Creating and installing a CA-signed server certificate for SSMC
SSMC ships with a self-signed certificate by default. HPE recommends you to install your own CA-signed certificate for the web server considering your enterprise security policy and practices. So, SSMC provides the necessary hooks and tools to generate and install a CA-signed certificate for the SSMC web server.
- Contact the CA signing authority for your enterprise. Explain that a CSR (Certificate Signing Request) in
PKCS#10 (RFC 2986)
format can be provided for SSMC, and one or more corresponding CA-signed certificates must be in PEM format that conforms to X.509 certificate standard. Consult them on what is required for the certificate fields, for example:Common Name, “CN=”; Organization Unit, “OU=”; Organization, “O=”; Locality or city, “L=”; State, “ST=”; Country, “C=”. Certificate validity in days
Once you have received the CA signed certificates, download the root and intermediate PEM encoded CA-signed certificates from your corporate CA website.
Import the root and intermediate CA certificates into the client web browser.
If you are creating this keystore after you have enabled FIPS (not recommended), you must make additional modifications to the keystore. See Modifying keystore entries for FIPS.
Migrating from any prior SSMC versions using the HPE SSMC Migration Tool overwrites the CA-signed certificate that may be installed on the target appliance with the one from source. Hewlett Packard Enterprise recommends you to install the CA-signed certificate on the target appliance only after the migration is done. If your target appliance already has the CA-signed certificate installed, then you have to reinstall CA certificate post migration.