Installing and Configuring the Remote Access Server (RAS)

Introduction to Remote Access Server

The Remote Access servers can be used by Component Enabler to access applications.

The server-side deployment consists of a number of platform-specific Remote Access servers that handle communications between clients and applications. Clients and servers communicate, using RATL protocol running on TCP/IP. This protocol is a simple wrapping of a standardized and extended set of NOF messages that provide all the functionality needed to support GUI forms.

Clients establish normal sessions with applications through the Remote Access servers using a TCP/IP connection. These servers perform a number of checks, such as authenticating users and verifying the application exists, before granting the client access. The servers then receive transaction requests from client programs over a TCP/IP connection and pass them to the application. Transaction responses from applications are passed back to the clients over the same TCP/IP connection. Remote Access servers can also pass back asynchronous messages, such as messages from Reports, to a client application.

Remote Access servers can also use the Microsoft Message Queue (MSMQ) server for connections instead of TCP/IP connections.

The Remote Access servers are designed to offer connectivity, throughput, and transit times comparable to terminal access to the applications on the same host applications. Each client application runs independently of all other clients, with its own connection back to the application server. There are no points of single threading or possible congestion in the transaction path to add overheads or reduce performance.

Installing Remote Access Server

Codefile

The codefile is automatically installed to the CCF system pack.

CCF params file

COMS

Register the entities to COMS via the Utility window with the following file:

       (<ABSUITE usercode>)NGEN28/SAMPLE/COMS/CONFIG/RATL ON <ABSUITE dictionary pack>     

For Big Buffers, set the Maximum Message Text size for Global Activity to 65000.

CCF Configuration

Use the CCF components to configure the server entities as follows:

CCF Component

Entity

Router

PCM

CUCI

Device and Service

TCPIP

Port

RATL

Service, View, Language, MQserver, MQclient, and MQrequest

Router

Identify the server as a PCM to the router and enable it, using the following syntax:

Add PCM <name>
 codefile = <filepath>
Enable PCM <name>

Attributes

Description

<name>

Identifies a valid server name.

<file path>

Specifies the codefile path.

Example:

 Add PCM <name>
  codefile = <filepath>
 Enable PCM <name>

CUCI

As part of the CCF configuration you must configure a:

Connection Device

Configure a device to the CUCI PCM to associate device connection attributes with each dialog. Attributes are assigned using the following syntax:

 Add Device <device name> 
  acvt = <VTname>, 
  ccenable = <boolean>,
  controlcapable = <boolean>, 
  dynamic = <boolean>, 
  marccapable = <boolean>, 
  maxinput = <number>, 
  maxoutput = <number>, 
  messages = <category>, 
  securitycatlist = <name>, 
  ndlheader = <boolean>, 
  screen = <boolean>,
  usage = <category>

Attributes

Description

<device name>

Defines a unique device name.

acvt

Specifies an Application Controller Virtual Terminal. This is the virtual terminal COMS expects the client to be using on input.

This attribute is optional.

<VT name> must be set to either Transparent or Default.

ccenable

Indicates if control character processing is enabled.

This attribute is optional.

This attribute can only be set to False.

controlcapable

Indicates if control commands can be entered or not.

This attribute is optional.

This attribute can only be set to False.

dynamic

Indicates if the connection is to be kept by COMS when the connection terminates.

This attribute is optional.

marccapable

Indicates if the connection can handle screen output from MARC.

This attribute must be set to True if you are to use the RATL Services attribute MARCOpenText.

maxinput

Specifies the maximum number of bytes in an input message. For Big Buffer Ispecs, this must be set to 45300 (65000 for Big Buffer Ispecs not using POF).

<number> must be a minimum of 2500.

maxoutput

Specifies the maximum number of bytes in an output message. For Big Buffer Ispecs, this must be set to 45300 (65000 for Big Buffer Ispecs not using POF).

<number> must be a minimum of 2500.

messages

Determines whether application messages are displayed at the client.

<category> must be set to None.

securitycatlist

Specifies a COMS Security Category List configuration entity that is defined in COMS. When set, the value of this attribute is the default value used when connecting to COMS. It can be overridden by the service attributes of NOFidentity.

This attribute is optional.

ndlheader

This attribute is optional.

This attribute can only be set to False.

screen

Indicates whether the client is a screen device.

This attribute is optional.

This attribute can only be set to False.

usage

Identifies whether the client can receive input messages, send output messages, or both.

<category> must be set to one of In, Out, or IO.

The recommended value is IO, so that the client can both send and receive messages.

Example

 Add Device RATLweb
  acvt = transparent, 
  ccenable = false, 
  controlcapable = false, 
  dynamic = true, 
  marccapable = false, 
  maxinput = 10000, 
  maxoutput = 10000, 
  messages = none, 
  securitycatlist = SCL_NOF, 
  ndlheader = false,
  screen = false, 
  usage = IO

Connection Service

Configure a service to the CUCI PCM to associate device connection attributes and to identify the connection path for each dialog. Attributes can be assigned using the following syntax:

 Add Service RATLon
  closeaction = <number>, 
  device = <name>, 
  logoffdisconnect = <boolean>,
   dynamic = <boolean>
 Enable Service RATLon

Attribute

Description

closeaction

The SYSTEM/COMS Close Action as defined on the SYSTEM/COMS Usercode menu. The close action is also defined on the Station menu of the COMS Utility.

You must enter a value in the range 1 to 4.

Note: If the dynamic attribute is set to True, the action is that of the DefaultStation definition in COMS.

device

You must provide a CUCI Device Name. This does not need to be a valid SYSTEM/COMS Device name.

dynamic

Indicates if the connection is to be kept by COMS.

This attribute is optional. Allowed values are:

  • True, the connection is not kept by COMS

  • False, the connection is kept by COMS.

logoffdisconnect

Indicates whether the session is automatically logged off when the connection is terminated.

This attribute must be set to True.

Example

 Add Service RATLon 
  closeaction = 3, 
  device = ratlweb, 
  logoffdisconnect = true
 Enable Service RATLon

Note: For services, the service name associated with the declared service is the name of the next service in the connection path

TCPIP Port

Define a port to the TCPIP PCM to associate port attributes for the dialogs. Attributes can be assigned using the following syntax:

 Add Port <port name> 
  stationname = <name>, 
  checkinterval = <number>, 
  device = <name>,
  framing = <category>, 
  maxoffer = <number>, 
  maxoutput = <number>, 
  service = <name>, 
  socket = <number>, 
  transport = <category>, 
  windowsize = <number>
 Enable Port <port name>

Attribute

Description

<port name>

Specifies a unique port name.

<port name> must correspond with an identified service.

stationname

Specifies a unique station name.

Refer to Using StationName.

checkinterval

Specifies the period of inactivity before keep alive packets are sent.

<number> is specified in seconds, and must be in the range 0 through 1440.

device

Specifies the name of a device to be used for all subport connections that are passed to the CUCI PCM.

<name> must be a previously configured device.

framing

Specifies the type of message delineation to be used. Message delineation indicates where a message starts and ends.

<category> must be set to Standard.

maxoffer

Specifies the number of subports to be offered (made available for connection) at any time.

<number> must be in the range 0 through 31.

maxoutput

Specifies the maximum number of bytes in an output message. For Big Buffer Ispecs, this must be set to 45300 (65000 for Big Buffer ispecs not using POF).

<number> must be in the range 128 through 65535.

service

Specifies the name of a service to be used for inbound subport connections. This is the next service in the connection path.

<name> defaults to <port name>.

socket

Specifies the socket number used by the client to connect to the port file.

<number> should be set to the recommended value of 2449, unless a non-standard port configuration exists.

transport

Identifies the transport to be used.

<category> must be set to TCPIP, or it defaults to null.

windowsize

Specifies the maximum number of bytes that can be queued, on input, per dialog before more is received. For Big Buffer Ispecs, this must be set to 45300.

Example

 Add Port RATL
  stationname = actlinc/#, 
  checkinterval = 5, 
  device = ratlweb, 
  framing = standard,
  maxoffer = 1,
  maxoutput = 10000,
  service = ratl, 
  socket = 2449, 
  transport = tcpip, 
  maxoffer = 500
 Enable Port RATL

Using StationName

This attribute names a connection to COMS. It provides a flexible format from which station names can be generated.

Note: Refer to <tcpip connection name> field of the Add or Modify TCPIP PCM command in the ClearPath MCP Software Custom Connect Facility Administration and Programming Guide for all possible station name values.

When developing a station name, you need to consider uniqueness and determinability. For example, you might require that the station name be consistent each time a particular user connects, and will not change over time. You might also require that more than one connection be used from the same client or from any number of clients and each name used is unique.

You also need to consider any COMS security that is applied to station names and how these stations comply.

For the best means of ensuring a consistently unique name, use the <tcpip psnf> attributes $yourhost or $yourIPaddress within the stationname attribute value.

If a hostname is desired but an IP address is formed for the stationname instead, that is the letters IP are inserted in front of the address, it might be possible to use TCP/IP mapping to set the hostname. Refer to the TCP/IP Implementation and Operations Guide for more information on mapping IP addresses.

On some networks, such as Dynamic Host Configuration Protocol (DHCP), IP addresses are not consistent over time. In this situation there are two possible alternatives:

Overriding the Stationname by Client

When a station name is set by the client it overrides the configured setting defined for RATL connections above. Refer to the Agile Business Suite Component Enabler User Guide for more information on setting the station name by client. The station name supplied by the client might have a numerator applied to uniquely qualify the name, where multiple connections are desired from the same client. The numerator is represented by a string of one or more consecutive hash characters (#) appended to the station name which is converted to a unique ascending number. The number of consecutive hash characters indicates the minimum number of digits to be appended. For example, a supplied station name of user### results in names of the form: USER001, USER002, USER003 ... USER999, USER1000, USER1001 etc

The effect of StationName on station name (Glb.Stn)

The setting of the internal station name, or attribute Glb.Stn, is affected by the external (COMS) station name.

For Component Enabler (or NOF) based connections the value of Glb.Stn is based on the COMS station name value and the Remote Access service attribute StationNamePrefix value. If the StationNamePrefix is not defined then Glb.Stn is prefixed by the letters RAT, as shown in the first example below. If the derived station name is longer than the limit of 17 characters, the connection attributes for yourhost is used, as shown in the second example below. If the value for yourhost is not known or it is longer than the 17 character limit, the value for youripaddress is used. If this value is also too long the IP address is converted to its integer equivalent, as shown in the third example below.

The following example shows the resulting COMS and station names for a client with the specified Port Stationname format, a station name prefix set or not set to SNP, a hostname of Timbertown, and an IP address of 123.132.213.231:

TCPIP Port StationName

RATL Service StationName Prefix

COMS Station Name

Glb.Stn

ACTLINC/#

<null>

ACTLINC/1

RATACTLINC/1

 

SNP

SNPACTLINC/1

ACTLINC/1

$yourhost/

<null>

TIMBERTOWN/1234

RATTIMBERTOWN/1

$youraddress

SNP

SNPTIMBERTOWN/1234

TIMBERTOWN/1

$youripaddress/#

<null>

123_132_213_231/1

RAT2072303079/1

 

SNP

SNP123_132_213_231/1

123_132_213_231/1

RATL Configuration

Configure the following entities:

RATL Configuration Syntax

You can use the following verbs in CCF to configure the server for Component Enabler, or Web Enabler:

Verb

How it is Used

Add

To define attributes for Views, Languages, Services, MQservers, MQclients, and MQrequests.

Delete

To change existing Views, Languages, Services, MQservers, MQclients, and MQrequests. The View, Language, Service, MQserver, MQclient, or MQrequest must be disabled before it can be deleted or modified.

Disable

To change existing Views, Services, and MQrequests. The View, Service, or MQrequest must be disabled before it can be deleted or modified.

Enable

To enable existing Views, Services, and MQrequests.

List

To list Dialogs, Services, Languages, Views, MQservers, MQclients, and MQrequests.

Modify

To define attributes for Views, Languages, Services, MQservers, MQclients, and MQrequests. The View, Language, Service, MQserver, MQclient, and MQrequest must be disabled before it can be deleted or modified.

Option

To change server program runtime options.

Show

To show existing Views, Services, Languages, connected Dialogs, MQservers, MQclients, and MQrequests.

Status

To show the status of the PCM, such as compile time, code version, and title.

Trace

To alter or show the trace options.

Service

Identify a service to the PCM to associate the connection path for dialogs. Attributes are assigned using the following syntax:

 Add Service <service name> 
  service = <name>, 
  NOFidentity = <name>, 
  SwitchToFireUp = <boolean>, 
  StationNamePrefix = <name>
 Enable Service <service name>

Attribute

Description

<service name>

Defines a unique service name.

service

Specifies the name of a service to which inbound stations should be connected.

This is the next service in the connection path.

<name> must be a previously configured service.

NOFidentity

Identifies the connection types of the applications.

<name> is a COMS Security Category List configuration entity that is defined in COMS.

If the attribute is not configured in the service definition, it must be defined using the SecurityCatList attribute in the CUCI service definition before the server can handle the Component Enabler connections.

SwitchToFireUp

Specifies behavior when switching back to an application from which a switch previously occurred.

This attribute is optional.

If True, returns to the Fireup Ispec instead of the Ispec from which the original switch occurred.

If False, returns to the Ispec from which the original switch occurred. If the client has not previously been displayed, the Fireup Ispec is retrieved.

Any data contained in the SwitchTo command overrides the setting of this attribute.

StationNamePrefix

Prevents the RAT station name prefix appearing in Glb.Stn for Component Enabler connections.

<name> prefixes the COMS Station Name.

Refer to Using StationName.

This attribute is optional.

MARCOpenText

Allows input to be passed to the MARC dialog when a new COMS connection is established from the server to a desired application. The value must be enclosed in double quotation marks.

When this attribute is present the text is sent instead of the server passing a hard coded message to the MDPLAUNCH window.

Note: In order for the command to be carried out successfully by MARC, the CUCI Device attribute marccapble must be set to true.

Example

 Add Service RATL
  service = LINC,
  NOFidentity = SCL_NOF,
  SwitchToFireUp = False,
  StationNamePrefix = AL/
 Enable Service RATL

Configuring Remote Access Server Entities

The Remote Access configuration entities for the COMS Security Category List names must be configured in at least one of the following attributes of the CCF configuration:

Refer to RATL Configuration Syntax for more information about the syntax used to configure the server in an MCP environment.

When configuring entities you can change their names, but the names must remain unique. You can define additional Port and Service entities ensuring that a connection path can be resolved through CCF, encompassing the PCMs from TCIP using the Remote Access server to CUCI. Refer to the ClearPath HMP NX/Services Administration Guide or ClearPath HMP Series CCF Administration Guide for more information on using CCF.

View

You can identify Views to the PCM to associate connection criteria for Component Enabler users to access applications. A View can refer to one or more applications, or different Views might apply to the same application.

To identify at least one application, you can assign attributes using the following syntax:

 Add View <view name> 
  application = <system>, 
  level = <number>, 
  window = <name>, 
  usercode = <usercode>, 
  language = <language>
   comsstatuscheck = <boolean>
 Enable View <view name>

Attribute

Description

<view name>

Specifies a unique view name.

application

Indicates the name of the initial application to be accessed through this View.

This attribute is optional.

<system> might contain the usercode, the application name and the

Dictionary name of the built application.

The Dictionary contains the LINCGLI, LINCFORM, and LINCCNTL files for the built application.

ComsStatusCheck

Specifies behavior when the transaction encounters a COMS Disabled Database on the MCP server.

If True, an error 202 is returned to the client immediately.

If False, the transaction will timeout.

level

Indicates the command level for dialogs using this View.

This attribute is optional and only applies to NOF based connections.

window

Specifies the COMS window to be used by this View.

This attribute is optional, but is required when the application to which you might need to switch is not already in use.

usercode

Indicates the usercode for every dialog that is established for this View.

If it is not present, the client is asked for a usercode.

This attribute is optional.

<usercode> must be valid for the purposes of workstations connected to Runtime through COMS.

language

Indicates the preferred language to be used for this View.

This attribute is optional.

<language> must be a previously identified language.

Example

 Add View sample_auto
  application = (USER1)SAMPSYS on DICTPACK,
  level = 0,
  window = SAMPLE
  usercode = anonymous,
  language = english
 Enable View sample_auto

Language

Identify a language to associate the ISO Country code and an ISO Language code with a language name. The ISO Language code is defined in ISO 639 while the ISO Country code is defined in ISO 3166. These standards are available in the official ISO website, http://www.iso.ch/.

Language names are configured in the application. Attributes can be assigned and enabled using the following syntax:

 Add Language <language>
  ISOC = <country code>,
  ISOL = <language cod

Attribute

Description

ISOC

Specifies the ISO Country code to be associated with the language name.

ISOL

Specifies the ISO Language code to be associated with the language name.

Example

Add Language english
 ISOC = EN,
 ISOL = EN

Message Queuing

Message Queuing allows multiple concurrent users of Component Enabler to access an Agile Business application, by making more efficient use of system resources, and reducing the overheads associated with establishing and maintaining individual connections for each user session. This is an alternative to the existing method of connecting to the Runtime application using individual TCP/IP connections.

Refer to the Agile Business Suite Component Enabler User Guide for more information on how to use message queuing for Component Enabler Scalability.

The following entities are added to the PCM section of the CCF params file to configure the request queues and connection details of the FalconMQ Server and FalconMQ Client library:

MQServer

 Add MQServer <name>
  Servername = <name>,
  IPaddress = <ipaddress>,
  Port = <number>,
  Domain = <name>,
  UserName = <name>,
  Password = <name>,

Set attributes associated with the FalconMQ server using the following syntax:

Attribute

Description

Servername

The name of the FalconMQ server.

Default: <MQserver name>

IPaddress

The IPaddress of the FalconMQ server.

An assigned IPaddress overrides any specified Servername.

Port

The required port number.

Default: 0

Domain

The Windows security domain.

Default: nulls

UserName

The Windows user name.

Default: nulls

Password

The password associated with the Windows user name.

Default: nulls

Note: Case sensitive names that refer to a Windows entity can be enclosed by single quotes to prevent uppercasing.

You can also use the following commands:

Example (italics denote responses):

 Add MQserver FMQS
  IPaddress = 123.1.2.3,
  Port = 1100,
  Domain = realm,
  UserName = dnote,
  Password = test,
MQserver FMQS added
Show MQserver FMQS
1 FMQS
  IPaddress = 123.1.2.3
  Port = 1100
  Domain = realm
  UserName = dnote
  Password = test

MQClient

Set attributes associated with the FalconMQ client using the following syntax:

 Add MQclient <name>
  Functionname = <name>

Attribute

Description

Functionname

The System Library function name.

Default: <MQclient name>

You can also use the following commands:

Example (italics denote responses):

 Add MQclient FalconMQSupport
 MQclient FALCONMQSUPPORT added
 Enable MQclient FalconMQSupport
 MQclient FALCONMQSUPPORT enabled

MQrequest

Set attributes associated with the request queue using the following syntax:

 Add MQrequest <name>
  MQclient = <name>,
  MQserver = <name>,
  Pathname = <name>,
  Processes = <number>,
  Station Name = <SNformat>,
  Usercode = <identifier>,
  View = <name>,
  Service = <name>

Attribute

Description

MQclient

The name of the FalconMQclient.

MQserver

The name of the FalconMQ server.

Pathname

The request queue path name.

Default: .\PRIVATE$\<MQrequestname>

Processes

The number of queue reader processes.

Default: 1

Stationname

The pooling station name format.

The possible Snformats are as follows:

  • <literal>

  • /

  • #

  • $

    • – MQclient

    • – MQrequest

    • – MQserver

    • – ServerName

    • – IPaddress

    • – Domain

    • – Username

Default: $MQrequest/#

Usercode

The pooling user code.

View

The name of the view.

Default: <MQrequestname>

MQrequestname>

The service name.

Default:

<first service name defined (in Remote Access Server)>

You can also use the following commands:

Example (italics denote responses):

 Add MQrequest sampleQ
    MQclient = FalconMQSupport,
    MQserver = FMQS,
    Usercode = legion,
    View = samplesystem,
    Service = ratl
 MQrepuest sampleQ added
 List MQrequests
 MQrequests:
 1 sampleQ

COMS Configuration

To define connection types to applications, you need to define two COMS configuration entities. These are Security Category List and Installation Data entities. The names used in the CCF configuration for SecurityCatList (CUCI device attribute), and NOFidentity, should correspond to the names of Security Category List entities in the COMS configuration. Each Security Category List entity needs a corresponding Installation Data entity. The value assigned to the INTEGER1 attribute determines the type of connection for that entity. Currently, the only allowable value for INTEGER1 is 9.

You can define Component Enabler (NOF) based connection types for applications using the following COMS configuration entries:

 CREATE INSTALLATION_DATA RATL_NOF
  INTEGER1 = 9
 CREATE SECURITY_CATEGORY_LIST RATL_NOF
  ID = RATL_NOF

Remote Access Server Commands

Clear Command

This command is used to clear connections from the PCM.

Syntax:

 Clear Dialog<#,name, or list>

Example:

 Clear Dialogs 1,4-7,9

Option Command

The following list outlines the options users can set:

Administering the Remote Access Server

Administering the Remote Access Server involves the following tasks

Starting and Stopping

Use the CCF commands to start and stop the server and to monitor or trace server activities.

Note: Any connections to COMS or a COMS application via NX Services (for example, NX view) are terminated.

Because the server is configured as part of CCF, starting and stopping CCF starts and stops the server:

Alternatively, the server can be started and stopped without disrupting CCF:

Monitoring

You can monitor the status of any Remote Access server component configured in CCF, such as Languages, Views, and Dialogs. You can use the CCF STATUS or SHOW commands to display the status of the selected component.

The following example uses the STATUS command to display the status of the PCM. It displays the version, timestamp, internal program options and default language.

 NA CCF RATLPCM STATUS

This command returns the following data:

 Unisys Corporation COMSock
 RATLPCM 44.201.1 -09/20/98 - 10:29:31
 Compile Options:Trace, Assert
 Language = ENGLISH

The following example uses the SHOW command to display the status of the connected dialog.

 NA CCF RATLPCM SHOW DIALOG 1

This command returns the following data:

 Sunday 09/20/98 10:29:31
 1 RATL/UNO
 Client = Open
 Transport = Open
 Service = Open
 Input Seq Num = 8
 Output Seq Num = 6
 NOF = True
 GUI = False
 View = UNO
 Language = SPANISH
 Device = RATLWEB
 Maxoutput = 6000
 HostName = ACUSAHA
 ACVT = Default

Security

If a host application supports password aging and the Remote Access server is compliant with the application then user passwords can be changed when using the Remote Access server.

Refer to the MCP/AS Security Administration Guide for more information on setting password aging on an A Series host.

Tracing

Use CCF commands to start and stop tracing and to set the tracing attributes. Tracing can be initiated either by the operator, or by the client as part of the connection request. Tracing is normally used only for problem resolution, as it might impact the performance of the server.

The options for the CCF TRACE command are:

ON or RESUME

Turns tracing on.

OFF or SUSPEND

Turns tracing off.

CLOSE

Closes the current trace file.

You can set trace attributes to specify which activity is traced. The trace attributes are listed in the following table:

Attribute

Components Traced

RATL

RATL protocol

ALLDLGS

All dialogs

Attach

Session establishment and termination

Blocked

Suspended and resumed output

CMDINFO

CCF command data buffer

CREDITS

Bytes available for transmission

DATAINFO

CCF associated data buffer

DATAPATH

Procedural flow of message buffering

FULL

Shows full size of data buffers

LISTBUFS

Internal data space processing

LOCKS

Contention

MISC

Miscellaneous

MISCPROCS

Miscellaneous processing

MQ

Message Queue interface

MSG

Message displays

OPERINP

Operational interface

PFD

Configuration file parameters

SCANNER

Parsing

TBL

Tables

An example of the CCF command to start tracing all dialogs for the Remote Access server is as follows:

 NA CCF RATLPCM TRACE ON +ALLDLGS

Remote Access Server Protocol Response Messages

In particular situations the server sends protocol messages, with a number of possible response codes, to the client.

The following table outlines some of the more common codes and possible causes, to assist in determining the cause of the message:

Response Code

Meaning

Possible Causes

100

Successful operation

Session was successfully established.

101

Login is required

The View does not contain a usercode attribute setting.

103

Additional login

The userdata file indicates that other required user related attributes are needed.

201

Application does not exist

Either the View is not known to the server or the application referred to in the View does not exist.

203

Application cannot be contacted

Unable to read or obtain the desired information from the control file.

204

Access denied

  • Application is not EAE 3.3 or later release.

  • Userdata validation error (invalid usercode/password).

  • Duplicate connection name.

  • Usercode specified on View does not exist or is not valid.

  • COMS Window for the Application does not exist or is not valid (window list).

  • Security Category List used by connection does not exist in COMS.

  • Failed COMS Usercode/Station name security checking.

Localization of Messages

Remote Access Server messages can be translated using the MCP-based Multilingual System (MLS). The user messages are stored in the program SYSTEM/LINC/PCM/RATL in the following arrays:

Configuring TLS 1.2 Remote Access Server

A TLS certificate must be installed on the server to ensure a secure connection and protect all important information. You must first create a TLS 1.2 certificate on the MCP host machine before importing the security certificate using Security Center.

Notes:

  • Earlier TLS and SSL levels are not supported due to known vulnerabilities. Only TLS 1.2 level is supported.

  • In the following procedure, the use of the terminology SSL for service and parameter names is due to the use of pre-existing frameworks and must not be read as SSL support.

To configure the TLS Remote Access Server, perform the following:

  1. Create the TLS certificate request on the MCP host machine:

    1. Ensure that the Security Center must be installed on the host and a PC environment.

      Refer to the MCP Security Overview and Implementation Guide for more information.

    2. To open the Security Center, select All Programs > Unisys MCP > Security Center.

    3. Select MCP Cryptographic Services Manager > Trusted Keys.

    4. Right-click on Other Keys, and then select Create Key.

    5. Set the Application to CCF and the Service name to RATLKEY.

    6. Set the Usercode to *NULL and key strength to at least 2048.

    7. Select the Create Certificate Request check box, and then fill in the remaining fields with the appropriate details (for example, Signature Algorithm is SHA256_RSA).

      Refer to the Online Help for more information.

    8. Click OK.

      The Save dialog box is displayed.

    9. Enter the file name, and then click Save.

      This creates a certificate request file (.req).

      Note: It is recommended that this certificate request file must be processed by a trusted third-party Certificate Authority (CA).

  2. Import the security certificate:

    1. Open the Security Center.

    2. Select MCP Cryptographic Services Manager > Trusted Keys.

    3. Expand the key store where the key was created.

    4. Right-click the key, and then select Options > Install Certificate Into Set.

    5. In the File Browser, select the .P7B or .P7C file.

      When the certificate is successfully installed a green check mark appears next to the name of the certificate.

      Note: If you are using a non-trusted CA, the created .P7B or .P7C file will be ready for installing or importing on the client. This same process must be followed if you are using a self-signed certificate.

  3. Configure the RATL TLS port:

    The supplied file NGEN28/SAMPLE/CCF/PARAMS/RATL contains the necessary configurations for RATL TLS. These must be customized to suit your environment.

    The added configurations are

    1. PORT RATLSSL

      As per PORT RATL with the additions/change of:

      SOCKET = 2018, % choose the socket number

      SSLSECUREMODE = TRUE, % always

      SSLKEYCONTAINER = CCF_RATLKEY; % the key name, this must be the concatenation of the two names used in 1 (e) above using a ‘_’.

    2. SERVICE RATLSSL

      As per SERVICE RATL

      Additionally, TLS must be enabled on TCPIP.

      From MARC: NW TCPIP OPT +SSL

Refer to the MCP Security Overview and Implementation Guide and TCP/IP Distributed Systems Services Operations Guide for more information on MCP security.