Configuring the Dynamic Workload Console to connect to an HCL Universal Orchestrator engine
You can connect an on-premises Dynamic Workload Console V10.2.3 or later to an
HCL Universal Orchestrator engine by performing the steps described in this topic. There
are three different procedures:
- Connecting an already installed Dynamic Workload Console to an HCL Universal Orchestrator engine
- Connecting to an HCL Universal Orchestrator engine during the installation of the Dynamic Workload Console
- Connecting a Dynamic Workload Console deployed on Kubernetes to an HCL Universal Orchestrator engine
- Connecting an already installed Dynamic Workload Console to an HCL Universal Orchestrator engine
-
- From the directory in which the Dynamic Workload Console is
installed, browse to the
configDropins/templatesfolder, copy thejwtsso.xmlfile and paste it into theconfigDropins/overridesdirectory without changing any parameter. - Create a file named
unoca.crtin a directory of the virtual machine that hosts the Dynamic Workload Console. - From the secret that has been deployed by HCL Universal
Orchestrator, extract the
ca.crtfile and paste it into theunoca.crtfile. - Import the certificate by running the following
command:
keytool -importcert -file unoca.crt -alias uno -keystore /<dwc_data>/usr/servers/dwcServer/resources/security/TWSServerTrustFile.p12 - Export the server certificate from the Dynamic Workload Console by
running the following
command:
keytool -export -keystore /<dwc_data>/usr/servers/dwcServer/resources/security/TWSServerKeyFile.p12 -alias server -file tls_dwc.pem -rfcNote: Check the extracted certificate and verify that no^Msis present in the file. If any^Msis present, remove it by running the following command:sed ‘s/\r//’ tls_dwc.pem > tws_dwc_clear.crt - Copy the extracted certificate and create a secret in the namespace that hosts the HCL Universal Orchestrator deployment.
- In the
values.yamlfile of HCL Universal Orchestrator, add the name of the secret that you created in the previous step within the following parameter:global.dwcconsole.certSecretName - Define an access control list for every user that must be authorized to connect to an HCL Universal Orchestrator engine.
- Run the
helm upgradecommand with the same parameters used during the installation of HCL Universal Orchestrator:helm upgrade <uno_release_name> <repo_name>/hcl-uno-chart -f values.yaml -n <uno_namespace>
- From the directory in which the Dynamic Workload Console is
installed, browse to the
- Connecting to an HCL Universal Orchestrator engine during the installation of the Dynamic Workload Console
-
- Create a file named
unoca.crtin a directory of the virtual machine that is designated to host the Dynamic Workload Console. - Copy the
unoca.crtfile into theadditionalCAsfolder. For more information about theadditionalCAsfolder, see SSL configuration options. - Run the
dwcinstcommand. - From the directory in which the Dynamic Workload Console is
installed, browse to the
configDropins/templatesfolder, copy thejwtsso.xmlfile and paste it into theconfigDropins/overridesdirectory without changing any parameter. - From the secret that has been deployed by HCL Universal
Orchestrator, extract the
ca.crtfile and paste it into theunoca.crtfile. - Import the certificate by running the following
command:
keytool -importcert -file unoca.crt -alias uno -keystore /<dwc_data>/usr/servers/dwcServer/resources/security/TWSServerTrustFile.p12 - Export the server certificate from the Dynamic Workload Console by
running the following
command:
keytool -export -keystore /<dwc_data>/usr/servers/dwcServer/resources/security/TWSServerKeyFile.p12 -alias server -file tls_dwc.pem -rfcNote: Check the extracted certificate and verify that no^Msis present in the file. If any^Msis present, remove it by running the following command:sed ‘s/\r//’ tls_dwc.pem > tws_dwc_clear.crt - Copy the extracted certificate and create a secret in the namespace that hosts the HCL Universal Orchestrator deployment.
- In the
values.yamlfile of HCL Universal Orchestrator, add the name of the secret that you created in the previous step within the following parameter:global.dwcconsole.certSecretName - Define an access control list for every user that must be authorized to connect to an HCL Universal Orchestrator engine.
- Run the
helm upgradecommand with the same parameters used during the installation of HCL Universal Orchestrator:helm upgrade <uno_release_name> <repo_name>/hcl-uno-chart -f values.yaml -n <uno_namespace>
- Create a file named
- Connecting a Dynamic Workload Console deployed on Kubernetes to an HCL Universal Orchestrator engine
-
- From the secret that has been deployed by HCL Universal
Orchestrator, copy the
ca.crtfile. - Load the third-party certificate by following the procedure described here.
- Upgrade the Dynamic Workload Console by
running the
helm upgradecommand. - From the directory in which the Dynamic Workload Console is
installed, browse to the
configDropins/templatesfolder, copy thejwtsso.xmlfile and paste it into theconfigDropins/overridesdirectory without changing any parameter. - Copy the
ca.crtfile generated during the deployment of the Dynamic Workload Console, and use the file to create a new secret into the HCL Universal Orchestrator namespace. - Copy the name of the secret created in the previous step into the
following section of the
values.yamlfile of HCL Universal Orchestrator:global.dwcconsole.certSecretName - Define an access control list for every user that must be authorized to connect to an HCL Universal Orchestrator engine.
- Run the
helm upgradecommand with the same parameters used during the installation of HCL Universal Orchestrator:helm upgrade <uno_release_name> <repo_name>/hcl-uno-chart -f values.yaml -n <uno_namespace>
- From the secret that has been deployed by HCL Universal
Orchestrator, copy the