![]() |
Copyright © Cloud Software Group, Inc. All Rights Reserved |
You must consider the following points when configuring the Rendezvous daemons (rvsrd and rvrd), the Apache module, and TIBCO API Exchange Gateway.
• Ensure that the subject name configured for Local Area Network (LAN) during the rvsrd daemon configuration on Machine 1 matches the subject name configured for LAN for the rvrd daemon configuration on Machine 2. The authorized subject names used in the rvsrd configuration on Machine 1 must be the same as the subject name used for the rvrd configuration on Machine 2.
• Ensure that the authorized subject names used in the configuration of rvsrd on Machine 1 matches the subject name set using the AsgSubject parameter in the Apache module configuration file (mod_ASG.conf) on Machine 1.
• Ensure that the subject names configured for rvrd on Machine 2 matches the subject name set using the tibco.clientVar.ASG/modRV/north_request property in the Core Engine properties file. The properties file is located as the ASG_CONFIG_HOME/asg.properties file.
• Ensure that the subject name configured using the AsgSubject parameter in the Apache module configuration file (mod_ASG.conf) on Machine 1 matches the subject name set using the tibco.clientVar.ASG/modRV/north_request property in the Core Engine properties file. The properties file is located as the ASG_CONFIG_HOME/asg.properties file.
• The listen port used to start the rvsrd daemon on Machine 1 must be different from the listen port used to start the rvrd daemon on Machine 2.
− Start the rvsrd daemon on Machine 1 as follows:
− Start the rvrd daemon on Machine 2 as follows:
• The network parameter configured in the Apache module configuration file (mod_ASG.conf) on Machine 1 must be same as the network property value set in the Core Engine properties (asg.properties) file.In the Core Engine properties (asg.properties) file on Machine 2, set the network property value as follows:
• The daemon certificate configured for the rvsrd setup must match the certificate specified by the AsgSecureDaemonCert parameter in the Apache module configuration file (mod_ASG.conf).
• The user certificate configured for a user during the rvsrd setup must match with the certificate specified by the AsgSecureDaemonKey parameter in the Apache module configuration file (mod_ASG.conf).
•
• Configure the secure Rendezvous daemon (rvsrd or rvsd) on the machine that is outside the firewall. This is shown as Machine 1 in the Secure Deployment with Rendezvous diagram. See TIBCO Rendezvous Administration for detailed instructions to configure rvsrd or rvsd, as required.
• Configure the Rendezvous daemon (rvrd or rvd) on the machine that is inside the inner security zone. This is shown as Machine 2 in the Secure Deployment with Rendezvous diagram. See TIBCO Rendezvous Administration for detailed instructions to configure rvrd or rvd, as required.
•
• Install, configure, and setup the Apache server on Machine 1. Refer to TIBCO API Exchange Gateway Installation guide for details.
− ASG_HOME\modules\http_server\apache\mod_ASG.conf
− ASG_ HOME\modules\http_server\apache\mod_asg_rv_inbound.so
3. Include <Full Path>/mod_ASG.conf
1. Open the mod_ASG.conf file for editing.
Table 24 Apache Module Properties For example, ;239.1.1.11
• This network parameter value must match the network value set during the configuration of rvrd setup on Machine 2. Specifies the daemon value set during the configuration of secure Rendezvous daemon (rvsrd). For example,You must specify the ssl prefix before the machine name, else the connection fails. Set this value to On to enable the Apache module to connect to the secure Rendezvous daemon (rvsrd).
• Specifies the path to the public certificate of the secure Rendezvous daemon (rvsrd). This public certificate is configured during the rvsrd setup.
• Specifies the username used in rvsrd configuration.If AsgSecureDaemonUsername is set, the Apache module uses the username and password to connect to the rvsrd daemon.If AsgSecureDaemonUsername is not set, AsgSecureDaemonKey parameter must be set. See AsgSecureDaemonKey.
• Specifies the password used by the client in rvsrd configuration. The password is required when connecting to the rvsrd daemon either using the username or the client certificate. You can specify an obfuscated password for this parameter. The obfuscated password is generated using the asg-password-obfuscator utility located in the ASG_HOME/bin directory.
• Specifies the path to the user certificate of secure Rendezvous daemon (rvsrd). This user certificate is configured for a user in the rvsrd setup. The certificate should be in text (PEM) format.The Apache module connects to the secure Rendezvous daemon (rvsrd) using the user certificate specified by this parameter.
• If this parameter is not set, the Apache module connects to the secure Rendezvous daemon (rvsrd) using the username and password specified by AsgSecureDaemonUsername and AsgSecureDaemonPassword parameters.
You can use the asg-password-obfuscator executable to obfuscate the password. The obfuscated password can be used in the AsgSecureDaemonPassword parameter of the mod_ASG.conf file of Apache module. See asg-password-obfuscator Utility for usage details.The following is the list of properties with example values for the Apache module set in the mod_ASG.conf file. Refer to Apache Module Properties for the properties description.
− AsgService 1111
− AsgNetwork ;239.1.1.11
− AsgDaemon ssl:ASGRVSecure:7500
−
− AsgSecureDaemonCert "C:\tibcoasg\tibrv\8.3\certs\cert2.pem"
− AsgSecureDaemonUsername "user"
− AsgSecureDaemonPassword "user"
− AsgSecureDaemonKey "C:\tibcoasg\tibrv\8.3\certs\Usercert.pem"
TIBCO API Exchange Gateway provides the asg-password-obfuscator utility. Using this utility, you can generate an obfuscated password used by the Apache module (C module) to communicate with the Rendezvous daemon. The obfuscated password can be set for the AsgSecureDaemonPassword parameter in the Apache module configuration (mod_ASG.conf) file.
The asg-password-obfuscator utility has the following options:
• The -i option generates the obfuscated password that can be used on any machine. This option is less secure as it is machine independent.
• The -hostname option generates the obfuscated password specifically for a hostname. This option is more secure as it restricts the encrypted password to be used only for that machine.
• Either the -i or -hostname option generates the obfuscated password for the Apache module to communicate with the Rendezvous daemon. These options are used only to generate the encrypted password for the configuration file of the Apache module (mod_ASG.conf).
• If you do not use the -i or -hostname options for the asg-password-obfuscator utility, the generated password can be used for the java based modules such as WSS’s keystore.
1. Navigate to the ASG_CONFIG_HOME directory.
2. Open the asg.properties file in a text editor.
Table 25 Core Engine Properties
− This property value must match the subject value specified in the Apache module configuration file (mod_ASG.conf) for Apache server.
− This property value must match the subject value specified for the rvrd configuration.
•
− This property value should match the listen port value given for the command to start the rvrd daemon on the machine where the Core Engine runs.
− This property value must be different from the listen port value given for the command to start the rvsrd daemon on the machine where the Apache server runs.
• For example, 2222The following is the list of properties with example values for the Core Engine set in the asg.properties file. Refer to Core Engine Properties for the properties description.
![]() |
Copyright © Cloud Software Group, Inc. All Rights Reserved |