![[AIX]](ngaix.gif)
![[MQ 9.4.0 Jun 2024]](ng940.gif)
runqmcred (protect authentication token keystore password)
Use the runqmcred command to encrypt the password for the queue manager key repository that contains the trusted authentication token issuer's public key certificates or symmetric keys.
Purpose
The runqmcred command is used to encrypt the queue manager authentication token key repository. The authentication token key repository contains the public key certificates or symmetric keys for trusted authentication token issuers. The path to the key repository and the file that contains the encrypted password are specified in the AuthToken stanza in the qm.ini file. The queue manager uses the information in the AuthToken stanza to verify that the token that an application provides for authentication purposes is issued by a trusted issuer.
The key repository password must be encrypted as it is not secure to store plain text passwords. Copy the encrypted password that is returned by the runqmcred command into a file, and include the path to the file in the KeyStorePwdFile attribute of the AuthToken stanza in the qm.ini file.
Syntax
Optional parameters
- -sf keyfile
- Path to a file that contains the initial key that is used to encrypt the password. Create this file that contains the initial key before you run the runqmcred command. The same initial key must be specified in the queue manager INITKEY attribute. The file must contain a single line of at least one character.
-sm- Encrypts passwords using a FIPS compliant cryptographic library.
Examples
The following example encrypts the authentication token key repository password with the initial key that you provide.
runqmcred -sf /home/initial.key5724-H72 (C) Copyright IBM Corp. 1994, 2026.
Enter password:
*************
<QM>!2!UnH/9hRXEGA0cenLVSGCW9a0s5A2vHDkTiA7vRv8ogc=!yhlsHFw7MIh48SvaYeTwRQ==runqmcred5724-H72 (C) Copyright IBM Corp. 1994, 2026.
Credentials are encrypted using the default encryption key. For more secure
protection of stored credentials, use a custom, strong encryption key.
Enter password:
*************
<QM>!2!b5rb01sMzFzc1ClZeQMryruWFM3HSm8DKyEaZK7qzWY=!TrWdU57DCDXM0Qah99I/Lg==Return codes
- 0
- Command completed successfully.
- 1
- Command completed unsuccessfully.
