The following SSL configuration instructions assume that you have already created or imported the certificate that you are going to use for SSL. This certificate must have a subject name (cn) that matches the published DNS name of the proxy service that you are going to use for authentication. You can obtain this certificate one of two ways:
You can use the Access Manager CA to create this certificate. See Section 24.1.1, Creating a Locally Signed Certificate.
You can create a certificate signing request (CSR), send it to an external CA, then import the returned certificates into Access Manager. See Section 24.1.2, Generating a Certificate Signing Request and Section 24.5, Importing Public Key Certificates (Trusted Roots).
If you are going to set up SSL communication between the Identity Server and the Access Gateway for authentication and you have configured the Identity Server to use certificates created by an external CA, you need to import the public certificate of this CA into the trusted root keystore of the Access Gateway.
If you haven’t already imported the public certificate of this CA into the trusted root store of the Identity Server, do so now. For instructions, see Section 24.5, Importing Public Key Certificates (Trusted Roots).
In the Administration Console, click
> > > > .In the
section, click .Click the
icon, select the public certificate of the CA that signed the Identity Server certificates, then click .Specify an alias, then click
twice.To apply the changes, click
, then on the Access Gateways page, click .If you are going to set up SSL between the Access Gateway and the Web servers, you need to configure your Web servers for SSL. Your Web servers must supply a certificate that clients (in this case, the Access Gateway) can import. See your Web server documentation for information on how to configure the Web server for SSL.
For mutual SSL, the proxy service must supply a certificate that the Web server can trust. This certificate can be the same one you use for SSL between the browsers and the reverse proxy.