Manage certificates for HTTPS connections

To establish an HTTPS connection between your Web redirector and EAServer, you must export the CA certificate (the signing authority’s certificate) that signs the user certificate for the HTTPS listener to which you want to connect. For example, if Verisign Class 1 Primary CA is the signer of the web_redirector_certificate that is assigned to an EAServer listener at port 8085, then you must install the Verisign Class 1 Primary CA certificate on your Web server host and mark it trusted for your redirector to connect to that EAServer listener.

There are several ways, depending on how you obtain and manage certificates, to export and install certificates. This procedure describes how to export a CA certificate from EAServer, install it on your Web server host, and mark it trusted using Security Manager:

StepsExporting and installing CA certificates

  1. Use Security Manager on the EAServer host to export the root certificate of the certificate associated with the HTTP protocol listener:

    1. Select the CA Certificates folder.

    2. Locate the CA certificate of the EAServer certificate associated with the HTTP listener.

    3. Highlight the certificate to export. This example uses Verisign Class 1 Primary CA.

    4. Select File | Export Certificate.

    5. From the Export Certificate wizard, select the format type for the exported certificate. Select Binary Encode X509 Certificate. Click Next.

    6. Select Save to File and enter the full path name to a file that will contain the CA certificate.

      Do not add any extension to the file name. A .crt extension is automatically added to the exported certificate by Security Manager.

    7. Click Finish to export the certificate to the file you specified.

    8. Copy this file to the Web server host.

  2. Manage the certificates (including trust information) on the Web server host using the standalone Security Manager. To start the standalone Security Manager and connect to the Sybase PKCS#11 module:

    1. Change to the $JAGUAR_CLIENT_ROOT/bin directory.

    2. Run the sasecmgr.sh command to start the standalone Security Manager.

      The standalone Security Manager manages keys and certificates on a client installation without the overhead on an entire EAServer installation. The PKCS#11 token installed as part of the standalone Security Manager contains the same information (keys and certificates) as a typical EAServer installation.

    3. From Security Manager, enter Tools | Connect.

    4. Enter the PKCS#11 PIN to connect to the PKCS#11 token. The default value is sybase.

    Any changes that you make modify the contents of the $JAGUAR_CLIENT_ROOT/db directory.

  3. Use the standalone Security Manager to install certificates in the security database (PKCS#11 module):

    1. Select the CA Certificates folder.

    2. Select File | Install Certificate.

    3. Click the Import from File box. Use the browse feature to locate the certificate you exported from EAServer and copied to the Web server host.

    4. Click Install. The certificate is installed in the CA folder.

    5. Select the CA folder to see the certificate.

  4. Mark the certificate trusted:

    1. Select the CA folder

    2. Select the certificate you just installed.

    3. Select File | Certificate Info.

      The Certificate Information dialog appears. Use the scroll bar to view all of the information.

    4. The Certificate dialog includes a Trusted Certificate check box. Mark the certificate as trusted.

      The certificate now appears in the Trusted folder.

    5. Restart the Web server if it was running.

      Follow the steps described in “Enable HTTPS connections” to establish an HTTPS connection using the installed signer’s certificate (on the Web server host) to connect to the EAServer HTTPS listener (that uses the users certificate signed by the signer’s certificate).