Secure the EUM Server
If you use HTTPS connections in a production (split host) EUM Server installation, use a custom RSA security certificate for the EUM server. This page describes how to create an RSA security certificate, change the password for the credential keystore, and how to obfuscate a password for the security certificate keystore.
Set Up a Custom Keystore for Production
In demo mode, the EUM Server uses a default self-signed certificate named ssugg.keystore. This certificate is intended for demonstration and light testing only. Do not use self-signed certificates for production systems since they are less secure than Certificate Authority (CA) signed certificates. EUM requires that certificates use RSA as the key algorithm whether they are self-signed or CA-signed.
For Mobile Real User Monitoring, if you use the default or another self-signed certificate on your EUM Server for testing, you may receive the following error: "The certificate for this server is invalid". Ensure that your self-signed certificate is trusted by the simulator or device you use for testing. In real-world scenarios, a CA signed certificate should be used since a self-signed certificate needs to be explicitly trusted by every device that reports to your EUM processor.
To secure the EUM server with a custom certificate and keystore, generate a new JKS keystore and configure the EUM Server to use it.
The following instructions describe how to create a JKS keystore for the EUM Server with a new key-pair or an existing key-pair. Alternatively, you can also configure the EUM server to use an existing JKS keystore.
The instructions demonstrate the steps with the Linux command line, but the commands are similar to the commands used for Windows. Make sure to adjust the paths for your operating system.
Overview of the Steps
The procedure is made up of three parts:
- Create a new certificate and keystore (1a) or import an existing certificate into a keystore (1b).
- Configure the EUM Server to use the keystore.
- Restart and test the new keystore.
Step 1a: Create a New Certificate and Keystore
Step 1b: Import an Existing Certificate into a JKS Keystore
If you have an existing public-private key pair that uses RSA, you must import them into a JKS keystore to use it for EUM.
Step 2: Configure the EUM Server to Use the New Keystore
Step 3: Restart and Test
Change the Certificate Keystore Password
The previous steps describe how to create a new keystore which is likely to have a new password. To change the keystore password without creating a new keystore, perform the following steps:
Change the Credential Keystore Password for the EUM Database
When you install the EUM Server, you need to specify a password to use to secure the credential keystore for the EUM Server. After installation, you can change the password for the credential keystore. You may need to do this, for example, to comply with your organization's password rotation policy.
Note that completing these procedures requires a restart of the EUM Server.
To change the existing EUM server credential keystore password:
Change the EUM Database Password
At EUM Server installation time, you set a password for the EUM database. You can change it later as follows: