Install a certificate from a Certificate Authority (CA) to replace the default self-signed certificate used to secure the SSL connection between AX Server and client applications.
This task requires you use Oracle's keytool utility for managing keys and certificates. For more information about the keytool utility, see the Oracle keytool documentation.
To successfully complete this task, you should also be comfortable working with security certificates and Java KeyStore technology:
If you run into any issues while you are configuring the security certificate, you can restore your original configuration by stopping the Analytics Exchange Service, restoring these files, and then restarting the service.
Tip
Add the Java bin subdirectory to your OS PATH environment variable so that you can use the keytool command without specifying the full path. To add the subdirectory to the path for your session, execute Set PATH=<java_bin_path>;%PATH%.
keytool -genkeypair -alias <alias> -keyalg RSA -keystore <keystore_filename>
Field | Example |
---|---|
What is your first and last name? Note You must enter the hostname of your AX Server instance for this question. | axserver.ax.com |
What is the name of your organizational unit? | Purchasing |
What is the name of your organization? | ExampleCompany |
What is the name of your City or Locality? | Cupertino |
What is the name of your State or Province? | CA |
What is the two-letter country code for this unit? | US |
Is <CN=axserver.ax.com, OU=Purchasing, O=ExampleCompany, L=Cupertino, ST=CA, C=US> correct? | y |
Press Enter to use the same password as the keystore or specify a new password and press Enter.
Note
Skip this section if you are using an existing certificate.
If you purchased your security certificate from a commercial CA, such as VeriSign, consult the documentation they provide for information on configuring your keystore. Create a CSR using the following syntax:
keytool -certreq -alias <alias> -keyalg RSA -file <csr_output_file> -keystore <keystore_filename>
Result You now have a file that you can use to request a certificate from a certificate authority.
If your certificate is in a format such as PKCS12 that cannot be imported into a keystore, and you cannot convert it to the PEM format, contact ACL Support Services for assistance with configuring the certificate in Tomcat.
keytool -import -alias <alias> -keystore <keystore_filename> -trustcacerts -file <certificate_filename>
If you are importing both certificates the alias specified for each certificate should be unique. You need to first import the root certificate, and then run the keytool command again to import the intermediate certificate.
keytool -import -alias <alias> -keystore <keystore_filename> -trustcacerts -file <certificate_filename>
The alias specified must be the same value specified when you generated the keystore. The imported certificate will replace the default self-signed certificate created in the keystore.
This configuration must be completed on each end-user computer where AX Client is installed if you are using a certificate without a root certificate in the cacerts file by default.
The default location is C:\Program Files(x86)\ACL Software\ACL Analytics Exchange Client\jre\lib\security
keytool -import -alias <alias> -keystore <cacerts_file> -trustcacerts -file <certificate_filename>
If you are importing both certificates the alias specified for each certificate should be unique.
The default Java password for the cacerts file is changeit.
If necessary, install the certificate in the web browser on each computer that will access Analytics Exchange web applications.
Note
This is not necessary if the certificate is provided by a CA listed in the Trusted Root Certification Authorities list in Internet Explorer. Large commercial CAs, such as VeriSign, are included in this list.