Extract certificates from an existing keystore on a master domain manager
About this task
If you need to extract the certificates from a keystore on a master domain manager to provide them to the backup master domain manager or Dynamic Workload Console, you can use Certman to extract the required certificates.
Extract certificates from version 10.2.3 or later
About this task
You can extract certificates from an existing keystore on a master domain manager V10.2.3 or later by completing the following steps:
Procedure
- Browse to TWS_INST_DIR/TWS/bin, where TWS_INST_DIR is the HCL Workload Automation installation directory.
-
Extract the certificates by running the following command:
certman extract -outpath <output path> [-storepasswd <pw>] [-wauser <user>] [-wagroup <group>] [-workdir <working directory>] [-cachain-splitted]Where:
- outpath
- Specify the folder where store the certificates.
- storepasswd
- Optionally, specify the password of the keystore on the master domain manager.
- wauser
- Optionally, specify the TWS_user that must be set as owner of the output files.
- wagroup
- Optionally, specify the TWS_user that must be set as group of the output files..Note: To specify an owner and group in wauser and wagroup parameters, the user who launches Certman must have the permissions to change the owner and group on output files.
- workdir
- Optionally, specify the working directory used by the command for storing data while running. When the command stops running, the working directory is deleted. Ensure you have write access to the specified directory and enough space is available.
- cachain-splitted
- Optionally, specify the CA chain to be splitted into multiple files. By default, it is false.
Results
-
- ca.crt
- The file that contains the intermediate CA certificate and ends
up with the Root ca.Note: If you enabled the cachain-splitted parameter, the ca.crt contains only the Root ca. The intermediate CA certificates are stored in the additionalCAs subfolder.
-
- tls.crt
- The certificate signed and validated by the CA.
-
- tls.key
- The private key of the tls certificate.
-
- tls.sth
- The stash file of the tls certificate that contains the password encoded in Base64 format.
-
- additionalCAs
- The subfolder where any intermediate CA certificate extracted by the truststore is stored.
Extract certificates from a previous product version level
About this task
You can extract certificates from a previous product version level by completing the following steps:
Procedure
- From Flexnet or from HCL Software, download the 10.2.3 installation package: HWA_10.2.3_<component>_<operating_system>.zip
-
Extract the content, browse to the path
<IMAGE_DIR>/TWS/<OPERATING_SYSTEM>_<ARCHITECTURE>/Tivoli_LWA_<operating_system>/TWS/bin/
, and copy the following files:
- certman
- certman.extract.json
- certman.generate.json
- certman.import.json
- certman.verify.json
- certman.version.json
-
Paste the Certman files
into the following path: TWS_INST_DIR/TWS/bin, where
TWS_INST_DIR is the HCL Workload Automation installation
directory.
Note: For UNIX systems, ensure that all the files have the ownership of the user who installed the master domain manager and the correct permissions (775 for certman and 644 for the json files).
-
Extract the certificates by running the following command:
certman extract -outpath <output path> [-storepasswd <pw>] [-wauser <user>] [-wagroup <group>] [-workdir <working directory>] [-cachain-splitted]Where:
- outpath
- Specify the folder where store the certificates.
- storepasswd
- Optionally, specify the password of the keystore on the master domain manager.
- wauser
- Optionally, specify the TWS_user that must be set as owner of the output files.
- wagroup
- Optionally, specify the TWS_user that must be set as group of the output files..Note: To specify an owner and group in wauser and wagroup parameters, the user who launches Certman must have the permissions to change the owner and group on output files.
- workdir
- Optionally, specify the working directory used by the command for storing data while running. When the command stops running, the working directory is deleted. Ensure you have write access to the specified directory and enough space is available.
- cachain-splitted
- Optionally, specify the CA chain to be splitted into multiple files. By default, it is false.
Results
-
- ca.crt
- The file that contains the intermediate CA certificate and ends
up with the Root ca.Note: If you enabled the cachain-splitted parameter, the ca.crt contains only the Root ca. The intermediate CA certificates are stored in the additionalCAs subfolder.
-
- tls.crt
- The certificate signed and validated by the CA.
-
- tls.key
- The private key of the tls certificate.
-
- tls.sth
- The stash file of the tls certificate that contains the password encoded in Base64 format.
-
- additionalCAs
- The subfolder where any intermediate CA certificate extracted by the truststore is stored.