Installing the Agent for Java EE/JMX (IBM WebSphere) with RMI Connector

This page guides you through the installation of an agent in an AE system in which authentication is not used. Additional installation steps are required before the agent can be started and used if you intend to use one of the available authentication methods. For more information, see Agent Authentication.

Tip! This page refers only to the manual installation process. If you want instructions on how to install a containerized Java agent, see Installing Containerized Java Agents.

This page includes the following:

Connecting to the Automation Engine

The Automation Engine and the Windows, UNIX, and Java Agents communicate using TLS/SSL. These agents establish a connection with the Java communication process (JCP), which uses trusted certificates to prove their identity to other communication partners.

Important! Make sure you are familiar with the TLS/SSL and certificate implementation before installing and/or upgrading the respective component. For more information, see:

When you used certificates signed by a CA, the certificates are stored in the respective Java or OS store by default; that is the Java trust store for Java components and Java Agents, the Windows OS store for Windows Agents, or the TLS/SSL store for UNIX Agents. In this case, you only have to check that the root certificates already are in the respective store.

If the relevant certificates are not there and you want to import them, you can use OS or Java specific tools for that purpose, such as Keytool, cert-manager, OpenSSL and such. For more information on how to use those tools, please refer to the respective product documentation.

If you do not want to use the default locations for the components and Agents listed above, make sure you use the trustedCertFolder=, agentSecurityFolder=, and keyPassword= parameters (if applicable) in the respective configuration (INI) file to define the path to the folder where the trusted certificates are stored.

Important! TLS/SSL Agents (in containers and on-premises) as well as the TLS Gateway, when used for the Automic Automation Kubernetes Edition, establish a connection to an ingress / HTTPS load balancer, which requires a certificate for authentication.

Make sure that address of the load balancer is defined on both sides: the Automation Engine and the Agent / TLS Gateway and that your HTTPS load balancer has the required certificates in place. For more information, see Connecting to AWI, the JCP and REST Processes Using an Ingress.

Installing the Agent for Java EE/JMX (IBM WebSphere) with RMI Connector

  1. On the host, set up the Agent.

    • On the WebSphere interface, select the Applications > Install New Application

    • Specify the path to ucxjjmx.war in Local File System. You can use Context root can be used to name the application.

    • Optionally, use the next window to activate the option Generate Default Bindings and define other settings.

    • Follow the installation procedure as described. In step 4, select the option Everyone? next to administrators.

    • When all six steps are complete, complete the installation procedure by clicking Finish. Refer to the log to verify that the installation was successful.

    • Select Save to Master Configuration and click Save.

    • Select Applications > Enterprise Applications. The list now includes the agent. Activate it by clicking the Activate button.

    • The agent can be started via the configuration WebInterface.

  2. On the host, use the configuration WebInterface .

    • The JMX agent has a configuration web interface that can be called with a Web browser using the following address: http://Server name:port/context root. For more information, see Web Configuration Interface for the Java EE/JMX Agent.

    • Adjust the JMX agent settings to your system environment. The most important settings are:

      • Name of the agent

      • Name of the computer on which the Java communication process is available

      • Port number of the Java communication process

      Note: the configuration file will be overwritten when you deploy the WAR file again. As a result you will have to redefine your configuration settings. Instead, you can also save a copy of your configuration file (INI file) before you start the deployment and copy it to the folder that includes the web application after the deployment has taken place.

    • When you used certificates signed by a CA, the certificates are stored in the respective Java or OS store by default. In this case, you only have to check that the root certificates already are in the respective store.

      If you do not want to use the default location for this component, make sure you use the trustedCertFolder=, agentSecurityFolder=, and keyPassword= parameters (if applicable) in the respective configuration (INI) file to define the path to the folder where the trusted certificates are stored.

      For more information, see Securing Connections to the AE (TLS/SSL).

  3. On the host, before creating jobs, consider the following issues:

    • Select Remote Java VM in the Job object's JMX tab

    • Enter the term websphere in the field Initial Context Factory

    • Specify the WebLogic Server for the server URL using the Host name of the WebSphere:port of BOOTSTRAP_ADDRESS format

    • Retrieve the port number. To do so, log on to the administrator console and select Servers > Applications servers. Select the name of your server and select Communications > Ports. The table contains the entry BOOTSTRAP_ADDRESS. Use the port number shown in the URL.

See also: