Hi,

Here is something we have bumped into when deploying WMQ SSL onto MSCS
clustered Windows servers.

We started by deploying our PKCS 12 files to a key repository on a
none-shared volume (the default sslkeyr - 'c:\Program Files\IBM\WebSphere
MQ\qmgrs\<qm>\ssl\key').  That worked fine, we then failed over in the
cluster and had to re-do the deploy to the backup's local volume.  This
worked fine too, and subsequent fail-overs worked a treat.

So far, so good, but we then made the mistake of trying to be clever...

We wanted to deploy the PKI stuff on the active system in such a way that
would be picked up upon fail-over, without the hassle of a fail-over.  The
obvious approach was to locate the key store on a shared volume, i.e.
sslkeyr of e:\WebSphere MQ\qmgrs\<qm>\ssl\key'.  We tried that, and deployed
the PKI - OK on the active server.  We then failed over and tried our SSL
channels...  oops - no certificate assigned to the queue manager.  It would
work on the 'backup' system if we wiped the key store and then re-deployed
our PKI files, but would then fail when we reverted to the original.

The key store has some sort of relationship with the local system - the
registry perhaps?

Can anyone recommend a technique for sharing a key store across an MSCS
cluster without failing over?  Many thanks in advance for any suggestions /
comments.

In the meantime, we have reverted to using local key stores and deploying by
install+failover+install - more work but it works!


Alan

Instructions for managing your mailing list subscription are provided in
the Listserv General Users Guide available at http://www.lsoft.com
Archive: http://vm.akh-wien.ac.at/MQSeries.archive

Reply via email to