Installing customized SSL certificates for use in TADDM
You can install your own customized SSL certificates and use them with TADDM.
-
Create a backup copy of the following keystore files:
$COLLATION_HOME/etc/serverkeys
$COLLATION_HOME/etc/jssecacerts.cert
-
Go to the $COLLATION_HOME/etc directory, open command line and enter the
keytool
and TADDMsslpassphrase
parameters with the values in the following manner:- Linux operating
system:
keytool=../external/jdk-Linux-x86_64/bin/keytool pass=XXXXXXXX30374
- Windows operating
system:
set keytool=..\external\jdk-Windows-i386-64\bin\keytool.exe set pass=XXXXXXXX30374
pass
parameter is the value of thecom.collation.sslpassphrase
property that is specified in the collation.properties file. - Linux operating
system:
-
Remove self-signed certificate and key from TADDM by running the following commands:
- Linux operating
system:
$keytool -delete -alias collation -noprompt -keystore jssecacerts.cert -storepass $pass $keytool -delete -alias collation -noprompt -keystore serverkeys -storepass $pass
- Windows operating
system:
%keytool% -delete -alias collation -noprompt -keystore jssecacerts.cert -storepass %pass% %keytool% -delete -alias collation -noprompt -keystore serverkeys -storepass %pass%
- Linux operating
system:
-
Generate SSL key with the required CN, validity, algorithm, and other parameters, and save it
to the serverkeys file.
For example, you can run the following command:
- Linux operating
system:
$keytool -genkey -alias collation -keystore serverkeys -validity 3650 -keyAlg RSA -sigalg SHA256WithRSA -keypass $pass -storepass $pass -dname "CN=John Public, OU=Engineering, OU=NA, o=Company, L=Manhattan, S=New York, c=US"
- Windows operating
system:
%keytool% -genkey -alias collation -keystore serverkeys -validity 3650 -keyAlg RSA -sigalg SHA256WithRSA -keypass %pass% -storepass %pass% -dname "CN=John Public, OU=Engineering, OU=NA, o=Company, L=Manhattan, S=New York, c=US"
- Linux operating
system:
-
Create another backup copy of the
serverkeys
file, where you saved the generated SSL key. -
Generate the certificate signing request (CSR file) by running the following command:
- Linux operating
system:
$keytool -certreq -alias collation -storepass $pass -file /tmp/certreq.csr -keystore serverkeys
- Windows operating
system:
%keytool% -certreq -alias collation -storepass %pass% -file C:\temp\certreq.csr -keystore serverkeys
- Linux operating
system:
-
Use the CSR file to get the SSL certificate from official certificate authority. Save the
certificate on your TADDM server, for example in the tmp directory on Linux
operating system, or in the C:\temp directory on Windows operating
system.
Note: There are two types of certificates: 'Individual certificate' and 'Full chain of certificate'.
To import the received certificate ('Individual certificate' or 'Full chain of certificate') to both serverkeys and jssecacerts.cert files on TADDM, run the below commands:
Important: For the-file
parameter, specify the path to the file where you saved the SSL certificate in the previous step, for example: /tmp/cert.crt on Linux operating system.- Individual certificate
-
- Linux operating
system:
$keytool -import -trustcacerts -alias root -noprompt -keystore serverkeys -storepass $pass -keypass $pass -file /tmp/CAcert.cer
$keytool -import -trustcacerts -alias intermediate -noprompt -keystore serverkeys -storepass $pass -keypass $pass -file /tmp/IntermediateCAcert.cer
$keytool -import -trustcacerts -alias server -noprompt -keystore serverkeys -storepass $pass -keypass $pass -file /tmp/serverCAcert.cer
$keytool -import -trustcacerts -alias root -noprompt -keystore jssecacerts.cert -storepass $pass -keypass $pass -file /tmp/CAcert.cer
$keytool -import -trustcacerts -alias intermediate -noprompt -keystore jssecacerts.cert -storepass $pass -keypass $pass -file /tmp/IntermediateCAcert.cer
$keytool -import -trustcacerts -alias server -noprompt -keystore jssecacerts.cert -storepass $pass -keypass $pass -file /tmp/serverCAcert.cer
- Windows operating
system:
%keytool% -import -trustcacerts -alias root -noprompt -keystore serverkeys -storepass %pass% -keypass %pass% -file C:\temp\CAcert.cer
%keytool% -import -trustcacerts -alias intermediate -noprompt -keystore serverkeys -storepass %pass% -keypass %pass% -file C:\temp\IntermediateCAcert.cer
%keytool% -import -trustcacerts -alias server -noprompt -keystore serverkeys -storepass %pass% -keypass %pass% -file C:\temp\serverCAcert.cer
%keytool% -import -trustcacerts -alias root -noprompt -keystore jssecacerts.cert -storepass %pass% -keypass %pass% -file C:\temp\CAcert.cer
%keytool% -import -trustcacerts -alias intermediate -noprompt -keystore jssecacerts.cert -storepass %pass% -keypass %pass% -file C:\temp\IntermediateCAcert.cer
%keytool% -import -trustcacerts -alias server -noprompt -keystore jssecacerts.cert -storepass %pass% -keypass %pass% -file C:\temp\serverCAcert.cer
- Linux operating
system:
- Full chain of certificates
-
- Linux operating system
:
$keytool –import –trustcacerts -alias collation -noprompt –keystore serverkeys -storepass $pass -keypass $pass -file /tmp/cert_chain.crt
$keytool –import –trustcacerts -alias collation -noprompt –keystore jssecacerts.cert -storepass $pass -keypass $pass -file /tmp/cert_chain.crt
- Windows operating
system:
%keytool% -import -trustcacerts -alias collation -noprompt -keystore serverkeys -storepass %pass% -keypass %pass% -file C:\temp\cert_chain.crt
%keytool% -import -trustcacerts -alias collation -noprompt -keystore jssecacerts.cert -storepass %pass% -keypass %pass% -file C:\temp\cert_chain.crt
- Linux operating system
:
- Restart the TADDM server.
Keep the backup copies of the serverkeys file that you generated in step 4,
and the file where you saved the SSL certificate in step 7. If you must replace or renew the
certificate, these files are necessary. To replace, or renew the certificate, complete the following
steps:
- Repeat the steps 2 and 3.
- Restore the serverkeys file.
- Repeat the steps 8 and 9.