InfoCenter Home >
6: Administer applications >
6.6: Tools and resources quick reference >
6.6.18: Securing applications >
6.6.18.12: Crytographic token support

6.6.18.12: Crytographic token support

To understand how to make WebSphere Application Server (both the runtime and the IKeyMan key management utility) work correctly with any crypto hardware, you should become familiar with the JSSE documentation available from the Application Server product installation:

product_installation_root/java/docs/jsse/readme.jsse.ibm.html

Be sure to unzip the file:

product_installation_root/java/docs/jsse/native-support.zip
to the appropriate location; otherwise, link errors will occur.

Follow the documentation that accompanies your device in order to install your crypto hardware. Installation instructions for IBM crypto hardware devices can be found at http://www.ibm.com/security/cryptocards/html/library.shtml

The product supports the use of the following cryptographic devices.

These can be used by an SSL client or server:

  • IBM 4758-23
  • nCipher nForce
  • Rainbow Cryptoswift

These can be used by SSL clients:

  • IBM Security Kit Smartcard
  • GemPlus Smartcards
  • Rainbow iKey 1000/2000 (USB "Smartcard" device)
  • Eracom CSA800

IBM HTTP Server Version 1.3.19 supports the following cryptographic devices. [This information is provided for convenience. Consult the IBM HTTP Server Web site and documentation as the ultimate authority].

Cryptographic devices Client or server Interface Operating system
Rainbow Cryptoswift Client or server BSAFE 3.0 Windows NT, Solaris, HP-UX
nCipher nFast Client or server BHAPI plugin under under BSAFE 4.0 Windows NT, Solaris
nCipher nForce accelerator mode Client or server BHAPI/BSAFE Windows NT, Solaris
nCipher nForce - key storage mode Client or server PKCS11 Windows NT, Solaris, HP-UX, AIX, Linux
IBM4758 Client or server PKCS11 Windows NT, AIX

  Be sure to check the WebSphere Application Server prerequisites Web site for the currently supported version(s) of IBM HTTP Server.

Go to previous article: The demo keyring Go to next article: Administering the product messages, logs, and traces (overview)

 

 
Go to previous article: The demo keyring Go to next article: Administering the product messages, logs, and traces (overview)