Feedback

  • Contents
 

Generate a self-signed HTTPS certificate for non-FQDN configurations

If the workstations hosting CIC client applications that will use Single Sign-On do not use the Fully Qualified Domain Name (FQDN) of the CIC server to access resources, such as using an IP address or short host name, you must use the GenSSLCertsU.exe command line utility to generate the HTTPS certificate for the CIC server.

Important!

You do not need to do this procedure if the workstations hosting your CIC client applications access the CIC server through its Fully Qualified Domain Name (FQDN).The CIC server automatically generates an HTTPS certificate with its FQDN address.Examples of configurations that require you to generate a new HTTPS certificate would be using DNS-A/AAAA records for a switchover pair, IP address, or short host name.

The GenSSLCertsU.exe command line utility has additional switches to customize creation of HTTPS certificates.For more information about the GenSSLCertsU.exe command line utility, see Security Features Technical Reference.

  1. On the CIC server, open a Command Prompt window with Administrator privileges.

  2. In the Command Prompt window, navigate to the drive where the CIC server software was installed by entering and executing the following command:

    D:

    D: is the default drive on which the CIC server software is installed.If you installed the CIC server software to a different drive, replace D with the appropriate letter.

  3. Navigate to the HTTPS subdirectory by entering and executing the following command:

    cd \I3\IC\Certificates\HTTPS

  4. In the Command Prompt window, copy the existing files to new, renamed instances by executing the following command:

    copy CICServerName*.* ?*.*.backup

    CICServerName is a variable representing the non-FQDN address of this CIC server that CIC client applications in the network can reach.The following table displays examples of different address schemes:

    Address scheme

    Example

    DNS A/AAAA-record

    cic-serv.example.com

    (DNS A/AAAA record points to either cic‑serv1.example.com or cic‑serv2.example.com)

    IP address

    192.168.1.100

    Short host name

    cic-serv

  5. In the Command Prompt window, enter and execute the following command:

    GenSSLCertsU w CICServerName -h

    CICServerName is the non-FQDN address of the CIC server.

    The GenSSLCertsU.exe utility generates the HTTPS certificate for the CIC server in the following directory on the partition or hard drive where the CIC server software was installed:

    \I3\IC\Certificates\HTTPS

Important!

GenSSLCertsU.exe creates the file name of HTTPS certificate with the host identified with the command.For example, if you have a CIC server named cic-serv1.example.com and you generate a new HTTPS certificate for cic-serv1 (not FQDN), the file names of the certificate and associated files are as follows:

cic-serv1_Certificate.cer
cic-serv1_PrivateKey.bin
cic-serv1_PublicKey.bin
cic-serv1_TrustedCertificate.cer

The CIC server loads the HTTPS certificate with a file name containing the FQDN of the server, such as cic-serv1.example.com.As such, you must manually rename the newly-generated HTTPS certificate to reflect the FQDN of the CIC server:

cic-serv1.example.com_Certificate.cer
cic-serv1.example.com_PrivateKey.bin
cic-serv1.example.com_PublicKey.bin
cic-serv1.example.com_TrustedCertificate.cer

The following steps guide you through renaming these files.

  1. In the Command Prompt window, rename the files for the certificates, PublicKey, and PrivateKey using the following commands:

    ren CICServerNameCertificate.cer CIC_server_FQDN_Certificate.cer

    ren CICServerNameTrustedCertificate.cer CIC_server_FQDN_TrustedCertificate.cer

    ren CICServerNamePublicKey.bin CIC_server_FQDN_PublicKey.bin

    ren CICServerNamePrivateKey.bin CIC_server_FQDN_PrivateKey.bin

    CICServerName is a variable that represents the name that the GenSSLCertsU.exe command was given to embed within the HTTPS certificate.

    CIC_server_FQDN is a variable representing the FQDN of this CIC server.


Important!

If you use DNS A/AAAA records for a switchover pair, do not replace CIC_server_FQDN with the DNS A/AAAA record name for as the target file name.The target file name must be the specific FQDN of this CIC server so that the CIC server loads the certificate and keys automatically.

Also, ensure that you do not miss including the underscore character (_) in the target file name between CIC_server_FQDN and the remainder of the file name.

Important!

If you use DNS A/AAAA records for a switchover pair, do not replace CIC_server_FQDN with the DNS A/AAAA record name for as the target file name.The target file name must be the specific FQDN of this CIC server so that the CIC server loads the certificate and keys automatically.

Also, ensure that you do not miss including the underscore character (_) in the target file name between CIC_server_FQDN and the remainder of the file name.

Examples:

ren cic-serv1Certificate.cer cic-serv1.example.com_Certificate.cer

ren cic-serv1TrustedCertificate.cer cic-serv1.example.com_TrustedCertificate.cer

ren cic-serv1PublicKey.bin cic-serv1.example.com_PublicKey.bin

ren cic-serv1PrivateKey.bin cic-serv1.example.com_PrivateKey.bin

  1. In the Windows Control Panel, start the Services application.

  2. Restart the Interaction Center service by right-clicking it and selecting Restart from the resulting context menu or selecting the Restart hyperlink on the left side of the pane.

The CIC server restarts and uses the new HTTPS certificate that you generated.