Replace Default SSL Certifictate - Linux
Replace Default SSL Certifictate - Linux
[Credentials]
KS_Access_Data = <new password>
4. Start the PowerChute daemon via the services console or using the command service
pbeagent start or systemctl start PBEAgent.service. This ensures PowerChute
stores the password in memory before you remove the keystore itself.
cd /opt/APC/PowerChuteBusinessEdition/Agent/
4. Create a new keystore and private key. Use the same password that was specified in step 3
of “Inform PowerChute of keystore password change”.
NOTE: The “first and last name” specified must match the hostname or FQDN (Fully Qualified
Domain Name) of the server where PowerChute is installed. For example: localhost. The
confirmation response (yes or no) is locale specific, so it expects the answer in the same
language as the question.
5. You can verify that the file 'keystore' now exists in the agent folder. The following command
lists the contents of the keystore:
The keytool generates a self-signed cert from the private key. This can be updated with a
signed CA cert later if required.
6. PowerChute can be restarted at this point while you create a CSR and get it signed.
Use keytool to create a CSR from the private key and self-signed cert in the keystore. You will be
prompted to enter the keystore password:
Use the .CSR file to create a new certificate signed by the Trusted CA. This process will usually be
done by a CA and depends on the Trusted CA software being used. The CA may need to contact
you, or you may need to install certain software, to verify your authenticity.
Import the Root CA and Web Server SSL certs to the PowerChute Keystore
The output of the CA signing should be the CA root cert, and a signed cert for PowerChute based on
the CSR. This section assumes certs have been generated by OpenSSL. If the certs returned from a
third-party CA are not in a format compatible with the Java keystore, you may have to convert them.
For example, you may need to bundle both CA and your signed certificate into a p.12 file.
1. Copy the CA cert and PowerChute host cert signed by the CA to the PowerChute Agent
directory.
2. Stop the PowerChute service if necessary.
3. Open a command prompt and change the directory to agent. By default,
/opt/APC/PowerChuteBusinessEdition/Agent/
4. Import the root CA cert to the Java keystore. You will be prompted to enter your password.
5. Enter the new keystore password, then confirm you trust the cert.
Import the root CA cert so that the web browser will be able to confirm that the PowerChute cert was
indeed signed by the specified CA.
Firefox
NOTE: Some versions of Firefox have issues deleting older certificates from the same CA. If you
need to replace a CA cert, you need to ensure it is overwritten correctly, or reinstall Firefox before
deleting an existing cert. See https://support.mozilla.org/bm/questions/1272865 for more details.
Start PowerChute
Start the PowerChute daemon via the services console or using the command service pbeagent
start or systemctl start PBEAgent.service
PowerChute should be using the new signed certificate and there should not be an SSL cert security
warning displayed by the browser when the PowerChute Web Interface is launched.