Information on the self-signed certificate used by default in PAM implementations
search cancel

Information on the self-signed certificate used by default in PAM implementations

book

Article ID: 263299

calendar_today

Updated On:

Products

CA Process Automation Base

Issue/Introduction

The following instructions describe how to read the certificate information stored in the default self-signed certificate that PAM initially deploys for an SSL configured environment.  This can be used to help inform on setting up SSL using a third party certificate.

Environment

Release : 4.3.5 and higher

CA Process Automation

Resolution

To acquire information about the self-signed certificate, you will need to run the keytool command.  The following is an example of how to achieve this:

- Locate a keytool.exe binary.  This is a binary that can be found in any JRE or JDK implementations.  In our example, one was found in location "C:\Program Files\Java\jre1.8.0_201\bin\"

- Access the DOMAINID value in the OasisConfig.properties file.  In our example, the OasisConfig.properties file is located in location "C:\Program Files\CA\PAM\wildfly\standalone\.config\" and has this value:

DOMAINID=faaaad-496f-4584-976f-c41aaaa99ff

- Open an Admin Command Prompt on the PAM Server.

- cd to the keystore location.  In our example, the Keystore file name is "c2okeystore" and is located in "C:\Program Files\CA\PAM\wildfly\standalone\.config".  

- Run the command:  

"C:\Program Files\Java\jre1.8.0_201\bin\keytool.exe"  -list -v -keystore c2okeystore

-  You will be prompted for a keystore password.  Enter the above DOMAINID value, ie faaaad-496f-4584-976f-c41aaaa99ff (one can paste this value using the admin command prompt menu options)

You should get an output similar to this:

Keystore type: jks
Keystore provider: SUN

Your keystore contains 1 entry

Alias name: itpam
Creation date: Oct 19, 2022
Entry type: PrivateKeyEntry
Certificate chain length: 1
Certificate[1]:
Owner: CN=CA
Issuer: CN=CA
Serial number: 183f068ad2e
Valid from: Tue Oct 18 13:22:15 UTC 2022 until: Wed Nov 04 13:22:15 UTC 2122
Certificate fingerprints:
         MD5:  C9:EE:94:15:AC:5A:72:3F:E2:EA:81:F0:F1:F4:4C:A5
         SHA1: 01:BA:36:0B:CA:92:8E:4D:3E:5D:4D:2B:08:37:3F:CC:E2:35:66:7B
         SHA256: E6:9D:78:A8:72:3D:D8:A5:BD:6F:4C:EC:67:BB:D7:1C:C7:B0:5B:06:92:6A:F9:54:6F:7A:D5:6C:7A:AB:E1:18
Signature algorithm name: SHA1withRSA
Subject Public Key Algorithm: 1024-bit RSA key
Version: 1


*******************************************
*******************************************




Warning:
The JKS keystore uses a proprietary format. It is recommended to migrate to PKCS12 which is an industry standard format using "keytool -importkeystore -srckeystore c2okeystore -destkeystore c2okeystore -deststoretype pkcs12".