Version 9 Release 0. IBM i2 Analyst's Notebook Configuration IBM

Similar documents
Version 9 Release 0. IBM i2 Analyst's Notebook Premium Configuration IBM

IBM. IBM i2 Enterprise Insight Analysis Understanding the Deployment Patterns. Version 2 Release 1 BA

Version 2 Release 1. IBM i2 Enterprise Insight Analysis Understanding the Deployment Patterns IBM BA

Version 2 Release 1. IBM i2 Enterprise Insight Analysis Maintaining a deployment IBM

IBM. IBM i2 Enterprise Insight Analysis User Guide. Version 2 Release 1

IBM. IBM i2 Analyze Windows Upgrade Guide. Version 4 Release 1 SC

Version 2 Release 2. IBM i2 Enterprise Insight Analysis Installing the components IBM SC

IBM i2 ibridge 8 for Oracle

IBM. IBM i2 Analyze: Configuring Secure Sockets Layer (SSL) Version 4 Release 1 SC

CONFIGURING SSO FOR FILENET P8 DOCUMENTS

Installing Watson Content Analytics 3.5 Fix Pack 1 on WebSphere Application Server Network Deployment 8.5.5

IBM i2 Analyze ibase Connector Deployment Guide. Version 4 Release 1 IBM

Version 4 Release 1. IBM i2 Enterprise Insight Analysis Data Model White Paper IBM

IBM emessage Version 8.x and higher. Account Startup Overview

Using application properties in IBM Cúram Social Program Management JUnit tests

IBM Security QRadar Version Customizing the Right-Click Menu Technical Note

IBM Operational Decision Manager Version 8 Release 5. Configuring Operational Decision Manager on Java SE

Platform LSF Version 9 Release 1.1. Migrating on Windows SC

Best practices. Starting and stopping IBM Platform Symphony Developer Edition on a two-host Microsoft Windows cluster. IBM Platform Symphony

IBM Maximo Calibration Version 7 Release 5. Installation Guide

IBM Operational Decision Manager. Version Sample deployment for Operational Decision Manager for z/os artifact migration

IBM Cognos Dynamic Query Analyzer Version Installation and Configuration Guide IBM

Platform LSF Version 9 Release 1.3. Migrating on Windows SC

IBM. Networking INETD. IBM i. Version 7.2

Version 9 Release 1. IBM i2 Analyst's Notebook Release Notes IBM

Tivoli Access Manager for Enterprise Single Sign-On

IBM Spectrum LSF Process Manager Version 10 Release 1. Release Notes IBM GI

IBM License Metric Tool Enablement Guide

Getting Started with InfoSphere Streams Quick Start Edition (VMware)

Migrating Classifications with Migration Manager

IBM FlashSystem V MTM 9846-AC3, 9848-AC3, 9846-AE2, 9848-AE2, F, F. Quick Start Guide IBM GI

IBM i2 Analyst s Notebook Quick Start Guide

IBM OpenPages GRC Platform Version 7.0 FP2. Enhancements

Networking Bootstrap Protocol

IBM Operations Analytics - Log Analysis: Network Manager Insight Pack Version 1 Release 4.1 GI IBM

IBM OpenPages GRC Platform - Version Interim Fix 1. Interim Fix ReadMe

IBM UrbanCode Cloud Services Security Version 3.0 Revised 12/16/2016. IBM UrbanCode Cloud Services Security

iscsi Configuration Manager Version 2.0

IBM Cloud Object Storage System Version Time Synchronization Configuration Guide IBM DSNCFG_ K

IBM FlashSystem V Quick Start Guide IBM GI

IBM LoadLeveler Version 5 Release 1. Documentation Update: IBM LoadLeveler Version 5 Release 1 IBM

IBM Content Analytics with Enterprise Search Version 3.0. Expanding queries and influencing how documents are ranked in the results

IBM Kenexa LCMS Premier on Cloud. Release Notes. Version 9.3

IBM Maximo for Service Providers Version 7 Release 6. Installation Guide

IBM Spectrum LSF Version 10 Release 1. Readme IBM

Best practices. Reducing concurrent SIM connection requests to SSM for Windows IBM Platform Symphony

IBM. IBM i2 Analyze: Backing Up A Deployment. Version 4 Release 1

IBM Security QRadar Version Forwarding Logs Using Tail2Syslog Technical Note

Development tools System i5 Debugger

IBM Netcool/OMNIbus 8.1 Web GUI Event List: sending NodeClickedOn data using Netcool/Impact. Licensed Materials Property of IBM

Build integration overview: Rational Team Concert and IBM UrbanCode Deploy

IBM Maximo for Aviation MRO Version 7 Release 6. Installation Guide IBM

IBM WebSphere Sample Adapter for Enterprise Information System Simulator Deployment and Testing on WPS 7.0. Quick Start Scenarios

IBM Storage Driver for OpenStack Version Release Notes

IBM Financial Transactions Repository Version IBM Financial Transactions Repository Guide IBM

ios 9 support in IBM MobileFirst Platform Foundation IBM

IBM XIV Provider for Microsoft Windows Volume Shadow Copy Service. Version 2.3.x. Installation Guide. Publication: GC (August 2011)

IBM. IBM i2 Analyze Deployment patterns and examples. Version 4 Release 1 SC

IBM Endpoint Manager Version 9.1. Patch Management for Ubuntu User's Guide

IBM Storage Management Pack for Microsoft System Center Operations Manager (SCOM) Version Release Notes

Netcool/Impact Version Release Notes GI

Contents. Configuring AD SSO for Platform Symphony API Page 2 of 8

Best practices. Linux system tuning for heavilyloaded. IBM Platform Symphony

IBM Storage Driver for OpenStack Version Installation Guide SC

IBM. IBM i2 Analyze Security White Paper. Version 4 Release 1

Patch Management for Solaris

IBM Security QRadar Version 7 Release 3. Community Edition IBM

Determining dependencies in Cúram data

IBM Maximo Spatial Asset Management Version 7 Release 5. Installation Guide

IBM. Networking Open Shortest Path First (OSPF) support. IBM i. Version 7.2

Application and Database Protection in a VMware vsphere Environment

Migrating on UNIX and Linux

IBM Copy Services Manager Version 6 Release 1. Release Notes August 2016 IBM

IBM i2 ibase 8 Upgrading IBM i2 ibase databases to SQL Server 2005 or 2008 VERSION MAY 2012

Setting Up Swagger UI for a Production Environment

Integrated use of IBM WebSphere Adapter for Siebel and SAP with WPS Relationship Service. Quick Start Scenarios

Version 1 Release 1 November IBM Social Marketing Solution Pack User's Guide IBM

IBM Cloud Orchestrator. Content Pack for IBM Endpoint Manager for Software Distribution IBM

IBM. Avoiding Inventory Synchronization Issues With UBA Technical Note

ServeRAID-MR10i SAS/SATA Controller IBM System x at-a-glance guide

Setting Up Swagger UI on WebSphere

Tivoli Access Manager for Enterprise Single Sign-On

IBM Maximo Spatial Asset Management Version 7 Release 5. Installation Guide

IBM Storage Driver for OpenStack Version Installation Guide SC

System i. Networking RouteD. Version 5 Release 4

RSE Server Installation Guide: AIX and Linux on IBM Power Systems

A Quick Look at IBM SmartCloud Monitoring. Author: Larry McWilliams, IBM Tivoli Integration of Competency Document Version 1, Update:

IBM Storage Device Driver for VMware VAAI. Installation Guide. Version 1.1.0

Tivoli Access Manager for Enterprise Single Sign-On

IBM. Release Notes November IBM Copy Services Manager. Version 6 Release 1

Implementing Enhanced LDAP Security

Installing on Windows

Performance Tuning Guide

IBM Rational DOORS Installing and Using the RQM Interface Release 9.2

IBM Maximo Spatial Asset Management Version 7 Release 6. Installation Guide IBM

IBM Tivoli Directory Server Version 5.2 Client Readme

Release Notes. IBM Tivoli Identity Manager Rational ClearQuest Adapter for TDI 7.0. Version First Edition (January 15, 2011)

Configuring IBM Rational Synergy to use HTTPS Protocol

IBM Watson Explorer Content Analytics Version Upgrading to Version IBM

Tivoli Endpoint Manager for Patch Management - AIX. User s Guide

Transcription:

Version 9 Release 0 IBM i2 Analyst's Notebook Configuration IBM

Note Before using this information and the product it supports, read the information in Notices on page 11. This edition applies to version 9, release 0, modification 7 of IBM i2 Analyst's Notebook and to all subsequent releases and modifications until otherwise indicated in new editions. Ensure that you are reading the appropriate document for the version of the product that you are using. To find a specific version of this document, access the Configuration section of the IBM Knowledge Center, and ensure that you select the correct version. Copyright International Business Machines Corporation 2016, 2018. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

Connecting IBM i2 Analyst's Notebook Premium to IBM i2 Analyze Analyst's Notebook Premium uses connectors to manage interactions with the i2 Analyze data sources. When you install Analyst's Notebook Premium, you must select the connectors to install. For information on installing the Analyst's Notebook Premium connectors, see Installing IBM i2 Analyst's Notebook Premium. With the connectors installed, you can access i2 Analyze through Analyst's Notebook Premium. Opal connector When i2 Analyze is started, the URI that must be used in Analyst's Notebook Premium is displayed in the console. For example: This application is configured for access on http://host_name/opal. Important: This URI must be distributed to each user that connects Analyst's Notebook Premium to i2 Analyze. Open Analyst's Notebook Premium, and connect by specifying the URI displayed in the console. If you do not have access the console where i2 Analyze is started, speak to your system administrator. Note: If your deployment uses an extra proxy server between Analyst's Notebook Premium and i2 Analyze, you must specify the URI that clients use to connect to i2 Analyze. After you specify the URI, the new value is displayed in the console when i2 Analyze is started. For more information, see Specifying the connection URI. Onyx connector Open Analyst's Notebook Premium, and connect by specifying the following URL: http:// host_name/apollo Where host_name is the fully qualified domain name or IP address of the HTTP server. Copyright IBM Corp. 2016, 2018 1

2 IBM i2 Analyst's Notebook Configuration

Enabling SSL connections in Analyst's Notebook Premium If the i2 Analyze deployment that you are connecting to uses SSL connections, the security certificate must be available on your machine. This lets the system know that your machine is trusted. Before you begin When the i2 Analyze system was configured to use SSL connections, a security certificate was generated: i2_certificate.der. You must have access to this certificate before you can enable an SSL connection from Analyst's Notebook Premium. Procedure To install the security certificate: 1. Copy the extracted i2_certificate.der file to your machine. 2. Install the certificate: a) Double-click the i2_certificate.der file. b) Click Install Certificate, and then click Next. c) Click Place all certificates in the following store. d) Click Browse, and select Trusted Root Certification Authorities. e) Click Next, and then click Finish. Note: If the certificate is self-signed, you will see a warning message: The operating system cannot verify the self-signed certificate. Click Yes to accept the certificate. Results With the security certificate installed, you can connect to your stores using the HTTPS protocol. Open Analyst's Notebook Premium, and connect using the HTTPS protocol. For more information about connecting to i2 Analyze, see Connecting IBM i2 Analyst's Notebook Premium to IBM i2 Analyze on page 1. Note: If you try to connect using the HTTP protocol (http://host_name/type), you are no longer able to log in. Copyright IBM Corp. 2016, 2018 3

4 IBM i2 Analyst's Notebook Configuration

Using X.509 certificates for authentication Analyst's Notebook Premium can use an X.509 certificate to authenticate with i2 Analyze. The connection to the i2 Analyze server is secured, and the user is authenticated with the server by the client certificate that is provided by Analyst's Notebook Premium. Before you begin Before you can specify a certificate for Analyst's Notebook Premium to use, you must have a trusted X.509 client certificate. For more information, see Client certificates. The deployment of i2 Analyze must be configured for client certificate authentication by following the instructions in Configuring X.509 client certificate authentication with i2 Analyze. A prerequisite for configuring X.509 client certificate authentication is that your deployment is using SSL with connections to the HTTP Server. Ensure that you enabled SSL connections in Analyst's Notebook Premium. For more information, see Enabling SSL connections in Analyst's Notebook Premium on page 3. About this task When you first start Analyst's Notebook Premium, or if you change the connection to a repository, the application displays a window that contain connection details for the Analysis Repository. Procedure 1. Enter the name and the URL of the server to connect to. Use the HTTPS protocol to connect to the server. For example, https://host_name/apollo (where host_name is the fully qualified domain name or IP address of the HTTP server). 2. Select Use client certificate and click Browse. Then, choose the client certificate to use to authenticate with the server. 3. Click OK. Results When client certificate authentication is configured correctly, you are logged in to i2 Analyze as the user associated with the selected certificate. Copyright IBM Corp. 2016, 2018 5

6 IBM i2 Analyst's Notebook Configuration

Configuring SPNEGO single sign-on for i2 Analyst's Notebook Premium Analyst's Notebook Premium can use your single sign-on credentials to authenticate with i2 Analyze. Before you can connect Analyst's Notebook Premium to i2 Analyze in single sign-on mode, you must ensure that the embedded browser is configured to support this authentication method. Analyst's Notebook Premium uses embedded web components to connect to i2 Analyze. To allow these connections to use SPNEGO single sign-on, you must ensure that Windows Integrated Authentication is enabled for your browser. To configure your web browser, follow step 3 in Configuring SPNEGO authentication in Liberty. When your Internet browser is configured for SPNEGO authentication, you can use i2 Analyze without being prompted for a user ID and password. Copyright IBM Corp. 2016, 2018 7

8 IBM i2 Analyst's Notebook Configuration

Installing and configuring IBM i2 QRadar Offense Investigator After you download and install i2 Offense Investigator, it must be configured so that users can send offenses from QRadar to Analyst's Notebook. About this task You need to enable access and select the authentication method. You can allow access to all users or limit access to a specific User Role. To use i2 Offense Investigator, the User Role must have permission to access at least offenses and log activity. After you set up the access, you can choose from two authentication mechanisms: User name and password: A user must enter log in details every session because no user details are stored on their system. Token based: A user enters the token information once only and this token is persisted in the registry. To use i2 Offense Investigator, a user must have an instance of QRadar version 7.2.8 running and install i2 Offense Investigator in the usual way by using XForce Exchange. Procedure 1. After you download the i2 Offense Investigator app extension from the XForce App Exchange, install it using the QRadar Extension Management tool: a) On the Admin page of your QRadar console, click Extensions Management. The Extensions Management window opens. b) Click Add. c) Browse to the i2 Offense Investigator file that you downloaded, select Install immediately, and then click Add. d) When i2 Offense Investigator appears in the Extensions Management window, click Install. 2. After installation, select the User Roles that are permitted to access i2 Offense Investigator. On the Admin page of your QRadar console, click User Roles and do one of the following actions: Allow access to all users. Limit access to a specific User Role. Create a User Role and limit access to this new User Role. 3. Ensure that all of the users who require access are added to the User Role that you want to use. 4. Open the page for the User Role that you want to configure, ensure that the group has access to at least offenses and log activity, and then select the IBM i2 QRadar Offense Investigator check box. 5. After you configure the User Roles, set up the authentication method. To specify user name and password authentication, no further configuration is required. Users are required to log in for every Analyst's Notebook session. To specify token based authentication, set up a token for i2 Offense Investigator to use when it communicates with the server: a) On the Admin page of your QRadar console, click Authorized Services. The Manage Authorized Services window opens. Copyright IBM Corp. 2016, 2018 9

b) Click Add Authorized Service. The Add Authorized Service window opens. c) Enter the details and click Create Service. A new entry is added to the list in the Manage Authorized Services window. d) Select the newly created service, copy the token that appears in the Manage Authorized Services window, and send it to each of the users who require access to i2 Offense Investigator. When a user is prompted to log in, they must select Token and enter the token that you give them. After they enter the token once, in subsequent Analyst's Notebook sessions, if this token is still valid, they are not prompted for it again. Results A Send to i2 Analyst's Notebook button becomes available to the users in QRadar on the Offenses and the Offense Summary pages, which allows them to chart selected offenses. Further information about how to use i2 Offense Investigator is provided as part of the Analyst's Notebook online help. 10 IBM i2 Analyst's Notebook Configuration

Notices This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-ibm product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY 10504-1785 U.S.A. The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-ibm Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged, should contact: IBM United Kingdom Limited Hursley House Hursley Park Winchester, Hants, SO21 2JN UK Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee. The licensed program described in this document and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement or any equivalent agreement between us. Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment. Copyright IBM Corp. 2016, 2018 11

Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. All statements regarding IBM's future direction or intent are subject to change or withdrawal without notice, and represent goals and objectives only. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are provided "AS IS", without warranty of any kind. IBM shall not be liable for any damages arising out of your use of the sample programs. If you are viewing this information softcopy, the photographs and color illustrations may not appear. Trademarks IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml. Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. ArcGIS, EDN, StreetMap, @esri.com, and www.esri.com are trademarks, registered trademarks, or service marks of Esri in the United States, the European Community, or certain other jurisdictions. Other names may be trademarks of their respective owners. Other company, product, and service names may be trademarks or service marks of others. 12 IBM i2 Analyst's Notebook Configuration

IBM