In this article :
Objective
Prerequisites
Steps to follow
Validation and confirmation
Tips
Related topics and articles
Objective
This article provides step-by-step guidance on how to enable SSL manually in ADAudit Plus. Securing ADAudit Plus with SSL ensures encrypted data transmission, preventing unauthorized access and enhancing security.
Prerequisites
ADAudit Plus must be installed and accessible.
Administrative access to the ADAudit Plus server.
A valid SSL certificate in PKCS #12 (.pfx) format containing both the public certificate and the private key.
Java keytool and access to server.xml configuration file.
Steps to follow
Step 1: Define the SSL port
Log in to ADAudit Plus with an account that has administrative privileges.
Navigate to Admin > General Settings > Connection.
Check the Enable SSL Port [https] box. The default port number 8444 is selected automatically.
Click Save changes.
Restart ADAudit Plus for the changes to take effect.
Note: If you want to install an existing PFX or PKCS #12 certificate, skip to the PFX or PKCS #12 format section in Step 5.
Step 2: Create the keystore
A keystore is a password-protected file that contains the keys and certificates for the server to encrypt and decrypt data.
To create a certificate keystore file and generate encryption keys, run command prompt as an administrator, navigate to <product_installation_directory>\jre\bin, and execute the following commands:
keytool -genkey -alias tomcat -keyalg RSA -validity 1000 -keystore <domainName>.keystore
Replace <domainName> with the name of your domain.
Type in your keystore password.
Refer to the image below and provide information in accordance with the following guidelines.
What is your first and last name? | Provide the machine name or the fully qualified domain name of the server hosting ADAudit Plus. |
What is the name of your organizational unit? | Enter the department name that you want to appear in the certification. |
What is the name of your organization? | Provide the legal name of your organization. |
What is the name of your city or locality? | Enter the city name as provided in your organization’s registered address. |
What is the name of your state or province? | Enter the state or province as provided in your organization’s registered address. |
What is the two-letter country code for this unit? | Provide the two-letter code of the country in which your organization is located. |
Enter key password for <tomcat> | Enter the same password as the keystore password. Note: If you choose to enter a different password, note it down because the key password will be required later. |
Step 3: Generate the certificate signing request
To create a certificate signing request (CSR) with a subject alternative name (SAN), execute the following command in command prompt:
keytool -certreq -alias tomcat -keyalg RSA -ext SAN=dns:server_name,dns:server_name.domain.com,dns:server_name.domain1.com -keystore <domainName>.keystore -file <domainName>.csr
Replace <domainName> with the name of your domain and provide the appropriate SANs as shown in the image below:
Step 4: Issue the SSL certificate
In this step, you will connect to a certificate authority (CA), submit the CSR to the specific CA, and get the SSL certificate issued to you.
A. Issue the SSL certificate using an external CA
To request a certificate from an external CA, submit the CSR to that CA. You can locate the CSR file in the <product_installation_directory>\jre\bin folder.
Unzip the certificates returned by your CA and put them in the <product_installation_directory>\jre\bin folder.
Note: After the SSL certificate is issued by the external CA, proceed to Step 5 to install the certificate.
B. Issue the SSL certificate using an internal CA
An internal CA is a member server or domain controller in a specific domain that has been assigned the CA role.
Connect to the Microsoft Active Directory Certificate Services of your internal CA and click the Request a certificate link.
On the Request a Certificate page, click the advanced certificate request link.
On the Submit a Certificate Request or Renewal Request page, copy the content from your CSR file and paste it in the Saved Request field.
Select Web Server or the appropriate template for Tomcat under Certificate Template and click Submit.
The certificate will be issued when you click the Download certificate chain link. The downloaded certificate will be in the P7B file format.
Copy the P7B file to the <product_installation_directory>\jre\bin folder.
Step 5: Import the certificate
Follow the steps given below that correspond with the format in which you want to import the certificate.
A. Privacy-enhanced mail (PEM) format
To import the certificate into the keystore file in PEM format, open command prompt, navigate to <product_installation_directory>\jre\bin, and run the commands from the list below that applies to your CA.
General commands
keytool -importcert -alias root -file <root.cert.pem> -keystore <your.domain.com>.keystore -trustcacerts
keytool -importcert -alias intermediate -file <intermediate.cert.pem> -keystore <your.domain.com>.keystore -trustcacerts
keytool -importcert -alias intermediat2 -file <intermediat2.cert.pem> -keystore <your.domain.com>.keystore -trustcacerts
keytool -importcert -alias tomcat -file <server.cert.pem> -keystore <your.domain.com>.keystore -trustcacerts
Vendor-specific commands
For GoDaddy certificates
keytool -import -alias root -keystore <domainName>.keystore -trustcacerts -file gd_bundle.crt
keytool -import -alias cross -keystore <domainName>.keystore -trustcacerts -file gd_cross.crt
keytool -import -alias intermed -keystore <domainName>.keystore -trustcacerts -file gd_intermed.crt
keytool -import -alias tomcat -keystore <domainName>.keystore -trustcacerts -file <domainName>.crt
For Verisign certificates
keytool -import -alias intermediateCA -keystore <domainName>.keystore -trustcacerts -file <your intermediate certificate.cer>
keytool -import -alias tomcat -keystore <domainName>.keystore -trustcacerts -file <domainName>.cer
For Comodo certificates
keytool -import -trustcacerts -alias root -file AddTrustExternalCARoot.crt -keystore <domainName>.keystore
keytool -import -trustcacerts -alias addtrust -file UTNAddTrustServerCA.crt -keystore <domainName>.keystore
keytool -import -trustcacerts -alias ComodoUTNServer -file ComodoUTNServerCA.crt -keystore <domainName>.keystore
keytool -import -trustcacerts -alias essentialSSL -file essentialSSLCA.crt -keystore <domainName>.keystore
For Entrust certificates
keytool -import -alias Entrust_L1C -keystore <keystore-name.keystore> -trustcacerts -file entrust_root.cer
keytool -import -alias Entrust_2048_chain -keystore <keystore-name.keystore> - trustcacerts -file entrust_2048_ssl.cer
keytool -import -alias -keystore <keystore-name.keystore> -trustcacerts -file <domainName.cer>/li>
For certificates purchased through the Thawte reseller channel
keytool -import -trustcacerts -alias thawteca -file <SSL_PrimaryCA.cer> -keystore <keystore-name.keystore>
keytool -import -trustcacerts -alias thawtecasec -file <SSL_SecondaryCA.cer> - keystore <keystore-name.keystore>
keytool -import -trustcacerts -alias tomcat -file <certificate-name.cer> -keystore <keystore-name.keystore>
Once the certificate is installed, proceed to Step 6 to bind the certificate to ADAudit Plus.
Note: If you are receiving the certificates from a CA that is not listed above, then contact your CA to get the commands required to add its certificates to the keystore.
B. P7B or PKCS #7 format
To import the certificate into the keystore file in P7B or PKCS #7 format, open Command Prompt, navigate to <product_installation_directory>\jre\bin, and execute the following command:
keytool -import -trustcacerts -alias tomcat -file certnew.p7b -keystore <keystore_name>.keystore
Once the certificate is installed, proceed to Step 6 to bind the certificate to ADAudit Plus.
C. PFX or PKCS #12 format
Copy and save your PFX or PKCS #12 file in the <product_installation_directory>\conf folder.
Open the server.xml file present in the <product_installation_directory>\conf folder with a local text editor. Create a backup of the existing server.xml file just in case you wish to restore it.
Find the connector tag that contains <Connector ... SSLEnabled="true"... name="SSL".../>.
Within the connector tag, make the following changes:
Replace the value of keystoreFile with "./conf/<YOUR_CERT_FILE.pfx>".
Add keystoreType="PKCS12".
Save and close the server.xml file.
<Connector SSLEnabled="true" URIEncoding="UTF-8" acceptCount="100" ciphers="TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA" clientAuth="false" connectionTimeout="20000" debug="0" disableUploadTimeout="true" enableLookups="false" keystoreFile="./conf/<YOUR_CERT_FILE.pfx>" keystorePass="*********" keystoreType="PKCS12"maxSpareThreads="75" maxThreads="150" minSpareThreads="25" name="SSL" port="8444" scheme="https" secure="true" sslEnabledProtocols="TLSv1,TLSv1.1,TLSv1.2" sslProtocol="TLS"/>
Note: After modifying the server.xml file, skip to the "Encrypt the keystore password" section in Step 6.
Step 6: Bind the certificates to ADAudit Plus
Copy the <domainName>.keystore file from the <product_installation_directory>\jre\bin folder and paste it in the <product_installation_directory>\conf folder.
Open the server.xml file present in the <product_installation_directory>\conf folder with a local text editor. Create a backup of the existing server.xml file in case you wish to restore it.
Find the connector tag that contains <Connector ... SSLEnabled="true"... name="SSL".../>.
Within the connector tag, replace the value of keystoreFile with "./conf/<Your_Domain_Name>.keystore".
<Connector SSLEnabled="true" URIEncoding="UTF-8" acceptCount="100" ciphers="TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA" clientAuth="false" connectionTimeout="20000" debug="0" disableUploadTimeout="true" enableLookups="false" keystoreFile="./conf/<Your_Domain_Name>.keystore" keystorePass="*********" maxSpareThreads="75" maxThreads="150" minSpareThreads="25" name="SSL" port="8444" scheme="https" secure="true" sslEnabledProtocols="TLSv1,TLSv1.1,TLSv1.2" sslProtocol="TLS"/>
Save and close the server.xml file.
Encrypt the keystore password
Log in to your ADAudit Plus web console and navigate to Admin > General Settings > Connection.
Select the General tab, check the Encrypt Keystore Password box, and enter the keystore password you used while generating the CSR for this certificate file.
Click Save changes.
Restart ADAudit Plus again for the changes to take effect.
Note: If you want to modify the TLS versions and ciphers attribute, refer to our security hardening guide.
Validation and confirmation
Check that the ADAudit Plus login page loads with HTTPS.
Click the padlock icon in the browser’s address bar to verify the SSL certificate is applied.
Ensure there are no certificate errors or warnings.
Tips
Backup server.xml and the keystore before making any changes.
Use a strong password for the keystore.
Ensure port 8443 is open in your firewall.
Use a valid CA-signed certificate for production use. Self-signed certs might cause browser warnings.
Renew your certificate before it expires and repeat the import steps.
Related Topics and Articles
How to enable SSL automatically in ADAudit Plus