Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
- Requirements for required SSL encryption and trusted clients
- Example: Enabling required SSL encryption and trusted clients
- Example: Generating a client certificate with OpenSSL
- Example: Generating a server certificate with OpenSSL
- Example: Viewing the contents of a cacerts file
- Add a client certificate to the Web tier
- Update the cacerts keystore file
- Use keytool to create a certificate request
- Use keytool to create a private key
Example: Generating a server certificate with OpenSSL
The following example describes how to create a signed server certificate using the OpenSSL toolkit as a private certificate authority. This example also uses the keytool utility available with the Sun Microsystems™ standard Java Development Kit. You can use a server certificate to enable SSL encryption from the HPE Service Manager server.
Note The information contained in this example regarding OpenSSL technology is provided by HPE as a courtesy to our customers and partners. This documentation does not replace an OpenSSL reference, and HPE encourages you to conduct additional research regarding OpenSSL technology by consulting with sources outside of this document. HPE hereby disclaims all liability associated with the use and accuracy of this information. As OpenSSL technology evolves, HPE may or may not update this reference.
- Obtain and install a Java platform on the server you want to use as your private certificate authority. See the Sun Microsystems™ Java Technology site for the necessary software and documentation.
-
Obtain and install OpenSSL on the server you want to use as your private certificate authority. See the OpenSSL Web site for the necessary software and documentation.
Caution HPE strongly recommends that you do not install your private certificate authority on the same server as your Service Manager production server.
- Create and configure an
openssl.conf
file in thebin
folder of your OpenSSL installation. - Open the operating system's command prompt on the private certificate authority server.
- Change directories to the OpenSSL
bin
folder. - Type the following command to create the private key for your private certificate authority:
openssl genrsa -des3 -out cakey.pem 2048
- When OpenSSL prompts you, type the password phrase you want to use to protect your certificate authority's private key file (
cakey.pem
). For example,CAKeyPassword
.
You must use the same password phrase each time you sign a certificate request with your private certificate authority. If you forget this password, you must repeat the steps to create another certificate authority private key. - Type the following command to create a public certificate for your private certificate authority:
openssl req -new -key cakey.pem -x509 -days 1095 -out mycacert.pem -config .\openssl.conf
- Change directories to the Java platform's
bin
folder. - Type the following command to import your private certificate authority's certificate into the Java
cacerts
file that you will publish to the rest of your network.keytool -import -keystore ./cacerts -trustcacerts -file mycacert.pem -storepass changeit
- When keytool prompts you, type
y
to trust the private certificate authority's certificate. - Install the updated Java cacerts file on the Service Manager server. Copy the
cacerts
file to theRUN
folder of the Service Manager server. You can also copy the cacerts file to the JRE\lib\security folder of your Java Run Time Environment (RTE) or Java Development Kit (JDK). - Install the updated Java cacerts file on the Service Manager web tier. Copy the
cacerts
file to the<web application server installation path>\WEB-INF
folder of the Service Manager web tier. - Install the updated Java cacerts file on the Service Manager Windows client. Copy the
cacerts
file to the<Windows client installation path>\plugins\com.hp.ov.sm.client.common_x.xx
folder of the Service Manager Windows client. - Change directories to the Java platform's
bin
folder. - Type the following command to create a private key and keystore for your Service Manager server.
keytool -genkey -alias myserver -keystore servercert.keystore
-
When keytool prompts you, type the password phrase you want to use to protect your Service Manager server's keystore file. For example,
SMServerKeyPassword
.Note Do not use the same password as your private certificate authority key password.
-
When keytool prompts you for your first and last name, type the fully qualified host name of your Service Manager server system.
Note This is the same name your clients will use to connect to the Service Manager server.
- When keytool prompts you for the organization unit, organization, city or locality, state or province, and two-letter country code, type the identification information for your company.
- Verify the information you provided and type
yes
if it is correct. -
When keytool prompts you for the password phrase to use for your Service Manager server's private key, press ENTER to use the same password as you created for the keystore.
Note The password for the private key must match the password for the keystore file.
- Type the following command to create a certificate request for your Service Manager server. For example, to create a certificate request for your HPE Service Manager server type:
keytool -certreq -alias myserver -keystore servercert.keystore -file smserver_certrequest.crs
- When keytool prompts you, type the password for the HPE Service Manager server's keystore file (from step 17). For example,
SMServerKeyPassword
. - Copy the Service Manager server's certificate request (For example,
smserver_certrequest.crs
) to the OpenSSLbin
folder. - Change directories to the OpenSSL
bin
folder. - Type the following command to sign the Service Manager server's certificate request with your private certificate authority:
openssl x509 -req -days 365 -in smserver_certrequest.crs -CA mycacert.pem -CAkey cakey.pem -CAcreateserial -out smserver_cert.pem
-
When OpenSSL prompts you, type the password for your certificate authority's private key. For example,
CAKeyPassword
.OpenSSL stores the new signed certificate (
smserver_cert.pem
) in thenewcerts
directory.Tip To view the contents of the signed certificate, you can type following command:
openssl x509 -in smserver_cert.pem -text -noout
- Copy the signed client certificate (
smserver_cert.pem
) to the OpenSSL server's Java platformbin
folder. - Open the operating system's command prompt.
- Change directories to the Java platform's
bin
folder. - Type the following command to import the Service Manager server's signed certificate into the server keystore.
keytool -import -trustcacerts -alias myserver -keystore ./servercert.keystore -file smserver_cert.pem
- When keytool prompts you to trust the private certificate authority's certificate, type
y
. - When keytool prompts you, type the password to your server's keystore file. For example,
SMServerKeyPassword
.
Related concepts
Example: Enabling required SSL encryption
Example: Enabling required SSL encryption and client authentication
Example: Enabling required SSL encryption and trusted clients
Example: Enabling trusted sign-on
Example: Viewing the contents of a cacerts file
Java Technology Web site
OpenSSL Web site"
Secure Sockets Layer (SSL) encryption and server certificates
What are PEM files?
What is a cacerts file?
Related tasks
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to ovdoc-ITSM@hp.com.
Help Topic ID:
Product:
Topic Title:
Feedback: