Sign Certificate by a Third-Party Authority

When self-signed certificates are not sufficient, you sign your certificate using a Third-Party Certificate Authority such as Verisign, Geotrust, or some other Internal Certificate Authority. The workflow to do this:
gateway83
When self-signed certificates are not sufficient, you sign your certificate using a Third-Party Certificate Authority such as Verisign, Geotrust, or some other Internal Certificate Authority. The workflow to do this:
Third-party-certificate-signing
Third-party-certificate-signing
Workflow steps:
  1. Submit the CSR to the Certificate Authority (CA).
  2. CA approves the CSR and sends back a public key and certificate chain.
Generate a Certificate Signing Request (CSR)
  1. Select the certificate for which you are generating the CSR and then click
    Properties
    .
  2. In the Private Key Properties, click
    Generate CSR
    .
  3. Enter the
    CSR Subject (DN)
    . This must match the cluster hostname of the Gateways.
  4. Click
    OK
    to save the CSR file to a specific location on your computer.
Submit the CSR file to the Certificate Authority.
Update the Gateway with the New Certificate
When the Certificate Authority approves your CSR, they will return a public key and a certificate chain for its signing authorities, including intermediaries and Root CAs. Sometimes, both the public key and the certificate chain are included in a single file.
  • If you receive a single file, you can import this into the Gateway directly. Proceed to "Update the Gateway" below.
  • If they are individual files, you must combine them into a single file manually. The certificates must be in this order in the file:
    client/server certificate
    intermediate Certificate Authority 1 
    intermediate Certificate Authority 2
    root Certificate Authority
Combine Files (if necessary)
To combine individual files into a single file:
  1. Download the public key and certificate chain files from the Certificate Authority (CA) in PEM format.
    If the CA did not provide the files in PEM format, you can convert them as follows:
    a) Run Manage Certificates and import the certificates.
    b) Export the certificates in the PEM format.
  2. Open each file in a text editor and select the following sections in the order shown:
    1. Public key returned from the CA for the CSR submitted:
      -----BEGIN CERTIFICATE-----
      MIIDFzCCAf+gAwIBAgIIeyRBqnKDR5gwDQYJKoZIhvcNAQEMBQAwFzEVMBMGA1UEAxMMZXhhbXBs
      ZWludGNhMB4XDTEyMDYyNTE4NDA0NloXDTE0MDYyNTE4NDA0NlowHjEcMBoGA1UEAxMTY2x1c3Rl
      ci5leGFtcGxlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIouTRZX1P+fAysB
      ...
      <snip>
      ...
      JIQ3Cm/UcHlqzgP6R7FbTy9euI1zYiHk0uuV8i/ZDK4Gv7VAMf5MffIOV0dMNLwaFuFwVLepEvzU
      BD8wauCpcu1mYIE3PfO/1TnvoQrN/If46j2CizX5ojea6rxjYoqEdQWFVNvzHCLwOwc2wrN/LUi+
      nYxNkmyyeZfRIjwmHri4p3UxWJLcAWvIeWa1gBdLoghBJhmZ5AShppTq+AOXXDzv56R88EZ2
      -----END CERTIFICATE-----
    2. Each Intermediary CA and the Root CA:
      -----BEGIN CERTIFICATE-----
      MIIDDTCCAfWgAwIBAgIIG+NhXrXD+7QwDQYJKoZIhvcNAQEMBQAwFDESMBAGA1UEAxMJZXhhbXBs
      ZWNhMB4XDTEyMDYyNTE4MzkxOFoXDTE0MDYyNTE4MzkxOFowFzEVMBMGA1UEAxMMZXhhbXBsZWlu
      dGNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAlCHJff2FseL9NPdDX5l7SecLlGwt
      ...
      <snip>
      ...
      FYRnEJ+aEtmtGBugepcvpf66LB853r8Y2w1Q99tSfkPoMPDWcuRQyWM+H4OIm5jBj4NNIkQFsIXz
      FM92LzyP+GBRwBB06wk8xwJUggEoZlgMAcvV0t5aHND3LKd7F5khUR0HToPXSnrgsOwSvqL/nb8o
      lWaC4NoyRXFjT3AcbXC9zK5W/tj36auhaqzH2EBp/nzqEu6BbFls32801Dw=
      -----END CERTIFICATE-----
      -----BEGIN CERTIFICATE-----
      MIIDETCCAfmgAwIBAgIJAL2efffStKM5MA0GCSqGSIb3DQEBDAUAMBQxEjAQBgNVBAMTCWV4YW1w
      bGVjYTAeFw0xMjA2MjUxODM4MzJaFw0xNzA2MjQxODM4MzJaMBQxEjAQBgNVBAMTCWV4YW1wbGVj
      YTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJlwjzAfTKD5BqtZiNZjbLNSfU3tg2zL
      ...
      <snip>
      ...
      Sv3PVXaMNJ+XcHflj4JconiPk5VY0Pjs9dDBPPGsut5XTdooIGrp1I0/E8kkPGFvZ44yl06KgyE0
      FD7t316k9+eKWrdKwFC7BBoF4AusNBhfvdDlW0/uYEJ0WZc5rsxc1rJLIVAvCqWfc1mfPD48WcuG
      hV7WgXBBPAYMiSgCPL+R09DQ0P7lzUrqkmIO237lSoih04Azm1Eo0qIPnWBKH+jA
      -----END CERTIFICATE-----
    3. Combine all keys/certificates into a new file and save it with the .PEM extension.
      -----BEGIN CERTIFICATE-----
      MIIDFzCCAf+gAwIBAgIIeyRBqnKDR5gwDQYJKoZIhvcNAQEMBQAwFzEVMBMGA1UEAxMMZXhhbXBs
      ZWludGNhMB4XDTEyMDYyNTE4NDA0NloXDTE0MDYyNTE4NDA0NlowHjEcMBoGA1UEAxMTY2x1c3Rl
      ...
      <snip>
      ...
      BD8wauCpcu1mYIE3PfO/1TnvoQrN/If46j2CizX5ojea6rxjYoqEdQWFVNvzHCLwOwc2wrN/LUi+
      nYxNkmyyeZfRIjwmHri4p3UxWJLcAWvIeWa1gBdLoghBJhmZ5AShppTq+AOXXDzv56R88EZ2
      -----END CERTIFICATE-----
      -----BEGIN CERTIFICATE-----
      MIIDDTCCAfWgAwIBAgIIG+NhXrXD+7QwDQYJKoZIhvcNAQEMBQAwFDESMBAGA1UEAxMJZXhhbXBs
      ZWNhMB4XDTEyMDYyNTE4MzkxOFoXDTE0MDYyNTE4MzkxOFowFzEVMBMGA1UEAxMMZXhhbXBsZWlu
      ...
      <snip>
      ...
      FM92LzyP+GBRwBB06wk8xwJUggEoZlgMAcvV0t5aHND3LKd7F5khUR0HToPXSnrgsOwSvqL/nb8o
      lWaC4NoyRXFjT3AcbXC9zK5W/tj36auhaqzH2EBp/nzqEu6BbFls32801Dw=
      -----END CERTIFICATE-----
      -----BEGIN CERTIFICATE-----
      MIIDETCCAfmgAwIBAgIJAL2efffStKM5MA0GCSqGSIb3DQEBDAUAMBQxEjAQBgNVBAMTCWV4YW1w
      bGVjYTAeFw0xMjA2MjUxODM4MzJaFw0xNzA2MjQxODM4MzJaMBQxEjAQBgNVBAMTCWV4YW1wbGVj
      ...
      <snip>
      ...
      FD7t316k9+eKWrdKwFC7BBoF4AusNBhfvdDlW0/uYEJ0WZc5rsxc1rJLIVAvCqWfc1mfPD48WcuG
      hV7WgXBBPAYMiSgCPL+R09DQ0P7lzUrqkmIO237lSoih04Azm1Eo0qIPnWBKH+jA
      -----END CERTIFICATE-----
  3. Verify that the new .PEM file is good:
    # openssl verify
    <new certificate file>
    .pem
    You should see:
      <new certificate file>.pem: OK
  4. Validate the new certificate chain:
    # perl -n0777e 'map { print "---\n"; open(CMD, "| openssl x509 -noout -subject -issuer"); print CMD; close(CMD) } /^-----BEGIN.*?^-----END.*?\n/gsm'
    <new certificate file>
    .pem
    This displays output similar to the following:
    ---
    subject= /CN=cluster.example.com
    issuer= /CN=exampleintca
    ---
    subject= /CN=exampleintca
    issuer= /CN=exampleca
    ---
    subject= /CN=exampleca
    issuer= /CN=exampleca
Update the Gateway
Once you have combined all the files into a new certificate (or you received a single file from the CA), upload the combined certificate into the Gateway.
To update the Gateway:
  1. Select the certificate from which you generated the CSR and then click
    Properties
    .
  2. Click
    Replace Certificate Chain
    .
  3. In the Assign Certificate to Private Key wizard, choose
    Import from a File
    and then select the new certificate.
  4. After completing the wizard, restart the Gateway for the new certificate to take effect.