The following section will guide you through using a custom certificate with SUSE Manager 3.2 and SUSE Manager Proxy 3.2 .
The following list provides requirements for using a custom certificate.
A Certificate Authority (CA) SSL public certificate file
A Web server SSL private key file
A Web server SSL public certificate file
Key and Certificate files must be in PEM format
The hostname of the web server’s SSL keys and relevant certificate files must match the hostname of the machine which they will be deployed on.
In case you want to use CAs with intermediate certificates, merge the intermediate and root CA certificates into one file. It is important that the intermediate certificate comes first within the combined file.
After completing YaST
firstboot procedures, export your current environment variables and point them to the correct SSL files to be imported.
Running these commands will make the default certificate obsolete after executing the yast2 susemanagersetup
command.
For more information on YaST
firstboot, see https://www.suse.com/documentation/suse-manager-3/singlehtml/suse_manager21/book_susemanager_install/book_susemanager_install.html#sec.manager.inst.setup.
Export the environment variables and point to the SSL files to be imported:
export CA_CERT=`path_to_CA_certificate_file`export SERVER_KEY=`path_to_web_server_key`export SERVER_CERT=`path_to_web_server_certificate`
Execute SUSE Manager setup with
yast2 susemanagersetup
Proceed with the default setup. Upon reaching the Certificate Setup window during YaST installation, fill in random values, as these will be overridden with the values specified in ???TITLE???.
Make sure that you execute yast2
susemanagersetup
from within the same shell the environment variables were exported from.
After completing the installation with yast found in Book “Advanced Topics”, Chapter 2 “SUSE Manager 3.2 Proxy” continue with a modified Book “Advanced Topics”, Chapter 2 “SUSE Manager 3.2 Proxy”, Section 2.2 “Proxy Installation and Connecting Clients”, Section 2.2.5 “Running configure-proxy.sh
” procedure:
Execute configure-proxy.sh
.
When prompted with:
Do you want to import existing certificates?
Answer with y .
Continue by following the script prompts.