Configuring SSL connections
If the Nokia NSP server is using a Secure Socket Layer (SSL) connection to encrypt data exchanged over JMS and HTTP, you will need to configure the truststore for the HTTPS connection on the Netcool/OMNIbus probe server.
- Obtain the security certificate from the NSP server.
- Import the security certificate from the NSP server.
- Verify that the security certificate has been imported into the keystore.
Obtaining a certificate file into the truststore
- Obtaining Nokia NSP security certificate from certificate authority (CA)
- Exporting security certificate file from an existing keystore file from NSP server using the
command:
./keytool -export -alias alias_name -keystore keystore_file -storepass password -file certificate_file
Where:
alias_name
is the keystore alias specified during Nokia NSP keystore generation, for example: NSP_ALIAS.keystore_file
is the path to and name of the Nokia NSP keystore file, for example: /opt/nspserver.keystore.password
is the Nokia NSP keystore password, for example: the password of nspserver.keystore.certificate_file
is the path to and name of the certificate file to be created, for example: /opt/nspcert.
Importing a security certificate into a new or an existing truststore on the Netcool/OMNIbus probe server
To import a certificate file into the truststore, use one of the following steps:
-
For importing the certificate into a new truststore, use the following command:
./keytool -import -trustcacerts -alias new_alias_name -file certificate_file -keystore truststore_file -storepass password
Note: If the alias does not point to an existing key entry in a truststore file, then keytool assumes you are adding a new trusted certificate entry into truststore file. In this case, the alias should not already exist, otherwise importing fails. -
For importing the certificate into an existing truststore, use the following command:
./keytool -import -trustcacerts -alias alias_name -file certificate_file -keystore truststore_file -storepass password
Note: If the alias points to a key entry in a truststore file, then keytool assumes you are importing a certificate reply, replacing old certificate chain with new certificate chain in truststore file.Where:
alias_name
is the key entry of the certificate reply. The alias must be the same as that specified during keystore file generation in Nokia NSP server, for example: NSP_ALIAS.new_alias_name
is the keystore alias of a new keystore, for example: NSP_ALIAS_NEW.certificate_file
is the path to and name of the certificate file created earlier, for example: /opt/nspcert.truststore_file
is the path to and name of the truststore file that will contain the imported certificate, for example: /opt/nspserver.truststore.password
is the Nokia NSP keystore password, for example: the password of nspserver.truststore.
Verifying that the security certificate has been imported into the keystore
To verify that the certificate has been imported into the keystore, use the following command:
./keytool -list -v -keystore truststore_file
Where:
truststore_file
is the path to and name of the truststore
file generated, for example: /opt/nfmpserver.trustStore.