To resolve any of the above issues or generate a new self-signed certificate should it be expiring soon, follow the steps below.
1. Stop all Application Server(s), Process Spawner (if used) and PXE (if used) services
NOTE:- Process spawner has been removed since TSSA 23.4
2. Generate a new self-signed certificate ('bladelogic.keystore')
- Make sure to move '<install_dir>\br\deployments\bladelogic.keystore' to a backup folder so it does not exist on the path.
- Skip this step if you only need to synchronize the keystore file between appservers in MAS (Multiple Application Server) environment
- Refer to the following doc page to find more details about generating keystore file using either blmkcert or keytool:
Implementing private certificates in TrueSight Server Automation
3. Copy the newly generated keystore file (bladelogic.keystore) to the correct location ('<install dir>/NSH/br/deployments') on all appservers
4. Run the following blasadmin commands in an NSH Shell on each appserver host to check the current setting and update, where appropriate for all appserver deployments to use the new certificate as below example: (assuming the certificate file stays the same)
- blasadmin –a set appserver certpasswd <keystore_password>
- blasadmin –s _launcher set appserverlauncher keystorepassword <keystore_password>
5. Start the Application Server service
To verify everything went correctly:
- Open the TSSA RCP Console and in the ‘options’ menu select the certificates tab. Delete any certificates for your Application Server(s).
- Attempt to login to each of Application Server(s), where the new 'bladelogic.keystore' was used
- The console should prompt to accept a new certificate. Accept it.
- After connecting, go to ‘File >> Reconnect’ in the console and look at the 'options' > Certificates tab again. Inspect the certificate from this appserver and confirm the new expiration date.