard transfer menu is available during the session
and you can transfer the clipboard content to and from the
target.
not selected
The clipboard transfer menu is not available during the
session.
Allow local AllowRecording selected Determines whether the controller user can make and save a local
recording recording of the session in the controlling system. Determines the
availability of the record button on the controller window. For more
information about recording sessions, see the IBM Endpoint Manager
for Remote Control Controller User's Guide.
selected The record button is available in the controller window.
not selected
The record button is not available in the controller
window.
Allow AllowCollaboration selected Determines whether more than one controller can join a session.
collaboration Determines the availability of the collaboration icon on the controller
window. For details of collaboration sessions, see the IBM Endpoint
Manager for Remote Control Controller User's Guide.
selected The collaboration icon is available in the controller
window.
not selected
The collaboration icon is not available in the controller
window.
Set to No
No Disconnect session button is available when you
attempt to connect to the target.
CheckUserLogin must be set to Yes and Managed set to No for
AllowForceDisconnect to take effect.
Disconnect grace ForceDisconnectTimeout 45 Number of seconds you must wait for the current controller to
time respond to the prompt to disconnect the current session. If they do
not respond in the given time, they will be automatically
disconnected from the session . The timer takes effect only when
AllowForceDisconnect and CheckUserLogin are set to Yes. The default
value is 45.
Audit to AuditToSystem selected Determines whether the actions that are carried out during remote
Application Event control sessions are logged to the application event log on the target.
Log This log can be used for audit purposes
selected Entries are displayed in the application event log of the
target corresponding to the each action carried out during
the session.
not selected
No entries are logged to the application event log.
Security policies
Table 10. Peer to peer policy descriptions - Security policies
Installer screen names Target property Default Value Description
Authenticate using CheckUserLogin selected Determines whether a logon window is displayed when the
Windows logon session type button is clicked on the Open Connection
window.
Yes The logon window is displayed to the controller user
who must logon using a valid Windows ID and
password. If the logon credentials are invalid the
target refuses the session.
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 45
Table 10. Peer to peer policy descriptions - Security policies (continued)
Installer screen names Target property Default Value Description
Must be a member of CheckUserGroup see description Default value is
these Windows groups
Windows systems
BUILTIN\Administrators
Linux systems
wheel
not selected
The lock target input menu item is not enabled in
the Perform action in target menu in the controller
window.
Note: It should be noted that if, during a session, the option
to Enable Privacy is selected, the remote user input is
automatically locked. It is not possible to enable privacy
without also locking the input.
Enable privacy when EnablePrivacy not selected Determines whether the local input and display will be locked
session starts for all sessions and therefore the target user can interact with
the target screen during a remote control session.
selected The target screen is blanked out by the privacy
bitmap when the session is established, preventing
the target user from interacting with the screen
during the session. The target desktop is still visible
to the controller user in the controller window.
not selected
The target screen is not blanked out when the
session is started and the target user can interact
with the screen.
Enable input lock when EnableInputLock not selected This property works in conjunction with Enable privacy. Use
session starts Enable input lock to determine whether the target user can
view their screen or not during a remote control session when
privacy mode is enabled.
selected The target screen is visible to the target user during
the session, while in privacy mode but their mouse
and keyboard control is locked.
not selected
The target screen is not visible to the target user and
the privacy bitmap is displayed on the target during
the session. The target users mouse and keyboard
are also disabled.
Note: Enable privacy should be selected to allow Enable
input lock to take effect.
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 47
Table 10. Peer to peer policy descriptions - Security policies (continued)
Installer screen names Target property Default Value Description
Enable on-screen session EnableOSSN not selected Determines whether a semi transparent layer is placed onto
notification the target screen indicating that a remote control session is in
progress. Should be used when privacy is a concern, so that
the user is clearly notified when somebody can remotely view
or control his PC.
selected The semi transparent layer is displayed on the target
screen displaying the text IBM Endpoint Manager
for Remote Control and what type of remote control
session is in progress. For example : IBM Endpoint
Manager for Remote Control - Active Mode. The
layer does not intercept keyboard or mouse actions,
therefore the user is still able to interact with their
screen.
not selected
No semi transparent layer is displayed on the target
screen.
Note: This policy is only supported on targets that have a
Windows operating system installed.
DisablePanicKey DisablePanicKey not selected Determines whether the target user can use the Pause Break
key to automatically end the remote control session.
selected The target user cannot use the Pause Break key to
automatically end the remote control session.
not selected
The target user can o use the Pause Break key to
automatically end the remote control session.
Inactivity timeout IdleTimeout 360 Specify the number of seconds to wait before stopping the
connection automatically if there is no remote control session
activity. Setting this value to 0 effectively disables the timer
and the session will not timeout . The minimum timeout value
is 60 seconds so a value >0 and <60 will timeout about 60
seconds and values >60 will timeout when value is reached .
The default value is 360.
Note: This value should be set to 0 for sessions which don't
involve sending or receiving information from the controller to
the target. For example in Monitor sessions.
Not selected
The acceptance window is not displayed and files are
transferred automatically from the target to the
controller system when requested.
System information ConfirmSysInfo selected Determines whether the user acceptance window is displayed
when the controller user requests to view the target system
information
selected When the controller user clicks on the system
information icon in the controller window, the user
acceptance window is displayed. The target user
must accept or refuse the request to view the target
system information.
not selected
The target system information is displayed
automatically when the controller user clicks on the
system information icon.
Local recording ConfirmRecording selected Determines whether the user acceptance window is displayed
when the controller user clicks the record icon on the controller
window.
selected When the controller user clicks the record icon on the
controller window a message window is displayed. If
the target user clicks Accept, the controller user is
able to select where to save the recording to locally. If
the controller user clicks Refuse, a message is
displayed to the controller user saying that
permission to record has been refused.
Note: It should be noted that once the target user
has accepted the request for recording, the acceptance
window is not displayed if the controller user stops
and then proceeds to restart local recording in the
same session. Please also note that the message is
displayed in English and is not translated.
not selected
When the controller user clicks the record icon on the
controller window no message window is displayed
and the controller user can then select where to save
the recording to locally.
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 49
Table 11. Peer to peer policy descriptions - User acceptance policies (continued)
Installer screen
names Target property Default Value Description
Collaboration ConfirmCollaboration selected Determines whether the user acceptance window is displayed
when an additional controller user requests to join a
collaboration session with a target.
selected When the controller user tries to join the collaboration
session, that the target is currently part of, the user
acceptance window is displayed. The target user
must accept or refuse the request to allow the
additional controller to join the session. If the target
user clicks accept, the additional controller joins the
collaboration session. If they click refuse, a message is
displayed on the controller and the additional
controller is not able to join the collaboration session.
not selected
The additional controller automatically joins the
collaboration session when they try to connect to the
master controller of the session.
User acceptance grace AcceptanceGraceTime 45 Sets the number of seconds to wait for the target user to
time respond before a session starts or times out, used in conjunction
with Confirm incoming connections.
v Acceptable values 0 to 60 - If set to 0 the activity starts
without displaying the message box for user acceptance on
the target.
Note: If Confirm incoming connections is selected, meaning
that the target user is prompted to accept or refuse the session,
Acceptance grace time MUST be set to a value >0 to allow the
target user time to respond.
Proceed on AcceptanceProceed not selected Action to take if the user acceptance dialogue timeout lapses.
acceptance timeout The target user has not clicked accept or refuse within the
number of seconds defined for Acceptance grace time .
selected Session is established .
not selected
Session is not established.
Do not prompt for AutoWinLogon selected Determines whether the user acceptance window is displayed
user acceptance when on the target, at session start, when the target user is not
user is not logged on. logged on.
selected The acceptance window is not displayed on the target
and the session is established.
not selected
The session is refused as there is no user logged on at
the target to accept the session.
Enable Hide windows HideWindows not selected Determines whether the Hide windows checkbox is displayed
on the user acceptance window when Confirm incoming
connections is also selected.
selected The Hide windows checkbox is displayed on the user
acceptance window
not selected
The Hide windows checkbox is not displayed on the
user acceptance window.
Session scripts
not selected
No script is run before the session
For details of setting up pre and post session scripts, see the
Session policies chapter in the IBM Endpoint Manager for Remote
Control Administrator's Guide.
Run post-session script RunPostScript not selected Determines whether a user defined script is run after the remote
control session finishes.
selected When a remote control session ends, the user defined
script is run.
not selected
No script is run after the session.
For details of setting up pre and post session scripts, see the
Session policies chapter in the IBM Endpoint Manager for Remote
Control Administrator's Guide.
Proceed with session ProceedOnScriptFail not selected Action to take if the pre or post script execution fails. A positive
when script fails value or 0 is considered a successful run of the pre or post
session script. A negative value, script not found or not finished
running within 3 minutes is considered a failure.
selected If the pre or post script run is a fail, the session
continues.
not selected
If the pre or post script run is a fail, the session does
not continue and is aborted.
You can install a default target RPM file and then configure the target after the
installation.
Note: If you are using Red Hat Enterprise Linux 6.0 64-bit the following libraries
along with their dependencies, need to be installed if they are not already
installed, glibc.i686, libgcc.i686, libXmu.i686,
libXtst.i686,libXp.i686,libXi.i686.
To install the RPM file, use the rpm command and the file specific to the version
that you want to install. For example,
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 51
When the target is installed, configure the target properties by editing the
etc/ibmtrct.conf file. For details of target properties and their definitions, see
“Installing the Windows target” on page 40.
This method requires IBM® Tivoli®® Provisioning Manager. The following files are
required for the installation.
Windows systems
trc_target_win.spb
Linux systems
trc_target_linux.spb
These files can be extracted by using the additional setup utility. For more
information about using the additional setup utility, see “Using the additional
setup utility” on page 69
Note: If you are using Red Hat Linux 6.0 64-bit operating system, the following
libraries along with their dependencies, need to be installed if they are not already
installed, glibc.i686, libgcc.i686, libXmu.i686, libXp.i686, libXtst.i686.
For more information about installing the software package block file please refer
to the IBM Tivoli Provisioning Manager information center at :
http://pic.dhe.ibm.com/infocenter/tivihelp/v28r1/index.jsp and the chapter that
explains installing software products.
Note: Tivoli Common Agent (TCA) needs to be installed on the computers before
the target can be installed using the SPB method.
It allows you to customise installation settings and also assign the target to a
specific group at install time.
Note: Ensure that the correct values are assigned to the parameters as no
validation of the values is carried out.
/s denotes a silent installation
/v" The string attached to /v contains the parameters for msiexec.exe,
which is a piece of software that executes the actual installation.
/qn Performs a silent and unattended installation with no progress window
and no UI.
The above parameter can also be replaced with the following
parameters
/qb For an unattended installation with a basic UI and a small
progress bar.
/qr For an unattended installation with a reduced UI progress bar
in large window.
/qf For an attended installation with full UI.
TRC_SERVER_HOSTNAME
The host name or IP address of the server. This property is required.
Default value is <blank>
For example, TRC_SERVER_HOSTNAME=trc.myserver.com.
TRC_SERVER_CONTEXT
This parameter value needs to match the last part of the path in the
server URL. Default value is trc
For example, TRC_SERVER_CONTEXT=trc.
TRC_SERVER_PORT
If the server runs on a non-standard port, specify the port number.
Default value is 80
For example, TRC_SERVER_PORT=8080.
TRC_SERVER_PROTOCOL
Choose between plain HTTP and secure HTTPS protocols. Valid values
are http and https. Default value is http.
For example, TRC_SERVER_PROTOCOL=http.
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 53
TRC_PROXY_HOSTNAME
Host name or IP address for the proxy server, if required. Default value
is <blank>
TRC_PROXY_HOSTNAME=proxy.company.com.
TRC_PROXY_PORT
Port number for the proxy server. Default value is <blank>
TRC_PROXY_PORT=8080.
TRC_PROXY_USER_ID
The user ID, if the proxy requires authentication. Default value is
<blank>
TRC_PROXY_USER_ID=proxyuser
TRC_PROXY_PASSWORD
The password, if the proxy requires authentication. Default value is
<blank>.
TRC_PROXY_PASSWORD=v264xmpt.
TRC_PROXY_AUTH_B64
The user ID and password, format user:password, encoded in base64.
Overrides the user ID and password properties. Use this if you do not
want the password to be easily visible. Base64 is not encryption.
Default value is <blank>.
TRC_PROXY_AUTH_B64=cHJveHl1c2VyOnYyNjR4bXB0
TRC_TARGET_PORT
To run the target on a non-standard port, specify the port number to
use. Default value is 888
TRC_TARGET_PORT=888
TRC_SERVER_HEARTBEAT_RETRY
The amount of time, in minutes, that the target waits to retry a
heartbeat when the server is not responding. Default value is 10.
TRC_SERVER_HEARTBEAT_RETRY=1
TRC_ACCESSIBILITY
Enables the accessible UI. Default value is No. Available on Windows
operating system.
GROUP_LABEL
The label for the group that this target should be assigned to, if this
feature is enabled on the server. To enable this feature, edit the
trc.properties file and set allow.target.group.override = true. For
more information about editing the properties files, see the IBM
Endpoint Manager for Remote Control Administrator's Guide. Default value
is DefaultTargetGroup.
Note:
a. This parameter is discarded if the target is already registered in the
IBM Endpoint Manager for Remote Control server.
b. The target group specified must already be present on the server.
GROUP_LABEL=NewTargetGroup
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 55
DISABLEFILEPULL
Determines whether you can transfer files from the target to the
controller during a peer to peer session.
DISABLEFILEPUSH
Determines whether you can transfer files from the controller to the
target during a peer to peer session. Default is No.
DEBUGTRACE
Enable debug logging. Debug messages are written to the target log file
which can be used for problem determination. Default is No.
FIPSCOMPLIANCE
Enable the use of a FIPS certified cryptographic provider for all
cryptographic functions. Default is No.
SP800131ACOMPLIANCE
Enable the use of NIST SP800-131A compliant algorithms and key
strengths for all cryptographic functions. Default is No.
Note: In Silent install mode, if you want to re-configure the parameters on the
existing installation, pass the parameter, REINSTALL=ALL. However, the parameter is
ignored if it is used when you upgrade the target.
For example on the command line you would type the following command :
You can also specify the parameters that you want to override.
For example, to change the target port to 2222, type the following command
trc_target_setup.exe /s /v"/qn TRC_TARGET_PORT=2222 REINSTALL=ALL"
Note: To view Help options during the Installation the following command can be
typed on the Command line. trc_target_setup.exe --help
The following instructions will allow you to customise and build the IBM Endpoint
Manager for Remote Control target RPM file.
Note: If you have the target CLI package already installed on the target you must
uninstall this before installing the target software by running the following
command
$ rpm -e ibm-trc-cli
Use the following steps to configure the RPM build tree in src/rpm in your home
directory.
Obtaining the IBM Endpoint Manager for Remote Control Target Source RPM
package:
The source RPM package is obtained from the installation files. By default, this
package will extract the install files for the target to the IBM/
Tivoli_Remote_Control directory inside your home directory.
Use the following command to install the package for the Target:
$ rpm -ivh ~/IBM/Tivoli_Remote_Control/RCTarget/ibm-trc-target-9.x.x.src.rpm
Where 9.x.x is relevant to the version that you want to install. For example, 9.1.0.
Note: This command might generate warnings about users and groups that do not
exist. These warnings are because your system does not have the user and groups
that were used to build the original package. You can ignore these warnings.
To verify that this step was successful, check the SPECS and the SOURCES directories
and make sure that the following files are there:
$ ls SPECS/ SOURCES/
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 57
SOURCES/:ibm-trc-target.tar
SPECS/: ibm-trc-target.spec
Building your customized IBM Endpoint Manager for Remote Control target
RPM package:
The following command will rebuild the RPM package using your customized
configuration file.
You should now run the following command to install your customised target.
This method requires IBM® Tivoli® Provisioning Manager. The following files are
required for the installation.
Windows systems
trc_target_win.spb
Linux systems
trc_target_linux.spb
These files can be extracted by using the additional setup utility. For more
information about using the additional setup utility, see “Using the additional
setup utility” on page 69
Note: If you are using Red Hat Linux 6.0 64-bit operating system, the following
libraries along with their dependencies, need to be installed if they are not already
installed, glibc.i686, libgcc.i686, libXmu.i686, libXp.i686, libXtst.i686.
For more information about installing the software package block file please refer
to the IBM Tivoli Provisioning Manager information center at :
http://pic.dhe.ibm.com/infocenter/tivihelp/v28r1/index.jsp and the chapter that
explains installing software products.
Note: Tivoli Common Agent (TCA) needs to be installed on the computers before
the target can be installed using the SPB method.
IBM Endpoint Manager for Remote Control provides two ways to install the
controller component. If you have access to the IBM Endpoint Manager console use
the deployment fixlets to deploy the controller. For more details, see the IBM
Endpoint Manager for Remote Control Console User's Guide. Alternatively use the
IBM Endpoint Manager for Remote Control controller installation files.
For more information about how to obtain the component installation files for a
Windows system, see Chapter 4, “Installing the IBM Endpoint Manager for Remote
Control components,” on page 19. Choose the appropriate method for obtaining
the file.
1. Run the trc_controller_setup.exe file.
2. On the file download window, select Run or Save
Run Select Run to start the installation wizard for installing the controller
software.
a. Click Next at welcome screen.
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 59
b. Accept the license agreement, click Next.
c. Accept or change the location for the installation files, click Next.
d. Click Install.
e. Click Finish.
Note: Run this executable file to install the controller software by using
the same procedure as in the Run section.
You can install the controller in two modes in Linux, a FIPS-compliant controller or
a standard controller.
Type the relevant command for installing the controller. Where 9.x.x is relevant to
the version that you want to install. For example, 9.1.0.
v For the standard controller type
#rpm -ivh ~/IBM/Tivoli_Remote_Control/RCTarget/ibm-trc-controller-
9.x.x.noarch.rpm
v For a FIPS-compliant controller, install the standard controller and the
FIPS-compliant JRE by running both commands.
#rpm -ivh ~/IBM/Tivoli_Remote_Control/RCTarget/ibm-trc-controller-
9.x.x.noarch.rpm
#rpm -ivh ~/IBM/Tivoli_Remote_Control/RCTarget/ibm-trc-controller-jre-
9.x.x.i386.rpm
You can start the controller from your applications list when it is installed.
Note: Ensure that you install a supported version of Java to run the controller on
the other supported operating system. See “Controller requirements” on page 13.
Preconfiguring the controller is useful for unattended installations. You can set
your configuration file values in the configuration file and copy the file to the
computers that you want to install the controller on. Your configuration settings
are installed together with the controller. The configuration values are set in the
trc_controller.cfg file. You can create the file and add your custom values or
you can edit a default configuration file. If you do not apply any preconfiguration,
the default configuration file is installed when you install the controller
component.
Preconfiguring the controller for a Windows operating system installation
1. Copy the trc_controller.cfg file to the same directory as the
trc_controller_setup.exe or trc_controller.msi file.
2. Run the controller installation file.
The controller is installed with your configured settings.
Use the content of the default configuration file to create your custom
configuration file and set your own values.
fips.compliance=false
sp800131a.compliance=false
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 61
enable.address.history=true
enable.user.history=false
enable.domain.history=true
history.max.items=20
tool06.ToolName=Terminal
tool06.ToolCommand=/usr/bin/gnome-terminal
tool06.ToolParameters =
tool06.ToolUser =
tool07.ToolName=Control Panel
tool07.ToolCommand=/usr/bin/gnome-control-center
tool07.ToolParameters =
tool07.ToolUser =
tool08.ToolName=
tool08.ToolCommand=
tool08.ToolParameters =
tool08.ToolUser =
tool09.ToolName=
tool09.ToolCommand=
tool09.ToolParameters =
tool09.ToolUser =
tool10.ToolName=
tool10.ToolCommand=
# Custom keys
# example.KeySequenceName = Inject F1
# example.KeySequenceValue = [F1]
#
# For a list of supported key codes, please refer to the User's Guide
key01.KeySequenceName =
key01.KeySequenceValue =
key02.KeySequenceName =
key02.KeySequenceValue =
key03.KeySequenceName =
key03.KeySequenceValue =
IBM Endpoint Manager for Remote Control provides two ways to install the
command line tools. If you have access to the IBM Endpoint Manager console, use
the deployment fixlets to deploy the tools. For more information about deploying
the components, see the IBM Endpoint Manager for Remote Control Controller User's
Guide. Alternatively use the IBM Endpoint Manager for Remote Control controller
installation files.
For more information about how to obtain the Windows component installation
files see, Chapter 4, “Installing the IBM Endpoint Manager for Remote Control
components,” on page 19. Choose the appropriate method for obtaining the file.
1. Run the trc_cli_setup.exe file.
2. On the file download window select Run or Save
Run Select Run to start the install shield wizard for installing the command
line software.
a. Click Next at the welcome screen.
b. Accept the license agreement, click Next.
c. Accept or change the location for the installation files, click Next.
d. On the server address screen type in the required information and
click Next :
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 63
Server host name
Enter the IP address or server name of the IBM Endpoint
Manager for Remote Control server.
Use secure connections (https)
Select https to use secure connections to contact the server.
Advanced settings
Click Advanced settings for more configuration settings.
Server port
Enter the port number that the server is listening
on.
Server context
Enter a value for the server context. For example,
trc.
Use a FIPS certified cryptographic provider
Select Use a FIPS certified cryptographic provider
for installing FIPS compliant tools.
Enable NIST SP800-131A compliance (Enables FIPS)
Select Enable NIST SP800-131A compliance
(Enables FIPS) for installing NIST SP800-131A
compliant tools.
e. On the Proxy settings panel if you are not using a proxy server click
Next.
v If you are using a Proxy select Use a proxy server or a Remote
Control Gateway. Type in the relevant information
1) Type in the IP address or host name for the proxy server.
2) Type in the port that proxy server is listening on.
3) Select Use an HTTP proxy or Use a Remote Control
Gateway.
4) Select Proxy requires authentication and enter the user ID
and password for authenticating to the proxy server.
5) Click Next.
f. Accept the default port or type in a required value, click Next
g. Click Install.
h. Click Finish.
Save Select Save to save the trc_cli_setup.exe file to a specific location.
For more information about using the command line tools, see theIBM Endpoint
Manager for Remote Control Controller User's Guide
Note: If the ibm-trc-target RPM file is installed, you do not need to install the
ibm-trc-cli RPM file because the CLI commands are already included in the
target. For more information about using the commands, see the IBM Endpoint
Manager for Remote Control Controller User's Guide.
1. Type, the following command to install the command-line software. Where 9.x.x
is relevant to the version that you want to install. For example, 9.1.0.
$ rpm -ivh ~/IBM/Tivoli_Remote_Control/RCTarget/ibm-trc-cli-
9.x.x.i386.rpm
2. When the installation is complete edit the /etc/ibmtrct.conf file and set your
configuration.
v Set the value of ServerURL to the host name or IP address of your IBM
Endpoint Manager for Remote Control Server.
v For FIPS-compliance set the value of FIPSCompliance to Yes.
v For NIST SP800-131a compliance, set the value of SP800131ACompliance to
yes.
3. Save the file.
For more information about using these commands, see the IBM Endpoint Manager
for Remote Control Controller User's Guide.
IBM Endpoint Manager for Remote Control provides two ways to install the
gateway support. If you have access to the IBM Endpoint Manager console use the
deployment fixlets to deploy gateway support. For more details, see the IBM
Endpoint Manager for Remote Control Console User's Guide. Alternatively you can
use the IBM Endpoint Manager for Remote Control gateway support installation
files.
Note: You can also install gateway support with no user interaction by performing
a silent installation. For more information about a silent installation, see “Installing
the gateway support by performing a silent installation” on page 66.
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 65
1. Run the trc_gateway_setup.exe file.
2. Click Next at the Welcome screen.
3. Accept or change the installation location and click Next.
4. Click Install.
5. Click Finish when the installation is complete.
When the gateway support is installed you must configure it for your
environment. For more information about configuring gateway support, see the
IBM Endpoint Manager for Remote Control Administrator's Guide.
For more information about configuring gateway support, see the IBM Endpoint
Manager for Remote Control Administrator's Guide.
When the gateway support installed, configure it for your environment. For more
information about configuring gateway support, see the IBM Endpoint Manager for
Remote Control Administrator's Guide .
IBM Endpoint Manager for Remote Control provides two ways to install the
broker support. If you have access to the IBM Endpoint Manager console, use the
deployment fixlets to deploy the broker support. For more details, see the IBM
The following files are installed in the [working dir]\Broker directory, where
[working dir] is determined by the version of Windows operating system that you
are installing the broker support on.
You must check that the IBM Endpoint Manager for Remote Control- Internet
Connection Broker service has registered and is started.
Chapter 4. Installing the IBM Endpoint Manager for Remote Control components 67
v libcrypto.so.1.0.0
v libssl.so.1.0.0
v trc_icb
v a licence directory
When the broker support is installed, configure the broker properties by editing
the trc_broker.properties file.
Note: This utility can only be run on computers with a Windows, Linux, AIX, or
Solaris SPARC operating system installed. For computers running a supported
operating system other than these, for example HP-UX, extract the installation files
by running the utility on another computer. Copy the extracted files to the
required computer.
For more information about how to obtain these files, see “Obtain the installation
files” on page 19.
69
e. Gateway Installation media: to extract the files for installing gateway
support.
f. Internet Connection Broker Installation media: to extract the files for
installing broker support.
5. Click Next.
6. Accept or change the installation folder. Click Next.
7. On the summary screen, click Install.
8. When complete, click Done.
9. Navigate to the chosen installation folder.
Follow the steps in the section that is relevant to your operating system.
To manage the IBM Endpoint Manager for Remote Control Windows components,
complete the following steps.
1. In Control Panel select Administrative tools > Services.
2. Highlight the relevant service.
Server service
IBM Endpoint Manager for Remote Control- Server
Target service
IBM Endpoint Manager for Remote Control- Target
Gateway service
IBM Endpoint Manager for Remote Control- Gateway
Broker service
IBM Endpoint Manager for Remote Control- Internet Connection
Broker
3. Choose the appropriate method for selecting an action for the service. You can
right-click and select start, stop, or restart or select Start, Stop, or Restart from
the list on the left.
Depending on the version of Linux you are using, use one of the following
commands to manage the components.
v /sbin/service component action
v /etc/init.d/component action
where component is the component service that you want to manage and action is
start, stop, or restart.
server For example, to start the server service.
v /sbin/service trcserver start
v /etc/init.d/trcserver start
target For example, to stop the target service.
v /sbin/service ibmtrct stop
v /etc/init.d/ibmtrct stop
71
gateway
For example, to restart the gateway service.
v /sbin/service ibmtrcgw restart
v /etc/init.d/ibmtrcgw restart
broker
For example, to restart the broker service.
v /sbin/service ibmtrcicb restart
v /etc/init.d/ibmtrcicb restart
Enabling email
To use the email function, for example for a forgotten password, to export and
email a report, or to request access to certain targets, you should have an email
server installed and set up.
Configuring LDAP
IBM Endpoint Manager for Remote Control provides Lightweight Directory Access
Protocol Version 3 support that you can use to enable authentication and
integration of users and their associated group membership into the IBM Endpoint
Manager for Remote Control database.
73
v The fully qualified server hostname or IP address of the Active Directory server
to be used with IBM Endpoint Manager for Remote Control.
v In an Enterprise scenario, a secondary backup LDAP server would also be
configured in IBM Endpoint Manager for Remote Control.
To perform the basic configuration for LDAP authentication complete the following
steps :
1. Click Admin > Edit properties file.
2. Ensuring that you are editing the common.properties file, edit the following
properties
authentication.LDAP
to enable or disable LDAP authentication.
true LDAP user authentication is performed.
Note: If you change this value, restart the server service for the
new value to take effect.
scheduled.interval.period
The unit of time to be used along with the scheduled interval
to specify how often the server should check for scheduled
tasks. Default is minutes.
Any changes to the ldap.properties file will not take effect until the IBM
Endpoint Manager for Remote Control application is reset using Admin,Reset
Application. To avoid multiple restarts or an extended outage use an LDAP
browser and the LDAP Configuration Utility as an aid to the entire configuration
process.
DC=mydomain,DC=mycompany,DC=com
When a connection is established use the same information used in the LDAP
browser to set the parameters in the ldap.properties file.
v Click Admin > Edit properties files
v Select ldap.properties from the list
v When modifications are complete, click Submit
The application must be reset for the changes to take effect. Click Admin > Reset
Application or restart the server service.
The properties file can also be edited manually by locating it on the IBM Endpoint
Manager for Remote Control Server, which is usually in the following location
[installdir]wlp\usr\servers\trcserver\apps\TRCAPP.ear\trc.war\WEB-INF\
classes directory (where installdir is the directory that the IBM Endpoint Manager
for Remote Control Server is installed in
for example :
C:\Program Files\IBM\Tivoli\TRC\server\wlp\usr\servers\trcserver
\apps\TRCAPP.ear\trc.war\WEB-INF\classes
Note: IBM Endpoint Manager for Remote Control is provided with a default
ldap.properties file and many of the extended configuration options are
commented out. To enable these, the file must be edited manually
Note: Check that a successful connection to the LDAP browser can be established
by using these credentials to verify that they are valid.
1. Edit the ldap.properties file.
2. Configure the following properties.
ldap.connectionName
The username that is used to authenticate to a read-only LDAP
connection. If left not set, an anonymous connection is attempted.
For example : [email protected]
ldap.connectionPassword
The password that is used to establish a read-only LDAP connection.
The password can be entered here in plain text or it can be encrypted.
ldap.connectionPasswordEncrypted
True The LDAP password is encrypted.
False The LDAP password is not encrypted and entered as plain text.
Use the following method to generate the encrypted password.
In a Windows system.
a. Open a command prompt window and type
cd [installdir]\wlp\usr\servers\trcserver\apps\TRCAPP.ear\trc.war\
WEB-INF\lib
Note: This command is all on one line with a space between jar
and com.
c. The output from the command is the following
Encrypted Password : [encrypted password]
Decrypted Password : [text version of password ]
For example,
Encrypted Password: 10|ydEBl67atSSbrAA=
Decrypted Password: myPassw0rd
Edit the ldap.properties file and set the ldap.connectionPassword
property to the encrypted password value. The decrypted password
is shown to verify that the encryption is valid.
In a UNIX or Linux system, (see the Windows operating system steps
for details of the commands)
a. Open a terminal window and type
[installdir]/wlp/usr/servers/trcserver/apps/TRCAPP.ear/trc.war/
WEB-INF/lib
Connection Security
The following properties define the level of security to be used on the connection
to the LDAP server. Set the following parameter to simple so that the IBM
Endpoint Manager for Remote Control can communicate with the majority of
Active Directory servers.
While most LDAP servers support simple plain text login, some Active Directory
administrators require a secure connection. IBM Endpoint Manager for Remote
Control supports two types of secure connections to an Active Directory server,
SASL (Digest-MD5) or SSL. If you are having trouble connecting to the Active
Directory server and see the following error in the trc.log:
LDAP Authentication.exception[LDAP: error code 8 - 00002028: LdapErr: DSID-0C09018A,
comment: The server requires binds to turn on integrity checking if SSL\TLS are not
already active on the connection, data 0, vece ]
IBM Endpoint Manager for Remote Control will need to be configured for either
SASL or SSL connections.
You can refine your search by going deeper into the OU structure and
selecting to search only within a specific organizational unit for example an
OU called Users and therefore you would set the property value as
ldap.userBase=OU=Users,ou=mylocation,dc=mydomain,dc=mycompany,dc=com
This would instruct IBM Endpoint Manager for Remote Control to look for
users matching the criteria, only within the Users OU (and any OUs that
belong to the Users OU if ldap.groupSubtree is set to true)
ldap.userSearch
Defines the LDAP query that is used to import Active Directory users to
IBM Endpoint Manager for Remote Control. The defined query needs to
filter the results such that only those users which match the search criteria
are imported to IBM Endpoint Manager for Remote Control. The default
value is
(objectClass=user)
which means, look for users in any object that is a user object within the
userbase. That is import all Active Directory users to IBM Endpoint
Manager for Remote Control.
Note: When using the above it should be noted that some environments
can have thousands of users therefore it is important to create a filter
which will only import the required users. To limit the users that are
imported to only those users who match the search criteria and are
members of the groups that were imported into IBM Endpoint Manager for
Remote Control through the ldap.groupSearch filter, you should set the
property ldap.userInGroup to true. It should also be noted that as well as
being imported into the relevant groups that are returned in the group
search, users are also imported into the DefaultGroup. Setting
ldap.userInGroup to false will import all users who match the search
criteria, regardless of their group membership.
The search can therefore be further refined by using more complex queries.
For example if you have the following values set
ldap.groupBase=(OU=mylocation.DC=mycompany.DC=com)
Ldap.userSearch: (&(objectClass=user)(|(memberOf=CN=Department1,OU=GROUPS,
OU=mylocation,DC=mycompany,DC=com) (memberOf=CN=Department3,OU=GROUPS,
OU=mylocation,DC=mycompany,DC=com))(name={0}))
To refine your search and go deeper into the OU structure, select to start
the search only within a specific organizational unit, for example, an OU
called Test. To refine this search set the property value as
This would instruct IBM Endpoint Manager for Remote Control to look for
groups matching the criteria, only within the Test OU (and any OUs that
belong to the Test OU if ldap.groupSubtree is set to true)
ldap.groupSearch
Defines the LDAP query that is used to import AD groups to IBM
Endpoint Manager for Remote Control. The defined query needs to filter
the results such that only those groups which are needed are imported to
IBM Endpoint Manager for Remote Control.
ldap.groupSearch=(objectClass=group)
Imports all AD groups found in the OU specified in the
ldap.groupBase property to IBM Endpoint Manager for Remote
Control. Be aware some environment can have thousands of
groups.
ldap.groupSearch=(&(objectClass=group)(cn=*SMS*))
Imports all groups that contain SMS in the cn attribute, for
example visio-sms-users
ldap.groupSearch=(&(objectClass=group)(cn=admins))
Imports all groups that are named admins.
ldap.groupSearch=(&(objectClass=group)(cn=admins*))
Imports all groups which have admins in the name for example
administrators, server-administrators.
ldap.groupMembers
ldap attribute name to be used to find the members of the groups that are
returned as a result of the specified search. The default value is member.
These queries can be tested using the LDAP browsers directory search option or
the LDAP configuration utility.
When the service has restarted logon to the IBM Endpoint Manager for Remote
Control server using an Active Directory userid and password. If the entries in the
LDAP properties file are correct you are authenticated and logged on successfully.
IBM Endpoint Manager for Remote Control Server connects directly to LDAP
therefore, any password changes within LDAP are immediately effective as long as
the LDAP password change has synchronized to the LDAP server which is set
within the ldap.properties file.
Note: The default ADMIN userid within the IBM Endpoint Manager for Remote
Control Server application will always authenticate against the IBM Endpoint
Manager for Remote Control Server database regardless of whether LDAP
authentication is enabled. This is to allow a mechanism for accessing the
application, should there be a connectivity problem between IBM Endpoint
Manager for Remote Control Server and LDAP.
To determine the cause of the failure look in the trc.log file. View the application
log using the Admin menu by completing the following steps.
v In the IBM Endpoint Manager for Remote Control Server UI, click Admin >
View application log
v Click CTRL+END to reach the end of the file.
Some common errors are listed below. Please note that the presence of these errors
indicates that there was a problem creating the initial connection between IBM
Endpoint Manager for Remote Control Server and Active Directory.
AcceptSecurityContext error, data 525
Returns when username is invalid
AcceptSecurityContext error, data 52e
Returns when username is valid but password or credentials are invalid.
Will prevent most other errors from being displayed as noted.
AcceptSecurityContext error, data 530
Logon failure: account logon time restriction violation. Displays only when
presented with valid username and password credential.
AcceptSecurityContext error, data 531
Logon failure user not allowed to log on to this computer. Displays only
when presented with valid username and password credential
AcceptSecurityContext error, data 532
Logon failure: the specified account password has expired. Displays only
when presented with valid username and password credential.
AcceptSecurityContext error, data 533
Logon failure account currently disabled. Displays only when presented
with valid username and password credential.
AcceptSecurityContext error, data 701
The user's account has expired. Displays only when presented with valid
username and password credential.
AcceptSecurityContext error, data 773
The user's password must be changed before logging on the first time.
Displays only when presented with valid username and password
credential.
AcceptSecurityContext error, data 775
The referenced account is currently locked out and may not be logged on
to. Displays even if invalid password is presented.
LDAP Authentication.exceptionmyserver.mydomain.com:389
Displays when the server name specified by ldap.connectionURL is
unreachable.
# 5724-N88 5725-C431
# LDAP Properties
ldap.connectionURL=ldap://myldapserver
# define the secondary LDAP server name, if the primary is down we can use an
alternative LDAP server
#–ldap.alternateURL=
# The username used to authenticate a read-only LDAP connection. If left not set,
an anonymous connection is made.
ldap.connectionPassword=myPassword
ldap.connectionPasswordEncrypted=false
# The fully qualified Java class name of the JNDI context factory to be used for
# this connection. If left unset, the default JNDI LDAP provider class is used.
# --- -ldap.contextFactory=com.sun.jndi.ldap.LdapCtxFactory
ldap.security_authentication=simple
#Identifies the realm or domain from which the connection name should be chosen
# ---- ldap.connectionRealm=
#Quality of protection
# ----ldap.connectionQop=auth
# Number indicating the size of the largest buffer the server is able to receive
when
# ldap.connectionMaxbuf=16384
# ----ldap.connectionStrength=high
# the service provider (for example: "ssl"). If this property is unspecified, the
behaviour
# ----ldap.security_protocol=ssl
# Access the keystore, this is where the Root CA public key cert was installed
# ----ldap.ssl_keyStore=PathOfKeyStoreFile
# ----ldap.ssl_keyStorePassword=KeystorePassword
# ----ldap.referrals=follow
# The base LDAP directory entry for looking up group information. If left
unspecified,
ldap.groupBase=OU=Groups,OU=mylocation,DC=mydomain,DC=mycompany,
DC=com
ldap.groupSearch=(&(objectClass=group) (name=TRC*))
# Set to true if you want to recursively search the subtree of the element specified
in
# the groupBase attribute for groups associated with a user. If left unspecified, the
default
# value of false causes only the top level to be searched (a nonrecursive search).
ldap.groupSubtree=true
ldap.groupName=name
ldap.groupDescription=description
ldap.groupMembers=member
ldap.userBase=OU=Users,OU=mylocation,DC=mydomain,DC=mycompany,
DC=com
# The LDAP filter expression to use when searching for a user's directory entry,
with {0} marking
ldap.userSearch=(&(objectClass=User)(sAMAccountName={0}))
# Set this value to true if you want to recursively search the subtree of the element
specified by
# the userBase attribute for the user's directory entry. The default value of false
causes only the
ldap.userSubtree=true
#Set this value to true if a user has to be a member of the groups found in the
group search
ldap.userInGroup=true
# Remote control will use it to encrypt the user input password and
# compare it with password it receives from the LDAP server. If left unspecified,
the default value is "cleartext".
# ---- ldap.digest=SHA
ldap.userid=sAMAccountname
ldap.userPassword=password
ldap.userEmail=userPrincipalName
# If the following parameters are defined they is mapped into the local remote
control database
ldap.forename=givenName
ldap.surname=sn
ldap.title=title
ldap.company=company
ldap.department=department
ldap.telephone=telephoneNumber
ldap.mobile=mobile
ldap.state=st
ldap.country=Co
#Set this value to the page size of LDAP search retrievals (default=500).
# Do not set this to anything greater than the max page size for the LDAP server (
for example, AD has a limit of 1000)
ldap.page.size=500
IBM Java JCE FIPS 140-2 Cryptographic Module version 1.3.1 Tested as meeting
Level 1 with Windows XP Professional SP2 operating system using IBM JVM 1.6
(single-user mode) FIPS-approved algorithms:
v AES (Cert. #805);
v DSA (Cert. #297);
v HMAC (Cert. #445);
v RNG (Cert. #463);
v RSA (Cert. #387);
v SHS (Cert. #803);
v Triple-DES (Cert. #687).
IBM Java JSSE FIPS 140-2 Cryptographic Module version 1.1 Tested as meeting
Level 1 with
v Windows 2000 Professional SP3 operating system (JVM 1.3.1_03 and JVM
1.4.1_04), Windows 2000 Advanced Server SP4 operating system (JVM 1.4.1)
v Sun Solaris 5.8 (JVM 1.3.1 and 1.4.1)
v AIX 5.2 (JVM 1.3.1 and 1.4.1)
v SuSE Linux Enterprise Server 8 (JVM 1.4.1_05)
v Red Hat Linux Advanced Server 2.1(JVM 1.4.1_05)
v IBM OS/400® V5R2M0 (JVM 1.4.1)
v z/OSV1R4 (JVM 1.4.1)
FIPS-approved algorithms:
v SHA-1 (Cert. #148);
v Triple-DES (Cert. #163);
v AES (Cert. #53);
v DSA (Cert. #83);
91
v RSA (PKCS#1, vendor affirmed);
v HMAC-SHA-1 (Cert. #148, vendor affirmed);
OpenSSL FIPS Object Module version 2.0.2 Tested as meeting Level 1 with
v Android 2.2 (gcc Compiler Version 4.4.0); Android 2.2 running on Qualcom
QSD8250 (ARMv7) with NEON (gcc Compiler Version 4.4.0); Android 2.2
running on OMAP 3530 (ARMv7) with NEON (gcc Compiler Version 4.1.0);
Android 3.0 (gcc Compiler Version 4.4.0); Android 4.0 (gcc Compiler Version
4.4.3); Android 4.0 running on TI OMAP 3 (ARMv7) with NEON (gcc Compiler
Version 4.4.3); Android 4.1 running on TI DM3730 (ARMv7) (gcc Compiler
Version 4.6); Android 4.1 running on TI DM3730 (ARMv7) with NEON (gcc
Complier Version 4.6); Android 4.2 running on Nvidia Tegra 3 (ARMv7) (gcc
Compiler Version 4.6); Android 4.2 running on Nvidia Tegra 3 (ARMv7) with
Neon (gcc Compiler Version 4.6) (single-user mode).
v Microsoft Windows 7 (32 bit) (Microsoft 32 bit C/C++ Optimizing Compiler
Version 16.00); Microsoft Windows 7 (64 bit) (Microsoft C/C++ Optimizing
Compiler Version 16.00); Microsoft Windows 7 running on Intel Core i5-2430M
(64-bit) with AES-NI (Microsoft ® C/C++ Optimizing Compiler Version 16.00 for
x64);
v Microsoft Windows 2008 running on Intel Xeon E3-1220v2 (32-bit under
vSphere) (Microsoft 32-bit C/C++ Optimizing Compiler Version 16.00 for 80x86);
Microsoft Windows 2008 running on Intel Xeon E3-1220v2 (64-bit under
vSphere) (Microsoft C/C++ Optimizing Compiler Version 16.00 for x64);
v uCLinux 0.9.29 (gcc Compiler Version 4.2.1);
v Fedora 14 running on Intel Core i5 with AES-NI (gcc Compiler Version 4.5.1);
v HP-UX 11i (32 bit) (HP C/aC++ B3910B); HP-UX 11i (64 bit) (HP C/aC++
B3910B);
v Ubuntu 10.04 (32 bit) (gcc Compiler Version 4.1.3); Ubuntu 10.04 (64 bit) (gcc
Compiler Version 4.1.3); Ubuntu 10.04 running on Intel Core i5 with AES-NI (32
bit) (gcc Compiler Version 4.1.3);
v Linux 2.6 (gcc Compiler Version 4.3.2); Linux 2.6.27 (gcc Compiler Version 4.2.4);
Linux 2.6.32 (gcc Compiler Version 4.3.2); Linux 2.6.33 (gcc Compiler Version
4.1.0); Linux 2.6 (gcc Compiler Version 4.1.0);
v VxWorks 6.8 (gcc Compiler Version 4.1.2);
v Oracle Solaris 10 (32 bit) (gcc Compiler Version 3.4.3); Oracle Solaris 10 (64 bit)
(gcc Compiler Version 3.4.3); Oracle Solaris 11(32 bit) (gcc Compiler Version
4.5.2); Oracle Solaris 11 (64 bit) (gcc Compiler Version 4.5.2); Oracle Solaris 11
running on Intel Xeon 5675 with AES-NI (32 bit) (gcc Compiler Version 4.5.2);
Oracle Solaris 11 running on Intel Xeon 5675 with AES-NI (64 bit) (gcc Compiler
Version 4.5.2); Oracle Solaris 11 (32 bit) (Sun C Version 5.12); Oracle Solaris 11
(64 bit) (Sun C Version 5.12);
v Oracle Linux 5 (64 bit) (gcc Compiler Version 4.1.2); Oracle Linux 5 running on
Intel Xeon 5675 with AES-NI (gcc Compiler Version 4.1.2); Oracle Linux 6 (gcc
Compiler Version 4.4.6); Oracle Linux 6 running on Intel Xeon 5675 with AES-NI
(gcc Compiler Version 4.4.6);
v CascadeOS 6.1 (32 bit) (gcc Compiler Version 4.4.5); CascadeOS 6.1 (64 bit) (gcc
Compiler Version 4.4.5);
v Apple iOS 5.1 (gcc Compiler Version 4.2.1);
v Microsoft Windows CE 6.0 (Microsoft C/C++ Optimizing Compiler Version 15.00
for ARM); Microsoft Windows CE 5.0 (Microsoft C/C++ Optimizing Compiler
Version 13.10 for ARM);
v DSP Media Framework 1.4 (TMS320C6x C/C++ Compiler v6.0.13);
FIPS-approved algorithms:
v AES (Certs. #1884, #2116, and #2234);
v DRBG (Certs. #157, #229, and #264);
v DSA (Certs. #589, #661, and #693);
v HMAC (Certs. #1126, #1288, and #1363);
v RNG (Certs. #985, #1087, and #1119);
v RSA (Certs. #960, #1086, and #1145);
v SHS (Certs. #1655, #1840, and #1923);
v Triple-DES (Certs. #1223, #1346, and #1398);
v ECDSA (Certs. #264, #270, #315, #347 and #378);
v CVL (Certs. #10, #12, #24, #36 and #49).
To enable FIPS compliance for a manual installation complete the following steps :
1. Configure Websphere
The WebSphere documentation describes how to enable FIPS mode in
WebSphere for:
v WebSphere Application Server :
– v7.0 : http://pic.dhe.ibm.com/infocenter/wasinfo/v7r0/index.jsp?topic=/
com.ibm.websphere.base.doc/info/aes/ae/tsec_fips.html
– v8.5http://pic.dhe.ibm.com/infocenter/wasinfo/v6r1/index.jsp?topic=/
com.ibm.websphere.base.doc/info/aes/ae/tsec_fips.html
v WebSphere Application Server Network Deployment:
– v7.0 : http://pic.dhe.ibm.com/infocenter/wasinfo/v7r0/index.jsp?topic=/
com.ibm.websphere.nd.doc/info/ae/ae/rovr_fips.html
– v8.5 : http://pic.dhe.ibm.com/infocenter/wasinfo/v8r5/index.jsp?topic=
%2Fcom.ibm.websphere.nd.doc%2Fae%2Ftsec_fips.html
v WebSphere Application Server - Express®:
– v7.0 :http://pic.dhe.ibm.com/infocenter/wasinfo/v7r0/index.jsp?topic=/
com.ibm.websphere.express.doc/info/exp/ae/tsec_fips.html
– v8.5 :http://pic.dhe.ibm.com/infocenter/wasinfo/v8r5/index.jsp?topic=
%2Fcom.ibm.websphere.express.doc%2Fae%2Ftsec_fips.html
Chapter 8. Federal Information Processing Standard (FIPS 140-2) compliance in IBM Endpoint Manager for Remote Control 93
Note: It should be noted that running in FIPS mode in IBM WebSphere with
the IBM JRE and the IBM JSSE provider currently does not work when using
an MS SQL database. These options will work with MS SQL when FIPS is not
enabled in IBM Websphere.
2. Log on to the IBM Endpoint Manager for Remote Control Server with a valid
admin id and password.
3. Click Admin > Edit properties files
4. In the common.properties file set FIPS.compliance to true.
5. Click Submit.
6. Click Admin > Reset Application.
Note: It should be noted that the FIPS enablement changes in Websphere would
affect all other applications running on that server so browser settings for the users
accessing those other applications should be changed to support Transport Layer
Security (TLS), if required by their browser version.
For example to enable TLS in Internet Explorer complete the following steps :
v Click Tools > Internet Options.
v On the Advanced tab select Use TLS 1.0.
v Click Apply
v Click OK.
security.provider.1=com.ibm.crypto.FIPS.provider.IBMJCEFIPS
security.provider.2=com.ibm.crypto.provider.IBMJCE
security.provider.3=com.ibm.jsse.IBMJSSEProvider
security.provider.4=com.ibm.jsse2.IBMJSSEProvider2
security.provider.5=com.ibm.security.jgss.IBMJGSSProvider
security.provider.6=com.ibm.security.cert.IBMCertPath
security.provider.7=com.ibm.crypto.pkcs11impl.provider.IBMPKCS11Impl
security.provider.8=com.ibm.security.cmskeystore.CMSProvider
security.provider.9=com.ibm.security.jgss.mech.spnego.IBMSPNEGO
security.provider.10=com.ibm.security.sasl.IBMSASL
Check to see if the IBM Endpoint Manager for Remote Control Server is configured
for FIPS by completing the following step
v Click Admin > View Current Server Status.
The IBM JRE for Windows operating system and Linux (Intel) operating systems is
included with IBM Endpoint Manager for Remote Control and is installed when
you install the controller software.
If you are using Windows operating system , the JRE is included in the controller
package trc_controller_setup.exe and trc_controller.msi. For Linux operating
system, the JRE is included in the package ibm-trc-controller-jre-
9.x.x.i386.rpm. Where 9.x.x is the version that you want to install. For example,
9.1.0. These packages install the IBM Java Runtime Environment pre-configured
with the IBM FIPS certified cryptographic provider. They also register the MIME
type application/x-ibm-trc-jws and a file association for *.trcjws files. The file
types are used by the IBM Endpoint Manager for Remote Control server in
FIPS-compliant mode to start the controller. For more information about
installation instructions for the controller, see “Installing the controller” on page 59.
To use a different installation of the IBM JRE, the IBM Endpoint Manager for
Remote Control controller uses the FIPS-compliant cryptography module that is
included with the IBM Java virtual machine. To enable FIPS mode, the settings of
the JVM (Java virtual machine) that are used to run the controller need to be
modified. When you enable FIPS compliance, any other Java applications that are
running on the default JVM can also use the FIPS provider and the other security
providers that are listed in the java.security file.
Note: Enabling FIPS on the controller is not supported if you are using an Oracle
JVM.
Chapter 8. Federal Information Processing Standard (FIPS 140-2) compliance in IBM Endpoint Manager for Remote Control 95
To enable FIPS compliance on the controller if you are not using the version of
IBM JRE supplied with IBM Endpoint Manager for Remote Control, complete the
following steps:
1. Edit the java.security file
Windows systems
%JRE_HOME%\lib\security\java.security
Where %JRE_HOME% is the path to the directory where the Java
virtual machines Java Runtime Environment (JRE) is installed.
Linux / UNIX systems
$JRE_HOME/lib/security/java.security
Where $JRE_HOME is the path to the directory where the Java virtual
machines Java Runtime Environment (JRE) is installed.
2. Modify the security.provider.x= list so that the following two entries are
the first ones in the list:
security.provider.1=com.ibm.fips.jsse.IBMJSSEFIPS
security.provider.2=com.ibm.crypto.fips.provider.IBMJCEFIPS
Fix the number sequence of the other items in this list so that all items are
numbered in sequence. For example,
security.provider.1=com.ibm.fips.jsse.IBMJSSEFIPS
security.provider.2=com.ibm.crypto.fips.provider.IBMJCEFIPS
security.provider.3=com.ibm.jsse2.IBMJSSEProvider2
security.provider.4=com.ibm.crypto.provider.IBMJCE
security.provider.5=com.ibm.security.jgss.IBMJGSSProvider
security.provider.6=com.ibm.security.cert.IBMCertPath
security.provider.7=com.ibm.security.sasl.IBMSASL
security.provider.8=com.ibm.xml.crypto.IBMXMLCryptoProvider
security.provider.9=com.ibm.xml.enc.IBMXMLEncProvider
security.provider.10=org.apache.harmony.security.provider.PolicyProvider
security.provider.11=com.ibm.security.jgss.mech.spnego.IBMSPNEGO
Note:
a. Applies to all supported versions of the IBM JVM.
b. You must make a file association for the *.trcjws files before you start the
first session with a target. Use the following commands
Windows systems
%JRE_HOME%\jre\bin\javaws
Where %JRE_HOME% is the path to the directory where the Java
virtual machines Java Runtime Environment (JRE) is installed.
Linux / UNIX systems
$JRE_HOME/jre/bin/javaws.exe
Where $JRE_HOME is the path to the directory where the Java
virtual machines Java Runtime Environment (JRE) is installed.
Check to see whether the controller is configured for FIPS by completing the
following step during a remote control session.
v Click Controller tools > Show session information in the controller window.
Edit the trc_controller.cfg file on the system that the controller is installed on.
For more information about installing the target, see the IBM Endpoint Manager
for Remote Control Installation Guide.
Using the target user interface, choose the appropriate option to verify that the
target is in FIPS mode.
v On the IBM Endpoint Manager for Remote Control- Target user interface, click
Actions Menu > Connection info
v Hover the mouse over the IBM Endpoint Manager for Remote Control icon in
the system notification area.
Chapter 8. Federal Information Processing Standard (FIPS 140-2) compliance in IBM Endpoint Manager for Remote Control 97
For example : trc_target_setup.exe /s /v"/qn TRC_SERVER_HOSTNAME=yourserver
TRC_SERVER_PROTOCOL=https TRC_SERVER_PORT=443 FIPSCOMPLIANCE=yes"
where yourserver is the hostname or IP address of your IBM Endpoint Manager for
Remote Control Server.
Chapter 8. Federal Information Processing Standard (FIPS 140-2) compliance in IBM Endpoint Manager for Remote Control 99
100 IBM Endpoint Manager for Remote Control Installation Guide
Chapter 9. NIST SP800-131A compliance in IBM Endpoint
Manager for Remote Control
IBM Endpoint Manager for Remote Control version 9.1.0 components can be
configured for NIST SP800-131A compliance.
When you enable NIST SP800-131A compliance, the TLSv1.2 protocol is used for
providing secure connections. Therefore, you must ensure that your browser is
compatible.
Table 13. Browser compatibility for TLSv1.2. The following table provides information about
the supported browser versions that are compatible with TLSv1.2.
TLSv1.2 supported TLSv1.2 supported
TLSv1.2 not but disabled but and enabled by
supported default default
Internet Explorer All versions of IE on IE8, IE9, IE10 on IE11 on Windows 7
Windows XP and Windows 7 and operating system and
Windows Vista Windows 8 operating later
operating systems, system..
(IE6, IE7, IE8, IE9)
Firefox <24 24 None
Compliance with NIST SP800-131A also requires that the cryptographic provider is
FIPS 140-2 certified. When SP800-131A compliance is enabled, FIPS 140-2
compliance is enabled automatically, even when it is disabled in the settings.
For NIST SP800-131A compliance, you must configure all your components. There
is no compatibility with earlier versions of the components.
Note: There is no support for NIST SP800-131A with Oracle JVMs. Therefore, to
take advantage of the NIST support, you must install the stand-alone controller
component.
101
Enabling NIST SP800-131A compliance on the server
You can enable NIST SP800-131A compliance on the IBM Endpoint Manager for
Remote Control server during installation, when you are using the server installer
program. You can also enable NIST compliance after installation. To enable NIST
SP800-131A compliance for a manual IBM Endpoint Manager for Remote Control
Server installation you must configure theIBM Endpoint Manager for Remote
Control Server and WebSphere.
Note: NIST SP800-131A enablement changes in WebSphere would affect all other
applications that are running on that server. Therefore, browser settings for the
users who access those other applications must be changed to support Transport
Layer Security (TLS).
However, if you did not already enable FIPS you must enable if first. For more
information about enabling FIPS after you install the server, see “Enabling FIPS
compliance on an automated server installation” on page 94.
You must also make sure that the server certificate is compliant by ensuring that
you follow the prerequisites for NIST support. For more information about
certificate prerequisites, see Chapter 9, “NIST SP800-131A compliance in IBM
Endpoint Manager for Remote Control,” on page 101.
Chapter 9. NIST SP800-131A compliance in IBM Endpoint Manager for Remote Control 103
...\tools\ssl.cmd" "C:\Program Files (x86)\IBM\Tivoli\TRCServer"
1 0 "C:\" "%CERTSTOREPW%" "servername.localnet" 1 trc
"%CERSTOREPWSELF%" "TrC" "1"
d. Save the file.
e. In the same directory, edit tmem.sh or tmem.cmd, depending on your
operating system.
f. Set the value of NIST800=1. Set the value of FIPSON=1 if it is not
already set.
g. Run the following command.
trcsetup userid password certpassword
Check to see whether the IBM Endpoint Manager for Remote Control Server is
configured for NIST SP800-131A by completing the following step.
The fields that show that NIST SP800-131A compliance is enabled are as follows.
v Enabled NIST SP800-131A mode
v JVM configured for NIST SP800-131A mode
If you are using a Windows system, the JRE is included in the controller package
trc_controller_setup.exe and trc_controller.msi. For Linux systems, the JRE is
included in the package ibm-trc-controller-jre-9.1.0.i386.rpm. These packages
install the IBM Java Run-time Environment preconfigured with the IBM FIPS
certified cryptographic provider and NIST SP800-131A enabled. The packages also
register the MIME type application/x-ibm-trc-jws and a file association for
*.trcjws files.
If you install the controller component locally to start peer to peer remote control
sessions, you must edit the trc_controller.cfg file to enable NIST SP800-131A
compliance. To enable NIST SP800-131A compliance, complete the following steps.
1. Edit the trc_controller.cfg file on the system that the controller is installed
on.
Windows systems
[controller install dir]\trc_controller.cfg
where [controller install dir] is the installation directory you chose when
you installed the controller.
Linux systems
opt/ibm/trc/controller/trc_controller.cfg
2. Set sp800131a.compliance to true.
3. Save the file.
Chapter 9. NIST SP800-131A compliance in IBM Endpoint Manager for Remote Control 105
Using the target user interface, choose the appropriate option to verify that NIST
SP800-131A compliance is enabled on the target.
v On the IBM Endpoint Manager for Remote Control- Target user interface, click
Actions Menu > Connection info.
v Hover the mouse over the IBM Endpoint Manager for Remote Control icon in
the system notification area.
where yourserver is the host name or IP address of your IBM Endpoint Manager for
Remote Control Server.
Chapter 9. NIST SP800-131A compliance in IBM Endpoint Manager for Remote Control 107
To enable NIST SP800-131A compliance, complete the following steps.
1. Edit the trc_broker.properties file.
2. Set SP800131ACompliance = Yes.
3. Save the file.
4. Restart the broker service. For more information about restarting the broker
service see, Chapter 6, “Managing the component services,” on page 71. Follow
the steps in the section that is relevant to your operating system.
109
110 IBM Endpoint Manager for Remote Control Installation Guide
Chapter 11. Recovering from installation errors
If you experience installation errors use this chapter to identify the problem and
address it.
Recovery steps
Use the following information as a starting point to find log files and other
information to help you recover from installation errors.
If you must contact IBM Software Support, gather the following information.
v If you are using a Windows operating system, any event log that is relevant to
the installation error.
v The installation log files.
v Operating system version, including any service packs.
v The version of the WebSphere Application Server, database server, and Java.
v Hardware description.
v Installation media type.
v Windows services that were active during the unsuccessful installation. For
example, antivirus software.
The following files can also be used to gather information about any errors that
might occur.
\tsetup.ini
Contains some basic information, logged during an automated installation.
[installdir]\install.log
Contains internal debug messages.
[installdir]\inst.ini
Contains all parameters about the installation.
[installdir]\wlp\usr\server\trcserver
Contains configuration xml files.
[installdir]\wlp\usr\server\trcserver\logs\messages.log
[installdir]\wlp\usr\server\trcserver\logs\messages_xxxxxxx.log
[installdir]\wlp\usr\server\trcserver\logs\ffdc directory
111
Cause The memory check at the beginning of the installation has determined that
the machine that you are installing on does not have the required
minimum memory for installation.
Solution
For details of the requirements for memory, see “Server requirements” on
page 9.
In this case you should cancel the installation and create the Oracle
database before proceeding to install IBM Endpoint Manager for Remote
Control again.
Note: To manually stop or start the server type the following command.
Note: The 32-bit Java that is supplied in 32-bit eWAS can use a
maximum of 2.7 GB only, no matter how much RAM is available.
You can also use the tmem.cmd and tmem.sh command to adjust the
following parameters.
maxwebconn
Sets the number of web connections allowed. The default is 85 and
can increase to 175.
maxthreads; minthreads
Sets the minimum and maximum threads allowed. Maximum
threads are 50, increasing to 150.
To edit these parameters in version 9.x.x, complete the following steps:
1. Edit trcsetup.cmd or trcsetup.sh.
2. Edit the line that contains the call to the memory.cmd file. For example,
C:\TRC\server\tools\memory.cmd 163 49 135 1
where
v maxwebconn = parameter 1 (163)
v minthreads = parameter 2 (49)
v maxthreads = parameter 3 (135)
Do not edit parameter 4. Keep the value 1.
3. Change the required values.
4. Save the trcsetup file.
5. Type the following command.
trcsetup userid password certpassword
Where userid and password are the database connection credentials and
certpassword is your certificate file password.
Run the command to change the database password for the application.
Restart the IBM Endpoint Manager for Remote Control service after you
run the command.
> mytrcserver.example.ibm.com
Server: gbibp9ph1--31ndcr.wan.ibm.com
Address: 192.0.2.0
Name: mytrcserver.example.ibm.com
Address: 192.0.2.1
> 9.169.86.25
Server: gbibp9ph1--31ndcr.wan.ibm.com
Address: 192.0.2.0
Name: mytrcserver.example.ibm.com
Address: 192.0.2.1
In the example you can see that the server hostname resolves to the correct
IP address.
To uninstall the IBM Endpoint Manager for Remote Control server by using the
installer, complete the following steps :
1. Navigate to the IBM Endpoint Manager for Remote Control server installation
directory. The default directory or the specific directory that you chose when
you installed the server. For example,
Windows systems
\Program Files\ibm\Tivoli\TRC\server
Linux systems
/opt/IBM/Tivoli/TRC/server
2. Double click Uninstall IBM Endpoint Manager for Remote Control -
Server.exe
3. Click Uninstall.
4. Click Done when finished.
The IBM Endpoint Manager for Remote Control features, files, and folders that
were created by the installer are removed.
119
2. Logon with the ID and password that were defined when installing Websphere.
3. Expand Applications and click Enterprise applications.
4. Select the check box for the IBM Endpoint Manager for Remote Control server
application.
5. Click Uninstall.
6. Select Save to save to the Master Configuration.
To remove the target software using Add or Remove Programs complete the
following steps:
1. Open the Control Panel.
2. Double click Add or Remove Programs.
3. Select IBM IBM Endpoint Manager for Remote Control - Target.
4. Click Remove.
5. Click Yes at the prompt.
The IBM Endpoint Manager for Remote Control target software is removed from
your system.
You can verify the target is removed by completing the following steps:
1. Run the command in step 1 to make sure that there is no IBM Endpoint
Manager for Remote Control package installed.
2. Run the following command to make sure that there is no IBM Endpoint
Manager for Remote Control process running.
IBM Endpoint Manager for Remote Control version 9.0.0 introduced new
capabilities that can cause some backwards compatibility issues if the different
components are not upgraded in the correct order.
This limitation applies only to environments where the gateway and broker
components have been deployed. In these environments, the broker and gateway
must be updated before the server or the target components. After they are
upgraded, the targets and server can be upgraded in the order that best suits your
environment, since there are no dependencies between them.
123
Upgrade the server component
If you already installed the IBM Endpoint Manager for Remote Control Server
software, you can upgrade the component by carrying out a similar installation
type to your original installation.
Before you start the upgrade, you must back up your property files and any
recording files if applicable. Back up any certificates, if applicable. For more
information about backing up and restoring certificates, see the IBM Endpoint
Manager for Remote Control Administrator's Guide
Property files
v common.properties
v ldap.properties
v trc.properties
v log4j.properties
v controller.properties
You can upgrade the server component by using any of the following methods:
Using the installation files
For more information about obtaining the component installation files, see
“Obtain the installation files” on page 19. For details about installing the
server, by using the installer, see “Installing by using the server installer”
on page 25.
Note: During the installation, select to keep existing property files and do
not select to drop the database.
For information about installing the server, on WebSphere 8.5, see
“Installing on WebSphere Application Server version 8.5: deploying the
war file” on page 32.
Using the IBM Endpoint Manager console
If you have the IBM Endpoint Manager console infrastructure installed you
can create and run a server installation task to upgrade the server. For
more information about using the wizard to create a server configuration
task, see the IBM Endpoint Manager for Remote Control Console User's
Guide.
When you complete the upgrade verify that the new version is installed, manually
edit the new properties files. Update the values with the values that are in your
backed up properties files. Restore your recording files and certificates if applicable
If you are using a Linux operating system and are upgrading from IBM Endpoint
Manager for Remote Control version 9.0.1 or earlier, edit the
trc_controller.cfg.rpmnew file. Compare the property values in the file with the
values in the trc_controller.cfg file. Merge the differences into the
trc_controller.cfg file and save the file.
Any of the following methods can be used to upgrade the controller component:
Using the installation files
For more information about obtaining the component installation files, see
“Obtain the installation files” on page 19. For more information about
installing the controller component on a Windows system, by using the
installation files, see “Installing the controller on a Windows system” on
page 59. For more information about installing the controller component in
a Linux system, by using the installation files, see “Installing the Linux
controller” on page 60.
Using the IBM Endpoint Manager console
If you have the IBM Endpoint Manager console infrastructure installed you
can use the update fixlets to upgrade the controller component. For more
information about using the update fixlets, see the IBM Endpoint Manager
for Remote Control Console User's Guide.
You can access the maintenance program on a system with Microsoft Windows by
running the trc_target_setup.exe program. To access the maintenance program
complete the following steps :
1. Navigate to the directory that the IBM Endpoint Manager for Remote Control
target software was installed to
for example : \Program Files\ibm\Tivoli Remote Control\RCTarget
2. Double click trc_target_setup.exe.
3. At the welcome screen click Next.
4. Select the required option and click Next
Modify
Select this option to navigate through the target installation screens to
modify the previously installed values.To modify the installation
properties follow from step 5 on page 40
Repair
Select this option to fix missing or corrupt files, shortcuts, and registry
entries.
a. Click Repair.
b. Click Finish.
Remove
Select this option to remove the target software and all of its features.
a. Click Remove.
b. Click Finish.
127
128 IBM Endpoint Manager for Remote Control Installation Guide
Appendix. Support
For more information about this product, see the following resources:
v http://pic.dhe.ibm.com/infocenter/tivihelp/v26r1/topic/com.ibm.tem.doc_9.1/
welcome/welcome.html
v IBM Endpoint Manager Support site
v IBM Endpoint Manager wiki
v Knowledge Base
v Forums and Communities
129
130 IBM Endpoint Manager for Remote Control Installation Guide
Notices
This information was developed for products and services that are offered in the
USA.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or
implied warranties in certain transactions, therefore, this statement may not apply
to you.
131
websites. The materials at those websites are not part of the materials for this IBM
product and use of those websites is at your own risk.
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758 U.S.A.
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
All IBM prices shown are IBM's suggested retail prices, are current and are subject
to change without notice. Dealer prices may vary.
This information is for planning purposes only. The information herein is subject to
change before the products described become available.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
Each copy or any portion of these sample programs or any derivative work, must
include a copyright notice as follows:
Portions of this code are derived from IBM Corp. Sample Programs.
© Copyright IBM Corp. _enter the year or years_. All rights reserved.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the web at www.ibm.com/legal/
copytrade.shtml.
Adobe, Acrobat, PostScript and all Adobe-based trademarks are either registered
trademarks or trademarks of Adobe Systems Incorporated in the United States,
other countries, or both.
Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo,
Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or
registered trademarks of Intel Corporation or its subsidiaries in the United States
and other countries.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Notices 133
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Oracle and/or its affiliates.
Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are
trademarks of HP, IBM Corp. and Quantum in the U.S. and other countries.
Applicability
These terms and conditions are in addition to any terms of use for the IBM
website.
Personal use
You may reproduce these publications for your personal, noncommercial use
provided that all proprietary notices are preserved. You may not distribute, display
or make derivative work of these publications, or any portion thereof, without the
express consent of IBM.
Commercial use
You may reproduce, distribute and display these publications solely within your
enterprise provided that all proprietary notices are preserved. You may not make
derivative works of these publications, or reproduce, distribute or display these
publications or any portion thereof outside your enterprise, without the express
consent of IBM.
Rights
IBM reserves the right to withdraw the permissions granted herein whenever, in its
discretion, the use of the publications is detrimental to its interest or, as
determined by IBM, the above instructions are not being properly followed.
You may not download, export or re-export this information except in full
compliance with all applicable laws and regulations, including all United States
export laws and regulations.
data import
upgrading 123
gateway support
L
LDAP 73 LDAP
installing 65
data source configuration file 85
linux 66
DB2 configuring 73
silent install 66
creating 33 connection credentials 76
windows 65
MSSQL connection security
getting started 17
creating 38 parameters 77
Oracle enabling 83
creating 36 errors 83
database I groups
mssql installation importing 82
creating 25 basic setup 6 ldap.security_athentication 77
mssql database configuring 73 SASL secure connection 78
permissions 25 firewall traversal 7 SSL secure connection 79
database authentication data verifying 109 synchronization 74
DB2 32 installation errors user authentication 79
MSSQL 37 DB2 112, 115 user search 80
Oracle 35 during installation 111 verify imported groups 84
135
LDAP (continued) RPM build tree target (continued)
verifying a connection 75 configuring 57 uninstalling (continued)
linux components RPM package Windows 120
restarting 71 building 58 upgrading 125
starting 71 RPM source file target config file
stopping 71 installing 57 customising 58
log files obtaining 57 target install
location 111 custom install
RPM for Linux 56
S windows 53
M server environment guidelines 10
target installation
rpm file 51
managing the component services 71 large environment 12
spb file 52, 59
manual install medium environment 11
target requirements 14
application deployment 39 small environment 11
targets
application server setup 32 server installation
not registering 116
database setup 21 IBM Endpoint Manager console 40
targets
MSSQL installer 25
not visible on server 116
FIPS compliancy war file 32
troubleshooting
connection errors 118 server installation types 10
installation errors 111
mssql database server requirements 9
creating 25 Setting up LDAP synchronization 74
SP800-131A compliance 101
broker U
N cli
enabling 107 uninstalling 119
server 119
NIST compliance 101
enabling 108 in WAS 119
broker
linux 108 using add remove programs 120
enabling 107
windows 108 using installer 119
cli
controller upgrading
enabling 108
enabling 105 controller 125
enabling
stand-alone 105 server 124
automated server installation 103
enabling target 125
manual server installation 102
automated server installation 103 upgrading from previous versions 123
gateway
manual server installation 102 upgrading the broker 123
enabling 107
gateway upgrading the gateway 123
linux target
enabling 107 using this guide 5
enabling 107
linux target
server
enabling 107
enabling 102
target
server
enabling 102
W
enabling 106 war file deployment
target
using the server installer 102 database setup 21
after installation 106
websphere variables
enabling 106
db2
target silent installation 106
O using the server installer 102
verifying 33
oracle
Obtaining the installation files 19 using the target installer 106
verifying 36
operating requirements 5 windows target
verifying 37
oracle database enabling 106
windows components
out of bounds errors 117 SPEC file
restarting 71
Oracle database customizing 58
starting 71
creating 22 system requirements
stopping 71
setting permissions 22 broker 15
Overview 3 controller 13
gateway 14
server 9
P target 14
platform support
broker 15
controller 13 T
server 9 target
target 14 installing
Windows 40
modifying
R Windows 127
uninstalling
requirements 5
Linux 120
Printed in USA