Table of Contents

HTTPS settings

Use HTTPS Only

Change HTTPS port

Certificates

Disclaimer

Generating a certificate

Generating a Self-signed certificate

Generating a Certificate manually

Certificates from a trusted authority

Downloading and installing a self-signed certificate

Import certificate from remote sites:

Installing a certificate manually

keytool -import -trustcacerts -keystore [REDPEAKS_HOME]/certificates/.keystore -storepass agentilKeyStore \
 -noprompt -alias yourAliasName -file [REDPEAKS_HOME]/certificates/certificate.cer

Import keystore into the Redpeaks keystore

keytool -importkeystore -srckeystore yourKeyStore.p12 -srcstoretype PKCS12 -srcstorepass agentilKeyStore \
 -destkeystore [REDPEAKS_HOME]/certificates/.keystore -deststoretype JKS -deststorepass agentilKeyStore

NOTE:

Building a Full PKCS12 Certificate Bundle (P12)

In some cases, you have:

The recommended way to provide a complete chain to Redpeaks is to build a PKCS12 (.p12) file containing

Ensure certificates are in PEM format

openssl x509 -inform DER -in intermediate.cer -out intermediate.crt
openssl x509 -inform DER -in root.cer -out root.crt

Build the chain file

cat intermediate.crt root.crt > chain.pem

Create PKCS12 with full chain

Example:

openssl pkcs12 -export -inkey server.key -in server.crt -certfile chain.pem -name pro_monitor -out fullcert.p12

You will be asked for an export password: use “agentilKeyStore” if you want to import it directly with default Redpeaks keystore password

Import P12 into Redpeaks keystore

keytool -importkeystore -srckeystore fullcert.p12 -srcstoretype PKCS12 \
 -srcstorepass agentilKeyStore -destkeystore [PRO_MONITOR_HOME]/certificates/.keystore -deststoretype JKS -deststorepass agentilKeyStore

Troubleshooting