Certificates#
Attention
The official support end-of-life (EOL) date for Gluu Server 2.4.4 is December 31, 2018. Starting January 1, 2019, no further security updates or bug-fixes will be provided for Gluu Server 2.X. We strongly recommend upgrading to the newest version.
Many of the components of the Gluu Server have cryptographic keys and X.509 certificates. There are many key formats, and keystore formats. Navigate to the sections below to find what you need for each of the
Asimba#
asimba.crt
, asimba.csr
, asimba.key
, asimba.key.orig
,
asimba.pkcs12
and asimbaIDP.jks
are associated with the
Asimba SAML Proxy Server. If you install the server
in your Gluu Server, you have to deal with these certificates
and keys.
Apache#
httpd.crt
, httpd.csr
, httpd.key
, httpd.key.orig
are Apache SSL
related certificates and keys. If you want to update your Apache SSL
certificate do not worry about the file extension .csr
and .key.orig
.
Updating Apache Certificate#
If you are using the Gluu Server CE binaries or latest Gluu Servers, you
need to manually update certificates and keys from the file
/etc/certs/
. Please note that your private key cannot be password
protected, and the public key should be base64 X.509. It's recommended to
backup your full /etc/certs
directory and cacerts
file before
proceeding, as well as to remove previous versions of certificates
you are about to update from the cacerts
storage.
For example, follow these steps in order to update the Apache SSL cert:
- save both the latest SSL httpd key and certificate in the file
/etc/certs
. - rename them to
httpd.key
andhttpd.crt
, respectively. - import 'httpd.der' into java keystore
- Convertion to DER, command:
openssl x509 -outform der -in httpd.crt -out httpd.der
- Import this DER into java keystore (cacerts), command:
keytool -importcert -file httpd.der -keystore cacerts -alias <hostname_of_your_Gluu_Server>_httpd
- restart LDAP server, apache2/httpd and tomcat.
You may find more info on certificates Gluu CE uses, as well as detailed steps to update them, in this article
Installing Intermediate Certificates#
To install intermediate certificates follow these steps:
- Log into your Gluu Server container.
- Keep your intermediate certificate in the file
/etc/certs/
. - Modify
/etc/httpd/conf.d/https_gluu.conf
, and addSSLCertificateChainFile /etc/certs/name_of_your_interm_root_cert.crt
. - Restart the service of the httpd server.
OpenDJ#
opendj.crt
is the public certificate being used by oxAuth to make a
connection to the internal Gluu-LDAP.
oxAuth#
oxauth-web-keys.json
is being used by Gluu's OpenID Connect & UMA
server.
Shibboleth IDP#
shibIDP.crt
, shibIDP.csr
, shibIDP.jks
, shibIDP.key
,
shibIDP.key.orig
, shibIDP.pkcs12
are required if you use the Gluu
Server's Shibboleth SAML server for SAML transactions.