IFS Middleware and Certificates
Information
Securely packaged certificates/keys
The keys in the certificates are sensitive information, so it needs to be stored in a password protected container. The IFS Installer will only import secure certificate stores that fulfill:
Third-party certificates must be imported into a valid PKCS #12 store
The PKCS #12 store password must contain at least six characters
The complete Chain of Trust, including the CA Root Certificate, must be included into the PKCS #12 store
The certificate must be a Server Certificate
IFS Recommend RSA Certificate Encryption
It's recommended to use keysize 2048 and use key algorithm RSA for the Certificates used in IFS systems.
Know Issues
Know issue with IFS Certificate when validating in IFS Middlware.
Error:-
Certificate verification failed. Path does not chain with any of the trust anchors.
Step 1: Import Certificate into Local Machine
- Mark this key as exportable
- Place into Trusted Root Certification Authorities
Step 2: Run MMC (from the start/run)
- Select File\Add Remove Snap-in
- Select Certificate and add for Computer account
- Find Certificate (in Trusted Root Certification Authorities)
- Select the Certificate and press the right mouse button
- Select All Tasks\Export
- Select Yes, export private key
- Select Export all extended properties
- Enter password (must contain at least six characters/no special characters)
- Save to a new File name (C:\Temp\newcert.pfx)