Minor changes are by default collapsed in the page history.
No changes
The page does not exist yet.
Failed to load changes
Version by on
Leave Collaboration
Are you sure you want to leave the realtime collaboration and continue editing alone? The changes you save while editing alone will lead to merge conflicts with the changes auto-saved by the realtime editing session.
Applying security certificates to your applications
Use security certificates to enable communication between BMC Helix Innovation Suite and application components with third-party services that do not have trusted CA signed security certificates. Use a custom CA certificate with third-party service public keys for authentication and add it to the trust store.
You can apply a security certificate while installing BMC Helix Service Management or post-installation of BMC Helix Service Management.
Warning
Important
To apply a custom or self-signed certificate for HTTPS communication, create the certificate and upload it while installing BMC Helix Service Management.
To apply a security certificate post-installation of BMC Helix Service Management
On the BMC Deployment Engine that is your Jenkins server, navigate to the HELIX_ONPREM_DEPLOYMENT pipeline.
In the HELIX_ONPREM_DEPLOYMENT pipeline, in the Build History section, select the last job, and click Rebuild.
In the CUSTOMER-INFO section, in the CUSTOM_CERTIFICATE parameter, click Browse and upload your custom cacerts file.
In the PRODUCT-DEPLOY section, select only the HELIX_GENERATE_CONFIG check box.
Build the HELIX_ONPREM_DEPLOYMENT pipeline by using the Rebuild option.
Make sure that the HELIX_ONPREM_DEPLOYMENT pipeline runs successfully.
Warning
Important
The cacerts file is checked into the Git repository when the HELIX_GENERATE_CONFIG pipeline runs successfully. In case of any failures in the HELIX_ONPREM_DEPLOYMENT or HELIX_GENERATE_CONFIG pipelines, you must upload the cacerts file in the HELIX_ONPREM_DEPLOYMENT pipeline until the HELIX_GENERATE_CONFIG pipeline executes successfully at least once.
You do not need to upload the cacerts file for consecutive execution of the HELIX_ONPREM_DEPLOYMENT pipeline and other pipelines if you do not select the HELIX_GENERATE_CONFIG pipeline.
Delete existing the cacerts secret by using the following command:
kubectl delete secret cacerts -n <Innovation Suite namespace>
Create a new secret.
Copy the cacerts file to a location by using the following command: