Importing the CA certificate into the IBM HTTP Server keystore
You must import the certificates that you received from Certificate Authority into the IBM® HTTP Server keystore and set the trusted certificate as the default certificate in the keystore.
Procedure
- Upload the CA certificate, root and intermediate certificates files to the /opt/IBM/HTTPServer/cert directory on the ICFM server for single server environment, or the Core server for three-server environment.
- To stop the IBM HTTP Server, run the following commands
as the root user on the ICFM
server for single server environment or the Core server for three-server environment:
cd /opt/IBM/HTTPServer/bin ./apachectl stop ./adminctl stop - Any truststore that is used to validate the signatures of a certificate that is obtained from
this certificate authority must have these signer certificates installed.
Upload root and intermediate signer certificates to the /opt/IBM/HTTPServer/cert directory. To import the signer certificates (from root to intermediate), run the following command for each of the root and intermediate certificates:
For example:./gskcmd -cert -add -type cms -db ../cert/key.kdb -pw db_password -label label_name -trust enable -file ../cert/signer_cert_filenamecd /opt/IBM/HTTPServer/bin ./gskcmd -cert -add -type cms -db ../cert/key.kdb -pw password -label "carootcert" -trust enable -file ../cert/carootcert.der - To verify that the signer certificates were imported successfully,
run the following command:
./gskcmd -cert -list -type cms -db ../cert/key.kdb -pw db_password - To receive the CA certificate file into IBM HTTP Server key database, run the following
command:
./gskcmd -cert -receive -type cms -db ../cert/key.kdb -pw db_password -file ../cert/cert_filename -default_cert yesFor example:./gskcmd -cert -receive -type cms -db ../cert/key.kdb -pw password -file ../cert/icfmdev109ihs_cert.der -default_cert yes - To verify that the CA certificate was loaded successfully,
run the following command:
./gskcmd -cert -list -type cms -db ../cert/key.kdb -pw db_passwordFor example:cd /opt/IBM/HTTPServer/bin ./gskcmd -cert -list -type cms -db ../cert/key.kdb -pw password - For a three-server environment, create a directory for the certificate files on the Analytics
server.
- Create the /opt/IBM/cert_files directory on the Analytics server.
- Copy the contents of the /opt/IBM/HTTPServer/cert directory from the Core server to the /opt/IBM/cert_files directory on the Analytics server.
- Enter the following command to set directory permissions:
/bin/chmod -R 755 /opt/IBM/cert_files