Jump to content


English
hp.com home
HP System Management Homepage  |  The Settings Tab  |  Security  |  Local Server Certificate

Security
Local Server Certificate

» HP System Management Homepage

»table of contents
»index
»Product Overview
»Getting Started
»Navigating the Software
»System Management Homepage Overview
»The Home Tab
»The Settings Tab
»Credits
»Security
»IP Binding
»IP Restricted Login
Local Server Certificate
»Local and Anonymous Access
»Trust Mode
»Trusted Management Servers
»User Groups
»The Tools Tab
»The Tasks Tab
»The Log Tab
»Troubleshooting
»glossary
»using help
Content starts here
» Related Topics

The Local Server Certificate page enables you to use certificates that are not generated by HP. If this process is followed, the self-signed certificate that was originally generated by the System Management Homepage is replaced with one that was issued by a Certificate Authority (CA). The first step of the process is to cause the System Management Homepage to create a Certificate Request (PKCS #10). This request utilizes the original private key that was associated with the self-signed certificate and generates the appropriate data for certificate request (the private key never leaves the server during this process).

After the PKCS #10 data has been created, the next step is to send it to a Certificate Authority. After the Certificate Authority has returned PKCS #7 data, the final step is to import this into the System Management Homepage. After the PKCS #7 data has been successfully imported, the original \hp\sslshare\cert.pem certificate file is overwritten with the system certificate from that PKCS #7 envelope. The same private key is used for the new imported certificate as was used with the previous self-signed certificate. This private key is randomly generated at startup when no key file exists.

To create PKCS #10:

  1. Click SettingsSystem Management HomepageSecurity.

  2. Select Local Server Certificate.

  3. Optionally, you can replace the default values in the Organization and/or Organizational Unit fields with your own values up to a maximum of 64 characters..

  4. Click [Create PKCS #10 Data].

    A screen appears indicating that the PKCS #10 Certificate Request data has been successfully generated and stored in c:\hp\sslshare\req_cr.pem for Windows or /opt/hp/sslshare/req_cr.pem for Linux.

  5. Copy the certificate data.

  6. Send PKCS #10 certificate request data to a Certificate Authority and ask them to send you the certificate request reply data in the form of PKCS #7 format. Request that the reply data be in base64 encoded format. If your organization has its own PKI/Certificate Server implemented, send the PKCS#10 data to the Certificate Authority manager and request the PKCS#7 reply data.

    Note: A third party certificate signer generally charges a fee.

  7. When the certificate signer sends the PKCS#7 encoded certificate request reply data to you, copy the data from the PKCS#7 certificate request reply and paste the copied data in the PKCS #7 Data field. In this case, skip the next step.

  8. Click [Import PKCS #7 Data].

    A message appears indicating whether or not the customer generated certificate was successfully imported.

  9. Stop the System Management Homepage.

  10. Restart the System Management Homepage.

  11. Browse to the managed system that contains the imported certificate.

  12. Select to view the certificate when prompted by the browser. Be sure the signer is listed as the signer you used, and not HP, before importing the certificate into your browser. Alternatively, you can import the root CA certificate into all the browsers on your network to avoid being prompted.

    Note: If the certificate signer of your choice sends you a certificate file in base64 encoded form instead of PKCS #7 data, copy the base64 encoded certificate file to the filename /hp/sslshare/cert.pem and restart the System Management Homepage.

Related Topics

» Security - IP Binding
» Security - IP Restricted Login
» Security - Local and Anonymous Access
» Security - Trust Mode
» Security - Trusted Management Servers
» Security - User Groups