Customizing user-facing certificates
How to set the user-facing endpoints of API Connect to use your own TLS server certificates.
Before you begin
Identify the user-facing certificates that you want to customize: Table 6.
Ensure that you have certificate, key, and CA PEM files for each certificate you want to customize. The PEM files must not be password-protected.
For example, to customize the certificate that secures the Cloud Manager UI, you must have the following PEM files: cloud-admin-ui-cert.pem, cloud-admin-ui-key.pem, cloud-admin-ui-ca.pem
User-facing certificates must meet the following requirements:
- Specify Extended Key Usage (EKU) of
serverAuth
. - Include the Subject Alternative Name (SAN) of the endpoint that they secure.
- If the certificate is signed by an intermediate CA, then the ca.pem file must contain the full chain to root CA.
About this task
You update the user-facing certificates with the apicup command.
You can set custom user-facing certificates during installation, or you can update them after installation, replacing the default certificates that are generated.
Note: API Connect verifies
certificates when you set them, but does not continuously monitor them for expiry. You are
responsible for monitoring and updating your custom certificates before they expire.