Cisco Cisco Unified Customer Voice Portal 11.0(1)

Page of 561
Before You Begin
You secure JMX communications by importing:
Self-signed certificates that are created automatically from information that you specify
during Unified CVP installation.
Signed certificates available from a Certificate Authority (CA).
You manage certificates using:
The keystore, a database for keys and trusted certificate information. For all keystore operations
it is assumed that:
For Windows 2003 Server machines:
The keystore resides in 
%CVP_HOME%\conf\security\.keystore
The keystore password resides in 
%CVP_HOME%\conf\security.properties
.
For AIX machines:
The keystore resides in 
$CVP_HOME/conf/security/.keystore
The keystore password resides in 
$CVP_HOME/conf/security.properties
.
The keytool, a command-line utility for managing keys and trusted certificates. The keytool
is installed in:
For Windows 2003 Server machines, 
%WAS_HOME%/java/bin. (Unified CVP will
also install JRE under %CVP_HOME%/jre.)
For AIX machines, 
$WAS_HOME/java/bin
Note:
• On both Windows and AIX systems, the keystore and the keystore password are in a folder
that is protected with Access Control List (ACL), so only a user who has Administrator
privileges can import trusted certificates.
• For more information about the keytool and keystores, refer to your Java documentation.
How to Secure JMX Communications Between Unified CVP Components
Follow the steps below to secure JMX communication using SSL between the Unified CVP
Operations Console service and a managed Unified CVP device.
Configuration and Administration Guide for Cisco Unified Customer Voice Portal Release 4.1(1)
243
Chapter 6: Configuring and Modifying Unified CVP Security
Securing Communications Between Unified CVP Components