In this guide, we'll go through the process of importing an existing OpenSSL based certificate into EveryonePrint consisting of a certificate file .cer (Security Certificate) and a private key file .key (KEY File).
Resolution:
The process consists of 3 steps:
- Import chain certificates
- Create the new Keystore
- Test the SSL connectivity
1. Import Chain Certificates:
/EOP%20MobilePrint%20(Legacy)/kb111222_001.png?width=600&height=186&name=kb111222_001.png)
Double-click the .cer file and confirm the chain of certificates all the way from root to end certificate, which must say, "This certificate is OK"./EOP%20MobilePrint%20(Legacy)/kb111222_002.png?width=400&height=496&name=kb111222_002.png)
In order to import the chain of certificates into an SSL keystore for use in EveryonePrint, each certificate in the chain must be saved to a file.
Select the root certificate, click View Certificate, Details, and Copy to File./EOP%20MobilePrint%20(Legacy)/kb111222_003.png?width=500&height=336&name=kb111222_003.png)
Choose the format Base-64 encoded X.509 (.CER)./EOP%20MobilePrint%20(Legacy)/kb111222_004.png?width=500&height=450&name=kb111222_004.png)
And save this top certificate as cert-1.cer./EOP%20MobilePrint%20(Legacy)/kb111222_005.png?width=500&height=375&name=kb111222_005.png)
Repeat this for the other intermediate certificates in the chain./EOP%20MobilePrint%20(Legacy)/kb111222_006.png?width=500&height=339&name=kb111222_006.png)
Save as cert-2, cert-3 and so on./EOP%20MobilePrint%20(Legacy)/kb111222_007.png?width=500&height=375&name=kb111222_007.png)
Repeat this for other intermediate certificates. Since the end certificate is already a .cer file, there is no need to copy this to the file.
In this example, we'll end up with 4 separate .cer files and the .key file./EOP%20MobilePrint%20(Legacy)/kb111222_008.png?width=600&height=188&name=kb111222_008.png)
2. Create the New Keystore
Open Keystore Explorer and Create a new Keystore file of the JKS type./EOP%20MobilePrint%20(Legacy)/kb111222_009.png?width=500&height=313&name=kb111222_009.png)
Choose to first Import Key Pair and choose the type OpenSSL./EOP%20MobilePrint%20(Legacy)/kb111222_010.png?width=500&height=323&name=kb111222_010.png)
The key, in this case, is un-encrypted, so no key decryption password is needed, however, most often, private keys are encrypted and password protected.
Choose the original .key and .cer file of the end certificate./EOP%20MobilePrint%20(Legacy)/kb111222_011.png?width=500&height=181&name=kb111222_011.png)
Enter alias that matches the "common name" or fully qualified domain of the certificate./EOP%20MobilePrint%20(Legacy)/kb111222_012.png?width=230&height=114&name=kb111222_012.png)
Enter a key password of your choice (this is used later when adding keystore to EveryonePrint)./EOP%20MobilePrint%20(Legacy)/kb111222_013.png?width=230&height=113&name=kb111222_013.png)
Right-click the certificate entry and choose Append to Certificate Chain./EOP%20MobilePrint%20(Legacy)/kb111222_014.png?width=500&height=322&name=kb111222_014.png)
And now we'll append all the previous intermediate certificates, starting from the "bottom" all the way up to the root, ie.
Start with cert-3.cer and append each one up to cert-1.cer./EOP%20MobilePrint%20(Legacy)/kb111222_015.png?width=500&height=338&name=kb111222_015.png)
/EOP%20MobilePrint%20(Legacy)/kb111222_016.png?width=230&height=99&name=kb111222_016.png)
When all intermediate and root certificate files have been appended, right-click the certificate and choose View Details -> Certificate Chain Details./EOP%20MobilePrint%20(Legacy)/kb111222_017.png?width=500&height=237&name=kb111222_017.png)
Confirm that the chain is established, identical to the original certificate, when opened directly in Windows./EOP%20MobilePrint%20(Legacy)/kb111222_018.png?width=500&height=545&name=kb111222_018.png)
When ready, save the keystore, and enter a keystore password. In this example, the password "password" was chosen for both the private key and keystore password./EOP%20MobilePrint%20(Legacy)/kb111222_019.png?width=500&height=307&name=kb111222_019.png)
Save the keystore file to the EveryonePrint etc folder, by default in: C:\Program Files (x86)\EveryonePrint\etc\./EOP%20MobilePrint%20(Legacy)/kb111222_020.png?width=500&height=340&name=kb111222_020.png)
In the \etc folder, open the file called jetty-ssl.xml and change the keystore entries to use our new keystore file, and enter passwords in 3 places.
While we're here, we're also changing from the default 9443 port to standard https port 443, so end users can enter a URL in their browser without specifying the port./EOP%20MobilePrint%20(Legacy)/kb111222_021.png?width=600&height=382&name=kb111222_021.png)
3. Test the SSL Connectivity
Now you should be able to confirm the working certificate in the browser./EOP%20MobilePrint%20(Legacy)/kb111222_022-1.png?width=500&height=207&name=kb111222_022-1.png)
If the Web interface is inaccessible, any Web server-related errors are logged to the file:
C:\Program Files (x86)\EveryonePrint\logs\eopwebservice.log