Tom Bosmans 5 October 2016 14:20:13
During installation of CCM with Connections 5.5 using Oracle RAC cluster by my colleagues, they ran in to a number of problems and got the environment in a completely broken state.
The core problem is that FileNet does not support the modern syntax for jdbc datasources. This technote explains what to do. http://www-01.ibm.com/support/docview.wss?uid=swg21978233
That is simple enough .
However , my colleagues continued on a detour, where they also changed the ConnectionsAdmin password. That created a bunch of problems on it's own.
It turns out that the Connections 5.5 documentation is incomplete on where to change the occurences of the Connections Admin user and/or password.
The CCM installer mostly uses the correct source for the username / password (the variables you enter in the installation wizard or the silent responsefile).
But the script to configure the GCD datasources , for some reason uses a DIFFERENT administrator user.
It goes back to look at the connectionsAdminPassword variable that's stored in the cfg.py file, in your Connections directory (eg. /data/Connections/cfg.py )
So when you change the password for the Connections Administrator, don't forget to update it in the cfg.py file as well , before running the CCM installation.
In the end, this took me over 1/2 day to resolve, also because the guys working on it enabled all traces they could find so I also ran into an out-of-diskspace exception ..... , but mostly because the installation process for CCM is slow.
Tom Bosmans 28 September 2016 10:27:37
After deploying Connections 5.0 CR4, the business cards and photo's integration in Sametime chat (the webbrowser version) suddenly stopped working.
The problem is more pronounced in Internet Explorer.
The photo doesn't load, nor does the business card information (the phonenumber, email address) . See the screenshot below :
In the traces in the browser, it is clear that there's a HTTP 403 error (forbidden) on this call :
It wasn't very high on my priority list, but I've not found out what the problem is (thanks to IBM Support).
Apparently, in CR4, something changed in the profiles-config.xml configuration :
is changed from true to false.
So the solution is simple, change this back from false to true , sync the nodes , and restart the server(s) that contains your Profiles application.
Optional security setting for Profiles javelin card. This setting is to disallow JSONP security.
Older 3rd party software may will not work with this setting unless they include a reverse proxy.
All of the Connections application will work with JSONP disabled.
--> <allowJsonpJavelin enabled="true"/>
Tom Bosmans 16 June 2016 15:36:39
The Stellent code that handles extracting content from the files in Connections , relies on an old version of libstdc++.so .
It relies on
While for instance on SLES 12, this is replaced with
It may not be immediately apparent that this is the problem.
If you use ExportTest.sh , you get a java error, which can throw you off. So use the "exporter" directly, when in doubt.
Check this older blog post, that is about the same problem (but then in Sametime).
Installation of Sametime Meeting Server
It also explains how to verify your search indexing settings.
Tom Bosmans 8 June 2016 11:06:37
When creating a simple bash script (actually, scripts for installing Connections using Puppet, but that's a different story), that would need to check if the Deployment Manager is running, I ran into the following problem :
The serverStatus.sh script always returns "0" as status code, even if the server is stopped. So it's a bit useless in bash scripting, where normally I'd rely on the return code by a script to determine if it ran successfully. So "$?" equals 0 when the script ran successfully and not equal "0" when something went wrong.
But like I said already , serverStatus.sh ALWAYS returns "0".
There's more problems with the serverStatus.sh command, for one, it takes a (relatively ) long time to execute.
Anyway, another way to check if the dmgr is running , is by using "grep" . Note that there's differences in the options on the different flavors of Unix and Linux, but that is not the scope of this post. I'm also not discussing the best practices, that you should look for process id's , and not rely on text ...
What is important, is that you use the "wide" option (so you see the full java command that is used to start the jvm).
On SLES :
ps -ef | grep dmgr
On Red hat :
ps -wwwef | grep dmgr
Now there's an annoying problem : this will return (if dmgr is running) 2 processes , the process of the dmgr, but also the grep command itself.
There's a trick for that - I found it here : http://www.ibm.com/developerworks/library/l-keyc3/#code10
Basically, to get around that, make the grep expression a regex. This will avoid that the grep command itself shows up :
ps -ef | grep "[d]mgr"
This will only show the process we're interested in.
So now we have a nice , correct variable we can use to determine the Dmgr (or any other WebSphere server, for that matter) is running.
If the Dmgr is running,
ps -ef | grep "[d]mgr"
and if it's not running :
ps -ef | grep "[d]mgr"
Tom Bosmans 27 May 2016 14:04:18
Let's encrypt your Domino http server - Part 2
In the mean time, since my post, things are changing in the Let's Encrypt world - they're officially out of beta (https://letsencrypt.org/2016/04/12/leaving-beta-new-sponsors.html
) and there's name changes (pending). Tooling has evolved as well (https://www.eff.org/deeplinks/2016/05/announcing-certbot-new-tls-robot
That is however not the scope of this update to my original post here
Let's encrypt tls certificate in Domino
There's a slightly annoying thing with the certificates delivered by Let's Encrypt, they are only valid for 3 months. So you have to renew them every 3 months .
I've done that manually so far, but obviously automating this is the better option. Wouldn't it be nice if this all went automatically :-)
So based on the previous post, this is a follow-up, on how to renew your certificates in Domino .
Update your tooling
Update your Letsencrypt client tooling to Certbot.
Get it here and follwo the instructions based on your OS.
Certbot continues to use the configuration directories created earlier, so no worries there.
Check if your certificates require updating
The certbot-auto tool checks your certificates and decides if it's necessary to update them.
Note that if to run certbot to just check that your certificates require updating, it's not necessary to stop the http server !
Check the output, to see if it's necessary to update. There's no need to continue if the certiticates don't require updating .
Update your certificates
To actually update your certificates, you need to stop the http server.
To renew, the http server on Domino needs to be stopped. You can do that using the pre-hook option :
./certbot-auto renew --pre-hook "su - notes -c \"/opt/ibm/domino/bin/server -c 'tell http quit'\""
This update the certifcates in your store.
Copy the certificates
Now copy these renewed certificates to a temporary location (because the kyrtool cannot process the certificates directly from the /etc/letsencrypt/live/... location.
cp /etc/letsencrypt/live//cert.pem /tmp/cert.pem
cp /etc/letsencrypt/live//fullchain.pem /tmp/fullchain.pem
cp /etc/letsencrypt/live/ /tmp/privkey.pem
Update the certificates in the Domino keyring
Run the kyrtool command against the Keyring you configured in the Domino SSL configuration. Check the previous post about this :
Let's encrypt tls certificate in Domino
su - notes -c "/opt/ibm/domino/bin/tools/startup kyrtool =/local/notesdata/notes.ini import roots -k /local/notesdata/keyring2.kyr -i /tmp/fullchain.pem"
su - notes -c "/opt/ibm/domino/bin/tools/startup kyrtool =/local/notesdata/notes.ini import keys -k /local/notesdata/keyring2.kyr -i /tmp/privkey.pem"
su - notes -c "/opt/ibm/domino/bin/tools/startup kyrtool =/local/notesdata/notes.ini import certs -k /local/notesdata/keyring2.kyr -i /tmp/cert.pem"
Remove the certificate file in tmp !
Restart the http server
Restart the http server in Domino, and the updated certificate is now available in the browser.
su - notes -c "/opt/ibm/domino/bin/server -c 'load http'"
Note that if you use this method on a Domino server running extensions (eg. a Traveler server, a Sametime server) you likely have to restart more tasks than just http.
Here's a sample script putting it all together.
This script is a sample you can use and adapt.
The guys at certbot recommend to check for updates 2 times a day - to cater for certificate redraws from Certbot .
I've scheduled it once every 2 days, using crontab.
This script relies on the certbot-auto tool to fail, when actually updating the certificate from Letsencrypt. In that case, it will stop the HTTP server running, and copy the certificates so the kyrtool can import them.
Update on chaining problems
After renewing my certificates, I ran into problems - specifically the mobile browser (on Android) did not accept the certificate anymore. Verifying the SSL configurattion using SSL Labs, I was surprised to only receive a "B" .
After googling a little bit , I came to the conclusion that there's changes in the certificate chain , and that these apparently are not reflected in the fullchain.pem.
Using SSL Lab (https://www.ssllabs.com/ssltest/
) - (SSL Labs provides "deep analysis of the configuration of any SSL web server on the public Internet ") you can see if you reach at least "A" .
If you don't have an A, most likely you run into the chaining problem I encountered : you need to have "none" chain issues , and the X3 certificate needs to be sent by server as well.
In my case (when there were chaining issues), this complained about a missing "Let's Encrypt Authority X3". I've verified the stores, and they still used the X1 Authority.
Manually updating trusts
So... it appears to me that the fullchain.pem does not contain the correct (new) chain, or that the kyrtool does not import it correctly.
Anyway, I've manually updated the trusts , by downloading the new X3 and X4 certificates from here https://letsencrypt.org/certificates/
Download the X3 and X4 certificates, to a temporary location on your server (eg. /tmp)
Import these into your keyring :
su - notes -c "/opt/ibm/domino/bin/tools/startup kyrtool =/local/notesdata/notes.ini import roots -k /local/notesdata/keyring2.kyr -i /tmp/lets-encrypt-x3-cross-signed.pem"
su - notes -c "/opt/ibm/domino/bin/tools/startup kyrtool =/local/notesdata/notes.ini import roots -k /local/notesdata/keyring2.kyr -i /tmp/lets-encrypt-x4-cross-signed.pem"
You can check the certificates and the trusted roots :
su - notes -c "/opt/ibm/domino/bin/tools/startup kyrtool =/local/notesdata/notes.ini show certs -k /local/notesdata/keyring2.kyr"
su - notes -c "/opt/ibm/domino/bin/tools/startup kyrtool =/local/notesdata/notes.ini show roots -k /local/notesdata/keyring2.kyr"
Restart the HTTP server, and everything is OK.
I expect that this problem will be resolved at some time in the future, so this manual steps is no longer necessary, but for now, this works.
Tom Bosmans 20 April 2016 21:53:09
There is no point in allowing Basic Authentication in environments where users don't have passwords , for instance when there's single sign on set up with SPNEGO .
Connections (like most IBM products) then relies on LTPA tokens for authentication.
Also, in these enterprise environments, you would generally secure the applications (meaning : using the J2EE roles in all applications in Connections, to not allow anonymous access (everywhere where it says "Everyone", use "All Authenticated users" instead).
The challenge in this scenario is that SOME uri's in that scenario , will not redirect you to the standard login form (Forms based authentication), but rather pop up the annoying Basic Authentication prompt.
A sample URL that will prompt for BA is for instance https://yourconnectionsserver.com/profiles/atom/profileService.do
... Another is accessing a Profile picture (only if you secured the Profiles application).
When your users use a normal browser to access Connections, you'll hardly ever see a BA prompt, because users would generally not access these url's as the initial call. So they'll already be authenticated by other means.
But it's a different story when you use API access to Connections - for instance to integrate Connections content into an intranet (that does not offer LTPA SSO).
In that case, it's pretty difficult to avoid Basic Authentication prompts popping up, because it's not very easy to catch them in the browser.
So we went with a drastic solution - disable Basic Authentication prompts completely.
The solution does not change the header when it's a Connections server making the connections. Connections , by itself , also uses some Basic Authentication for it's interservice requests. I don't want to mess with these. I don't think this is really necessary (since, again, Basic Authentication is not disabled), but still.
The solution is based on what's written here :
However, that did not exactly work for me: I had to remove the "always" keyword - otherwise the Header edit would not work.
# remove basic auth headers in the response except for the Connections nodes (incl. ccm, fileviewer, etc)
SetEnvIf Remote_Addr ".*" REMOVEBASICAUTH
SetEnvIf Remote_Addr "10\.*|127\..*" !REMOVEBASICAUTH
Header edit WWW-Authenticate ^Basic NGCBasic env=REMOVEBASICAUTH
# end half
So what these 3 lines do :
1. SetEnvIf Remote_Addr ".*" REMOVEBASICAUTH
Set the environment variable for all connections
2. SetEnvIf Remote_Addr "10\.*|127\..*" !REMOVEBASICAUTH
Remove the environment variable based on a regular expression (in this case, all ip addresses starting with 10. , and localhost). This regex should match the IP addresses of all the Connections servers (and FileNet , and FileViewer, and Cognos and ...) - any server that would make calls to Connections .
3. Header edit WWW-Authenticate ^Basic ConnBasic env=REMOVEBASICAUTH
This line edits the WWW-Authenticate header, if it starts with "Basic" , and changes it to something else. The result is, that you would not get a prompt in the browser.
Remark on Mobile access and Desktop plugin
The Mobile Connections application do use Basic Authentication for authenticating, as does the Desktop Plugin.
However, neither one relies on the Basic Authentication prompt working correctly.
Tom Bosmans 4 December 2015 20:35:44
Let's encrypt your Domino http server
"Let's encrypt" (https://letsencrypt.org/
) is a new service that's currently in public beta (since 3rd of december 2015 https://letsencrypt.org/2015/12/03/entering-public-beta.html
Good news, it's free, and it allows you to get certificates from a trusted CA (yes, trusted , they are included in recent Chrome , Firefox and Safari browsers). From their site :
Anyone who owns a domain name can use Let’s Encrypt to obtain a trusted certificate at zero cost.
And even better, you can use it in Domino (at least since Domino 9.0.1FP2 , that adds TLS encryption). So now you have no more reasons to keep running a http only site, you can switch everything to https .
How does it work ? Insanely simple !
If you use Apache, it's even fully automated, but for Domino, you can also generate certificates only, and then import them into the Domino keyring.
This shows how to do it on Linux (I use CentOS 7).
Install the let's encrypt software
You need to install git first, then install the let's encrypt client :
Log in as root, and I executed this from the /root folder :
yum install git
git clone https://github.com/letsencrypt/letsencrypt
Stop your http server
To run Let's encrypt in the "certonly" mode, you need to have a "free" port 80 or 443. So stop the http server on your domino server (or stop the Domino server completely).
Create the certificate
Now run the client
There's a lot more options, but this just focuses on creating a certificate to use in Domino.
The interface opens, with only one option really, a field where you can enter your hostnames.
Note that you need to enter hostnames here , Let's encrypt does not support wildcard certificates for now. You can add multiple hostnames , they will be added as "alternates".
The result is that the pem certificates are created in this directory :
Obviously; it depends on the domain name you entered.
You'll find 4 files.
cert.pem -> ../../archive/gwbasics.be/cert1.pem
chain.pem -> ../../archive/gwbasics.be/chain1.pem
fullchain.pem -> ../../archive/gwbasics.be/fullchain1.pem
privkey.pem -> ../../archive/gwbasics.be/privkey1.pem
You'll need all 4 , in the next steps.
Copy the certificates to a temporary location
You'll need to run the kyrtool in the next steps as the user running your Domino server, so you need to put the .pem files in a location that that user can access.
I copied them to /tmp.
You must remove them afterwards, btw !
Download they kyrtool from FixCentral. You want to get KYRTool_9x_ClientServer .
Extract the zip, and then copy the correct kyrtool file to your Notes program directory, on your server.
cp kyrtool /opt/ibm/domino/notes/latest/linux/
Change the permissions on the file, so it's executable by your notes user.
chmod 755 kyrtool
You can also perform these tasks on an Administrator client - but why bother.
More information here : http://www-10.lotus.com/ldd/dominowiki.nsf/dx/kyrtool
Create a new keyring and import the certificates
Now we create the keyring, and import our certificates that we put in /tmp .
You 'll need to execute the commands as the user that runs your Domino server, in my case, that's "notes".
Note that you can't run kyrtool directly, but you need to run it through the "startup" executable.
su - notes
/opt/ibm/domino/bin/tools/startup kyrtool =/local/notesdata/notes.ini create -k /local/notesdata/keystore2.kyr -p
Now import your root certificate, the keys and the certificate that we got from Let's Encrypt.
/opt/ibm/domino/bin/tools/startup kyrtool =/local/notesdata/notes.ini import roots -k /local/notesdata/keystore2.kyr -i /tmp/fullchain.pem
/opt/ibm/domino/bin/tools/startup kyrtool =/local/notesdata/notes.ini import keys -k /local/notesdata/keystore2.kyr -i /tmp/privkey.pem
/opt/ibm/domino/bin/tools/startup kyrtool =/local/notesdata/notes.ini import certs -k /local/notesdata/keystore2.kyr r -i /tmp/cert.pem
Configure your Sites to use the new keyring
Use a Notes client to go to your Domain's names.nsf. Open the document that configures your SSL security (which can be a server document, or an internet site document).
Obviously, I use Internet Site documents.
The only thing you need to change, is the Key File name. It needs to point to the /local/notesdata/keystore2.kyr you created earlier.
Save and close the document, do the same for the other internet site document (eg. SMTP and LDAP, and other HTTP) and restart http.
The site is now using a secure TLS encryption.
Continued here :
Part 2 - autorenew the certificates
Tom Bosmans 25 September 2015 17:27:27
We started of with Communities in Connections allowing custom themes, but after applying branding, we wanted to disable the custom themes.
The custom themes in Connections Communities 5.0 don't all use the next gen theme yet, so with custom branding, some things look really ugly.
Now when you disable custom themes, but this does not affect existing communities. You can ask your community owners to please reset their themes to default, but you can also do it for them.
Unfortunately, doing this through the API does not work (you can set everything through the API, but in this version 5.0 CR2, setting the theme appears to be broken - we've opened a PMR), so we're left with editing the database directly.
You need to update multiple databases/schema's, not just the Community schema ! Here's what to do :
Of course, don't edit the Connections databases directly, ever .... so use these at your own risk :-) Communities:
UPDATE "SNCOMM"."COMMUNITY" SET COMMUNITY_THEME = 'default' Wikis:
UPDATE "WIKIS"."LIBRARY" SET THEME_NAME = 'default' Blogs:
UPDATE "BLOGS"."WEBSITEASSOC" SET ASSOCTHEME = 'default' Forums:
UPDATE "FORUM"."DF_MEMBERPROFILE" SET THEMEID = 'default' WHERE THEMEID is not null Activities:
UPDATE "ACTIVITIES"."OA_MEMBERPROFILE" SET THEMEID = 'default' WHERE THEMEID is not null
Tom Bosmans 5 May 2015 12:02:06
In a recent project, we struggled with the Cognos installation and configuration for Connections 5.0 Metrics against an Oracle 11 RAC Cluster.
For the installation of Connections components, we can use the Oracle RAC cluster directly (through it's load balanced address), instead of simple database connections (just a database server and port), but for Cognos, this does not work.
The difference is explained here : http://www-01.ibm.com/support/docview.wss?uid=swg21344465
For Oracle database
only the following items are specified in Cognos Configuration to establish the connection.
1) Database server and port number. You can use a fully qualified server name
2) User ID and password. User ID is the Oracle schema to be used for the content store.
3) Service name. This should have the same value as the SERVICE_NAME or SID of the appropriate entry in a valid tnsnames.ora file.
For Oracle database (Advanced) the connection is made using an Oracle Net8 keyword-value pair. The following items need to be specified in Cognos Configuration.
1) User ID and password. User ID is the Oracle schema to be used for the content store.
2) Database specifier. This is the Oracle Net8 keyword-value pair for the connection. It is should be an entire entry from a tnsnames.ora file without the carriage returns. Here is an example:
So our Oracle cluster consists of 2 database servers, and during installation, we configure Cognos to directly connect to 1 of the 2 database servers. After installation, we change the configuration to use the RAC Cluster address, so we have High availability.
This is a trick that we've had to use in the past for installations of Portal and Connections at other clients.
For Cognos, however, this is not properly documented and it had us puzzled for a few months. We actually ran with Cognos configured to 1 of the 2 database servers, and this caused us quite a bit of trouble (as you can imagine).
In the end, my colleague found a solution for this problem by changing the CognoBI/cogstartup.xml file
<crn:parameter name="CM" opaque="true">
<crn:instance name="IBM Cognos Content Store" class="Oracle">
<crn:value xsi:type="cfg:credential" encrypted="true"><password></crn:value>
<crn:parameter name="CM" opaque="true">
<crn:instance name="IBM Cognos Content Store" class="OracleAdvanced">
<crn:value xsi:type="cfg:credential" encrypted="true"><password></crn:value>
Restart Cognos and it's now configured to use the RAC Cluster like it's supposed to.
Tom Bosmans 30 March 2015 14:49:31
If you perform a silent installation of Connections 5 (which of course you do, if you are a professional :-) ), the default NextGen theme is not displayed.
We only noticed this ourselves after performing several client installations ... oops. http://www-01.ibm.com/support/docview.wss?uid=swg21700136