Create a Windows user for WebSphere
- Log in to Windows by using an administrator user account.
- Select Start > Control Panel > Administrative Tools > Computer Management > Local Users and Groups.
- Right-click Users and select New User.
- Type a user name and password in the appropriate boxes, and type any other information you require in the remaining boxes.
- Deselect User Must Change Password At Next Login, click Create, and then click Close.
- Click Users, right-click the user you created and select Properties.
- Click the Member Of tab and then click Add.
- In the Enter The Object Names To Select box, type
Administrators
, click Check Names to ensure that the group name is correct. - Click OK and then click OK again.
- Select Start > Control Panel > Administrative Tools > Local Security Policy > Local Policies.
- Click User Rights Assignment, and then right-click Act as Part of the Operating System and select Properties.
- Click Add User or Group.
- In the Enter The Object Names To Select box, type the name of the user you created in step 4, click Check Names to ensure that the name is correct, and then click OK.
- Click OK to close the Act As Part Of The Operating System Properties dialog box.
Configure WebSphere to use the newly created user as Administrator
-
Ensure that WebSphere is running.
-
In WebSphere Administrative Console, select Security > Global Security.
-
Under Administrative security, select Administrative user roles.
-
Click Add and do the following:
- Type * in the search box and click search.
- Click Administrator under roles.
- Add the newly created user to Mapped to role and map it to Administrator.
-
Click OK and save your changes.
-
Restart the WebSphere profile.
Enable administrative security
-
In WebSphere Administrative Console, select Security > Global Security.
-
Click Security Configuration Wizard.
-
Ensure Enable Application Security checkbox is enabled. Click Next.
-
Select Federated Repositories and click Next.
-
Specify the credentials you want to set and click Next.
-
Click Finish.
-
Restart the WebSphere profile.
WebSphere starts using the default keystore and truststore.
Enable SSL (custom key and truststore)
Truststores and keystores can be created using ikeyman utility or admin console. To make ikeyman work properly, enure that the WebSphere installation path does not contain parentheses.
-
In WebSphere Administrative Console, select Security > SSL certificate and key management.
-
Click Keystores and certificates under Related items.
-
In the Key store usages dropdown, ensure that SSL Keystores is selected. Click New.
-
Type a logical name and description.
-
Specify the path where you want your keystore to be created. If you have already created a keystore through ikeyman, specify the path to the keystore file.
-
Specify and confirm the password.
-
Choose the keystore type and click Apply.
-
Save the master configuration.
-
Click Personal Certificate.
-
If you had added already created a keystore using ikeyman, your certificate will appear. Otherwise, you need to add a new self-signed certificate by performing the following steps:
- Select Create > Self-signed Certificate.
- Specify appropriate values on the certificate form. Ensure that you keep Alias and common name as fully qualified domain name of the machine.
- Click Apply.
-
Repeat steps 2 through 10 for creating a truststore.
Apply custom keystore and truststore to the server
-
In WebSphere Administrative Console, select Security > SSL certificate and key management.
-
Click Manage endpoint security configuration. The local topology map opens.
-
Under Inbound, select direct child of nodes.
-
Under Related items, select SSL configurations.
-
Select NodeDeafultSSLSetting.
-
From the truststore name and keystore name drop-down lists, select the custom truststore and keystore that you created.
-
Click Apply.
-
Save the master configuration.
-
Restart the WebSphere profile.
Your profile now runs on custom SSL settings and your certificate.
Enabling support for AEM forms natives
- In WebSphere Administrative Console, select Security > Global Security.
- In the Authentication section, expand RMI/IIOP security and click CSIv2 inbound communications.
- Ensure that SSL-supported is selected in the Transport drop-down list.
- Restart the WebSphere profile.
Configuring WebSphere to convert URLs that begins with https
To convert a URL that begins with https, add a Signer certificate for that URL to the WebSphere server.
Create a Signer certificate for a https enabled site
-
Ensure that WebSphere is running.
-
In WebSphere Administrative Console, navigate to Signer certificates and then click Security > SSL Certificate and Key Management > Key Stores and Certificates > NodeDefaultTrustStore > Signer Certificates.
-
Click Retrieve From Port and perform these tasks:
- In the Host box, type the URL. For example, type
www.paypal.com
. - In the Port box, type
443
. This port is the default SSL port. - In the Alias box, type an alias.
- In the Host box, type the URL. For example, type
-
Click Retrieve Signer Information and then verify that the information is retrieved.
-
Click Apply and then click Save.
HTML-to-PDF conversion from the site whose certificate is added will now work from the Generate PDF service.
Configuring dynamic ports
IBM WebSphere does not allow multiple calls to ORB.init() when Global Security is enabled. You can read about the permanent restriction at https://www-01.ibm.com/support/docview.wss?uid=swg1PK58704.
Perform the following steps to set the port to be dynamic and resolve the issue:
-
In WebSphere Administrative Console, select Servers > Server Types > WebSphere application server.
-
In the Preferences section, select your server.
-
In the Configuration tab, under Communications section, expand Ports, and click Details.
-
Click the following port names, change the port number to 0, and click OK.
ORB_LISTENER_ADDRESS
SAS_SSL_SERVERAUTH_LISTENER_ADDRESS
CSIV2_SSL_SERVERAUTH_LISTENER_ADDRESS
CSIV2_SSL_MUTUALAUTH_LISTENER_ADDRESS
Configure the sling.properties file
-
Open
[aem-forms_root]
\crx-repository\launchpad\sling.properties file for editing. -
Locate the
sling.bootdelegation.ibm
property and addcom.ibm.websphere.ssl.*
to its value field. The updated field look like the following:sling.bootdelegation.ibm=com.ibm.xml.*, com.ibm.websphere.ssl.*
-
Save the file and restart the server.
Experience Manager
Espressos & Experience Manager: AEM Forms
Espressos & Experience Manager
Thursday, Mar 6, 7:00 PM UTC
Join Adobe's AEM product team as they highlight AEM Forms' latest innovations, including: the new Gen AI Assistant, Unified Composition with AEM Sites, and new ways to deploy forms through conversations.
RegisterRapid Feature Releases with AEM Cloud: Telegraph Media Group’s RDE Strategy
Hear how Telegraph Media Group, the award-winning publisher of The Daily Telegraph, The Sunday Telegraph, The Telegraph Magazine,...
Wed, Mar 19, 3:30 PM PDT (10:30 PM UTC)
Elevate and Empower Teams with Agentic AI for Exceptional Experiences
Elevate and empower your CX teams with AI that transforms creativity, personalization, and productivity. Discover how Adobe is...
Tue, Mar 18, 1:00 PM PDT (8:00 PM UTC)
Connect with Experience League at Summit!
Get front-row access to top sessions, hands-on activities, and networking—wherever you are!
Learn more