PingIntelligence

Creating a CA-signed certificate

About this task

Flowchart summarizing the steps to creating a CA-signed certificate for an ASE cluster

To create a CA-signed SSL certificate:

Steps

  1. Create a cluster key pair by running the following CLI command:

    create_cluster_key_pair [--yes | -y]
    create private key for cluster server
    --yes | -y : create private key without confirmation prompt

    Example:

    The following command creates a key in the /opt/pingidentity/ase/config/certs/cluster/ directory:

    $ pingidentity/ase/bin/cli.sh -u admin -p admin create_cluster_key_pair
    Warning: create_cluster_key_pair will delete any existing cluster key_pair, CSR and self-signed certificate
    Do you want to proceed [y/n]:y
    Ok, creating new cluster key pair. Creating DH parameter may take around 20 minutes. Please wait
    Cluster key created at keystore
    Cluster dh param file created at /opt/pingidentity/ase/config/certs/cluster/dh1024.pem

    The private key in the pair is automatically created and updated in the key store in the <pi_install_path>/pingidentity/ase/config/certs/ directory.

  2. Generate a certificate signing request (CSR) from the private key using the following CLI command:

    create_cluster_csr [--yes | -y]
    create certificate signing request for cluster server
    --yes | -y : create certificate signing request without confirmation prompt

    This .csr file gets saved in the <pi_install_path>/pingidentity/ase/config/certs/cluster/ directory.

    Example:

    The following command creates a .csr file in the /opt/pingidentity/ase/config/certs/cluster/ directory:

    $ pingidentity/ase/bin/cli.sh -u admin -p admin create_cluster_csr
    Warning: create_cluster_csr will delete any existing cluster CSR and self signed certificate
    Do you want to proceed [y/n]:y
    please provide following info
    Country Code >OP
    State >GP
    Location >IP
    Organization >KP
    Organization Unit >Kpase
    Common Name >www.123.com
    Generating CSR. Please wait...
    OK, cluster csr created at /opt/pingidentity/ase/config/certs/cluster/cluster.csr
  3. Upload the CSR created in step 2 to the CA-signing authority’s website to get a CA-signed certificate.

  4. Download the CA-signed certificate from the CA-signing authority’s website.

  5. Import the signed CA-certificate into ASE cluster by running the following CLI command:

    import_cluster_cert {cert_path} [--yes | -y]
    import CA signed certificate for cluster server
    --yes | -y : import CA signed certificate without confirmation prompt

    The certificate is imported into the key store in the <pi_install_path>/pingidentity/ase/config/certs/ directory.

    Example:

    ./cli.sh -uadmin -padmin import_cluster_key_pair /home/ec2-user/cert_folder/signed_cert/test.elasticbeam.com.key
    Warning: import_cluster_key_pair will overwrite any existing cluster certificates
    Do you want to proceed [y/n]:y
    Exporting cluster key to API Security Enforcer...
    OK, key pair added to keystore
    2:43
    [ec2-user@rhel76-cluster-nodes-6-12 bin]$ ./cli.sh -uadmin -padmin import_cluster_cert /home/ec2-user/cert_folder/signed_cert/test.elastic.crt
    Warning: import_cluster_cert will overwrite any existing cluster signed certificate
    Do you want to proceed [y/n]:y
    Exporting cluster certificate to API Security Enforcer...
    OK, signed certificate added to keystore
  6. Synchronizing the key and certificate by restarting the ASE cluster.

    For more information, follow the instructions in Restarting an ASE cluster.