Use the information in the following sections to help you set up certificate management as you install OES 2.
To set up your server so that HTTPS services use eDirectory certificates, you must specify the
option while installing or upgrading eDirectory.This installs eDirectory keys and certificates on the server, but it does not configure the server to automatically replace the certificates when they expire. Automatic maintenance requires that Server Self-Provisioning be enabled as follows:
On the server you are configuring, in iManager > Roles and Tasks, click the
> option.Click
.This causes automatic certificate replacement for the conditions described in PKI Health Check.
IMPORTANT:If you enable Server Self-Provisioning in an OES 2 tree and you have created a CRL configuration object but not yet configured any CRL distribution points, the PKI Health Check might replace the default certificates every time it runs.
To avoid this, you can either
Finish configuring the CA's CRL capability by creating one or more CRL Distribution Points by using iManager's
task.or
Delete any CRL Configuration objects, for example CN=One - Configuration.CN=CRL Container.CN=Security.
If you also want the CA certificate to be replaced if it changes or expires, click the
option.Because the Internet Explorer and Mozilla Firefox browsers don’t trust eDirectory certificate authorities by default, attempts to establish a secure connection with OES 2 servers often generate certificate errors or warnings.
These are eliminated by importing the eDirectory tree CA’s self-signed certificate into the browsers.
Complete the instructions in the following sections as applicable to your network.
Launch Novell iManager.
Log into the eDirectory tree as the Admin user.
Select the
menu, then click > .Click the
tab, then select the self-signed certificate.Click
.Deselect
.The
changes to DER.Click
.Click
and save the file to the local disk, noting the filename and location if they are indicated.Click
> .Find the file you just saved. By default it is usually on the desktop.
Complete the instructions in the follow sections that apply to your browsers.
Launch Firefox.
Click
> > .Select the
tab.Click
.Select the
tab, then click .Browse to the certificate file you downloaded in Exporting the CA’s Self-Signed Certificate and click .
Select
, then click > > .Firefox now trusts certificates from the servers in the tree.
Launch Firefox.
Click
> > .Select the
tab.Click
.Select the
tab, then click .Browse to the certificate file you downloaded in Exporting the CA’s Self-Signed Certificate and click .
Select
, then click > > .Firefox now trusts certificates from the servers in the tree.
Launch Internet Explorer.
Click
> .Select the
tab.Click
.Click
.The Certificate Import Wizard launches.
Click
.Click
,In the Exporting the CA’s Self-Signed Certificate, then click .
drop-down list, select , browse to the file you downloaded inClick
.Click
.Choose the default,
Click
> > .Internet Explorer now trusts certificates from the servers in the tree.