KB Article #181873
CERTIFICATES: Extend the validity of a certificate signed with the ST internal CA
Before you begin
In the below examples, the following notations and names are used:
$FILEDRIVEHOME
is the full system path to the installation directory of SecureTrasnsport. The placeholder should be replaced by the full system path before using it in commands.
EXPIRED-CERT.p12
is the exported current (expiring/expired) certificate from SecureTransport (including the private key).
Resolution
1. Export the private key from your current certificate:
openssl pkcs12 -info -in EXPIRED-CERT.p12 -nodes -nocerts -out YOUR-PRIV-KEY.key
2. Get the current information from your certificate (CN=; OU=; etc.):
openssl pkcs12 -info -in EXPIRED-CERT.p12 |grep subject
3. Generate a new CSR for the new certificate and fill up the information gathered from Step 2:
openssl req -new -key YOUR-PRIV-KEY.key -out YOUR-CSR.csr
4. Extend the validity of the certificate with N number of days (must be less than what is left for the current Internal CA). In the example it is extended by 3650 days:
openssl x509 -req -days 3650 -in YOUR-CSR.csr -CA $FILEDRIVEHOME/lib/certs/db/ca-crt.pem -CAkey $FILEDRIVEHOME/lib/certs/db/ca-key.pem -CAcreateserial -out NEW-PUBLIC-CERT.crt
5. Generate the new PKCS12 capsule that you will import in the ST server:
openssl pkcs12 -export -out NEW-CERT.p12 -inkey YOUR-PRIV-KEY.key -in NEW-PUBLIC-CERT.crt
When asked, provide a password for the new certificate. It must be at least 8 characters long.
The resulting NEW-CERT.p12
is the renewed/extended certificate and can be imported into ST. This new certificate will have the same fingerprint and will be valid and chained to a trusted root. You can now delete the .p12
, .key
and .csr
files.