This procedure describes how to renew your own CORBA certificate.
Before you begin:
Verify that you have one or all of the following: the signed certificate, its private key, and its CA chain in one of the following formats:
NOTE: All components must be signed using the same CA Certificate. Private key passwords must exist for PKCS#12 and PEM, however the Certificate PEM must not to be locked/protected by password.
To replace CORBA certificates:
PEM format: Manage_SSL_BYO -input pem
-component {component name}
-output { Manage_SSL output deployment directory}
-output_keystores_password {Component keystore password}
-certificate {certificate pem file}
-private_key {certificate private key pem file}
-password {password for private key pem file}
-ca_certificates {CA certificate chain PEM file}
PKCS#12 format: Manage_SSL_BYO -input PKCS#12
-component {component name}
-output { Manage_SSL output deployment directory}
-output_keystores_password {Component keystore password}
-file {pkcs#12 file to import from}
-password {password of pkcs#12 file}
[-cert_and_key_name {name of the certificate and private key to import }]
Supported -component values:
CONTROL-M_Agent
CONTROL-M_Server
CONTROL-M_EnterpriseManagerServers
CONTROL-M_BPI
CONTROL-M_Web_Application
CONTROL-M_EnterpriseManagerAPI
CONTROL-M_zOS
EXAMPLE:
Manage_SSL_BYO -input pem -component CONTROL-M_EnterpriseManagerServers -output CTMEM -output_keystores -password abcd1234 -certificate certificate.pem -private_key privatekey.pem -password abcd1234 -ca_certificates ca-chain.cert.pem
Manage_SSL_BYO -input PKCS#12 -component CONTROL-M_EnterpriseManagerServers -output CTMEM -output_keystores -file em.p12 -password abcd1234 -cert_and_key_name
Parent Topic |