Importing certificates into TrueSight Orchestration Platform components after upgrades
The imports described on this page are only needed if the certificates being used are not issued by a certificate authority that is already trusted.
Note
These instructions are intended for use with upgrades to 7.9.x environments with an external Remedy Single Sign-On authentication service. You do not need to perform these steps if you are using the embedded Remedy Single Sign-On authentication service.
If you are converting your environment from HTTP to HTTPS, complete the procedures in Configuring TrueSight Orchestration to use HTTPS before performing the procedures in this page.
Importing Remedy Single Sign-On certificate files to the repository truststore
After upgrading the Platform repository, you need to add the Remedy Single Sign-On certificates to the repository truststore (Located at %REPO_HOME%/jvm/lib/security/cacerts).
Before you perform the following steps, ensure that you copy the certificates from Remedy Single Sign-On, and place them in your environment. Whether to import root, intermediate, and host certificates varies based upon the provider.
For details about working setting up security with Remedy Single Sign-On, see Remedy SSO Security planning.
Note
If Remedy Single Sign-On server is using a certificate issued by a certificate authority (CA) that is already represented in the repository cacerts file, then you need not import root and intermediate certificates.
To import the certificates
Run the following command to import the root certificate.
%REPO_HOME%/jvm/bin>keytool -importcert -alias myrootcertificate-certificate-provider -trustcacerts -file %root_certificate_location%/root-certificate -keystore %trust_store_location%/truststore
Run the following command to import the intermediate certificate.
%REPO_HOME%/jvm/bin>keytool -importcert -alias myintermdiate-certificate-provider -trustcacerts -file %intermediate_certificate_location%/intermediate-certificate -keystore %trust_store_location%/truststore
Run the following command to add or import the host certificate.
%REPO_HOME%/jvm/bin>keytool -importcert -alias myhostcertificate-certificate-provider -trustcacerts -file %host_certificate_location%/host-certificate -keystore %trust_store_location%/truststore
Note
If you have different certificates for individual host components, such as BMC Remedy Single Sign-On or the repository, then you need to add the host certificate to the truststore file.
Importing repository certificate files after upgrading CDP
After you upgrade the CDP, the root certificate gets copied from the repository cacerts file to the jssecacerts file (located at %CDP_HOME%/jvm/lib/security/jssecacerts).
To verify that entry in the jssecacerts file is created, run the following command.
%CDP_HOME%/jvm/bin>keytool -list -v keystore ../lib/security/jssecacerts > %outputfile_location%/test.txt
- When you open the test.txt file an entry for root certificate in the jssecacerts file is visible.
You can manually import intermediate certificate into the jssecacerts file using the same command, as described in Adding certificate files while upgrading the repository.
Importing certificate files after upgrading other peers
The HTTPS certificate for each of the servers listed needs to be copied to the trust store (cacerts and jssecacerts) of each of the paired clients. The following table lists the client/server communication relationships for each type of component.
Client relationships
Client | Server |
---|---|
CDP | Repository, HA-CDP (in a high-availability environment), CDP (for Orca and Legacy web services) |
HA-CDP | Repository, CDP |
Repository | Repository Note In environments that have multiple repositories, each repository needs to import the certificate of the repository with which it will communicate. |
AP | CDP, AP (for Legacy web services) |
LAP | CDP |
Development Studio | Repository, CDP |
Operator Control Panel | CDP |
Comments
Log in or register to comment.