Generate Your Own Certificate and Private Key
At installation time, the Exalead CloudView installer generates a self-signed certificate. However, for production, it is better to generate your own certificate signed by a trusted certificate authority.
- Stop the Exalead CloudView server.
-
Verify your certificate format using the following command:
openssl x509 -in <infile.cert> -text -inform <format>
The certificate must follow these requirements:
- DER format to facilitate the integration with Java tools (certification import/export in trust stores, etc.), or PEM depending on your needs.
- Generated key length must be: 2048 bits.
- Modulus must be: 2048 bits.
- Exalead CloudView also supports SHA-2 certificates.
-
Encrypted PEM files usually storePrivate keys. Convert them to a nonencrypted file.
You can use openssl on the command line:
openssl pkcs8 -topk8 -in <key> -out <hostname>-<instance>.key -nocrypt
The Private key must follow these requirements:
- Standard not encrypted
PEM
file format. - Generated key length must be 2048 bits.
- It must have the following headers and
footers:
-----BEGIN PRIVATE KEY----- -----END PRIVATE KEY-----
- Standard not encrypted
-
Verify that Exalead CloudView stores the certificate correctly, using UNIX LF end
of line characters:
- On Windows, you can use the following tool:
http://www.thefreecountry.com/tofrodos/index.shtml
. - On UNIX, you can use
dos2unix
.
- On Windows, you can use the following tool:
-
On each product instance, overwrite the key and certificate files generated at
installation time in
DATADIR/security
:- The public certificate:
DATADIR/security/<hostname>-<instance>.cert
- The Private key:
DATADIR/security/<hostname>-<instance>.key
Note: If you are using an alias, the Private key name must use the alias and not the default<hostname>-<instance>
. - The public certificate:
- Add the server certificate to the truststore of every product instance. See Add Certificates to the Keystore.