If your IBM
® deployment uses SSL encryption when communicating with the LDAP server, you can additionally choose to encrypt the UserInfo servlet.
Before you begin
You must have created a keystore .jks file on the IBM Sametime
Community Server, which stores a copy of the IBM Lotus
® server's SSL certificate.
About this task
This configuration is necessary to enable the Business Card feature when you have chosen to encrypt all data transmitted between the Sametime
server and the LDAP server, where the Business Card data is stored.
- Open a command prompt and navigate to the following directory:
Open the UserInfoConfig.xml file in an editor and make the following changes:
- IBM AIX®, IBM i, Linux™, Solaris: the Sametime server's data directory
- Windows™: the Sametime server's installation directory
Save and close the file
Restart the Sametime Community Server.
- Locate the <ReadStConfigUpdates> tag and set to value="true". If this statement is not in the file, you do not need to add it.
The statement should look like this:
- Locate the <StorageDetails> tag and set the following values:
Use the value of the port that your LDAP server listens on for SSL communications (the default is port 636).
- In the <SslProperties> tag, set the following values:
- KeyStorePath indicates the path to where the keystore database is stored.
On Windows and IBM i, the file is named stkeys.jks; on AIX, Linux, and Solaris, the file is named keys.jks.
- KeyStorePassword indicates the password you created for accessing the keystore database.
Parent topic: Enabling encryption between Sametime and the LDAP server
Previous topic: Modifying the LDAP server configuration for SSL
Creating a keystore file for the Domino server’s SSL certificate