SSL Certificate Configuration
OpsHub Integration Manager will automatically import the certificate if you create or edit a system. If the certificate does not import automatically during project or entity selection, you may see error messages like:
Peer is not authenticatedPeer's identity has not been verifiedHandshake failureorHandshake exception
If the certificate is not imported, follow the steps below.
Download HTTPS Certificate
To access systems deployed on HTTPS from OpsHub Integration Manager, download the HTTPS certificate on the machine where OIM is deployed.
Mozilla Firefox

Open the system URL in Firefox using HTTPS protocol.
Click the lock icon on the upper-left side of the address bar.
Click "More Information" in the pop-up.
In the new window, click "View Certificate".
Go to the "Details" tab.
Click the "Export" button.
Save the certificate on your local drive.
Note: If a certificate hierarchy is present, all certificates must be exported.
Internet Explorer

Open the system URL in Internet Explorer using HTTPS.
Click the lock icon on the right side of the address bar.
A pop-up will show "Website Identification".
Click "View Certificates".
Go to the "Details" tab and click "Copy to File".
A wizard for copying certificates will appear.
Select the DER encoded binary option and click Next.
Click Browse, provide a filename, and save it to a local drive.
Note: Export all certificates in the chain if a hierarchy is present.
Google Chrome

Open the system URL in Chrome using HTTPS protocol.
Click the lock icon on the upper-left of the address bar.
A pop-up will state "Identity Verified".
Go to the "Connection" tab and click "Certificate Information".
In the "Details" tab, click "Copy to File".
A certificate export wizard will appear.
Select the DER encoded binary option and click Next.
Click Browse, set a filename, and save to a local drive.
Note: Export all certificates in the hierarchy if present.
Import SSL Certificate through Console
Follow the steps below to import the downloaded certificate into OpsHub Integration Manager:
Open Command Prompt with Administrator privileges (right-click
cmd.exe→ Run as Administrator).Navigate to the folder:
<<OpsHub_Installation_Directory>>\AppData\OpsHubDataRun the following command:
keytool -importcert -alias <<certificate alias>> -keystore <<path>> -file "Certificate_Location\Certificate filename.extension"Example:
keytool -importcert -alias httpscertifcate -keystore "C:\Program Files\OpsHub\AppData\OpsHubData\cacerts" -file "C:\Users\Administrator\Desktop\certificate.crt"When prompted, enter the keystore password. Note: The default keystore password is
changeit.Type
yeswhen asked: Trust this certificate?Restart the OpsHub Server.
Important Notes:
If any hierarchy is present in the certificate, all certificates must be imported.
If multiple end system certificates are configured in OpsHub Integration Manager and these certificates have different private key passwords, use the Certificate Password Encryptor Utility to encrypt and store the passwords.
This utility creates a
cacert_config.propertiesfile containing all alias names and their encrypted passwords.You can use this file to load the certificates from the keystore in OpsHub Integration Manager.
Last updated

