RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x
This article explains how to export an SSL server certificate from an RSA Authentication Manager 8.x server .jks file using KeyStore Explorer, KSE.
There are two.jks file keystores in /opt/rsa/am/server/security that hold the replaced AM certificate and associated key pair,
webserver-identity.jks for Security Console certificates, and
vh-identity.jks for Virtual host replacement certificates
Make a backup copy of the file you want to export the private key from, usually vh-identity.jk to import the private key into a Load Balancer in-front of the Web Tier. Move this backup copy of the .jks to Windows where KSE is running.
You will need the
both
SSL Server Identity Certificate Private Key Password
SSL Server Identity Certificate Keystore File Password
from
./rsautil manage-secrets -a list com.rsa.signing.key
The RSA Authentication Manager 8.x server now allows customers to use the Operations Console to import their own security certificate and use it to encrypt the SSL traffic for the Authentication Manager administrative consoles. The GUI does not provide an option to export that custom certificate and its private key should you want to move it to a new server.
You can also export the Virtual Host VHost Cert and private key to a .pfx or .p12 file to import the private key to a Load Balancer e.g. F5, that can then terminate TLS connections from clients on the Internet and distribute those requests across multiple Web Tiers
- Download KeyStore Explorer from the internet (Windows based).
- Download a copy of the certificate database from your Authentication Manager 8.x server and copy it to the server where you installed the KeyStore Explorer program. The certificate database is a file called webserver-identity.jks and it is located on the Authentication Manager 8.x server in /opt/rsa/am/server/security. You can use an SFTP client such as Win SCP or Filezilla to download a copy of the file from your Authentication Manager server.
- Lookup the certificate private key and keystore file passwords on the Authentication Manager 8.x server so you can use the KeyStore Explorer program to open and export the certificates. On the RSA server navigate to /opt/rsa/am/utils and run the following command:
./rsautil manage-secrets -a listall
- When you run the command, you will be prompted to enter the Operations Console administrator name and password. If you enter the correct account credentials the command will print a list of passwords to the screen. From that list you want to copy the SSL Server Identity Certificate Private Key Password and SSL Server Identity Certificate Keystore File Password, as shown in the example below. Note that your passwords will be different than the ones shown here:
SSL Server Identity Certificate Private Key Password ..: iGegdeO9ev1XG0Y10gIzaAeiLaXY5g SSL Server Identity Certificate Keystore File Password : rkEoHHgSFzoMmKhqg4C4t0xckbR8NE
- Now you have all the information you need to extract your certificate from the jks store copied off the Authentication Manager 8.x server.
- Use the KeyStore Explorer program to open the keystore file (webserver-identity.jks for Security Console cert, vhost-identity.jks for Virtual host).
- When prompted for a password enter the SSL Server Identity Certificate Keystore File Password captured above.
- Once the keystore is open, find the certificate you want to export in the list.
- Right click on the certificate name and choose Export > Export Key Pair. When prompted for a password, enter the SSL Server Identity Certificate Private Key Password.
- Export the data to a .p12 file and then use that to import the certificate and private key into your new Authentication Manager server. You may need to import the CA root and any intermediary certs from your certificate provider into the Authentication Manager 8.x server first.
A third-party tool called Keystore Manager [aka KeyStore Explorer KSE] can be used to extract the certificate and private key from the Authentication Manager 8.x server.
This process has only been tested in the RSA Support lab and has not been approved via the QA process. The tools used in this procedure are not provided by or warranted by RSA and we assume no responsibility for problems that may arise out of their use. Since this procedure has not been tested by QA RSA Support can only give best effort support if you have a problem with it?s use.
Related Articles
How to create / recreate a cluster in EA environment 119Number of Views RSA SecurID Access Identity Router publish and access issues after importing certificates 68Number of Views RSA Access Manager Sun Java Server Web Server Agent upgrade is failing when running configure-sjsw7.sh script 6Number of Views How to export RADIUS server certificate on authentication manager 8 15Number of Views Password Available External email incorrectly defaults to localhost for hostname in RSA Identity Governance & Lifecycle 73Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x