Replacing the Default Virtual Host Certificate
The following is the procedure for replacing the default virtual host certificate.
Procedure
Generate a certificate signing request using one of the following methods.
RSA Security Console. For instructions, see Generate a Certificate Signing Request (CSR) for the Web Tier.
Third-party tool. Ensure that the third-party tool generates a private key and a signing request. Ensure that you enter a common name (CN) where the value is the fully qualified hostname (FQHN) of the virtual host or you will not be able to activate the virtual host certificate. For instructions, see the third-party tool documentation.
Send the certificate signing request to the certificate authority (CA).
Import the trusted root and signed virtual host certificates and make it the active certificate. For instructions, see Import a Signed Virtual Host Certificate.
Update each web tier after importing the new certificate. For instructions, see RSA Authentication Manager Updates.
Related Concepts
Related Articles
Maintain Authentication Agent Associations in a Duplicated User Group 13Number of Views Cloud Administration System Event Log API 11Number of Views Delete a Replica Instance 215Number of Views Log Rotation Policy for the Appliance Logs 49Number of Views Select an Integration Path for Authentication Manager and Cloud Access Service 68Number of Views
Trending Articles
RSA Authentication Manager 8.9 Release Notes (January 2026) RSA announces the availability of the RSA SecurID Hardware Appliance 230 based on the Dell PowerEdge R240 Server How to troubleshoot Oracle database ORA-04030 errors in RSA Identity Governance & Lifecycle RSA Authentication Manager Upgrade Process Microsoft SQL Server Collectors can no longer connect to the SQL Server database after upgrade to Microsoft SQL Server 201…