For details on how to manage certificates post-installation, see Managing certificates.
Automation Suite requires two certificates at the time of installation.
- Server certificate – required for TLS communication between the client and the cluster;
- Identity token-signing certificate – required to sign the authentication token.
The installation process generates self-signed certificates on your behalf, but we recommend updating these with certificates signed by a trusted certificate authority as soon as installation completes.
The installation process generates self-signed certificates on your behalf. These certificates will expire in 90 days, and you must replace them with certificates signed by a trusted Certificate Authority (CA) as soon as installation completes. If you do not update the certificates, the installation will stop working after 90 days.
Aside from the above certificates, you may need to provide additional trusted CA certificates if you want the cluster to trust external software. Example: SQL Server CA Certificate, SMTP Server CA Certificate, external S3 compatible objectstore CA certificate, etc.
At the time of installation, you must provide CA certificates for any external software that requires a secure TLS communication. However, if you have not enabled the TLS communication, you can configure it post-installation. For instructions, see Managing certificates.
Server certificate requirements
The server certificate must meet the following requirements:
- File format should be
.pem, i.e., Base64 encoded DER certificate;
- Private key length should be at least 2048;
- Extended Key Usage: TLS Web Server Authentication; required for accessing Automation Suite on iOS devices;
- Certificate key must be decrypted. If the key is encrypted, run the following command to decrypt it:
# replace /path/to/encrypted/cert/key to absolute file path of key # replace /path/to/decrypt/cert/key to store decrypt key # Once prompted, please entry the passphrase or password to decrypt the key openssl rsa -in /path/to/encrypted/cert/key -out /path/to/decrypt/cert/key
- Should have Subject Alternative Name for all the DNS entries required for installing Automation Suite. If the FQDN for the cluster is
automationsuite.mycompany.com, the certificate SAN should have the following DNS:
Alternatively, if the
*wildcard is too generic, make sure you have SAN entries for the following DNS:
Server certificate files
Automation Suite requires three files at the time of installation, as follows:
- Server / TLS certificate file — the server’s public certificate file. This file must contain only the leaf server certificate.
- Server / TLS key file — private key file for the server certificate.
- Certificate Authority Bundle — this is the Public Certificate of CA which is used to sign or issue the server certificate. This file must contain both root and all intermediate certificates if present.
To verify the CA and Server certificate, run the following command on the Linux machine:
# Please replace /path/to/ca-certificate-bundle and /path/to/server-certificate with actual file path. openssl verify -CAfile /path/to/ca-certificate-bundle /path/to/server-certificate
Identity token-signing certificate
Automation Suite has the following requirements in terms of token-signing certificates at the time of installation:
- File format should be
pkcs12to sign the authentication token;
- Password for signing the certificate is requires.
If an identity token signing certificate is not provided, Automation Suite uses the server certificates to generate the one at the time of installation.
Updated 5 months ago