Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Updated all the content

...

Adding a self-signed certificate

Creating a

...

self-signed certificate

  1. Launch Windows Powershell as administrator.
  2. Create your certificate by running the following command. Leave the PowerShell console session open. 

    Code Block
    languagepowershell
    $certName = "{certificateName}"         ## Replace {certificateName}
    Tip

    Replace {certificateName} with the name that you will use to access the Idera Dashboard. For example, if you are using the https://ComputerName:9291 link to access Idera Dashboard, then use ComputerName . In case, you are using the   https://ComputerName.Domain.com:9291 address then use Computername.Domain.com .

  3. Run the following command to configure your certificate settings.

    Code Block
    languagepowershell
    $Params = @{
         "DnsName"           = @($certName,"{certificateName}")   ## If you want to include other addresses or servers, you must separate each with a comma
         "CertStoreLocation" = "Cert:LocalMachine\My"
         "KeyExportPolicy"   = "Exportable"
         "KeySpec"           = "Signature"
         "KeyUsage"          = @("KeyEncipherment","DigitalSignature")
         "KeyAlgorithm"      = "RSA"
         "KeyLength"         = "2048"
         "HashAlgorithm"     = "SHA256"
         "NotAfter"          = (Get-Date).AddYears(10)
     }
    
     ## Checks for asterisks in the $certName and replaces it with the underscore character
     If ($certName.Contains("*")) {
         $certName = $certName -replace '\*','_'
     }
    Note

    Replace {certificateName} with the certificate name you previously defined in Step 2. 

    Tip

    Change the NotAfter parameter value to make your certificate valid for a more extended period.

  4. Run the command below to create your certificate defined with the parameters above. 

    Code Block
    $cert = New-SelfSignedCertificate @Params

Anchor
ExportPrivateKey
ExportPrivateKey
Export your certificate private key

Once the certificate is created, you need to export the certificate's private key. To do so, follow the steps below:

  1. Export your certificate in .cer format by running the following command.

    Code Block
    languagepowershell
     Export-Certificate -Cert $cert -FilePath "{DesiredPath}\$certname.cer"   ## Replace {DesiredPath} with the desired location e.g. C:\Users\Public\Documents

    Once the certificate is created, you should be able to check the certificate specifications.
    Image Added

  2. Create a password for your certificate private key and save it in a variable. Replace {myPassword} with the password that you wish to use to protect your certificate's private key.

    Code Block
    languagepowershell
     $mypwd = ConvertTo-SecureString -String "{myPassword}" -Force -AsPlainText  ## Replace {myPassword}
  3. Run the next command to export your private key, use the password you store in the $mypwd variable.

    Code Block
    languagepowershell
     Export-PfxCertificate -Cert $cert -FilePath "{DesiredPath}\$certname.pfx" -Password $mypwd   ## Replace {DesiredPath} with your desired location e.g. C:\Users\Public\Documents

    When the private key is exported in a .pfx file, you should be able to check the certificate specifications.

    Image Added

Import your private key into the Trusted Root Certification Authorities

Complete your certificate configuration by adding the .cer file to the Trusted Root Certification Authorities folder in the Console Root. To do so, follow the steps below. 

  1. Open the Microsoft Management Console (MMC) by selecting Run from the Start menu as Administrator. Type mmc and click OK.
    Image Added
  2. When the MCC window opens, click File from the menu toolbar, and select Add/Remove Snap-in...
  3. Once the Add or Remove Snap-ins window opens, select Certificates from the Available snap-ins options and click Add >.
  4. In the Certificates snap-in window, select Computer Account, and click Next.
  5. In the Select Computer window, verify that the Local computer is set as the computer you want the snap-in to manage. Click Finish.
    Image Added
  6. Import your certificate (.cer file) into the Trusted Root Certification Authorities folder. To do so, expand the Certificates node, from the Console Root tree and right-click the Trusted Root Certification Authorities folder, select All Tasks, and click Import...
    Image Added
  7. When the Certificate Import Wizard opens, follow the instructions to import the .cer file previously created.

    Info

    When adding your certificate or private key using the Certificate Import Wizard, use the password you previously defined in the Export your certificate private key section.

Import Key Pair

  1. Download the free KeyStore Explorer utility from
    Newtab2
    aliashttp://keystore-explorer.org/
    urlhttp://keystore-explorer.org/
    and install it.
  2. Open KeyStore Explorer as administrator. KeyStore Explorer displays the following Quick Start options. On launch, it may ask you to download an updated Java Cryptography Extension (JCE) Unlimited Strength file.
    Image Added
  3. Click Open an existing KeyStore.
  4. Browse to the IDERA Dashboard conf directory, the default path is  C:\Program Files\Idera\Dashboard\WebApplication\conf , and open the keystore file.
    Image Added
  5. On the Unlock KeyStore dialog, enter "password" and then click OK.
    Image Added
  6. KeyStore Explorer displays a list of any existing certificates. Delete the existing key and click the Import Key Pair.
    Image Added
  7. Select PKCS #12 as the type of key you want to import, and click OK
    Image Added
  8. Look for the key you created steps above, in this case, windev2302eval.pfx.click Choose.
    Image Added
  9. Select an alias for your key, and click OK.
    Image Added
  10. Choose a password and click OK.
    Image Added
  11. When the configuration is completed the following message pops up, click OK.
    Image Added
  12. Return to the main KeyStore Explorer window, save your configuration, and close the application.
    Image Added
  13. Close all the opened browsers.
  14. Download the free KeyStore Explorer utility from
    Newtab2
    aliashttp://keystore-explorer.sourceforge.net/
    urlhttp://keystore-explorer.sourceforge.net/
    and install it.
  15. Open KeyStore Explorer. KeyStore Explorer displays the following Quick Start options. On launch, it may ask you to download an updated Java Cryptography Extension (JCE) Unlimited Strength file.
    Image Removed
  16. Click Open an existing KeyStore.
  17. Browse to the IDERA Dashboard conf directory, the default path is  C:\Program Files\Idera\Dashboard\WebApplication\conf , and open the keystore file.
    Image Removed
  18. On the Unlock KeyStore dialog, enter "password" and then click OK.
    Image Removed
    KeyStore Explorer displays a list of any existing certificates.
    Image Removed
  19. To create a new key click  Generate Key Pair.
    Image Removed
  20. On the Generate Key Pair window, verify the proper algorithm is selected, and then click OK.
    Image Removed
    KeyStore Explorer begins to generate a new key pair
  21. On the Generate New Pair Certificate window, make the following changes:
    Image Removed
    • In the Signature Algorithm list, select SHA-1 with RSA or SHA-256 with RSA. This example uses SHA-1 with RSA.
    • In the Validity Period field set the number of years the certificate is valid, this example uses 5 years, and click Apply.
    • Click the Edit Name button to open the Name window.
  22. Anchorstep9step9On the Name window Click the Edit Name icon to enter identifying information. In the Name dialog, complete each of the available fields. The entry in the Common Name (CN) field should correlate with the name of the website.
    In essence, the name that you provide should match the URL that you intend to use. For example, the following image shows an entry that creates a certificate for https://localhost. For more information on each field refer to
    Newtab2
    aliasDistinguished Name Fields
    urlhttps://msdn.microsoft.com/en-us/library/windows/desktop/aa381979(v=vs.85).aspx
    Image Removed
    Once you fill your information click OK.
  23. On the Generate New Pair Certificate window click Add Extensions.
    Image Removed
  24. On the Add Certificate Extensions window, click  Add Image Removed
    Image Removed
  25. On the Add extension Type dialog select Subject Alternative Name and click OK.
    Image Removed
  26. On the Subject Alternative Name Extension dialog, click the Add Image Removed.
    Image Removed
  27. On the Alternative Name dialog, select DNS Name. In the General Name Value field, enter the Fully Qualified Domain Name of the server on which the IDERA Dashboard exists. Click OK on all windows to save your changes.

    Image Removed
  28. On the New Key Pair Entry Alias dialog, verify that the displayed alias matches the name of your website and then click OK.
    Image Removed
  29. KeyStore Explorer displays the New Key Pair Entry Password window. Type and confirm the password you want to use for the key pair, and then click OK.

    Note

    This password must match the password entered in step 5.

    In this case, type the following password in both input boxes:
    password
    Image Removed

  30. Verify the new line in the KeyStore Explorer certificate list, as shown in the following image.
    Image Removed
  31. To delete the old certificate select the appropriate line, and then click Cut. If you get a Pasword requement use the one from step 5.
    Image Removed
  32. Save the changes to the keystore file.
    Image Removed
  33. Double-click on the certificate that you created, verify your details, and click Export.
    Image Removed
  34. On the Export Certificate dialog save the certificate in the IDERA Dashboard conf directory (e.g. C:\Program\Files\Idera\Dashboard\WebApplication\conf\)
    Image Removed
  35. Return to the main KeyStore Explorer window and close the application.
  36. Restart the Idera Dashboard Core Service and Idera Dashboard Web Application Service.

Adding a certificate

...

Newtab2
aliasManage Trusted Root Certificates
urlhttps://technet.microsoft.com/en-us/library/cc754841(v=ws.11).aspx
  1. Access to the Idera Dashboard with the following link https://<{certificateName}>:9291 .
Scroll pdf ignore
Excerpt
Newtabfooter
aliasIDERA
urlhttp://www.idera.com
|
Newtabfooter
aliasProducts
urlhttps://www.idera.com/productssolutions/sqlserver
|
Newtabfooter
aliasPurchase
urlhttps://www.idera.com/buynow/onlinestore
|
Newtabfooter
aliasSupport
urlhttps://idera.secure.force.com/
|
Newtabfooter
aliasCommunity
urlhttp://community.idera.com
|
Newtabfooter
aliasResources
urlhttp://www.idera.com/resourcecentral
|
Newtabfooter
aliasAbout Us
urlhttp://www.idera.com/about/aboutus
|
Newtabfooter
aliasLegal
urlhttps://www.idera.com/legal/termsofuse