Manually modifying the web server keystore for FIPS mode compliance
Use this procedure to modify the keystore file when you have enabled FIPS prior to creating a server certificate according to the SSMC procedures.
Procedure
-
From the system where you installed SSMC, rename the default keystore so you can easily revert to a non-FIPS installation.
ssmcadmin@server2:/opt/hpe/ssmc/ssmcbase/etc$ pwd /opt/hpe/ssmc/ssmcbase/etc ssmcadmin@server2:/opt/hpe/ssmc/ssmcbase/etc$ mv keystore keystore.nofps
-
Navigate to
/opt/hpe/ssmc/ssmcbase/fips/jre/bin
, and then run the following command:./keytool -provider org.bouncycastle.jcajce.provider.BouncyCastleFipsProvider -providerpath /opt/hpe/ssmc/ssmcbase/bcFipsJars/bc-fips-1.0.1.jar -importkeystore -srckeystore /opt/hpe/ssmc/ssmcbase/etc/keystore.nofps -destkeystore /opt/hpe/ssmc/ssmcbase/etc/keystore -srcstoretype JKS -deststoretype BCFKS -srcstorepass <store password> -deststorepass <store password> -srckeypass <key password> -destkeypass <key password> -alias jetty
-
Update the
jetty-ssl-context.xml
file in/opt/hpe/ssmc/ssmcbase/etc
with the passwords used by the keystore:If you changed the default password to the keystore as a whole, modify the KeyStorePassword entry.
If you changed the password to the private key inside the keystore, change the KeyManagerPassword.
If your security policy requires obfuscating passwords prior to storing them in configuration files, follow the procedure mentioned in the section Using obfuscated passwords in configuration files.