+

Search Tips   |   Advanced Search

 

Manage keystore configurations remotely

 

You can manage keystores remotely in a ND environment on separate machines. A node server can hold the configuration for a keystore, while the actual keystore resides on another system. After you set up a remotely managed configuration, you can perform all of the certificate and keystore operations for the keystore on the remote machine from the server that contains the keystore remote configuration. Key stores can be remotely managed only in network deployed environments.

 

Overview

Complete the following steps in the console:

 

Procedure

  1. Click Security > SSL certificate and key management > Manage endpoint security configurations > {Inbound | Outbound} > ssl_configuration > Key stores and certificates.

  2. Click New.

  3. Type a name in the Name field. This name uniquely identifies the keystore in the configuration.

  4. Type the location of the keystore file in the Path field. The location can be a file name or a file URL to an existing keystore file.

  5. Type the keystore password in the Password field. This password is for the keystore file specified in the Path field.

  6. Type the keystore password again in the Confirm Password field to confirm the password.

  7. Select a keystore type from the list. The type you select is for the keystore file specified in the Path field.

  8. Select the Remotely managed check box, and then fill in one or more hosts names of the systems where the keystore file is to be located. If you provide multiple host names, separate the host names with a pipe (|).

  9. Select any of the following optional selections:

    • The Read only selection creates a keystore configuration object but does not create a keystore file. If this option is selected, the keystore file specified in the Path field must already exist.

    • The Initialize at startup selection initializes the keystore during run time.

  10. Select Apply and Save.

 

Results

A keystore configuration object is created on the server from where the command was run. The keystore file for the configuration will be created on each system specified in the host list.

 

What to do next

Now, you can perform all certificate management operations on the keystore from the system where the keystore configuration resides. For example, you can perform certificate management operations, such as: creating a self-signed certificate, extracting a certificate, or extracting a signer certificate.

To manage a self-signed certificates by using the wsadmin tool, use the PersonalCertificateCommands group commands of the AdminTask object. For more information, see PersonalCertificateCommands command group for the AdminTask object.



Extracting a signer certificate from a personal certificate
Creating a self-signed certificate