Use this procedure for either a queue manager or an IBM® MQ MQI
client to receive a personal certificate to your
cryptographic hardware.
Procedure
- To receive a personal certificate using the strmqikm (iKeyman) user
interface, complete the following steps:
- Complete the steps to work with your cryptographic hardware. See Managing certificates on PKCS #11 hardware.
- Click Receive. The Receive Certificate from a File window
opens.
- Type the certificate file name and location for the new personal certificate, or click
Browse to select the name and location.
- Click OK. If you already have a personal certificate in your
key database a window opens, asking if you want to set the key you are adding as the default key in
the database.
- Click Yes or No. The Enter a Label
window opens.
- Click OK. The Personal Certificates list
shows the label of the new personal certificate you added. This label is formed by adding the
cryptographic token label before the label you supplied.
- To receive a personal certificate using the runmqakm (GSKCapiCmd)
command, complete the following steps:
- Open a command window that is configured for your environment.
- Receive the personal certificate by using the runmqakm (GSKCapiCmd)
command:
runmqakm -cert -receive -file filename -crypto module_name
-tokenlabel hardware_token -pw hardware_password
-format cert_format -fips
-secondaryDB filename -secondaryDBpw password
where:
- -file filename
- Specifies the fully qualified file name of the file containing the personal certificate.
- -crypto module_name
- Specifies the fully qualified name of the PKCS #11 library supplied with the cryptographic
hardware.
- -tokenlabel hardware_token
- Specifies the PKCS #11 cryptographic device token label.
- -pw hardware_password
- Specifies the password for access to the cryptographic hardware.
- -format cert_format
- Specifies the format of the certificate. The value can be ascii for
Base64-encoded ASCII or binary for binary DER data. The default is ASCII.
- -fips
- Specifies that the command is run in FIPS mode. When in FIPS mode, the IBM Crypto for C (ICC) component uses
algorithms that are FIPS 140-2 validated. If the ICC component does not initialize in FIPS mode, the
runmqakm command fails.
- -secondaryDB filename
- Specifies the fully qualified file name of the CMS key database.
- -secondaryDBpw password
- Specifies the password for the CMS key database.