Preparing a new keystore with the replacement key pair
You can replace the self-signed certificate with an existing key pair. As an alternative, you can use the certificate that is associated with the original key pair.
Using an existing key pair
To use an existing key pair, use the manage-certificates
tool that is located in the server’s bin
or bat
directory, depending on your operating system.
About this task
If a private key and certificate already exist in PEM-encoded format, they can replace both the original private key and the self-signed certificate in keystore
, instead of replacing the self-signed certificate associated with the original server-generated private key.
Steps
-
Import the existing certificates using the
manage-certificates import-certificate
.Order the certificates that use the
--certificate-file
option so that each subsequent certificate functions as the issuer for the previous one.List the server certificate first, then any intermediate certificates, and then list the root certificate authority (CA) certificate. Because some deployments do not feature an intermediate issuer, you might need to import only the server certificate and a single issuer.
For example, the following command imports the existing certificates into a new keystore file named
keystore.new
.manage-certificates import-certificate \ --keystore keystore.new \ --keystore-type JKS \ --keystore-password-file keystore.pin \ --alias server-cert \ --private-key-file existing.key \ --certificate-file existing.crt \ --certificate-file intermediate.crt \ --certificate-file root-ca.crt
Replacing the certificate associated with the original key pair
Replace the certificate associated with the original server-generated private key (server-cert
) if it has expired or must be replaced with a certificate from a different certificate authority (CA).
About this task
Perform the following steps to replace the certificate associated with the original key pair:
Steps
-
Create a CSR file for the
server-cert
.Example:
manage-certificates generate-certificate-signing-request \ --keystore keystore \ --keystore-type JKS \ --keystore-password-file keystore.pin \ --alias server-cert \ --use-existing-key-pair \ --subject-dn "CN=ldap.example.com,O=Example Corporation,C=US" \ --output-file server-cert.csr
-
Submit
server-cert.csr
to a CA for signing. -
Export the server’s private key into
server-cert.key
.Example:
manage-certificates export-private-key \ --keystore keystore \ --keystore-password-file keystore.pin \ --alias server-cert \ --output-file server-cert.key
-
Import the certificates obtained from the CA, including the CA-signed server certificate, the root CA certificate, and any intermediate certificates, into
keystore.new
.Example:
manage-certificates import-certificate \ --keystore keystore.new \ --keystore-type JKS \ --keystore-password-file keystore.pin \ --alias server-cert \ --private-key-file server-cert.key \ --certificate-file server-cert.crt \ --certificate-file intermediate.crt \ --certificate-file root-ca.crt