-
Using Internet Explorer, connect to the URL: https://<MCS Server full computer
name>:<https port>/<ENOVIA application name>/emxLogin.jsp.
A certificate error appears in the address bar.
-
Click Continue to this website (not recommended).
-
Click Certificate Error in the address bar and select
View Certificate in the certificate dialog. In the
General tab click Install Certificate.
The Certificate Import Wizard appears.
-
Click Next and select the following:
- Automatically select the certificate store based on the type of certificate.
- Place all the certificate in the following store.
-
Click Next and the details of the selected options appear.
Click Finish.
The import was successful message appears.
-
Click Tools > Internet Options >
Content tab in your browser.
-
Click Certificates and select the Trusted Root
Certification Authorities tab.
-
Select the certificate issued to servername that is issued by servername.
Note:
servername is the full computer name of the machine on which the application server,
in which the MCS application is deployed, is running.
-
Click Export.
-
Click Next in the Certificate Export
Wizard.
-
Select the default option for Export File Format (DER encoded
binary X.509 (.CER)) and click Next.
-
Enter an appropriate file name and note down the full path, which is specified. For
example, the full path can be C:\root.der.
-
Click Next and click Finish.
-
Close other dialogs and open the command prompt.
-
Go to the <JAVA_HOME>/bin folder and then run the following
command:
keytool -list -keystore <JAVA_HOME>\lib\security\cacerts
where <JAVA_HOME>
is one which is mentioned in the
Env.txt
file located at
<xcadconnectorsInstallFolder>\CATEnv.
-
Enter the keystore password.
Note:
Contact your administrator for the keystore password.
The following information is displayed along with a list of certificates:
Keystore type: JKS
Keystore provider: SUN
Your keystore contains <x> entries.
-
Import the certificate, which was exported in steps 6 to 13 using the following
command:
keytool -importcert -trustcacerts -v -file
<FullPathOfCertificateFile> -alias <UniqueAliasName> -keystore
<JAVA_HOME>\lib\security\cacerts
where,
FullPathOfCertificateFile
is the full path of the file into
which the certificate was exported in step 12.
For example,
C:\root.der.
-
Enter the keystore password.
Note: Contact your administrator for the keystore password.
The information about
the certificate is displayed in a confirmation message.
-
Type Yes and press Enter.
A success message is displayed.
-
In
<JAVA_HOME>/bin
run the following command:
keytool -list -keystore <JAVA_HOME>\lib\security\cacerts
-
Enter the keystore password.
Note:
Contact your administrator for the keystore password.
The following information is displayed along with a list of certificates:
Keystore type: JKS
Keystore provider: SUN
Your keystore contains <x+1> entries.
This message confirms that your private root certificate is added to the
Extranet server cacerts keystore, as a trusted certificate authority.
When Java is
updated on client side to use the existing PLM Collaboration Services client, you should
manually update JAVA_HOME
in Env.txt
file.