Cisco Cisco Customer Voice Portal 8.0(1)

Page of 573
You manage certificates using:
The keystore, a database for keys and trusted certificate information. For all keystore operations
it is assumed that:
For Windows 2003 Server machines:
Keystore resides in: 
%CVP_HOME%\conf\security\.keystore
Resource Manager keystore resides in: 
%CVP_HOME%\conf\security\.ormKeystore
Keystore password resides in: 
%CVP_HOME%\conf\security.properties
The keytool, a command-line utility for managing keys and trusted certificates. The keytool
is installed in:
For Windows 2003 Server machines:
%CVP_HOME%/jre
Note:
• On Windows systems, the keystore and the keystore password are in a folder that is protected
with Access Control List (ACL), so only a user who has Administrator privileges can import
trusted certificates.
• For more information about the keytool and keystores, refer to your Java documentation.
How to Secure JMX Communications Between Unified CVP Components
Follow the steps below to secure JMX communication using SSL between the Unified CVP
Operations Console service, a managed Unified CVP device, and other CVP-related JMX clients.
Step 1
Stop the Unified CVP Operations Console service. On a Windows system, do the following:
1. Select Start > Settings > Control Panel > Administrative Tools > Services.
The Services window appears.
2. In the list of Service names, highlight the Cisco services that you need to stop to complete
the secure communication setup.
The services would include each device configured in the Operations Console, the
Operations console itself, the Web Services Manager, and the Resource Manager as shown
in the list that follows:
Cisco CVP CallServer
Cisco CVP OpsConsoleServer
Cisco CVP Resource Manager
Configuration and Administration Guide for Cisco Unified Customer Voice Portal Release 8.0(1)
229
Chapter 5: Configuring and Modifying Unified CVP Security
Securing Communications Between Unified CVP Components