‎12-11-2021 08:20 PM
Hi Community.
We are trying to start an Instance in HOPEX V5, if we start the instance without the self signed certificate, the instance start and it continue running, but if we try to start a new instance using a self signed certificate, same properties and everything, only adding the certificate, then the instance fail quick.
The certificate was created using IIS from windows server, we tried with 2 diff certificates and nothing works. What you think could be the problem?
Solved! Go to Solution.
‎22-11-2021 01:40 PM - edited ‎22-11-2021 02:00 PM
Hi,
I have similar issue where it seems that I have to change the Private internal SSL Certificate:
Scenario:
‎15-11-2021 10:02 AM
Hello,
I am not sure to understand the full context of the problem. II will try anyway to help you find a solution.
There are 2 SSL certificates for V5 :
Not sure which case you are talking about.
You must add this certificate on Windows of the IIS server.
This certificate is not to be confused with the internal certificate. What you see in HAS or HAS Instance Manager is the internal certificate.
This certificate will be used for the communication between the servers (IIS and HAS).
It can be self-signed or signed should you organization required it.
If you have only 1 server HAS. Meaning you are not in a Cluster/Farms deployment. Use the default generated self-signed certificate.
When you create the instance :
The certificate is generate and managed by HAS itself. Some file will be created in the installation folder (Default location: C:\ProgramData\MEGA\Hopex Application Server\5000) and a certificated will be add in the trusted certificate of Windows.
This is the recommended option.
Each server of the farm must have in it's trusted Windows certificate the internal certificate (self-signed or signed).
Below is an example of the step you can follow. You may need to adjust the script to your constraints.
openssl genrsa -out rootCA.key 4096
openssl req -x509 -new -nodes -key rootCA.key -days 1024 -config ca.cfg -extensions v3_ca -out rootCA.crt
openssl pkcs12 -export -out NomDuCertificat.pfx -inkey rootCA.key -in rootCA.crt
Once Installed you have 2 options :
To find the thumbprint double click on your certificate from the MMC console or from the file.
Depending on where you are in the scenario of installation the process might be different:
"certificate":"Thumbprint du certificat"
When you change the impersonification user to launch the processes this user might not have access to the certificate.
Go to the MMC console find the certificate and give the appropriate access rights.
If you are using an automatic HAS generated certificate you can delete it and restart the HAS instance. it will be recreated with the proper access rights.