Installation Guides
Kron PAM 3.7.* Mobile App Serv...
The steps for Kron PAM Server (within the Secure Zone)
the configurations for kron pam server · all required pam services (including auth ) should be actively working on 10 10 0 1 · on the system configuration man page of the kron pam gui, mobile tomcat url should be set with kron pam mobile app server’s info (e g , https // 10 10 0 2 10 10 0 2 9443/mobile api/rest ) · the following jobs related to push notification system should be defined on the kron pam gui scpolicynotifierjob , sendpushmessagejob · using the rsa key pair created with the aioc alias, the environment configurations (kron commons config) in the docker container on the kron pam server can be accessed by the kron pam mobile app server for this, instead of using the customer's existing key pair, a self signed certificate is used this rsa key pair is stored in different formats and keystore files (pkcs#12 and jks) but with the same alias ( aioc ) the jks and p12 files located at /pam/docker mgmt/cert should be recreated with keytool commands, in this scenario (if the kron pam server and kron pam mobile app server are installed on the same server, these files should stand as is) listing the certificates’ configurations jks sudo keytool list v keystore /pam/docker mgmt/cert/aioc jks storepass krondev10 p12 sudo keytool list v keystore /pam/docker mgmt/cert/aioc p12 storepass krondev10 storetype pkcs12 deleting the certificates’ configurations jks sudo keytool delete alias aioc keystore /pam/docker mgmt/cert/aioc jks storepass krondev10 p12 sudo keytool delete alias aioc keystore /pam/docker mgmt/cert/aioc p12 storepass krondev10 deleting the certificate files jks rm rf /pam/docker mgmt/cert/aioc jks p12 rm rf /pam/docker mgmt/cert/aioc p12 creating the certificate files and configurations jks sudo keytool \ genkeypair alias aioc keyalg rsa keysize 2048 \ dname "cn=localhost,ou=kron,o=kron,c=tr" \ ext "san\ c=dns\ localhost,dns\ kron commons alfred,dns\ kron commons auth,dns\ kron commons license,dns\ kron commons network,dns\ kron commons notification,dns\ kron commons config,ip 127 0 0 1,ip 10 10 0 1 ,ip 10 10 0 2 10 10 0 2 " \ storepass krondev10 keypass krondev10 keystore /pam/docker mgmt/cert/aioc jks validity 3650 p12 sudo keytool \ genkeypair alias aioc keyalg rsa keysize 2048 \ storetype pkcs12 dname "cn=localhost,ou=kron,o=kron,c=tr" \ ext "san\ c=dns\ localhost,dns\ kron commons alfred,dns\ kron commons auth,dns\ kron commons license,dns\ kron commons network,dns\ kron commons notification,dns\ kron commons config,ip 127 0 0 1,ip 10 10 0 1 ,ip 10 10 0 2 10 10 0 2 " \ storepass krondev10 keypass krondev10 keystore /pam/docker mgmt/cert/aioc p12 validity 3650 · the following keytool command should be executed to import certificate yes | sudo keytool \ importkeystore srckeystore /pam/docker mgmt/cert/ aioc jks srcstorepass krondev10 destkeystore /pam/docker mgmt/cert/ aioc p12 deststoretype pkcs12 storepass krondev10 · the ownership and mode configurations should be changed for these files sudo chown pamuser\ pam group /pam/docker mgmt/cert/ aioc jks /pam/docker mgmt/cert/ aioc p12 · lastly, all of the docker services on the kron pam server should be restarted (down & up) docker compose down docker compose up d