DCE Replacement Strategies

Book description

This IBM Redbooks publication recommends strategies that you can use to replace the Distributed Computing Environment (DCE) dependencies in your environment and move to new technologies. The following topics are covered:
- DCE overview and recap
- Replacement technologies
- Replacement strategies
- Replacement scenarios
- Replacement coding examples

This book is a valuable information source if you are an executive, administrator, or developer of an IBM customer environment that uses IBM DCE for a distributed systems and application infrastructure.

Although strategies for replacing DCE are described, the book does not cover strategies for replacing dependencies to IBM products that use DCE, such as DFS and TXSeries.

Please note that the additional material referenced in the text is not available from IBM.

Table of contents

  1. Tables
  2. Figures
  3. Notices
    1. Trademarks
  4. Preface
    1. The team that wrote this redbook
    2. Become a published author
    3. Comments welcome
  5. Part 1: Description of the DCE replacement strategies
    1. Chapter 1: DCE review
      1. Defining DCE
      2. Who uses DCE
      3. What DCE does (1/2)
      4. What DCE does (2/2)
        1. Threads
        2. RPC
        3. Security core
        4. GSS-API
        5. Directory
        6. Time
        7. Cross component
      5. The DCE environment
      6. Application dependencies on DCE
        1. Direct dependencies
        2. Indirect dependencies
        3. No dependencies
      7. Summary of DCE review
    2. Chapter 2: Replacement technologies
      1. Criteria for selecting the technologies
        1. Compliance with industry standards
        2. Coverage of predominant DCE services
        3. Ease of migration
        4. Similarity to DCE services
        5. Technologies considered strategic
        6. Support of predominant platforms
        7. Support of predominant programming languages
        8. Availability of IBM implementations
      2. Technologies for C/C++ applications (1/3)
      3. Technologies for C/C++ applications (2/3)
      4. Technologies for C/C++ applications (3/3)
        1. aznAPI
        2. CORBA
        3. DCE RPC
        4. DCE UUID
        5. Kerberos
        6. LDAP
        7. Network Time Protocol
        8. Platform auditing
        9. Platform logging and messaging
        10. POSIX 1003.1c threads
        11. Web services
      5. Technologies for Java applications (1/3)
      6. Technologies for Java applications (2/3)
      7. Technologies for Java applications (3/3)
        1. J2EE application environment
        2. Standards for the J2EE
        3. DCE services that can be replaced by J2EE
        4. IBM implementation of J2EE: WebSphere Application Server
        5. Additional information on IBM WebSphere Application Server
      8. Summary
    3. Chapter 3: Replacement strategies
      1. Replacement strategies for C/C++ applications (1/4)
      2. Replacement strategies for C/C++ applications (2/4)
      3. Replacement strategies for C/C++ applications (3/4)
      4. Replacement strategies for C/C++ applications (4/4)
        1. Auditing
        2. Authentication
        3. Authorization, PAC, and UUID
        4. Backing store
        5. Configuration
        6. Delegation, GSS-API, and login
        7. Directory
        8. Extended Registry Attributes
        9. Event management
        10. GSS-API
        11. Host management
        12. Integrated login
        13. Login
        14. Messaging
        15. PAC
        16. Password strength
        17. Protection
        18. Registry
        19. RPC services
        20. Serviceability
        21. Threads
        22. Time
        23. UUID
      5. Replacement strategy for Java applications
        1. Determining a new architecture
        2. Revising the application environment for the new architecture
        3. Rewriting the DCE applications to the new architecture
      6. Replacement strategies for mixed applications
        1. CORBA interoperability
        2. Java Native Interface
        3. JCA and JNI
    4. Chapter 4: Using DCE data with IBM Network Authentication Service
      1. Introduction
      2. Migrating DCE data to an LDAP directory
      3. Configuring IBM Network Authentication Service
      4. Managing the data in a shared environment
      5. Removing DCE-specific data
      6. Details about shared data
      7. Details about non-shared data
    5. Chapter 5: Using DCE objects with IBM Tivoli Access Manager
      1. Introduction
      2. Data representation
      3. Configuration scenarios
        1. Scenario 1
        2. Scenario 2
        3. Scenario 3
      4. Managing objects in a shared environment (1/2)
      5. Managing objects in a shared environment (2/2)
        1. Creating a user with IBM Tivoli Access Manager
        2. Creating a group with IBM Tivoli Access Manager
        3. Adding a member to a group using IBM Tivoli Access Manager
        4. Deleting a user using IBM Tivoli Access Manager
        5. Deleting a group using IBM Tivoli Access Manager
        6. Removing a member from an IBM Tivoli Access Manager group
        7. Creating a principal with DCE
        8. Creating a DCE group
        9. Adding a member to a group using DCE
        10. Deleting a user using DCE
        11. Deleting a group using DCE commands
        12. Removing a member from a group with DCE commands
        13. Sharing policies
        14. Attaching a DCE policy
        15. Deleting a shared DCE policy
    6. Chapter 6: Binary structure of DCE ERA data in LDAP
      1. Recap: The DCE to LDAP migration process
      2. Reading binary DCE ERA data in LDAP
  6. Part 2: Replacement sample scenarios
    1. Chapter 7: Common replacement considerations
      1. How to read the example scenarios
      2. Common assumptions in the sample scenarios
      3. Simplifications in the sample scenarios
      4. Security considerations
      5. Performance considerations
      6. Using an LDAP directory
        1. LDAP security considerations
        2. Availability and performance considerations
      7. SSL implementation hints (1/2)
      8. SSL implementation hints (2/2)
        1. SSL and TLS overview
        2. Uses of SSL
        3. Using SSL in the replacement scenarios
        4. IBM GSKit
        5. Authentication with certificates
        6. Using self-signed certificates
        7. Using certificates from a Certificate Authority (CA)
        8. Additional hints and considerations
    2. Chapter 8: Scenario 1: GSS-API application
      1. Scenario description
        1. Initial application with DCE dependencies
        2. Revised application without DCE dependencies
      2. DCE application (1/2)
      3. DCE application (2/2)
        1. Configuring and running the DCE application
        2. Application client
        3. Application server
      4. Replacement roadmap (1/3)
      5. Replacement roadmap (2/3)
      6. Replacement roadmap (3/3)
        1. Software requirements
        2. Migration of DCE security registry to IBM Directory Server
        3. Configuring IBM Network Authentication Service
        4. Configuring IBM Tivoli Access Manager
        5. Configuring the Windows Kerberos client
        6. Revising the application
        7. Cleaning up the DCE related information in the IBM Directory
      7. Revised application discussion
        1. Configuring and running the revised application
        2. Application client
        3. Application server
      8. Administration considerations and interfaces (1/3)
      9. Administration considerations and interfaces (2/3)
      10. Administration considerations and interfaces (3/3)
        1. Administration during the migration process
        2. Administration after the migration process
        3. IBM Network Authentication Service administration interface
        4. IBM Tivoli Access Manager administration interface
      11. Discussion and conclusions
    3. Chapter 9: Scenario 2: Non-secure RPC application
      1. Scenario description
        1. Initial application with DCE dependencies
        2. Revised application without DCE dependencies
      2. DCE application
        1. Configuring and running the DCE application
        2. Application client
        3. Application server
      3. Replacement roadmap
        1. Software requirements
        2. Installing and configuring WebSphere Application Server
        3. Revising the application
        4. Removing DCE
      4. Revised application discussion (1/3)
      5. Revised application discussion (2/3)
      6. Revised application discussion (3/3)
        1. Building, configuring, and running the revised application
        2. CORBA IDL file
        3. Application client
        4. Application server
      7. Administration considerations and interfaces
      8. Discussion and conclusions
    4. Chapter 10: Scenario 3: Secure RPC application #1
      1. Scenario description (1/2)
      2. Scenario description (2/2)
        1. Initial application with DCE dependencies
        2. Revised application without DCE dependencies
      3. DCE application (1/2)
      4. DCE application (2/2)
        1. Configuring and running the DCE application
        2. Application interface definition
        3. Application client
        4. Application server
      5. Replacement roadmap (1/4)
      6. Replacement roadmap (2/4)
      7. Replacement roadmap (3/4)
      8. Replacement roadmap (4/4)
        1. Software requirements
        2. Installing and configuring IBM WebSphere Application Server
        3. Configuring WebSphere Application Server security
        4. Configuring the application client
        5. Developing the application
        6. Configuring IBM Directory Server
        7. Assembling the scenario application
        8. Deploying and starting the application
        9. Running the application client
      9. Revised application discussion (1/3)
      10. Revised application discussion (2/3)
      11. Revised application discussion (3/3)
        1. Enterprise bean wrappers
        2. CORBA IDL file
        3. Application client
        4. Application server
        5. Java Native Interface
        6. J2EE Connector Architecture
      12. Administration considerations and interfaces
      13. Discussion and conclusions
    5. Chapter 11: Scenario 4: Secure RPC application #2
      1. Scenario description
        1. Initial application with DCE dependencies
        2. Revised application without DCE dependencies
      2. DCE application
      3. Replacement roadmap
        1. Software requirements
        2. Installing and configuring IBM WebSphere Application Server
        3. Configuring WebSphere Application Server security
        4. Configuring the application client
        5. Developing the application
        6. Configuring IBM Directory Server
        7. Assembling the scenario application
        8. Deploying and starting the application
        9. Running the application client
      4. Revised application discussion
        1. Application client
        2. Application server
      5. Administration considerations and interfaces
      6. Discussion and conclusions
  7. Part 3: Appendixes
    1. Appendix A: Scenario 1: Source code listings
      1. Application with DCE dependencies
      2. Makefile for application client
      3. Makefile for application server
      4. DCE dependent application client (1/2)
      5. DCE dependent application client (2/2)
      6. DCE dependent application server
      7. Authorization module with DCE dependencies
      8. Utility source of the DCE dependent application
      9. Header file for utility source
      10. Revised application without DCE dependencies
      11. Makefile for application client
      12. Makefile for application server
      13. Revised application client
      14. Revised application server
      15. Authorization module using aznAPI
      16. Utility source of the revised application (1/2)
      17. Utility source of the revised application (2/2)
      18. Header file for utility source
      19. Application configuration file (1/3)
      20. Application configuration file (2/3)
      21. Application configuration file (3/3)
    2. Appendix B: Scenario 2: Source code listings
      1. Application with DCE dependencies
      2. Makefile for the AIX platform
      3. Makefile for the Windows platform
      4. IDL source
      5. DCE dependent application client
      6. DCE dependent application server
      7. Application server logic
      8. Revised application without DCE dependencies
      9. Makefile for the AIX platform
      10. Makefile for the Windows platform
      11. CORBA IDL file
      12. Header file for C wrapper functions
      13. C++ client for the revised application
      14. C client for the revised application
      15. Header file for CORBA servant
      16. Servant implemention
      17. Revised application server (1/2)
      18. Revised application server (2/2)
      19. Revised application logic
      20. Properties file for client
      21. Properties file for server
    3. Appendix C: Scenario 3: Source code listings
      1. Application with DCE dependencies
      2. Makefile for the AIX platform
      3. Makefile for the Windows platform
      4. IDL source
      5. DCE dependent application client
      6. DCE dependent application server (1/2)
      7. DCE dependent application server (2/2)
      8. Application server manager
      9. Application server logic header
      10. Application server logic
      11. Common error handling
      12. Revised application without DCE dependencies
      13. JNI connection
      14. JNI connection factory class
      15. JNI connection manager
      16. JNI managed connection
      17. JNI connection meta data
      18. JNI managed connection factory interface
      19. JNI managed connection meta data
      20. JNI resource adapter meta data
      21. Enterprise bean wrapper
      22. Enterprise bean remote interface
      23. Enterprise bean home interface
      24. Deployment descriptor for the application
      25. Deployment descriptor for the enterprise bean
      26. Deployment descriptor for the resource adapter
      27. “C” application server
      28. JNI wrapper for the application server
      29. Header file for application server
      30. CORBA C++ client
      31. Properties file for CORBA C++ client
    4. Appendix D: Scenario 4: Source code listings
      1. Application with DCE dependencies
      2. Revised application without DCE dependencies
      3. Build script to create class and jar files
      4. Java client program
      5. Java stateless session bean
      6. Java EJB home interface
      7. Java EJB remote interface
      8. Java application exception
      9. EJB deployment descriptor
      10. Application client deployment descriptor
      11. Application deployment descriptor
      12. Application client security properties
    5. Appendix E: Additional material
      1. Locating the Web material
      2. Using the Web material
      3. System requirements for downloading the Web material
      4. How to use the Web material
  8. Abbreviations and acronyms
  9. Related publications
    1. IBM Redbooks
    2. Other publications
    3. Online resources
    4. How to get IBM Redbooks
  10. Index (1/3)
  11. Index (2/3)
  12. Index (3/3)
  13. Back cover

Product information

  • Title: DCE Replacement Strategies
  • Author(s): Heinz Johner, Jakob Erber, Stephen Hawkins, Klaus Mueller, Pallavi Nagesha Rao, Donna Skibbie
  • Release date: June 2003
  • Publisher(s): IBM Redbooks
  • ISBN: None