Data Risk Analytics User Guide Installing Custom Certificate in Admin Server for Ssl Communication With Browser 2025-07!03!11!16!07
Data Risk Analytics User Guide Installing Custom Certificate in Admin Server for Ssl Communication With Browser 2025-07!03!11!16!07
Contents
Installing Custom Certificate in Admin Server for SSL Communication with Browser . . . . . . . . . . . . . . . . . . . . . . . . 3
Note: The Admin Server does not support installing a full chain certificate for external communication.
Only a single certificate can be installed.
The Admin server uses a built-in default ROOT Certificate for SSL client-server communication. If you need to use your
own certificate, you need to provide your public certificate and private key files in binary (.der) format. Then, follow the
procedure below to install your certificate in the Admin server.
1. Verify that in your certificates, the organization's DN is NOT set to the default values
(CN=CounterBreach,OU=CB,O=IMPERVA,L=Unknown,ST=Unknown,C=Unknown).
These values are recognized as the default values that require a different procedure; use your own values
instead.
5. After the Admin server restarts, verify that the certificates were uploaded successfully by inspecting the log file
at cat /var/log/cbctl<DATE>.log and verifying you see the line Not Default certificate, update is skipped!
followed by your DN information.