By default, the enecerts utility produces the eneCert.pem certificate (used by all clients and servers to specify their identity when using SSL) and the eneCA.pem Certificate Authority (CA) certificate (used by all clients and servers that wish to authenticate the other endpoint of a communication channel).

If you have your own CA certificate and private-key files, you can use the --CAkey and --CAcert flags to generate the eneCert.pem certificate. The private-key file (.key extension) is used to digitally sign the public key that is generated by the enecerts utility. Both flags must be used for this operation.

The syntax for the --CAkey flag is:

--CAkey private-key
               

where private-key is your own .key file with the private key for the CA that should be used to sign the generated certificate.

The syntax for the --CAcert flag is:

--CAcert cert-pem
               

where cert-pem is your CA certificate (.pem extension). This file is the same type of file as the default eneCA.pem CA certificate.

For example, the following Windows command creates a signed certificate file using your own CA certificate and private-key files:

enecerts --CAkey myCA.key --CAcert myCA.pem

You would then use the resulting eneCert.pem certificate and your CA file (myCA.pem in the example) to configure SSL for your Guided Search components. If you have multiple machines in your deployment, you must also copy these files to the other machines.


Copyright © Legal Notices