The installation of Enforce uses a self-signed certificate by default. Use the following guide to replace the default certificate with one signed by a certificate authority (CA).
The following steps assume the system environment variable for JAVA_HOME has been set and that you're working from the tomcat conf directory.
Prerequisites:
Linux and DLP 15.8/16.x
Windows and DLP 15.8/16.x
Overview of the request process
keytool -certreq -alias tomcat -keyalg RSA -dname "CN=server name,OU=Organizational Unit, O=Organization, L=City, ST=State, C=Country" -keystore .keystore -file yourCertificateRequest.csr
Submit yourCertificateRequest.csr to the CA
Download the signed certificate (including its certificate chain)
keytool -importcert -alias tomcat -keystore .keystore -file yourSignedCert.p7b -trustcacerts
Linux: /opt/Symantec/DataLossPrevention/EnforceServer/Services/SymantecDLPManager.sh restart
Windows: sc restart SymantecDLPManager
Refer tp the KB 273794, link below, for information about using a script to automate the keytool commands.
Example Script to automate keytool commands
Also refer to the following Tech Docs:
Configuring Certificate Authentication for the Enforce Server Administration Console
Adding certificate authority (CA) certificates to the Tomcat trust store