Applying security certificates to your applications
You can use a custom cacerts or self-signed certificate as a security certificate for your Service Management applications in the following cases:
- You want to use a custom CA certificate or self-signed certificate to use HTTPS communication for applications.
- You want BMC Helix Innovation Suite to communicate with third-party services that use custom cacerts.
When you use BMC Helix Innovation Suite and application components to communicate with third-party services that do not have trusted CA signed security certificates, you must apply security certificates to perform outbound HTTPS calls. To achieve this communication, a security certificate file with third-party service public keys is used for authentication. A platform or application component requires a Java trust store to verify third-party service credentials. You must add the security certificate files to the trust store.
The following image describes the actions to apply security certificates to an application:
To use custom certificates for HTTPS communication
- Download the cacerts file.
- Customize the cacerts file.
- Customize the cacerts file by adding the authentication details required to allow communication between BMC Helix Innovation Suite and application components with third-party services.
To add the new certificate to the trust store, run the following key tool command:
keytool -importcert -v -alias <alias name> -file <Path of the certificate file that contains the public key> -keystore <Path of the cacerts file>For example,
keytool -importcert -v -alias <alias name> -file /tmp/<certificatefilename> -keystore /opt/cacertsThe key tool prompts for a password.
- Enter the password as changeit and press Enter.
While performing the installation, in the CACERTS_FILE parameter, upload the custom cacerts file.
To use custom certificates to communicate with third-party services
- Download the cacerts file.
- Customize the cacerts file.
- Customize the cacerts file by adding the authentication details required to allow communication between BMC Helix Innovation Suite and application components with third-party services.
To add the new certificate to the trust store, run the following key tool command:
keytool -importcert -v -alias <alias name> -file <Path of the certificate file that contains the public key> -keystore <Path of the cacerts file>For example,
keytool -importcert -v -alias <alias name> -file /tmp/<certificatefilename> -keystore /opt/cacertsThe key tool prompts for a password.
- Enter the password as changeit and press Enter.
- To add a custom certificate while performing the installation, in the CACERTS_FILE parameter, upload the custom cacerts file.
- (Optional) To add a custom certificate post-installation of BMC Helix Innovation Suite and applications, perform the following steps:
- On the BMC Deployment Engine that is your Jenkins server, navigate to the HELIX_ONPREM_DEPLOYMENT pipeline.
- In the HELIX_ONPREM_DEPLOYMENT pipeline, in the Build History section, select the last job, and click Rebuild.
- In the CUSTOMER-INFO section, in the CACERTS_FILE parameter, click Browse and upload your custom cacerts file.
- In the PRODUCT-DEPLOY section, select only the HELIX_GENERATE_CONFIG check box.
- Build the HELIX_ONPREM_DEPLOYMENT pipeline by using the Rebuild option.
Make sure that the HELIX_ONPREM_DEPLOYMENT pipeline runs successfully.
- Select the HELIX_ONPREM_DEPLOYMENT pipeline, select the latest build, and click Rebuild.
- In the CUSTOMER-INFO section, specify the parameter value as
- In the PRODUCT-DEPLOY section, clear the HELIX_GENERATE_CONFIG check box, and select the HELIX_PLATFORM_DEPLOY, HELIX_NONPLATFORM_DEPLOY, and HELIX_SMARTAPPS_DEPLOY check boxes.
- Click Rebuild.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*