Generating unique self-signed certificates
Creating a new pnca keypair certificate
Create a new pnca keypair certificate by running the following command:
keytool -genkey -keyalg RSA -alias pnca -keystore keystore_1.ks -storepass get2net -validity 299665 -keysize 2048 -sigalg SHA256withRSAThis command prompts you to enter the details such as name, organization details as shown in the following code block. Type the details appropriately.
What is your first and last name?
[Unknown]: <FirstName LastName>
What is the name of your organizational unit?
[Unknown]: <organizational unit>
What is the name of your organization?
[Unknown]: <company>
What is the name of your City or Locality?
[Unknown]: <city>
What is the name of your State or Province?
[Unknown]: <state>
What is the two-letter country code for this unit?
[Unknown]: <country code>
Is CN=<FirstName LastName>, OU=<organizational unit>, O=<company>, L=<city>, ST=<state>, C=<country code> correct?
[no]: yesIt creates the file keystore_1.ks with alias pnca.
Export Keystore as pnca.p12 by running the following command:
keytool -importkeystore -srckeystore keystore_1.ks -destkeystore pnca.p12 -deststoretype PKCS12Delete old pnca from pnserver.ks by running the following command:
keytool -delete -alias pnca -keystore pnserver.ks -storepass get2net -storetype JKSImport pnca.p12 into pnserver.ks by running the following command:
keytool -importkeystore -deststorepass get2net -destkeypass get2net -destkeystore pnserver.ks -srckeystore pnca.p12 -srcstoretype PKCS12 -srcstorepass get2net -alias pnca
Creating a new pnagent certificate
Create new pnagent certificate by running the following command:
keytool -genkey -keyalg RSA -alias pnagent -keystore keystore_2.ks -storepass get2net -validity 299665 -keysize 2048 -sigalg SHA256withRSAThis command prompts you to enter the details such as name, organization details as shown in the following code block. Type the details appropriately.
What is your first and last name?
[Unknown]: <FirstName LastName>
What is the name of your organizational unit?
[Unknown]: <organizational unit>
What is the name of your organization?
[Unknown]: <company>
What is the name of your City or Locality?
[Unknown]: <city>
What is the name of your State or Province?
[Unknown]: <state>
What is the two-letter country code for this unit?
[Unknown]: <country code>
Is CN=<FirstName LastName>, OU=<organizational unit>, O=<company>, L=<city>, ST=<state>, C=<country code>correct?
[no]: yesIt creates file keystore_2.ks with alias pnagent.
Export certificate from keystore_2.ks as pnagent.cer by running the following command:
keytool -export -alias pnagent -file pnagent.cer -keystore keystore_2.ksDelete old pnagent from pnserver.ks by running the following command:
keytool -delete -alias pnagent -keystore pnserver.ks -storepass get2net -storetype JKSImport pnagent.cer into pnserver.ks by running the following command:
keytool -import -alias pnagent -file pnagent.cer -keystore pnserver.ks -storepass get2net
Creating a new bppmwsgateway keystore
Create a new bppmwsgateway keypair certificate by running the following command:
keytool -genkey -keyalg RSA -alias bppmwsgateway -keystore keystore_3.ks -storepass get2net -validity 46355 -keysize 2048 -sigalg SHA256withRSAThis command prompts you to enter the details such as name, organization details as shown in the following code block. Type the details appropriately.
What is your first and last name?
[Unknown]: BPPM REST WS GATEWAY
What is the name of your organizational unit?
[Unknown]: <organizational unit>
What is the name of your organization?
[Unknown]: <company>
What is the name of your City or Locality?
[Unknown]: <city>
What is the name of your State or Province?
[Unknown]: <state>
What is the two-letter country code for this unit?
[Unknown]: <country code>
Is CN=BPPM REST WS GATEWAY, OU=<organizational unit>, O=<company>, L=<city>, ST=<state>, C=<country code> correct?
[no]: yesIt updates file keystore_3.ks with alias bppmwsgateway
Export Keypair from keystore_3.ks as bppmwsgateway.p12 by running the following command:
keytool -importkeystore -srckeystore keystore_3.ks -destkeystore bppmwsgateway.p12 -deststoretype PKCS12Delete old pnca from pnserver.ks by running the following command:
keytool -delete -alias bppmwsgateway -keystore pnserver.ks -storepass get2net -storetype JKSImport bppmwsgateway.p12 into pnserver.ks by running the following command:
keytool -importkeystore -deststorepass get2net -destkeypass get2net -destkeystore pnserver.ks -srckeystore bppmwsgateway.p12 -srcstoretype PKCS12 -srcstorepass get2net -alias bppmwsgateway
Creating a new bmcatriumwsserversslnew certificate
Create a new pnagent certificate by running the following command.:
keytool -genkey -keyalg RSA -alias bmcatriumwsserversslnew -keystore keystore_4.ks -storepass get2net -validity 299665 -keysize 2048 -sigalg
SHA256withRSAThis command prompts you to enter the details such as name, organization details as shown in the following code block. Type the details appropriately.
What is your first and last name?
[Unknown]: ATRIUM WS SSL SERVER
What is the name of your organizational unit?
[Unknown]: <organizational unit>
What is the name of your organization?
[Unknown]: <company>
What is the name of your City or Locality?
[Unknown]: <city>
What is the name of your State or Province?
[Unknown]: <state>
What is the two-letter country code for this unit?
[Unknown]: <country code>
Is CN=<FirstName LastName>, OU=<organizational unit>, O=<company>, L=<city>, ST=<state>, C=<country code>correct?
[no]: yesIt create file keystore_4.ks with alias bmcatriumwsserversslnew
Export certificate from keystore_4.ks as bmcatriumwsserversslnew.cer by running the following command:
keytool -export -alias bmcatriumwsserversslnew -file bmcatriumwsserversslnew.cer -keystore keystore_4.ksDelete old pnagent from pnserver.ks by running the following command:
keytool -delete -alias bmcatriumwsserversslnew -keystore pnserver.ks -storepass get2net -storetype JKSImport pnagent.cer into pnserver.ks by running the following command:
keytool -import -alias bmcatriumwsserversslnew -file bmcatriumwsserversslnew.cer -keystore pnserver.ks -storepass get2net- Replace pnagent certificate where required ( Integration Services , TrueSight Presentation Server ,TrueSight Infrastructure Management components ).
Creating a new TunnelAgent certificate
Create new TunnelAgent certificate by running the following command:
keytool -genkey -keyalg RSA -alias "bmc proactivenet" -keystore keystore_5.ks -storepass get2net -validity 46355 -keysize 2048 -sigalg SHA256withRSAEnter the following details appropriately.
What is your first and last name?
[Unknown]: <FirstName LastName>
What is the name of your organizational unit?
[Unknown]: <organizational unit>
What is the name of your organization?
[Unknown]: <company>
What is the name of your City or Locality?
[Unknown]: <city>
What is the name of your State or Province?
[Unknown]: <state>
What is the two-letter country code for this unit?
[Unknown]: <country code>
Is CN=<FirstName LastName>, OU=<organizational unit>, O=<company>, L=<city>, ST=<state>, C=<country code>correct?
[no]: yesExport certificate from keystore_5.ks as TunnelAgent.crt by running the following command:
keytool -export -alias "bmc proactivenet" -file TunnelAgent.crt -keystore keystore_5.ksEnter keystore password get2net.
Crtificate stores in file <TunnelAgent.crt>- Copy this TunnelAgent.crt at TSIM_HOME\TrueSight\pw\apache\conf
- Restart the TrueSight Infrastructure Mangement Server.
Related topic
You can also explore how to implement private certificates in other TrueSight Operations Management components.