Configure Secure Connections for SMTP

For each organization, if its SMTP server requires a secure connection, follow these steps to import the SMTP server Certificate Authority's root certificate into the Java truststore of CSA. If necessary, contact your SMTP server administrator to obtain the SMTP server certificate.

If the SMTP server does not require a secure connection, you can omit this task.

Note If you have configured CSA to be compliant with FIPS 140-2, you must substitute the CSA server truststore (for example, csa_server_truststore.p12) for the Java truststore (cacerts) and substitute the CSA server truststore password for the Java truststore password (changeit) in the examples. See the Cloud Service Automation FIPS 140-2 Compliance Configuration Guide for more information about the CSA server truststore and password.

  1. Open a command prompt and run the keytool utility with the following options to create a local trusted certificate entry for the SMTP server.

    Windows:

    "CSA_JRE_HOME\bin\keytool" -importcert -trustcacerts -alias smtp
    -keystore "CSA_JRE_HOME\lib\security\cacerts"
    -file <c:\certfile_name.cer> -storepass changeit

    Linux:

    CSA_JRE_HOME/bin/keytool -importcert -trustcacerts -alias smtp
    -keystore CSA_JRE_HOME/lib/security/cacerts
    -file </tmp/certfile_name.cer> -storepass changeit

    where CSA_JRE_HOME is the directory in which the JRE that is used by CSA is installed and <c:\certfile_name.cer> on Windows </tmp/certfile_name.cer> on Linux is the path and name of the Certificate Authority's root certificate for the SMTP server. The file extension may be .crt rather than .cer. You can also use a different value for -alias.

  2. At the prompt to import the certificate, type Yes.
  3. Press Enter.
  4. Restart CSA.

    See Restart CSA for instructions.