Digital certificates are required to provide client and server authentication for REN SSL. A digital certificate is an electronic means of establishing your credentials for web or business transactions that are issued by a certification authority (CA). The CA is a trusted third party who signs and issues the certificates for users after verifying their authentication using secure means.
This appendix describes a sample way of installing digital certificates and configure REN SSL. PeopleSoft customers may have their own means of obtaining and installing digital certificates for REN SSL.
This section outlines the basic steps to install digital certificates. Before installing digital certificates, you must create the application server domain.
Note. The application server domain must have write permissions. All certificates are stored under <PS_HOME>/appserv/<domain name>. The cacerts file has write permissions under <PS_HOME>/JRE/lib/security.
The following overview lists the steps that are required to install digital certificates. The following sections describe each step in detail.
To install digital certificates and configure REN SSL:
Install the CA server certificate.
Installing REN server certificate.
Configure digital certificates.
Import certificates in Java keystore.
Configure the REN server.
Configure the REN clusters.
Install certificates for local node.
Generating client certificate
Install PSMCAPI certificates.
To install the CA server certificate:
Generate the RSA private key for certificate authority.
Generate the Certificate Signing Request (CSR) for certificate authority.
Generate the PEM file.
Note. If there is already an existing CA certificate in PEM format, these three steps can be omitted.
Import CA Certificate in PEM format in PeopleTools, Security, Security Objects, Digital Certificates.
The above steps are explained in details in the section, Configuring Digital Certificates.
See Configuring Digital Certificates, Implementing Client Authentication.
To install REN server certificate:
Generate REN server Certificate Signing Request (CSR) using PeopleTools, Security, Security Objects, Digital Certificates.
Get the CSR signed by CA.
Note. The certificate must be in PEM format.
Import the certificate in PeopleTools, Security, Security Objects, Digital Certificates.
The above steps are explained in details in the following section, Configuring Digital Certificates.
See Configuring Digital Certificates.
Before configuring digital certificates, you must generate the private keys, CSR, and PEM file.
To configure digital certificates:
Select PeopleTools, Security, Security Objects, Digital Certificates.
Click +.
Select ROOTCA from Type drop-down list.
Enter an alias name for the CA in Alias, and click Add Root.
The Add Root Certificate dialog box appears.
Open the ca.pem file.
The root CA certificate is generated.
Copy the contents of ca.pem file, paste them in the Add Root Certificate dialog box, and click OK.
Click +.
Select Cert from the Type drop-down list.
Enter an alias name in Alias, such as, PSFTCA. Click Add Root.
Select CA certificate alias of step 4 from the Issuer Alias lookup button.
Click Request.
The Request New certificate dialog box appears.
Enter Common Name, Org Unit, Organization, Locality, State/Province, Country, Algorithm, Key Size, Email Address, and Challenge Pswd.
Note. Common name must be the machine name of REN server's machine, for example PTA112.peoplesoft.com where PTA112 is the machine name and .peoplesoft.com is the domain name
Click OK.
The Certificates Signing Request dialog box appears.
Copy and paste the text from the Certificates Signing Request dialog box, and save the text in a file named ren.csr in <PS_HOME>\appserv\<domain name>\.
Click OK.
The Import link appears.
Submit ren.csr to the CA that issued the selected root certificate.
The CA may send you the signed public key certificate by email or require you to download it from a specified web page.
Open the saved certificate file in a text editor, and then highlight and copy its entire contents.
Select PeopleTools, Security, Security Objects, Digital Certificates.
Click Import.
The Import Certificate page appears.
Paste the copied certificate content into the long edit box, and click OK.
See Implementing Node Authentication.
See Also
To import certificates in Java Key Store:
Open a command prompt.
Issue the following command:
<PS_HOME>\jre\bin\keytool -import -trustcacerts -alias <alias-name> -file <CA Certificate Pem file> -keystore <PS_HOME>\jre\lib\security\cacerts -storepass changeit
Example:
<PS_HOME>\jre\bin\keytool -import -trustcacerts -alias PSFTCA -file ca.pem -keystore <PS_HOME>\jre\lib\security\cacerts -storepass changeit
Note. You will get an error, sslv3 alert certificate unknown, if the certificate is not imported correctly.
See Understanding Client Authentication.
To configure REN server for SSL:
Select PeopleTools, REN Server Configuration, REN Server Definition.
The REN Server Definition page appears.
Select the SSL Only check box.
Select RENSERVER from the Certificate Alias drop-down list.
Click Save.
See Also
To configure REN clusters:
Select PeopleTools, REN Server Configuration, REN Server Cluster.
The REN Server Cluster page appears.
Update REN Server Cluster URL using https and the SSL port.
Update REN Server Browser URL using https and the SSL port.
Click Save.
See Also
Clustering REN Servers and SSL-Enabled REN Servers
Apart from CA and REN server certificate, client authentication requires local node certificates, client certificate for the browser, and PSMCAPI certificate.
To install certificates for local node:
Select PeopleTools, Security, Security Objects, Digital Certificates.
Click +.
Select Local Node from the Type drop-down list.
Enter local node name in Alias. Click Add Root.
Select alias of CA certificate from the Issuer Alias lookup button.
Click Request.
Enter Common Name, Org Unit, Organization, Locality, State/Province, Country, Algorithm, Key Size, Email Address, and Challenge Pswd.
Note. Common name must be the machine name of REN server's machine, for example PTA112.peoplesoft.com where PTA112 is the machine name and .peoplesoft.com is the domain name
Click OK.
The Certificates Signing Request dialog box appears.
Copy and paste the text from the Certificates Signing Request dialog box, and save the text in a file named qelocal.csr in <PS_HOME>\appserv\<domain name>\.
Note. The file name, qelocal.csr is used as an example only.
Click OK.
The Import link appears.
To obtain your local node certificate, submit the qelocal.csr to the CA that issued the selected root certificate.
The process of obtaining digital certificates varies, depending on the CA. Typically, a CA requires you to paste the content of the PEM-formatted CSR into a form that you submit online. The CA may send you the signed public key certificate by email or require you to download it from a specified web page.
Open the saved certificate file in a text editor, and then highlight and copy its entire contents.
Select PeopleTools, Security, Security Objects, Digital Certificates.
Click the Import link.
The Import Certificate page appears.
Paste the copied certificate content into the long edit box, and click OK.
See Implementing Node Authentication.
See Also
Client certificate can be generated by openssl or keytool in P12 format and imported in the browser. Importing the certificates is dependent on the browser.
The following steps are an example to generate a client certificate using openssl. Clients can use keytool or Microsoft CA to generate client certificate.
To generate client certificate using openssl:
Generate RSA private key.
openssl genrsa -des3 -out <Private key file>
Example:
openssl genrsa des3 out renclient.key passout pass:pass 1024
Generate Certificate Signing Request file.
openssl req -config <ps_home>\src\openssl\openssl- 0.9.7b\apps\ openssl.cnf -new -M;key <Private key file> -out <CSR file>
Example:
openssl req config ..\apps\openssl.cnf -new -key renclient.key out renclient.csr passout pass:pass
Generate PEM format file.
openssl x509 -req -days 365 in <CSR file> -CA <CA PEM File> -CAkey<CA Key File> -M;CAcreateserial -out <RenServer PEM file> -outform PEM
Note. <CA key file> and <CA PEM file> are Certificate Authority Key file and Certificate Authority in PEM format respectively.
Example:
openssl x509 req days 365 in RENCLIENT.csr -CA ca.pem -CAkey ca.key -CAcreateserial -out renclient1.pem -outform PEM -passout pass:pass
Generate .p12 certificate for browser.
openssl pkcs12 -export -in <RenServer PEM file> -out <.p12 file> -inkey <Private key file> -name <alias name>
Example:
openssl pkcs12 -export -in renclient.pem -out renclient.p12 -inkey renclient.key -M;name renclient
To install PSMCAPI certificates:
Generate a private key in the keystore using the following command:
<PS_HOME>\jre\bin\keytool genkey dname CN=Company Name, OU=Organization Unit, O=M;Organization, L=Locality, S=State/Provenance, C=Country alias <alias Name> -M;keyalg RSA validity 365 keystore <PS_HOME>\jre\lib\cacerts storepass changeit keypass password
Generate the CSR using the following command:
PS_HOME>\jre\bin\keytool certreq alias <alias name> -file <certificate file name> -keystore <PS_HOME>\jre\lib\security\cacerts storepass changeit keypass password
To obtain your certificate, submit the CSR to the CA that issued the selected root certificate.
Import the signed certificates into Java keystore using the following command:
<PS_HOME>\jre\bin\keytool import alias <alias name> -file <certificate file .pem> -keystore <PS_HOME>\jre\lib\security\cacerts storepass changeit keypass password
Note. The clients must import the CA certificate in Java Keystore of JRE of PSMCAPI for SSL communication with REN server using KeyTool command.
See Implementing Client Authentication.