Certificate rotation
Rotate the certificates in your environment.
Before you begin
- Generate new certificates by performing one of the following procedures:
- Generate new certificates and a Certificate Authority (CA)Note: When you generate new certificates to proceed with the certificate rotation procedure, the password to encrypt the private key must be the same used for the old certificates.
or
- Generate new certificates from an existing Certificate Authority (CA)
- Generate new certificates and a Certificate Authority (CA)
- Give
rootaccess to the master domain manager and the dynamic agent.
About this task
You can extend the certificate customization also to backup master domain manager, dynamic domain manager, and Dynamic Workload Console.
To perform certificate rotation in your environment without downtime, follow the procedure described below:
Procedure
-
Create the
additionalCAsfolder by running the following command:mkdir -p <TWA_DATA_DIR>/ssl/depot/additionalCAs -
Copy the certificates from the
outpathfolder into theadditionalCAsfolder by running the following command:cp outpath/ca.crt TWA_DATA_DIR/ssl/depot/additionalCAs/ca_new.crt cp SSL_certs_2025/tls.crt TWA_DATA_DIR/ssl/depot/additionalCAs/tls_new.crtNote: If you generated certificates from an existing CA, you do not need to copyca_new.crtinto theadditionalCAsfolder. -
Add the new
ca.crtandtls.crtcertificates to the CA chain by running theAgentCertificateDownloaderscript on the backup master domain manager, dynamic agents and fault-tolerant agents:cd <TWS_path>/bin ./AgentCertificateDownloader.sh --wauser twsuser --wapassword <wauser password> --tdwbhostname <wauser ip address> --tdwbport <master port> --work_dir /tmpFor more information, see Certificates download to dynamic agents and fault-tolerant agents - AgentCertificateDownloader script -
Import the new certificates on the master domain manager and backup master domain manager:
The certificates are renewed without downtime.
-
Import the CA chain by running the following command:
certman import -inpath <input path> -all -keypasswd <key pwd> -updatedepot -alias server -forcealiasWhere:
- inpath
- Specify the folder that contains the CA chain.
- all
- Import the certificate, the key and the CA chain.
- keypasswd
- Specify the password used to encrypt the private key. If
allis specified, this value is mandatory. The password requires a length of at least 8 characters.Note: If the password contains wildcards, enclose the password in single quotes. For example:-keypasswd 'passw!rd' - updatedepot
- Add the parameter to the command to update the master domain manager
depotfolder located at:<TWSDATA>/ssl/depot - alias server
- Specify the server alias to be used in the truststore file during the import.
- forcealias
- Specify an alias to be used in the truststore file that overwrites the existing alias.
-
Remove the
additionalCAsfolder from thedepotof the master domain manager:rm -rf <TWA_DATA_DIR>/ssl/depot/additionalCAs -
Run the
AgentCertificateDownloaderscript on the backup master domain manager, dynamic agents and fault-tolerant agents:cd <TWS_path>/bin ./AgentCertificateDownloader.sh --wauser twsuser --wapassword <wauser password> --tdwbhostname <wauser ip address> --tdwbport <master port> --work_dir /tmpFor more information, see Certificates download to dynamic agents and fault-tolerant agents - AgentCertificateDownloader script.