Previous Topic: FIPS Mode LoggingNext Topic: Useful Commands


Replacing CA IdentityMinder Certificates with SHA-2 Signed SSL Certificates

SHA-2 SSL certificate hashing is a cryptographic algorithm developed by the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA). SHA2 certificates are more secure than all previous algorithms. In CA IdentityMinder, you can configure SHA-2 signed SSL certificates in place of certificates that are signed with the SHA-1 hash function.

Note: For more information about configuring SSL certificates, see the Installation Guide.

The following table shows the path location on the CA IdentityMinder server where you can place the SHA-2 signed certificates:

Certificates

Install Location

Description

Provisioning Server Certificate

[Provisioning Server install dir]/data/tls/server/eta2_servercert.pem

[Provisioning Server install dir]/data/tls/server/eta2_serverkey.pem

cs_install/ccs/data/tls/server/eta2_servercert.pem

cs_install/ccs/data/tls/server/eta2_serverkey.pem

cs_install/jcs/conf/eta2_server.p12

Used by the Provisioning Server in .pem format and by CA IAM CS in .p12 format (including signed cert, private key and root CA cert).

Note: Import the eta2_server.p12 into cs_install/jcs/conf/ssl.keystore under the alias eta2_server and remove the existing entry. The ssl.keystore password is the password of the connector server that is supplied during the install.

Provisioning Client Certificate

[Provisioning Server install dir]/data/tls/client/eta2_clientcert.pem

[Provisioning Server install dir]/data/tls/client/eta2_clientkey.pem

[Provisioning Manager install dir]/data/tls/client/eta2_clientcert.pem

[Provisioning Manager install dir]/data/tls/client/eta2_clientkey.pem

cs_install/ccs/data/tls/ client/eta2_clientcert.pem

cs_install/ccs/data/tls/ client/eta2_clientkey.pem

cs_install/jcs/conf/eta2_client.p12

Used by the Provisioning Server in .pem format and by CA IAM CS in .p12 format (including signed cert, private key and root CA cert).

Provisioning Directory Trusted Certificate

cadir_install/config/ssld/impd_trusted.pem

Used by CA Directory in .pem format. It must contain certificate content in the following structure:

-----BEGIN CERTIFICATE-----

Cert contents

-----END CERTIFICATE-----

Provisioning Directory Personality Certificate

cadir_install/config/ssld/personalities/impd-co.pem

cadir_install/config/ssld/personalities/impd-inc.pem

cadir_install/config/ssld/personalities/impd-main.pem

cadir_install/config/ssld/personalities/impd-notify.pem

cadir_install/config/ssld/personalities/impd-router.pem

Used by CA Directory in .pem format.

Root CA Certificate

[Provisioning Server install dir]/data/tls/et2_cacert.pem

[Provisioning Manager install dir]/data/tls/et2_cacert.pem

cs_install/ccs/data/tls/ et2_cacert.pem

conxp_install/lib/jiam.jar

[Application Server install dir]/iam_im.ear/library/jiam.jar

Certificate is Imported into Connector Xpress keystore located at [Connector Xpress install dir]/conf/ssl.keystore.

The certificate must also be imported into the jiam.jar keystore. To import, extract the jar, import the certificate into admincacerts.jks and then repackage the jar contents. The keystore password of admincacerts.jks is "changeit". Verify that all copies of jiam.jar are replaced.