Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

How to update the certificate for Dell Encryption services using an existing certificate in the Microsoft keystore

Summary: This article provides information about how to update the certificate for Dell Encryption (formerly Dell Data Protection | Encryption) services using an existing certificate from the Microsoft keystore. ...

This article may have been automatically translated. If you have any feedback regarding its quality, please let us know using the form at the bottom of this page.

Article Content


Symptoms

Affected Products:

  • Dell Security Management Server
  • Dell Data Protection | Enterprise Edition Server

Affected Platforms:

  • Windows

Cause

Not Applicable

Resolution

  1. Enter Start | Run | MMC.

Type MMC
Figure 1: (English Only) Type MMC

  1. Click File | Add/Remove Snap-in.

Click Add/Remove Snap-in
Figure 2: (English Only) Click Add/Remove Snap-in

  1. In the Add or Remove Snap-ins window, select Certificates, and click Add.

Add Certificates
Figure 3: (English Only) Add Certificates

  1. Select the Computer account radio button when prompted and click Next.

Computer account
Figure 4: (English Only) Computer account

  1. Select Local computer (selected by default) and click Finish.

Local Computer
Figure 5: (English Only) Local Computer

  1. In the Add or Remove Snap-ins window, click OK.

Click OK
Figure 6: (English Only) Click OK

  1. In the MMC main console, click the plus (+) symbol to expand the Certificate snap-in.

Import
Figure 7: (English Only) Import

  1. Go to the Personal | Certificates pane.
  2. Right-click within the Certificates panel and click All Tasks | Import to start the Certificate Import Wizard.

Certificate Import Wizard
Figure 8: (English Only) Certificate Import Wizard

  1. Follow the wizard to import the signed certificate along with the private key. The certificate file must be in a container format having both the end-user certificate and its private key.

Click Next
Figure 9: (English Only) Click Next

  1. Click Browse.

Click Browse
Figure 10: (English Only) Click Browse

  1. In the Open dialog box:
    1. Change the file type to Personal Information Exchange (*.pfx, *.p12).
    2. Browse to and select the cert you want to import (ddpe.pfx is the cert that is used in the example).
    3. Click OK.

Personal Information Exchange (*.pfx, *.p12)
Figure 11: (English Only) Personal Information Exchange (*.pfx, *.p12)

  1. On the Private key protection screen:
    1. Optionally, input a password
    2. Put a check-in, Mark this key as exportable. This allows you to back up or transport our keys later.
    3. Put a check-in, Include all extended properties.
    4. Click Next.

Private key protection
Figure 12: (English Only) Private key protection

  1. Check Place all certificates in the following store: Personal and click Next.

Certificate Store
Figure 13: (English Only) Certificate Store

  1. Click Finish.

Finish
Figure 14: (English Only) Finish

Export the certificate with the private key and certification path from the MMC.

  1. Open the start menu and select Run.

Run
Figure 16: (English Only) Run

  1. Type MMC and press OK.

Type MMC
Figure 17: (English Only) Type MMC

  1. Click File in the top menu of the MMC and select Add/Remove Snap-in.

Click Add/Remove Snap-in
Figure 18: (English Only) Click Add/Remove Snap-in

  1. From the Available snap-ins pane of the Add or Remove Snap-ins window, select Certificates then click the Add > button which opens the Certificates snap-in window.

Add Certificates
Figure 19: (English Only) Add Certificates

  1. Select the Computer Account radio button then click the Next > button.

Computer Account
Figure 20: (English Only) Computer Account

  1. Click the Finish button to close the Certificates snap-in window.

Local Computer (the computer this console is running on)
Figure 21: (English Only) Local Computer (the computer this console is running on)

  1. Click OK on the Add or Remove Snap-ins window to finish adding the snap in.

Click Ok
Figure 22: (English Only) Click Ok

  1. In the MMC window, expand Certificates (Local Computer) and the Personal folder. Then select the Certificates folder.

Certificates folder
Figure 23: (English Only) Certificates folder

  1. Determine the certificate that you want to export. Right click on the certificate and select All Tasks and choose Export.

Export
Figure 24: (English Only) Export

  1. On the Certificate Export Wizard, click the Next > button.

Certificate Export Wizard
Figure 25: (English Only) Certificate Export Wizard

  1. On the Export Private Key screen select the Yes, export the private key radio button, and click the Next button.

Yes, export the private key
Figure 26: (English Only) Yes, export the private key

  1. On the Export File Format screen: 
    1. Select the Personal Information Exchange - PKCS #12 (.PFX) radio button.
    2. Select the Include all certificates in the certification path if possible.
    3. The Export all extended properties checkboxes
    4. Click Next.

Personal Information Exchange - PKCS#12(.PFX)
Figure 27: (English Only) Personal Information Exchange - PKCS#12(.PFX)

  1. Assign a password to the file and click the Next > button.

Create password
Figure 28: (English Only) Create password

  1. Choose the location, and name of the export file then click the Next > button.

Choose location and name of the export file
Figure 29: (English Only) Choose the location and name of the export file

  1. Click the Finish button.

Click Finish
Figure 30: (English Only) Click Finish

  1. Stop All Dell Security Management Server Services:
  2. Update and Configure Java Services for the new certificate:
    1. From the start menu, select Server Configuration Tool.

Run Server Configuration Tool
Figure 31: (English Only) Run Server Configuration Tool

  1. From the Actions menu, select Import SSL/TLS BETA.

Select Import SSL/TLS Beta
Figure 32: (English Only) Select Import SSL/TLS Beta

  1. A pop-out window appears. Go to the certificate and select Open.

Open the certificate
Figure 33: (English Only) Open the certificate

  1. Provide the password for the certificate.

Enter password
Figure 34: (English Only) Enter password

  1. Provide the proper windows credentials to import the certificate and select Next. Usually, this is the service account that is configured for the Dell Security Management Server.

Enter Windows credentials to import the certificate
Figure 35: (English Only) Enter Windows credentials to import the certificate

  1. The timestamps for the below files show updated (based on default install locations, the folder paths may vary):
C:\Program Files\Dell\Enterprise Edition\Compliance Reporter\conf\cacerts
C:\Program Files\Dell\Enterprise Edition\Compliance Reporter\conf\eserver.properties
C:\Program Files\Dell\Enterprise Edition\Device Server\conf\cacerts
C:\Program Files\Dell\Enterprise Edition\Device Server\conf\application.properties
C:\Program Files\Dell\Enterprise Edition\Security Server\conf\cacerts
C:\Program Files\Dell\Enterprise Edition\Security Server\conf\application.properties

Timestamps show updated
Figure 36: (English Only) Timestamps show updated

  1. Update and Configure .net services for the new certificate file:
    1. From the start menu, select Server Configuration Tool.

Run Server Configuration Tool
Figure 37: (English Only) Run Server Configuration Tool

    1. From the Actions menu, select Configure Certificates.

    Configure Certificates
    Figure 38: (English Only) Configure Certificates

    1. In the Certificate Wizard, select Next.

    Click Next
    Figure 39: (English Only) Click Next

    1. Select the Advanced radial button and press Next.

    Advanced
    Figure 40: (English Only) Advanced

    1. Select the Select Certificate radial button and press Next.

    Select Certificate
    Figure 41: (English Only) Select Certificate

    1. Select Browse.

    Select Browse
    Figure 42: (English Only) Select Browse

    1. Highlight the appropriate certificate and select OK. The list is populated from the Personal Certificates for the Local Computer.

    Highlight certificate and click Ok
    Figure 43: (English Only) Highlight certificate and click Ok

    1. Press Next

    Click Next
    Figure 44: (English Only) Click Next

    1. Press Finish to complete setup.

    Click Finish
    Figure 45: (English Only) Click Finish

    1. Import the certificate for Dell Manager clients:
      1. From the start menu, select Server Configuration Tool.

    Run Server Configuration Tool
    Figure 46: (English Only) Run Server Configuration Tool

    1. From the Actions menu, select Import DM Certificate.

    Select Import DM Certificate
    Figure 47: (English Only) Select Import DM Certificate

    1. A pop-out window appears. Go to the certificate and select Open.

    Open the certificate
    Figure 48: (English Only) Open the certificate

    1. Provide the password for the certificate.

    Enter password
    Figure 49: (English Only) Enter password

    1. Provide the proper windows credentials to import the certificate and select Next. Usually, this is the service account that is configured for the Dell Security Management Server.

    Enter windows credentials to import the certificate
    Figure 50: (English Only) Enter windows credentials to import the certificate

    1. Import Identity certificate:
      1. From the start menu, select Server Configuration Tool.

    Run Server Configuration Tool
    Figure 51: (English Only) Run Server Configuration Tool

    1. From the Actions menu, select Import Identity Certificate.

    Select Import Identity Certificate
    Figure 52: (English Only) Select Import Identity Certificate

    1. A pop-out window appears. Go to the certificate and select Open.

    Open the certificate
    Figure 53: (English Only) Open the certificate

    1. Provide the password for the certificate.

    Enter password
    Figure 54: (English Only) Enter password

    1. Provide the proper windows credentials to import the certificate and select Next. Usually, this is the service account that is configured for the Dell Security Management Server.

    Provide windows credentials and click Next
    Figure 55: (English Only) Provide Windows credentials and click Next

    1. Start All Dell Security Management Server Services:
    1. Enter Start | Run | MMC.

    Run MMC
    Figure 56: (English Only) Run MMC

    1. Click File | Add/Remove Snap-in.

    Click Add/Remove Snap-in
    Figure 57: (English Only) Click Add/Remove Snap-in

    1. In the Add or Remove Snap-ins window, select Certificates, and click Add.

    Add Certificates
    Figure 58: (English Only) Add Certificates

    1. Select the Computer account radio button when prompted and click Next.

    Computer account
    Figure 59: (English Only) Computer account

    1. Select Local computer (selected by default) and click Finish.

    Local computer: (the computer this console is running on)
    Figure 60: (English Only) Local computer: (the computer this console is running on)

    1. In the Add or Remove Snap-ins window, click OK.

    Click Ok
    Figure 61: (English Only) Click Ok

    1. In the MMC main console, click the plus (+) symbol to expand the Certificate snap-in.

    Import
    Figure 62: (English Only) Import

    1. Go to the Personal | Certificates pane.
    2. Right-click within the Certificates panel and click All Tasks | Import to start the Certificate Import Wizard.

    Certificate Import Wizard
    Figure 63: (English Only) Certificate Import Wizard

    1. Follow the wizard to import the signed certificate along with the private key. The certificate file must be in a container format having both the end-user certificate and its private key.

    Click Next and follow wizard to import the signed certificate
    Figure 64: (English Only) Click Next and follow the wizard to import the signed certificate

    1. Click Browse.

    Click Browse
    Figure 65: (English Only) Click Browse

    1. In the Open dialog box:
      1. Change the file to Personal Information Exchange (*.pfx, *.p12).
      2. Browse to and select the cert you want to import (ddpe.pfx is the cert that is used in the example).
      3. Click OK.

    Personal Information Exchange (*.pfx, *.p12)
    Figure 66: (English Only) Personal Information Exchange (*.pfx, *.p12)

    1. On the Private key protection screen:
      1. Optionally, input a password
      2. Put a check-in, Mark this key as exportable. This allows you to back up or transport our keys later.
      3. Put a check-in, Include all extended properties.
      4. Click Next.

    Private key protection
    Figure 67: (English Only) Private key protection

    1. Check Place all certificates in the following store: Personal and click Next.

    Certificate Store
    Figure 68: (English Only) Certificate Store

    1. Click Finish.

    Click Finish
    Figure 69: (English Only) Click Finish

    Export the certificate with the private key and certification path from the MMC.

    1. Open the start menu and select Run.

    Open Run
    Figure 70: (English Only) Open Run 

    1. Type MMC and press OK.

    Type MMC
    Figure 71: (English Only) Type MMC

    1. Click File in the top menu of the MMC and select Add/Remove Snap-in.

    Select Add/Remove Snap in
    Figure 72: (English Only) Select Add/Remove Snap in

    1. From the Available snap-ins pane of the Add or Remove Snap-ins window, select Certificates then click the Add > button which opens the Certificates snap-in window.

    Open Certificate snap-in
    Figure 73: (English Only) Open Certificate snap-in

    1. Select the Computer Account radio button then click the Next > button.

    Computer account
    Figure 74: (English Only) Computer account

    1. Click the Finish button to close the Certificates snap-in window.

    Local computer (the computer this console is running on)
    Figure 75: (English Only) Local computer (the computer this console is running on)

    1. Click OK on the Add or Remove Snap-ins window to finish adding the snap in.

    Click Ok
    Figure 76: (English Only) Click Ok

    1. In the MMC window, expand Certificates (Local Computer) and the Personal folder. Then select the Certificates folder.

    Select Certificates
    Figure 77: (English Only) Select Certificates

    1. Determine the certificate that you want to export. Right click on the certificate and select All Tasks and choose Export.

    Export
    Figure 78: (English Only) Export

    1. On the Certificate Export Wizard, click the Next > button.

    Certificate Export Wizard
    Figure 79: (English Only) Certificate Export Wizard

    1. On the Export Private Key screen select the Yes, export the private key radio button, and click the Next > button.

    Export Private Key
    Figure 80: (English Only) Export Private Key

    1. On the Export File Format screen, select the Personal Information Exchange - PKCS #12 (.PFX) radio button, select the Include all certificates in the certification path if possible, and the Export all extended properties checkbox then click the Next.

    Personal Information Exchange - PKCS#12(.PFX)
    Figure 81: (English Only) Personal Information Exchange - PKCS#12(.PFX)

    1. Assign a password to the file and click the Next > button.

    Create password
    Figure 82: (English Only) Create password

    1. Choose the location, and name of the export file then click the Next.

    Choose location and name of the export file
    Figure 83: (English Only) Choose the location and name of the export file

    1. Click the Finish button.

    Click Finish
    Figure 84: (English Only) Click Finish

    • Create a folder on the root of C called Cert and move the exported PFX from the "Export the certificate with the private key and certification path from the MMC" step into this folder.
    • Take a copy of the cacerts file from the C:\Program Files\Dell\Enterprise Edition\Security Server\Conf directory and copy it into the C:\Cert folder.
    • Get the alias name from the exported certificate.
      • Open an administrative command prompt.
      • From the command prompt, add the Java bin directory to the path. The following example command uses the default installation folder for the Java bin folder and may have to be updated.
      • Set path=%path%;C:\Program Files\Dell\Java Runtime\jre1.7\bin

    Type set path=%path%;C:\Program Files\Dell\Java Runtime\jre1.7\bin
    Figure 85: (English Only) Type set path=%path%;C:\Program Files\Dell\Java Runtime\jre1.7\bin

    • From the command prompt, go to the directory C:\Cert Folder.
    • Run the key tool utility to list the information in the exported certificate. The following command must be updated with the values used when exporting the certificate (PFX). After the command is run, the password to the exported certificate must be provided to access the information.
      • Command:
        • keytool -list -v -keystore <PFX filename> -storetype PKCS12
      • Parameters:
        • <PFX filename> - The name of the exported certificate file

      Type keytool -list -v -keystore <PFX filename> -storetype PKCS12
      Figure 86: (English Only) Type keytool -list -v -keystore <PFX filename> -storetype PKCS12

      • Record the value after Alias name, from the output of the previous command.
      • Import the certificate into the cacerts file.
        • From the command prompt opened in the first step, run the key tool utility to import the exported PFX file to a cacerts file. The following command must be updated with information that is gathered throughout the process so far. After the command is run, the password to the exported certificate must be provided to access the information to import.
        • Close the command prompt.
          • Command:
            • keytool -importkeystore -v -srckeystore <PFX filename> -srcstoretype  PKCS12 -srcalias<PFX alias> -destkeystore<cacerts file> -deststorepass <java keystore password> -destalias <cacerts alias> -destkeypass <cacertsalias password>
          • Parameters:
            • <PFX filename> - The name of the exported certificate file
            • <PFX alias> - The alias name recorded in previously
            • <cacerts file> - The filename of the cacerts file that is updated.
            • <java keystore password> - The password that protects all information that is stored in the cacerts file. This must match the value for cacerts alias password.
            • <cacerts alias> - The alias that the certificate information is stored under in the cacerts file. It is recommended, but not necessary, to make this ddpe.
            • <cacerts alias password>- The password that protects the information that is stored in the specified alias in the cacerts file. This must match the value for <java keystore password>.

        Type keytool -importkeystore -v -srckeystore <PFX filename> -srcstoretype  PKCS12 -srcalias<PFX alias> -destkeystore<cacerts file> -deststorepass <java keystore password> -destalias <cacerts alias> -destkeypass <cacertsalias password>
        Figure 87: (English Only) Type keytool -importkeystore -v -srckeystore <PFX filename> -srcstoretype  PKCS12 -srcalias<PFX alias> -destkeystore<cacerts file> -deststorepass <java keystore password> -destalias <cacerts alias> -destkeypass <cacertsalias password>

          • Back up the existing cacerts file for the Java services:
            • Stop each service from the list below. Depending on the architecture of the environment and the server version that is installed, all the services in the list may not be present.
            • Rename the existing cacerts file to cacerts. DDMMYY where DDMMYY is the date in two-digit day, month, and year format. The cacerts file is in the conf folder within the service install folder.
              • Compliance Reporter - The default location for the Compliance Reporter service is C:\Program Files\Dell\Enterprise Edition\Compliance Reporter.
              • Device Server - The default location for the Device Server service is C:\Program Files\Dell\Enterprise Edition\Device Server.
              • Identity Server - The default location for the Identity Server service is C:\Program Files\Dell\Enterprise Edition\Identity Server.
              • Security Server - The default location for the Security Server service is C:\Program Files\Dell\Enterprise Edition\Security Server.
              • Console Web Services - The default location for the Console Web Services is C:\Program Files\Dell\Enterprise Edition\Console.
              Note: Console Web Services was deprecated in Dell Security Management Server (formerly Dell Data Protection | Enterprise Edition) v9.2.
          • Copy the generated cacerts file into the conf folder for each service that has been backed up.
          • Update the application.properties and eserver.properties files with the new cacerts values.

            Update application.preperties and eserver.properties
            Figure 88: (English Only) Update application.preperties and eserver.properties

            • Open the application.properties/eserver.properties file and update the following values. All values may not be present in one or more configuration files for each service. If a value is not present skip it, and update the remaining values present in the files.
            • eserver.keystore.password - This must be updated with the java keystore file, cacerts, assigned password. The value must be formatted like the example below.
              • eserver.keystore.password=password
            • keystore.password - This must be updated with the java keystore password, cacerts, alias password. The value must be formatted like the example below.
              • keystore.password = CLR(password)
            • Once the service is started the value is encrypted, and the setting looks like.
              • keystore.password = ENC(encrypted password)
            • keystore.alias.ssl - This value is case sensitive and must be updated to exactly match cacerts alias.
            • keystore.alias.signing - This value is case sensitive and must be updated to exactly match cacerts alias.
            • Sample file locations and configuration settings
            • Security Server:
              • application.properties file location
              • application.properties settings
              • keystore.password=CLR(changeit)
              • keystore.alias.ssl=ddpe
              • keystore.alias.signing=ddpe
            • Compliance Reporter:

              eserver.properties
              Figure 89: (English Only) eserver.properties

              • eserver.properties file location
              • eserver.properties settings
              • eserver.keystore.password=changeit
            • Device Server:
              • application.properties file location

                application.properties
                Figure 90: (English Only) application.properties

                • application.properties settings
                • keystore.password=CLR(changeit)
                • keystore.alias.ssl=ddpe
          • Restart services stopped in the previous step.
          • Validate the thumbprint by browsing to https://server:8443/xapi/, https://server:8084/reporter, and https://server:8081/xapi and performing the following steps for each URL
            • Click the lock icon.

              Go to server URL
              Figure 91: (English Only) Go to server URL

            • Click View Certificates.

              View Certificate
              Figure 92: (English Only) View Certificate

            • Click the Details tab.

              Click Details tab
              Figure 93: (English Only) Click the Details tab

            • Scroll down and click Thumbprint to view the Thumbprint to validate each service is using the proper certificate.

              Click Thumbprint
              Figure 94: (English Only) Click Thumbprint

            Note: Import DM Certificate may be unavailable when using Windows Authentication to SQL. Run the Action of "Test Database Configuration" to enable the option.

            • Update the .net service certificates using the Server Configuration Tool.
              • Stop the Core Server and Compatibility Server services.
              • Start the Server Configuration Tool and select Configure Certificates from the Actions menu item which opens the Certificate Wizard.

                Configure Certificate
                Figure 95: (English Only) Configure Certificate

              • Click the Next button then select the Advanced radio button on the Certificate Wizard Mode screen, then click Next.

                Advanced
                Figure 96: (English Only) Advanced

              • On the Core Server SSL Certificate screen: Select the Select Certificate radio button, then click Next.

                Select Certificate
                Figure 97: (English Only) Select Certificate

              • On the Select Core Server SSL Certificate screen, click the Browse… button.
              • Then on the Browse For Certificate screen select the certificate to use and click OK.
              • Once back on the Select Core Server SSL Certificate screen click Next.

                Select Certificate and click next
                Figure 98: (English Only) Select Certificate and click next

              • Repeat the steps for the Message Security Certificate.
              • Click Finish.
            • Update the Dell Manager certificate.
              • Select Import DM Certificate from the Actions menu item.

                Import DM Certificate
                Figure 99: (English Only) Import DM Certificate

              • Locate the exported PFX file and click the Open button.

                Open exported PFX file
                Figure 100: (English Only) Open exported PFX file

              • Input the password to the exported PFX file and click the OK button.

                Enter password
                Figure 101: (English Only) Enter password

              • Close the Server Configuration Tool and start the Core Server and Compatibility Server services.

            During a new install or upgrade of Dell Data Protection | Encryption 8.x the Master Installer may cause the certificate that is generated for the Security Server to have missing information. The information that may be missing could include but is not limited to: the alias for the signing server does not provide the default Fully Qualified Domain Name (FQDN), or the Security Server may not have a server certificate at all. This article shows you how to work around this issue.

            Error Message

            Security Server Service will not start and review of the Security Server "Wrapper.log" displays the following error message "Error: Invocation of init method failed; nested exception is java.lang.Exception: SSL cert with alias not found in keystore"
            

            Workaround

            Warning: Environments that require ISO support also require signed-certificates. The Keytool cannot generate a signed certificate. This workaround should not be implemented if your environment supports ISO devices.

            To work around this issue, using the keytool alone does not properly generate a replacement certificate. Do the following steps to generate the replacement certificate.

            1. Replace the current Security Server cacerts file with a cacerts file copied from the Device Server.
            2. Stop the Security Server Service if it is running.
            3. Rename the cacerts file that is found in the \Program Files\…\Security Server\conf folder as a backup.
            4. Copy the cacerts file from the DS\conf folder to the Security Server\conf folder.
            5. Run the keytool from a command prompt and locate the alias for the cacerts file.
            Note:
            • The command-line entry is keytool -v -list -keystore cacerts. Also, you must add the path to the keytool or the cacerts if they are in different directories
            • The alias is shown at the top of the file
              • [command line to set the PATH is: set path=%path%;<DDP/CMG install folder location>\java runtime\jre 1.x\bin; note the jre 1.x referenced must be jre 1.7 or similar]
            1. Enter the keystore password
            Note: The default password is changeit (if the password is not the default, you find the current password in the DS\Conf\eserver.properties file).
            1. Copy the alias name into the Security Server\conf\application.properties on the line after keystore.alias.ssl=
            2. Verify that the password in the application.properties file is the same as the password in the DS cacerts file. The password should be the default changeit (if the password has changed from the default password, then you must reset it).
            Note: To reset the password:
            1. Go to the line keystore.password=ENC() 
            2. Remove ENC and replace it with upper case CLR.
            3. Remove the text between the () and replace it with the password.
            The line should read: keystore.password=CLR()
            1. Restart the Security Server.
            2. Finally, check the output.log for errors and verify that the Security Server Service is running.

            To contact support, reference Dell Data Security International Support Phone Numbers.
            Go to TechDirect to generate a technical support request online.
            For additional insights and resources, join the Dell Security Community Forum.

             

            Article Properties


            Affected Product

            Dell Encryption

            Last Published Date

            07 Sep 2023

            Version

            14

            Article Type

            Solution