Adding outbound certificates
About this task
- Secure SSL/TLS connections - Some certificates that are required in the truststore to establish the connection and to trust the certificate that is returned are referred as third-party certificates.
- Mutually authenticated secure SSL/TLS connections - The application requires a client certificate that is used to establish the secure connection. For the application, to have a client certificate, you must upload both the certificate and private key.
When you want to establish a TLS connection, the Sterling™ Order Management System application must trust the server with which it is connecting. To establish this trust, the Sterling Order Management System application must be able to validate the certificate that is returned by the server. The Sterling Order Management System application can either trust the certificates directly or can trust the issuers that created the certificates. If the Sterling Order Management System application trusts the issuers of the certificates, there is no impact when certificates are updated for a server.
- Go to the jdk/bin directory in the extracted runtime of your developer
toolkit.
devtoolkit_docker/runtime/jdk/bin - Run the following
command.
./keytool -list -keystore ../jre/lib/omoc_security/cacerts - Enter changeit if prompted for a password.
A list of all trusted certificates is displayed which are also available in the cloud environments.
It is recommended that you provide the intermediate certificate and root certificate so that the application has a complete list of trust in the truststore. For client certificates, you can also use the trust chain to identify which certificate to use.
A certificate chain is an ordered list of certificates and contains an SSL Certificate and the certificate authority (CA) certificates. It enables the receiver to verify that the sender and all the CA certificates are trustworthy. The chain starts with an SSL certificate, and each certificate in the chain is signed by the entity that is identified by the next certificate in the chain.
Any certificate that is between the SSL Certificate and the Root Certificate is called a chain or Intermediate Certificate. The Intermediate Certificate is the signer or issuer of the SSL Certificate. The Root CA Certificate is the signer or issuer of the Intermediate Certificate. To make the SSL certificate compatible with all clients, it is mandatory that the Intermediate Certificate is installed. You can add multiple Intermediate Certificates.
The chain ends with a Root CA Certificate. The Root CA Certificate is always signed by the certificate authority itself. The signatures of all certificates in the chain must be verified up to the Root CA Certificate.
You can upload intermediate certificates as trust certificates so that an Sterling Order Management System environment can trust that certificate. If an Sterling Order Management System environment trusts an intermediate certificate, it can also trust all endpoint client certificates that are signed by that intermediate certificate.
You must not upload certificates directly and must use the trust chain. So, when the certificates change, you can update them easily.
For more information about accessing IBM Sterling® Order Management System applications, see Accessing IBM Sterling Order Management System applications.