The Web & Admin consoles provide a simplified interface for performing common Commvault tasks. Each service pack release brings additional functionality allowing the Admin console to replace more of the day-to-day administration tasks.
Https is used by default to secure the consoles, however; as it is a self signed certificate users are presented with the following:
Official Documentation for the procedure outlined in this post can be found here. The official documentation does not however; instruct on creating a certificate that will allow the use of multiple SAN (Subject Alternative Name) aliases. This guide will include the necessary fields for creating a SAN cert request, in addition to ensuring the cert complies with the SHA256withRSA signature algorithm.
- CommCell with Web & Admin Console
- Certificate Authority
- This can be either internal or external. If you are allowing access to the web console externally an external authority is recommended.
- If you are using an internal CA, ensure it is capable of issuing SHA2 certs rather than the deprecated SHA2. Details can be found here. SHA1 certs are acceted by IE however chrome and firefox will complain.
- In order to ensure the necessary java versions are in place you may need to update Java. The minimum version required is JRE 1.8.0_65. Check which version you have installed; the SP10 release of Commvault is packaged with java version “1.8.0_121” so does not require updating. To check your java version run “java -version” from the command prompt of the web server. if you need to update java follow the official doco here.
- From the web console computer, navigate to the following directory via an elevated command prompt (replace the java version if different):
- You must create a keystore file using the keytool utility contained in the above directory. Run the following command:
keytool -genkey -alias tomcat -keyalg RSA -sigalg SHA256withRSA -keystore "C:\mykeystore.jks" -keysize 2048
- You will be prompted for the following details:
- Keystore password: Be sure to make this a strong password and keep it safe.
- First & Last Name: This is the domain name for which you are creating a certificate i.e. CMS.MyDomain.com
- Org Unit: Leave this blank or use company name
- Org Name: use company name
- City or Locality, State, Country Code: As Described
- At the “Is this correct?” prompt, type yes.
- At the “Enter password for tomcat”, click ENTER to use the same as the keystore file.
- Now we use the created keyfile to generate a csr:
keytool -certreq -file C:\somename.csr -keystore C:\mykeystore.jks -keyalg RSA -sigalg SHA256withRSA -alias tomcat -ext SAN=dns:alias1.mydomain.local,dns:alias2.mydomain.com -keysize 2048
- You will be prompted for the password you created earlier. Once entered the certificate request will be saved as specified (C:\somename.csr if you used the above command).
- Use this csr to generate the certificate. Upload the request to your certificate authority and download the signed certificates. The files you will require for the next step are as follows:
- root certificate
- intermediate certificate (if available)
- issued certificate
- All of these files can be in either cer or crt format. If you have been given a *.p7b. file dont panic; this can be opened to show the issued certs. In the example below you can see only the root and issued certificate are available.
- Right click the certificates one by one and choose All Tasks –> Export. Use the default option as pictured below to export the individual certs as *.cer files.
- Once you have your 2 or 3 certificates, head back to the command prompt. Its now time to import your root, intermediate (if you have one) and issued certs.
- First import the root certificate:
keytool -import -alias root -keystore C:\mykeystore.jks -trustcacerts -file C:\root.cer
- Next the intermediate:
keytool -import -alias intermed -keystore C:\mykeystore.jks -trustcacerts -file C:\intermediate.cer
- And finally the issued SAN cert:
keytool -import -alias tomcat -keystore C:\mykeystore.jks -trustcacerts -file C:\actual.cer
- You now have a keystore (in this case “mykeystore.jks”) which can be used by Commvault to secure its web console traffic. To make Commvault aware of this file you’ll need to copy it into the Program Files/Commvault/ContentStore/Apache/Conf folder on the web server. Once the file is copied, stop the “Commvault Tomcat Service” using Commvault Process Manager.
- If you are using a Commvault version prior to v11 SP9 you’ll need to refer to the official doco here, if not carry on…
- Using a text editor (such as Notepad++) edit the “server.xml” file. It’s wise at this point to take a copy of the file first in case things go pear-shaped.
- Find the line “<Certificate certificateKeystoreFile=”” and edit the path and password to match your keystore file:
- Ensure the path is correct, if you placed the file in the conf folder as instructed, the path should be “conf/mykeystore.jks”.
- Start the Tomcat service using the Commvault Process Manager, give the web server a couple of minutes to start and then browse to the server using one of your specified SAN aliases :-).