<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to create a CSR for SSL in IMC</title>
    <link>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7108324#M6164</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I guess you won't be working on this any more, but I want to mention for anyone else that jserver process not starting after following the steps above means something is wrong with IMC's access to the keystore.&lt;/P&gt;&lt;P&gt;Make sure the keystore password and private key password match, and that they are correctly entered in the two configuration files I mentioned above, along with the name of the keystore file. You could always double-check your keystore with Java keytool using "keytool -list -v -keystore &amp;lt;keystore-filename&amp;gt;" (replacing keystore-filename with the correct name like &lt;STRONG&gt;newks&amp;nbsp;&lt;/STRONG&gt;- if you can open the keystore with the same password provided to iMC, it should be able to open it too, and jserver would start.&lt;/P&gt;&lt;P&gt;If needed you can debug why it won't start using the iMC\client\log\imcforeground.log file, it should show some certificate-related issue when trying to start up.&lt;/P&gt;</description>
    <pubDate>Mon, 09 Nov 2020 10:07:55 GMT</pubDate>
    <dc:creator>jguse</dc:creator>
    <dc:date>2020-11-09T10:07:55Z</dc:date>
    <item>
      <title>How to create a CSR for SSL</title>
      <link>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7105400#M6129</link>
      <description>&lt;P&gt;I need to create a Certificate request for a SSL cert. The file will be signed by our organisation and then imported to IMC server.&lt;/P&gt;&lt;P&gt;Our system is 7.3 and RHEL 7&lt;/P&gt;&lt;P&gt;Can anyone give me a step by step guide? it's not clear in Getting started guide.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 08:02:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7105400#M6129</guid>
      <dc:creator>dasi66</dc:creator>
      <dc:date>2020-10-19T08:02:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a CSR for SSL</title>
      <link>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7105402#M6130</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;You want to get a keystore file for import into IMC, which includes both its cert / cert chain and private key - or at least it is the easiest way to do it. The format can be PKCS12 or JKS, or possibly other formats would work too, though I've only tested with those two.&lt;/P&gt;&lt;P&gt;As for the certificate itself, it should include a CN, ie. your system's hostname, and any number of SANs for other IPs and DNS aliases of the system (like the FQDN). Purpose should include Server Authentication. The rest of the details in there are not really important.&lt;/P&gt;&lt;P&gt;Make sure the private key password you set matches the keystore password when you export the certificate. iMC expects the same password for both, and not using matching passwords will cause the HTTPS access to fail when you apply it.&lt;/P&gt;&lt;P&gt;Once that's done, just open the Web GUI and go to&amp;nbsp;&lt;STRONG&gt;System Configuration &amp;gt; HTTPS Access Settings&lt;/STRONG&gt;, select your keystore file for upload (Server-side Authentication) and enter the password you used for it. Then just restart iMC when the upload is complete, and make sure to clear your browser cache too - and you should see it using your new certificate.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 07:40:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7105402#M6130</guid>
      <dc:creator>jguse</dc:creator>
      <dc:date>2020-10-19T07:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a CSR for SSL</title>
      <link>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7105405#M6131</link>
      <description>&lt;P&gt;Can you provide step by step commands to create the files needed?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And password, is that mandatory or can we skip that part..?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 08:04:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7105405#M6131</guid>
      <dc:creator>dasi66</dc:creator>
      <dc:date>2020-10-19T08:04:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a CSR for SSL</title>
      <link>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7105408#M6132</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I don't think you can skip the passwords with IMC, it's generally a security risk to use a keystore and private key without one anyway, and isn't really any more difficult to set up.&lt;/P&gt;&lt;P&gt;As for the steps to create the files... it really depends on what system you use to generate the CSR and the type of CA you use to create the certificate. Whether you use Microsoft's CA or OpenSSL CA or something else, there are generally plenty of tutorials and guides you can find online to create and export a signed certificate, hence it's not something the iMC docs go into detail about. Which one do you intend to use?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 08:24:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7105408#M6132</guid>
      <dc:creator>jguse</dc:creator>
      <dc:date>2020-10-19T08:24:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a CSR for SSL</title>
      <link>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7105422#M6133</link>
      <description>&lt;P&gt;OK, thanks. Can I use openssl req&amp;nbsp; -new -newkey rsa:2048....... to create CSR or must I use&amp;nbsp;&lt;SPAN class=""&gt;&lt;SPAN class="highlight selected"&gt;keytool&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&amp;nbsp;-genkey &lt;/SPAN&gt;&lt;SPAN&gt;-v -alias &lt;/SPAN&gt;&lt;SPAN class=""&gt;IMC -validity &lt;/SPAN&gt;&lt;SPAN&gt;3650 &lt;/SPAN&gt;&lt;SPAN class=""&gt;-keyalg RSA.....&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 11:11:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7105422#M6133</guid>
      <dc:creator>dasi66</dc:creator>
      <dc:date>2020-10-19T11:11:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a CSR for SSL</title>
      <link>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7105587#M6135</link>
      <description>&lt;P&gt;I intend to use Microsoft CA.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2020 12:47:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7105587#M6135</guid>
      <dc:creator>dasi66</dc:creator>
      <dc:date>2020-10-20T12:47:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a CSR for SSL</title>
      <link>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7105937#M6136</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;As it can be a fairly challenging process, I'll provide two examples. The first using Windows and Keytool, using IMC's keystore newks under iMC\client\security. The second with Linux and OpenSSL creating a new keystore that will be imported with IMC.&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;STRONG&gt;Using Java Keytool on Windows:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1. &lt;STRONG&gt;First check your IMC version.&lt;/STRONG&gt; If you're running IMC 7.3 &lt;STRONG&gt;E0705&lt;/STRONG&gt; or later, then the built-in keytool included in IMC under IMC\common\jre folder will work. If you're on an older version, either update IMC first, or install the latest JRE on your IMC server separately, as the keytool included in earlier IMC versions was an old one that did not support the X.509 extensions (ie. the SAN).&lt;/P&gt;&lt;P&gt;2. Open Windows CMD and navigate to &lt;STRONG&gt;iMC\client\security&lt;/STRONG&gt; folder.&lt;/P&gt;&lt;P&gt;3. Add Keytool to your OS path. For example with latest IMC version - adjust the actual path according to where the keytool.exe file is located: &lt;STRONG&gt;Set PATH="C:\Program Files\iMC\common\jre\bin"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;4. Make a backup copy of the&amp;nbsp;&lt;STRONG&gt;newks&amp;nbsp;&lt;/STRONG&gt;keystore in the &lt;STRONG&gt;iMC\client\security&lt;/STRONG&gt; folder and delete the original.&lt;/P&gt;&lt;P&gt;5. Generate the keypair with a new keystore called 'newks' (you should be in iMC\client\security context):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;keytool -genkeypair -v -alias imc -keyalg RSA -keystore newks -storepass iMCV500R001 -keypass iMCV500R001 -validity 3650 -ext san=dns:&amp;lt;hostname&amp;gt;,ip:&amp;lt;ip address&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Replace &lt;STRONG&gt;&amp;lt;hostname&amp;gt;&lt;/STRONG&gt; and &lt;STRONG&gt;&amp;lt;ip address&amp;gt;&lt;/STRONG&gt; with the appropriate values and add additional dns: or ip: values as needed. The -storepass and -keypass passwords may be changed, but must always be identical.&lt;/P&gt;&lt;P&gt;Fill out the data when prompted to do so. Set the "What is your first and last name" to the hostname or IP of your IMC server. The other parameters are up to you. Once done you should have a new keystore called&amp;nbsp;&lt;STRONG&gt;newks&amp;nbsp;&lt;/STRONG&gt;in the iMC\client\security folder (move it there if needed).&lt;/P&gt;&lt;P&gt;6. Generate your CSR for signing by the CA:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;keytool -certreq -keyalg RSA -alias imc -file &amp;lt;file&amp;gt;.csr -keystore newks -storepass iMCV500R001 -keypass iMCV500R001 -validity 3650 -ext san=dns:&amp;lt;hostname&amp;gt;,ip:&amp;lt;ip address&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Replace &lt;STRONG&gt;&amp;lt;file&amp;gt;&lt;/STRONG&gt; with the name of the CSR file that will be created, while &lt;STRONG&gt;&amp;lt;hostname&amp;gt;&lt;/STRONG&gt; and &lt;STRONG&gt;&amp;lt;ip address&amp;gt;&lt;/STRONG&gt; are the same values as in step 5. Adjust passwords if needed.&lt;/P&gt;&lt;P&gt;7. Open the CSR file that was generated with a text editor and copy it to clipboard.&lt;/P&gt;&lt;P&gt;8. Get the signed certificate generated by your CA. In this example, I'll provide the steps for Microsoft's CA.&lt;/P&gt;&lt;P&gt;Upload your certificate request (CSR) on the /certsrv interface (CA Web Enrollment page) via &lt;STRONG&gt;Request a certificate -&amp;gt; Advanced certificate request -&amp;gt; Submit a certificate request by using a base-64...&lt;/STRONG&gt; and then paste the contents you copied in step 7 with Certificate Template type &lt;STRONG&gt;Web Server&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;This will generate the signed certificate, which you can download as Base 64 encoded. Optionally if you have a PKI hierarchy you will want to download the entire certificate chain instead (in which case, you don't need to download the certificate separately, as it's in the chain).&lt;/P&gt;&lt;P&gt;9. Import the certificate into the keystore:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;keytool -import -alias imc -keystore newks -file &amp;lt;certname&amp;gt;.cer -storepass iMCV500R001 -keypass iMCV500R001 -validity 3650&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alternatively if you have a certificate chain, instead of the above, import the chain into the keystore:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;keytool -import -alias imc -keystore newks -trustcacerts -file &amp;lt;certname&amp;gt;.p7b -storepass iMCV500R001 -keypass iMCV500R001 -validity 3650&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Replace &lt;STRONG&gt;&amp;lt;certname&amp;gt;&lt;/STRONG&gt; with the name of the certificate/chain file. Adjust passwords if needed.&amp;nbsp;Answer "yes" if prompted about the certificate not being trusted.&lt;/P&gt;&lt;P&gt;Once imported, you can verify it with the command:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;keytool -list -v -keystore newks&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;10. Restart iMC via DMA and then connect to the web GUI using HTTPS. Check the certificate presented and ensure it is correct.&lt;/P&gt;&lt;P&gt;If you receive a root certificate trust warning in the browser, that mean the certificate of the root CA that signed your cert is not trusted on your machine. You'll need to import it into your "Trusted Root Certification Authorities" in Windows to avoid getting the error.&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;STRONG&gt;NOTE:&amp;nbsp;&lt;/STRONG&gt;If you did not use the default IMC keystore/keypass password above, you will need to adjust IMC's relevant configuration files before it can open the keystore to use the certificate:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;iMC\client\conf\&lt;STRONG&gt;server.xml &lt;/STRONG&gt;(defines the HTTPS Connector for iMC)&lt;/LI&gt;&lt;LI&gt;iMC\client\bin\&lt;STRONG&gt;startup.bat &lt;/STRONG&gt;(startup script for iMC – see .sh equivalent on Linux)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The keystore name and password appear as follows in &lt;STRONG&gt;server.xml&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;keystoreFile="&lt;STRONG&gt;security/newks&lt;/STRONG&gt;" keystorePass="&lt;STRONG&gt;iMCV500R001&lt;/STRONG&gt;"&lt;/P&gt;&lt;P&gt;They are stored a bit differently in the &lt;STRONG&gt;startup.bat(.sh)&amp;nbsp;&lt;/STRONG&gt;file:&lt;/P&gt;&lt;P&gt;-Djavax.net.ssl.keyStore="%IMC_HOME%\security\&lt;STRONG&gt;newks&lt;/STRONG&gt;" -Djavax.net.ssl.keyStorePassword=&lt;STRONG&gt;iMCV500R001&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;You can adjust the path and password as needed for your keystore and password, save the files, and then restart IMC for the change to take effect. Mind the quotations in server.xml and lack thereof in the startup file. In case of certain special characters like &amp;lt; &amp;gt; in the password, IMC may replace these when starting up with escape characters by design.&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;STRONG&gt;Using OpenSSL on Linux (RHEL):&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Note that iMC supports a variety of keystore formats. I have tested JKS, PKCS#12 and PFX successfully. The method below is one example, but not the only way you can get a working keystore with OpenSSL. If anything is unclear, please consult the extensive OpenSSL documentation first.&lt;/P&gt;&lt;P&gt;1. Make sure OpenSSL is installed (should be by default):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;yum install openssl -y&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Generate the private key. In this example, we use filename&amp;nbsp;&lt;STRONG&gt;imc.pem &lt;/STRONG&gt;with password &lt;STRONG&gt;iMCV500R001:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;openssl genpkey -algorithm RSA -out /etc/pki/tls/private/imc.pem -pass pass:iMCV500R001&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Before creating the CSR, create an OpenSSL config file that will include the X.509 extensions for SAN we need to identify the IMC server by multiple DNS Names/IP addresses. Here we create&amp;nbsp;&lt;STRONG&gt;imc_cert.cnf&amp;nbsp;&lt;/STRONG&gt;using nano:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;nano /etc/pki/tls/imc_cert.cnf&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;File contents&amp;nbsp;&lt;/STRONG&gt;(adjust all the values as needed):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[req]
distinguished_name = req_distinguished_name
req_extensions = req_ext
prompt = no
[req_distinguished_name]
C   = CountryCode
ST  = State
L   = SomeCity
O   = HPE
OU  = LAB
CN  = imc
[req_ext]
subjectAltName = _names
[alt_names]
IP.1 = 10.10.10.1
DNS.1 = imc
DNS.2 = imc.local.lab&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The important values above are the CN = which should be the hostname/IP of your IMC server, and the IPs/hostnames after [alt_names]. These should include all addresses and names that you use to connect to your IMC server.&lt;/P&gt;&lt;P&gt;Save the file and exit the editor.&lt;/P&gt;&lt;P&gt;4. Create the CSR based on the previously generated private key and config file:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;openssl req -new -key /etc/pki/tls/private/imc.pem -out /etc/pki/tls/imc.csr -config /etc/pki/tls/imc_cert.cnf&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this example the CSR&amp;nbsp;&lt;STRONG&gt;imc.csr&amp;nbsp;&lt;/STRONG&gt;will be created.&lt;/P&gt;&lt;P&gt;5. Have your CA generate the signed certificate using this CSR. It's expected here that you already have a working CA that can sign it. Here is an example of the command I used on my OpenSSL CA server in my lab:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;openssl x509 -req -in imc.csr \
&amp;gt; -CA /etc/pki/CA/certs/opensslCA.crt \
&amp;gt; -CAkey /etc/pki/CA/private/opensslCA.key \
&amp;gt; -CAcreateserial \
&amp;gt; -out imc.crt \
&amp;gt; -days 365&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note that if you use an OpenSSL CA, it must respect the Subject Alternate Names that you have requested in the CSR, or you will get a certificate without them. This means&amp;nbsp;&lt;STRONG&gt;copy_extensions = copy&lt;/STRONG&gt; should be configured in the CA's CA_default configuration.&lt;/P&gt;&lt;P&gt;6. Create a keystore with the certificate and private key. In this case I create a PKCS#12 file, but you could also use JKS or PFX etc. (plenty of instructions for this can be found online).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;openssl pkcs12 -export \
-in /etc/pki/tls/certs/imc.crt \
-inkey /etc/pki/tls/private/imc.pem \
-out /root/imc.p12&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make sure you set the export password to the same password as used for the private key when prompted!&lt;/P&gt;&lt;P&gt;This results in an&amp;nbsp;&lt;STRONG&gt;imc.p12&amp;nbsp;&lt;/STRONG&gt;file located in the root directory that contains both the certificate and its private key.&lt;/P&gt;&lt;P&gt;7. Open the IMC Web GUI and access&amp;nbsp;&lt;STRONG&gt;System &amp;gt; System Configuration &amp;gt; HTTPS Access Settings.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;8. Upload the&amp;nbsp;keystore file (&lt;STRONG&gt;imc.p12&lt;/STRONG&gt;&amp;nbsp;in this example)&amp;nbsp;using&lt;STRONG&gt;&amp;nbsp;Server-side Authentication&lt;/STRONG&gt; option and providing the password you set. Note that just like with the Windows process above, the keystore password and private key password must match.&lt;/P&gt;&lt;P&gt;9. Restart iMC, and now the HTTPS interface should present your new signed certificate.&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;Hope that helps get your signed certificate installed in iMC.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 09:51:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7105937#M6136</guid>
      <dc:creator>jguse</dc:creator>
      <dc:date>2020-10-22T09:51:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a CSR for SSL</title>
      <link>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7106625#M6152</link>
      <description>&lt;P&gt;Sorry but it did'nt work. jserver bricked as I was afraid of. &lt;LI-EMOJI id="lia_disappointed-face" title=":disappointed_face:"&gt;&lt;/LI-EMOJI&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have to quit this now. take way to much time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Time to put in an RFE on the subject!&lt;/P&gt;&lt;P&gt;Thanks for your effort though.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 15:43:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7106625#M6152</guid>
      <dc:creator>dasi66</dc:creator>
      <dc:date>2020-10-27T15:43:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a CSR for SSL</title>
      <link>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7108324#M6164</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I guess you won't be working on this any more, but I want to mention for anyone else that jserver process not starting after following the steps above means something is wrong with IMC's access to the keystore.&lt;/P&gt;&lt;P&gt;Make sure the keystore password and private key password match, and that they are correctly entered in the two configuration files I mentioned above, along with the name of the keystore file. You could always double-check your keystore with Java keytool using "keytool -list -v -keystore &amp;lt;keystore-filename&amp;gt;" (replacing keystore-filename with the correct name like &lt;STRONG&gt;newks&amp;nbsp;&lt;/STRONG&gt;- if you can open the keystore with the same password provided to iMC, it should be able to open it too, and jserver would start.&lt;/P&gt;&lt;P&gt;If needed you can debug why it won't start using the iMC\client\log\imcforeground.log file, it should show some certificate-related issue when trying to start up.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 10:07:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7108324#M6164</guid>
      <dc:creator>jguse</dc:creator>
      <dc:date>2020-11-09T10:07:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a CSR for SSL</title>
      <link>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7108341#M6165</link>
      <description>&lt;P&gt;OK, thanks for info. Maybe I try some day when I have a lot of time &lt;LI-EMOJI id="lia_slightly-smiling-face" title=":slightly_smiling_face:"&gt;&lt;/LI-EMOJI&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 11:12:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/imc/how-to-create-a-csr-for-ssl/m-p/7108341#M6165</guid>
      <dc:creator>dasi66</dc:creator>
      <dc:date>2020-11-09T11:12:42Z</dc:date>
    </item>
  </channel>
</rss>

