Please Note Prior To Replacing The Communication Certificate:- Replacing the Communication Certificate could cause temporary Console performance issues under certain circumstances.
- Be sure to replace the certificate prior to expiration.
- Be sure to use an Update Schedule that allows the majority of Agents to receive changes before the new certificate is required.
- Server 8.11.2 - 8.12.0 follow the steps here due to a defect (EPCB-24434).
|
Understanding the Certificate Update Schedule
When you specify a new Agent Communication Certificate, the App Control Server does not immediately switch to it. Instead, the Update Schedule specified creates a swap delay, which allows Agents to continue using the existing Communication Certificate. This feature allows for
- Distribution of the updated Trusted Certificate List to all the Agents before the new Certificate is used.
- Reduced chances of Communication Key Overuse, which could impact Console performance.
Once the swap delay expires, the Server will switch to the new Communication Certificate. When specifying an Update Schedule, be sure to consider
- Time remaining until the current Communication Certificate expires.
- Agent connectivity requirements to obtain files from the Certificate Download Location (ex: VPN access, holiday schedules, maintenance windwos, etc)
More details on these settings can be found in the User Guide > System Configuration > Securing Agent-Server Communications.
Replacing the Agent Communication Certificate
- Log in to the App Control Console and navigate to Settings > System Configuration > Security
- If using the Self-signed Certificate generated by the Console
- Current Server Certificate Details > click Edit
- Make any necessary updates (such as previous server name, "Valid For" period, etc)
- If importing a PKCS12 File (ex: Certificate Authority Cert)
- Import Server Certificate > click Choose File
- Locate the desired certificate file and specify the Password for the certificate.
- Configure the Certificate Delay Swap
- It is recommended to use the defaults (720 minutes prior to the current Certificate Expiration Date).
- Click Generate (if editing) or Import (if using a file).
- Server 8.11.2+ The Current Server Certificate and Pending Server Certificate are shown.
- Complete the steps, After Updating Agent Server Certificate below.
After Replacing the Agent Communication Certificate:
- The previous Communication Certificate will be displayed in the Current Server Certificate Details for the duration specified in the Update Schedule.
- If using an alternate RDL verify the updated TrustedCertList.pem file is copied from \Parity Server\hostpkg\ accordingly.
- It is likely that the certificate bound to Port 443 in IIS is also expired and will need to be updated at this time as well.
- If a secondary server is configured (ex: for Disaster Recovery)
- The matching Agent Communication Certificate should be copied (with Private Key) to the secondary server and imported in the Local Machine Certificate Store > Trusted People.
- Verify IIS on the secondary server has the matching certificate from the Primary bound.