Please Note Prior To Replacing The Communication Certificate:
- Server 8.9.4+ includes a Certificate Delay Swap.
- Server 8.10.2+ includes Certificate Update Schedule options which will show the old Communication Certificate for a period of time before swapping the new one.
- It is recommended to use the expiration date of the current certificate (default).
- Setting the Update Schedule will determine the Certificate Delay Swap.
- Replacing the Communication Certificate could cause temporary Console performance issues under certain circumstances.
- Be sure to replace the certificate prior to expiration.
- Be sure to use an Update Schedule that allows the majority of Agents to receive changes before the new certificate is required.
|
Understanding Certificate Delay Swap (Update Schedule):
To help prevent Communication Key Overuse, beginning with Server 8.10.2 an Update Schedule for the new Communication Certificate can be specified when using either a Self-signed Certificate or a Certificate Authority Certificate. If Agents have not received the updated Trusted Certificate List before the new Communication Certificate is activated, the Communication Key will be used for Agent communication.
Overuse of the Communication Key may result in poor Console performance. For this reason it is recommended to:
- Replace the Communication Certificate before it expires
- Specify Agent Certificate Update settings relative to your environment (Agent connectivity, VPN requirements for file transfers, etc)
- Follow the complete procedure below, including the steps After Updating the Communication Certificate.
More details on these settings can be found in the User Guide > System Configuration > Securing Agent-Server Communications.
Using a Self-signed Certificate:
- Log in to the App Control Console > gear icon > System Configuration.
- From System Configuration tab: navigate to: Security > Current Server Certificate > Edit.
- Make any necessary updates (such as previous server name, "Valid For" period, etc)
- Configure the Certificate Delay Swap
- It is recommended to use the defaults (12 hours prior to the current Certificate Expiration Date).
- Click Generate.
- Reminder: The current Communication Certificate will still display/be used based on the Update Schedule chosen.
- Complete the steps, After Updating Agent Server Certificate below.
Using a Certificate Authority (CA) Issued Certificate:
- Obtain the new, unexpired CA issued certificate for the Server.
- Log in to the App Control Console and navigate to: Settings > System Configuration > Security.
- In the section: Import Server Certificate From PKCS12 File > click Browse...
- Locate the certificate file and specify the Password as provided by the CA.
- Configure the Certificate Delay Swap
- It is recommended to use the defaults (12 hours prior to the current Certificate Expiration Date).
- Click Import.
- Reminder: The current Communication Certificate will still display/be used based on the Update Schedule chosen.
- Complete the steps, After Updating Agent Server Certificate below.
After Updating Agent Server Certificate:
- The previous Communication Certificate will be displayed in the Current Server Certificate Details for the duration specified in the Update Schedule.
- If using an alternate RDL verify the updated TrustedCertList.pem file is copied from \Parity Server\hostpkg\ accordingly.
- It is likely that the certificate bound to Port 443 in IIS is also expired and will need to be updated at this time as well.