Obtaining a trusted certificate

Top  Previous  Next

If you want your administrators to use JSCAPE MFT Synchronizer Manager via a secure connection, you can let them connect via HTTPS. The HTTPS protocol requires an SSL certificate. You can either generate your own self-signed certificate using the Server Keys tab in the Keys module or you can create a certificate signing request (CSR) and have your certificate signed by a third party known as a certificate authority (CA).

 

Note

 

When using your own self-signed certificate the client web browser may display a warning message letting the user know that the certificate in use is not signed by a known CA. This is not an error but rather a warning to the user that the certificate has not been validated by a trusted authority. If you wish to avoid this message you should create a certificate signing request and have that certificate signed by a trusted certificate authority.

 

 

Generating a private key

 

The first step in obtaining a CA signed certificate is to generate your own server key.  The most important thing to understand when generating your server key is that the Common Name field should match the domain name that administrators will use when connecting to your HTTPS service.  For example, if your HTTPS connection will be served under the domain sync.jscape.com  then this is the value you should use in your Common Name field when generating your private key.

 

See also

 

Generating a key

 

Generating a CSR

 

The next step is to create a certificate signing request for your server key.  The CSR will be used by the CA in order to create a signed certificate.  To generate a CSR, highlight the desired server key in the Server Keys tab and then click the Generate CSR button. Upon clicking the Generate CSR button, a .csr file will be automatically downloaded onto your system. Secure this .csr file and submit it to your CA for signing.

 

Figure 39

 

clip039

 

 

Submitting CSR to CA

 

The next step is to submit your CSR to the CA for use in generating your signed certificate.  Please consult your CA for instructions on how to accomplish this.  Your CA may ask you in which format you would like the certificate.  If this option is presented to you select the Other, Apache or Java option to receive the certificate in a common format.

 

 

Importing signed certificate

 

The last step is to import the signed certificate issued to you by your CA.  To import the signed certificate select the server key that was used to generate the CSR and click the Import Certificates button.  You will be prompted for the path of the certificate file issued to you by your CA.

 

Note

 

Some CA issue an intermediate certificate in addition to a signed certificate.  If your certificate came with an intermediate certificate you will need to append the contents of the intermediate to the signed certificate issued to you by your CA.  If your certificate did not come with an intermediate certificate you may skip these steps.

 

1.Open your signed certificate and intermediate certificate files using a text editor e.g. notepad or vi.
2.Copy the full contents of the intermediate certificate and append to the end of signed certificate file.
3.Save signed certificate and continue with process of importing signed certificate.

 

 

 

Figure 40

 

clip040

 

Certificates file - The file containing signed certificate.

 

File password - The password protecting certificate. Leave blank if none.

 

Alias in file - The certificate alias in file.  Leave blank if none.

 

Verifying signed certificate

 

Upon successfully installing your signed certificate you can verify that it is working by connecting through a web browser via HTTPS and viewing the certificate details.  You should notice in the certificate details that the CA is listed as a trusted authority for the certificate.





Home | Company | Products | Solutions | Purchase | Support | Services | Blog

© 2021 JSCAPE LLC