-
Using Internet Explorer, connect to the URL: https://<MCS
Server full computer name>:<https port>/<ENOVIA application
name>/emxLogin.jsp.
A certificate error appears in the address bar.
-
Click
Continue to this website (not recommended).
-
Click Certificate Error in the address bar and select
View certificate
in the certificate dialog. In the
General tab click
Install Certificate.
The Certificate Import Wizard appears.
-
Click Next and select the following:
- Automatically select the certificate store based on the type
of certificate.
- Place all the certificate in the following store.
-
Click Next and the details of the selected options appear. Click
Finish.
The import was successful message appears.
-
Click
Tools >
Internet Options >
Content tab in your browser.
-
Click Certificates and select the
Trusted Root Certification Authorities tab.
-
Select the certificate issued to
servername
, that is issued by
servername
.
Note:
servername
is the full computer name of the
machine on which the application server, in which the MCS application is
deployed, is running.
-
Click
Export.
-
Click
Next in the
Certificate Export Wizard.
-
Select the default option for "
Export File
Format
" (DER encoded binary X.509 (.CER)) and click
Next.
-
Enter an appropriate file name and note down the full path, which
is specified. For example, the full path can be
C:\root.der
.
-
Click
Next and click
Finish.
-
Close other dialogs and open the command prompt.
-
Go to the <JRE_HOME>/bin folder for this JRE and then run
the following command:
keytool -list -keystore <JRE_HOME>\lib\security\cacerts
where <JRE_HOME> is the home location of the latest
compatible (with 3DEXPERIENCE server) and supported (as per Program Directory)
JRE update installed on your client computer.
-
Enter the keystore password.
Note:
Contact your administrator for the keystore
password.
The following information is displayed along with a list
of certificates:
Keystore type: JKS
Keystore provider: SUN
Your keystore contains <x> entries.
-
Import the certificate, which was exported in steps 6 to 13 using
the following command:
keytool -importcert -trustcacerts -v -file
<FullPathOfCertificateFile> -alias <UniqueAliasName> -keystore
<JRE_HOME>\lib\security\cacerts
where,
FullPathOfCertificateFile is the full path of the file into which
the certificate was exported in step 12. For example, C:\root.der.
-
Enter the keystore password.
Note:
Contact your administrator for the keystore password.
The information about the certificate is displayed in a
confirmation message.
-
Type
Yes
and press
Enter
.
A success message is displayed.
-
In
<JRE_HOME>/bin
run the following command:
keytool -list -keystore
<JRE_HOME>\lib\security\cacerts
-
Enter the keystore password.
Note:
Contact your administrator for the keystore password.
The following information is displayed along with a list of
certificates.
Keystore type: JKS
Keystore provider: SUN
Your keystore contains <x+1> entries
This message confirms that your private root certificate is added to the Extranet server
cacerts keystore, as a trusted certificate authority.
Note:
When JRE is updated on client
side to use the existing SOLIDWORKS PLM Collaboration Services you should manually
update the JAVA_HOME
in Env.txt
.