How to Update the Root (Server) and Client Certificates in RSA Identity Governance & Lifecycle
Originally Published: 2020-01-05
Article Number
Applies To
RSA Version/Condition: 7.0.x, 7.1.x, 7.2.x
Issue
This article explains how to update the RSA Identity Governance & Lifecycle root (server) certificate and corresponding client certificates for use with AFX and remote collection agents. Some examples of when you might want to do this are:
- After an upgrade of the AFX Server.
- After restoring a database from another system.
- After restoring an AFX Server archive from another system.
- After installing the AFX Server archive on a soft-appliance.
- The client and server certificates are out of sync.
- You have run modifyhostname.sh.
- To configure WebSphere or WebLogic to use server.keystore for incoming AFX connections.
- After an upgrade to RSA Identity Governance & Lifecycle 7.2.0 (see RSA Knowledge Base Article 000039236 -- Root (Server) and Client Certificates are RFC-5280 compliant starting in version 7.2.0 of RSA Identity Governance & Lifecycle for more information.)
- After upgrading JDK (see RSA Knowledge Base Articles 000038503 -- AFX Server and Remote Collection Agents fail to start after updating Java to version 1.8u241 (1.8.0.241) or later in RSA Identity Governance & Lifecycle and 000039222 -- AFX Connectors remain in a Deployed state and 'java.lang.SecurityException: Algorithm not allowable in FIPS140 mode: MD5' error in RSA Identity Governance & Lifecycle for more information.)
Resolution
- Update the server certificate.
- Update each AFX Server client certificate.
- Update each remote collection agent client certificate (if you use remote agents.)
NOTES:
- AFX and remote agents will not be running until this entire process is completed. Therefore, do this at a time when the system is quiet.
- The server certificate (first step) does not always need to be regenerated. Sometimes just downloading the server and client keystores is sufficient as long as their fingerprints match. Sometimes only the client certificate needs to be regenerated. Once regenerated, both the server and client keystores may be downloaded and their fingerprints checked. The complete process is to regenerate both the server and client keystores and that is what article describes.
Update the server certificate
- In the RSA Identity Governance & Lifecycle user interface go to Admin > System > Security tab.
- Under Server Certificate Store for Agent SSL Connections: click the Change Certificate Store button.
You will see the following dialog message. Click OK to generate the new server certificate.
- Click the Download button and save the server.keystore to a location on your computer.
- Login to the application server as the oracle user.
- Download the new server.keystore to your RSA Identity Governance & Lifecycle application server. In this example the keystore file was downloaded to $AVEKSA_HOME (/home/oracle).
- Go to the keystore directory
cd $AVEKSA_HOME/keystore
- Backup the existing server.keystore.
mv server.keystore server.keystore.bak
- Replace the existing server.keystore with the new server.keystore file that was just downloaded.
mv $AVEKSA_HOME/server.keystore $AVEKSA_HOME/keystore
- Restart RSA Identity Governance & Lifecycle.
acm restart
Update each AFX Server client certificate
Update the AFX server client certificate for each AFX Server by updating the client.keystore and restarting the AFX and RSA Identity Governance & Lifecycle applications.
- In the RSA Identity Governance & Lifecycle user interface go to AFX > Servers.
- For each AFX Server, click on the AFX Server name.
- Click the Change Certificate button. This action generates a new client certificate based off the new server certificate just generated and ensures the client certificate stored in the database matches the server certificate stored in the database.
You will see the following dialog message. Click OK to generate the new client certificate.
- Click the Download Keystore button and save the client.keystore to a location on your computer.
- Login to the application server where AFX is installed as the afx user.
- Download the new client.keystore to your RSA Identity Governance & Lifecycle AFX server. In this example the keystore file was downloaded to $AVEKSA_HOME (/home/oracle).
- Go to the keystore directory.
cd $AFX_HOME/esb/conf
- Backup the existing client.keystore.
mv client.keystore client.keystore.bak
- Replace the existing client.keystore with the new client.keystore file that was just downloaded.
mv $AVEKSA_HOME/client.keystore $AFX_HOME/esb/conf
- Restart AFX and the RSA Identity Governance & Lifecycle application.
afx stop acm restart afx start
Update each remote collection agent client certificate
- In the RSA Identity Governance & Lifecycle user interface go to Collectors > Agents.
- For each remote agent (not the default local AveksaAgent), click on the remote agent name.
- Click the Change Certificate button. This action generates a new client certificate based off the new server certificate just generated and ensures the client certificate stored in the database matches the server certificate stored in the database.
You will see the following dialog message. Click OK to generate the new server certificate.
- Click the Download Agent button to download a new agent with the new certificate in a zip file called AveksaAgent.zip.
- Login to the remote server that has the remote agent as user oracle.
- Download the new AveksaAgent.zip to the remote server. In this example, the zip file was downloaded to /home/oracle.
- Stop the agent by running agent_stop.sh in the AveksaAgent/bin directory, as follows:
cd home/oracle/AveksaAgent/bin ./agent_stop.sh
- Backup the agent directory.
cd /home/oracle mv <agent-directory> <agent-directory.bak>
- Unzip the agent on the remote server where it runs (replacing the old one).
unzip AveksaAgent.zip
- Start the agent by running agent_start.sh in the AveksaAgent/bin directory, as follows:
cd home/oracle/AveksaAgent/bin ./agent_start.sh
Notes
- Check the server.keystore:
su oracle cd $AVEKSA_HOME/keystore keytool -list -v -storepass Av3k5a15num83r0n3 -keystore server.keystore -alias aveksa_ca
- Check the client.keystore for the AFX Server(s).
su {afxuser}
cd $AFX_HOME/esb/conf
keytool -list -v -storepass Av3k5a15num83r0n3 -keystore client.keystore -alias aveksa_ca
- Check the client.keystore for the remote collection agent(s).
su oracle cd /home/oracle/AveksaAgent/conf keytool -list -v -storepass Av3k5a15num83r0n3 -keystore client.keystore -alias aveksa_ca
- Look for the output below and ensure the fingerprints are the same for the server.keystore and the client.keystore. If they differ, repeat the steps in this article.
Certificate fingerprints: MD5: 20:C5:53:B6:54:E6:E9:1A:82:C4:B9:03:73:56:CE:BC SHA1: DF:8F:78:72:79:36:F0:9C:B8:63:89:CA:10:C6:A9:90:06:1A:64:1D SHA256: CB:8B:88:AA:FA:A5:A1:17:31:4A:90:FF:7B:0C:F8:8E:97:AD:0D:84:85:1A:D8:37:BD:2A:8A:94:8A:34:CE:26 Signature algorithm name: SHA256withRSA Subject Public Key Algorithm: 2048-bit RSA key
Related Articles
Replacing the server certificate used for the RSA Identity Governance & Lifecycle appliance web administration interface 3.07KNumber of Views How to replace the RSA Authentication Manager self signed console certificate with a signed certificate from Microsoft Act… 1.57KNumber of Views What to expect during an RSA SecurID Access Identity Router (IDR)/Cluster software update 594Number of Views RSA Authentication Manager Administration Server with Operations Console service fails to start when restarted from the SS… 1.62KNumber of Views How to 'Trust' the RSA Authentication Manager Security Console Self-Signed Root CA certificate and prevent Cert warnings. 725Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?