Microsoft KB Archive/943318

= Engyro Connectors for MOM 2005: OVO Password Encryption Check and Set =

Article ID: 943318

Article Last Modified on 10/11/2007

-

APPLIES TO


 * Engyro Product Connectors for Microsoft Operations Manager 2005

-





Rapid publishing disclaimer
Microsoft corporation and/or its respective suppliers make no representations about the suitability, reliability, or accuracy of the information and related graphics contained herein. All such information and related graphics are provided &quot;as is&quot; without warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information and related graphics, including all implied warranties and conditions of merchantability, fitness for a particular purpose, workmanlike effort, title and non-infringement. You specifically agree that in no event shall Microsoft and/or its suppliers be liable for any direct, indirect, punitive, incidental, special, consequential damages or any damages whatsoever including, without limitation, damages for loss of use, data or profits, arising out of or in any way connected with the use of or inability to use the information and related graphics contained herein, whether based on contract, tort, negligence, strict liability or otherwise, even if Microsoft or any of its suppliers has been advised of the possibility of damages.





INTRODUCTION
The article describes OVO Password Encryption check and set instructions.



MORE INFORMATION
There are instances where special character in the password break the encryption. To see if the password is getting encrypted/decrypted properly. Try the following and the epcmomd.log will let you know if your opc_adm password is getting converted properly.
 * 1) On the OVO server open a command prompt and edit the /etc/opt/OV/share/lrf/epcmomd.lrf file.
 * 2) Change the -d1 to -d51 and save the file. This is a special debug mode that will display the decrypted password.
 * 3) Run the following commands to re-register the lrf file.
 * 4) * ovdelobj /etc/opt/OV/share/lrf/epcmomd.lrf
 * 5) * ovaddobj /etc/opt/OV/share/lrf/epcmomd.lrf
 * 6) Restart the epcmomd

ovstart epcmomd
 * 1) Look at the /opt/EngyroXD/logs/epcmomd.log and verify the password is getting decrypted properly in the log.

If the password is not getting decrypted properly your only option is to change to opc_adm password in OVO to something that the crypt binary can encrypt properly then reset both the opcpw.conf and crypt.conf password files.

The /opt/EngyroXD/conf/opcpw.conf file is the encrypted password for the Java interface into the OVO api's and the /opt/EngyroXD/conf/crypt.conf file is for the epcmomd daemon that watches the OVO Event Stream Interface for MOM alerts.

You will need to reset both of these with the /opt/EngyroXD/bin/crypt binary. On the OVO server do the following to reset the password:
 * 1) Open a command prompt a cd to the EngyorXD/bin directory (/opt/EngyroXD is the default install location of the EXD)
 * 2) Type the following: ./crypt

Enter Password:

Enter output file name: /opt/EngyroXD/conf/opcpw.conf

Note: this is the default install location of the opcpw.conf file. If you installed the EngyroXD in a different location please adjust the path to the opcpw.conf.
 * 1) Run the crypt binary a second time but specify the /opt/EngyroXD/conf/crypt.conf file for the output file name.
 * 2) Restart the EngyroXD

/opt/EngyroXD/EngyroXD stop

/opt/EngyroXD/EngyroXD start

Keywords: kbhowto kbinfo kbexpertiseinter KB943318

-

[mailto:TECHNET@MICROSOFT.COM Send feedback to Microsoft]

© Microsoft Corporation. All rights reserved.