Using your own truststore for server SSL connections
The server by default provides a truststore but you might want to use your own truststore for server SSL connections.
About this task
If you want to use your own truststore, you must take the following steps.
Procedure
-
Change the server configuration file to use your own certificate keystore.
- Open
HCL® Quality Server installation directory\usr\servers\defaultServer\server.custom.xml
in an editor. - Inside server.custom.xml uncomment the
keystore
element and then add the details of your certificate keystore.<keystore id="defaultKeyStore" password="<password>" location="<keystore path>"/>
- If you generate the keystore by using the securityUtility tool, you can directly copy the values from the tool output and add the location attribute. For more information, see Liberty: Keystores in the WebSphere® Application Server Liberty base documentation.
- Open
-
Change the HTTP/TCP proxy (
registration.xml
) to replace thessl
element with the commented outssl
element and update its attributes. For details, see Modifying the configuration settings of the HTTP/TCP proxy. -
Change the HCL OneTest™ API
Agent (
Agent.config
file) to edit thessl
element and update its attributes. For details, see Registering HCL OneTest API Agent with HCL Quality Server. - Restart the services (server, HCL OneTest™ API Agent, HTTP/TCP proxy). Follow each of the referenced topics for details about restarting each service.
- Configure the other intercept technologies, such as the Java Virtualization or SIBus tooling that communicate with the server to use your certificate. The certificate must be added to the hosting Java application, for example, WebSphere Application Server, by using techniques that are appropriate for that technology.
- Change the project's server URL to reference the new HCL® Quality Server server. For details see Project settings.