0% found this document useful (0 votes)
0 views3 pages

Data Risk Analytics User Guide Installing Custom Certificate in Admin Server for Ssl Communication With Browser 2025-07!03!11!16!07

dra user guide

Uploaded by

vijay konduru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views3 pages

Data Risk Analytics User Guide Installing Custom Certificate in Admin Server for Ssl Communication With Browser 2025-07!03!11!16!07

dra user guide

Uploaded by

vijay konduru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Data Risk Analytics User Guide

Data Risk Analytics User Guide

Data Risk Analytics User Guide 1


Contents

Contents
Installing Custom Certificate in Admin Server for SSL Communication with Browser . . . . . . . . . . . . . . . . . . . . . . . . 3

Data Risk Analytics User Guide 2


Data Risk Analytics User Guide

Installing Custom Certificate in Admin Server for SSL


Communication with Browser

Note: The Admin Server does not support installing a full chain certificate for external communication.
Only a single certificate can be installed.

The Admin server uses a built-in default ROOT Certificate for SSL client-server communication. If you need to use your
own certificate, you need to provide your public certificate and private key files in binary (.der) format. Then, follow the
procedure below to install your certificate in the Admin server.

To install your custom certificate:

1. Verify that in your certificates, the organization's DN is NOT set to the default values
(CN=CounterBreach,OU=CB,O=IMPERVA,L=Unknown,ST=Unknown,C=Unknown).

These values are recognized as the default values that require a different procedure; use your own values
instead.

2. Connect to the Admin server CLI with root privileges as follows:


◦ If in sealed mode: connect with any user and run the command
admin
to gain root privileges.
◦ If not in sealed mode: connect locally with the user 'root'.
3. Place the .der files in the /tmp folder on the Admin server.
4. Run the following command and follow the on screen instructions:

cbctl adminserver certificate external-communication install-custom-certifica


te

Note: Running this command restarts all Admin server processes.

5. After the Admin server restarts, verify that the certificates were uploaded successfully by inspecting the log file
at cat /var/log/cbctl<DATE>.log and verifying you see the line Not Default certificate, update is skipped!
followed by your DN information.

Data Risk Analytics User Guide 3

You might also like