Set Up a Custom Keystore for the Synthetic Server

The following sections describe and show an example of how to create a custom RSA security certificate, generate a new JKS keystore, and sign the certificate.

Install Prerequisite Libraries

Make sure the following libraries are installed on the Synthetic Server:

  • keytool
  • openssl

Create a Certificate and Keystore

Use the keytool command to create a keystore that uses RSA encryption then generate a certificate signing request (CSR).

The following steps show you an example of how to do both.

  1. Log in to the Synthetic Server machine.

  2. From a command-line shell, navigate to the root directory of the Synthetic Server:

    cd <synthetic_server_root>
  3. Create a new keystore with a new unique key pair that uses RSA encryption:

    <path_to_jre>/jre/bin/keytool -genkey -keyalg RSA -validity <validity_in_days> -alias 'synthetic-server' -keystore ./mycustom.keystore

    This creates a new public-private key pair with an alias of "synthetic-server". You can use any value you like for the alias. The "first and last name" required during the installation process becomes the common name (CN) of the certificate. Use the name of the server.

  4. Configure the keystore by entering the information requested at the command prompt.
  5. Specify a password for the key store. You need to configure this password in the Synthetic Server configuration file later.
  6. Generate a certificate signing request (CSR):

    <path_to_jre>/jre/bin/keytool -certreq -keystore ./mycustom.keystore -file /tmp/synthetic-server.csr -alias 'synthetic-server'

    This generates a certificate signing request based on the contents of the alias; in the example, it is "synthetic-server".

Sign and Install the Signed Certificate

Once you have a CSR, you request a Certificate Authority to sign it and then install the signed certificate.

The following steps are a continuation of the process from Create a Certificate and Keystore:

  1. Send the output file from the last step (/tmp/synthetic-server.csr in this example) to a Certificate Authority for signing.

  2. Install the certificate for the Certificate Authority used to sign the .csr file:

    <path_to_jre>/jre/bin/keytool -import -trustcacerts -alias myorg-rootca -keystore ./mycustom.keystore -file /path/to/<CA-root-cert>

    This command imports your CA's root certificate into the keystore and stores it in an alias called "myorg-rootca".

  3. Install the signed server certificate as follows:

    <path_to_jre>/jre/bin/keytool -import -keystore ./mycustom.keystore -file /path/to/<signed-cert>  -alias 'synthetic-server'

    This command imports your signed certificate over the top of the self-signed certificate in the existing alias; in the example, it is "synthetic-server".

  4. Import the root certificate to the other platform components connecting to the Synthetic Server through HTTPS:

    keytool -import -trustcacerts -alias <alias_name> -file mycert.cer -keystore <complete_path_to_cacerts.jks>