Before You Begin
Admin (a) role is required to modify the web server properties in Oracle ILOM.
Obtain the new (temporary self-signed or certificate authority-signed) HTTPS certitude and private key. For instructions using the OpenSSL toolkit, see Obtain a Custom SSL Certificate and Private Key Using OpenSSLToolkit.
Ensure that you can access the new HTTPS certificate and private key through your network or local file system.
When uploading a certificate chain for SSL, ensure that the certificates within the certificate chain are listed in the correct order. For more details, see Certificate Chain Order.
For instance, in the:
SSL Certificate and Private Key Configuration Properties, Oracle ILOM Administrator's Guide for Configuration and Maintenance (Firmware 3.2.x)
SSL Certificate and Private Key Configuration Properties, Oracle ILOM 3.1 Configuration and Maintenance Guide
Upload SSL Certificate, Oracle ILOM 3.0 Daily Management - CLI Procedures Guide
Upload SSL Certificate, Oracle ILOM 3.0 Daily Management - Web Procedures Guide
An SSL Certificate Chain links your intermediate certificate(s) to the trusted root certificate. When using a certificate chain, the SSL certificates in the chain must be listed in the following order:
ilom.cer
intermediate.cer(s)
root.trusted_CA.cer
Example: Create Certificate Chain
cat ilom.cer intermediate.cer root_trusted_CA.cer > cer-chain.cer
where:
cat represents the Symantec command used in this example to create a certificate chain file (cer-chain.cer).
ilom.cer is the sender's certificate, which must come first in list.
any intermediate.cer that follows must directly certify the proceeding certificate.
root_trusted_CA.cer represents the root certificate issued by the Certificate Authority.