How to Configure Data Sources to Connect to SSL URLs
There are two ways to configure the Unified Self-service data source to connect to the CA Service Desk Manager (CA SDM) or CA Service Catalog SSL URLs:
casm1401
There are two ways to configure the Unified Self-service data source to connect to the CA Service Desk Manager (CA SDM) or CA Service Catalog SSL URLs:
- Import SSL Certificates
- Update Custom Keystore References
Import SSL Certificates
If CA SDM and CA Service Catalog are SSL enabled, import and add the SSL certificates to the JRE Keystore
Follow these steps:
- Download the SSL certificate by accessing the CA SDM and CA Service Catalog URL.
- Save the certificates at any location.
- Set the JAVA_HOME and PATH environment variables.For example:JAVA_HOME="C:\Program Files\CA\Self Service\OSOP\tomcat-7.0.40\jre"PATH=%JAVA_HOME%\bin;%PATH%
- Navigate to theOSOP\tomcat-7.0.40\jre\lib\security\folder and create a backup of thecacertsfile.
- Copy the downloaded certificates to theOSOP\tomcat-7.0.40\jre\lib\securityfolder.: Ensure that you copy all the required certificates.
- Import each certificate that you copied with a unique name by executing the following command:keytool -import -trustcacerts -alias server -file "\OSOP\tomcat-7.0.40\jre\lib\security\<certificate_name>.cer" -keystore "\OSOP\tomcat-7.0.40\jre\lib\security\cacerts" -storepass changeitWhere,certificate_nameis the alias that you provide for the certificate that you import.: Forcacertsfile, the default password ischangeit.
- Repeat step 6 for each certificate and replace thecertificate_namefor each certificate.
- Restart USS Tomcat server.
- Repeat steps 3-8 for CA Service Catalog.
- Verify that you can now access the SSL enabled CA SDM or CA Service Catalog URLs from USS.
Update Custom Keystore References
Follow these steps:
- Download and save the keystore files for CA SDM and CA Service Catalog on the USS server.: Ensure that the keystore file is JKS instead of PKCS file. For more information on how to convert the PKCS file to JKS, see Convert PKCS file to JKS.
- Navigate to \OSOP\tomcat-7.0.40\bin\ folder and create a backup of thewrapper.conffile.
- Edit the originalwrapper.conffile.
- Locate the following parameters with sequential numbers.For example,wrapper.java.additional.25=-Dcatalina.home="\OSOP\tomcat-7.0.40"wrapper.java.additional.26=-Djava.io.tmpdir="\OSOP\tomcat-7.0.40\temp"
- Add parameters with next sequence numbers.For example,wrapper.java.additional.27=-Djavax.net.ssl.trustStore="\OSOP\tomcat-7.0.40\jre\lib\security\<keystore_name>"wrapper.java.additional.28=-Djavax.net.ssl.trustStorePassword="Keystore_password"Where,-Djavax.net.ssl.trustStore, is the JKS keystore file used for Tomcat in CA SDM and CA Service Catalog.-Djavax.net.ssl.trustStorePassword, is the password for that keystore.You can import all the required keystore file for CA SDM and CA Service Catalog into a single keystore and then point USS to use the keystore.
- Restart the USS server.