Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell OpenManage Server Administrator Version 7.3 User's Guide

X.509 Certificate Management

  • NOTE: You must be logged in with Administrator privileges to perform certificate management.
Web certificates are necessary to ensure the identity of a remote system and ensure that information exchanged with the remote system are not viewed or changed by others. To ensure system security, it is recommended that:
  • You generate a new X.509 certificate, reuse an existing X.509 certificate, or import a root certificate or certificate chain from a Certification Authority (CA).
  • All systems that have Server Administrator installed have unique host names.

To manage X.509 certificates through the Preferences home page, click General Settings, click the Web Server tab, and click X.509 Certificate.

The following are the available options:

  • Generate a new certificate — Generates a new self-signed certificate used for SSL communication between the server running Server Administrator and the browser.
    • NOTE: When using a self-signed certificate, most web browsers display an untrusted warning as the self-signed certificate is not signed by a Certificate Authority (CA) trusted by the operating system. Some secure browser settings can also block the self-signed SSL certificates. The OMSA web GUI requires a CA-signed certificate for such secure browsers.
  • Certificate Maintenance — Allows you to generate a Certificate Signing Request (CSR) containing all the certificate information about the host required by the CA to automate the creation of a trusted SSL web certificate. You can retrieve the necessary CSR file either from the instructions on the Certificate Signing Request (CSR) page or by copying the entire text in the text box on the CSR page and pasting it in the CA submit form. The text must be in the Base64–encoded format.
    • NOTE: You also have an option to view the certificate information and export the certificate that is being used in universal Base64–encoded format, which can be imported by other web services.
  • Import a root certificate — A certificate authority typically issues both a root certificate file (based on the domain name of the host) and a certificate chain file, which establishes trust among the CA, the root certificate of the host and the web browser and operating system of a remote user. In larger domains, the certificate chain file can define the intermediate CAs. First, import the root certificate file (typically .CER file type) of the host. Then, import the CA-issued PKCS#7 certificate chain (typically .P7B file type) that establishes the chain of trust from the top-level CA through any intermediate authorities trusted by the operating system and then finally to the root certificate.
  • Import certificate chain — Allows you to import the certificate response (in PKCS#7 format) from a trusted CA.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\