You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
While exporting the private key from the certificate store, a new password has to be set for the new key file.
87
-
88
-
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-export-private-key.png" alt-text="Screenshot that shows the command to export the private key.":::
89
-
90
-
After the export is completed, you should see a *key.pem* file:
91
-
92
-
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-get-key-dot-pem-file.png" alt-text="Screenshot that shows the command to get the private key file.":::
90
+
While exporting the private key from the certificate store, include the `-nodes` paramter (which stands for no Desktop Environments (DEs)). This instructs OpenSSL to output the private key in an unencrypted format. Otherwise a new password has to be set for the new key file.
93
91
94
92
1. Export the certificate by using the following command:
While exporting the certificate from the certificate store, you have to enter the password for the *\<FileName>.pfx* file.
98
+
1. Delete and create a new symbolic link:
101
99
102
-
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-export-certificate.png" alt-text="Screenshot that shows the command to export the certificate.":::
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-get-omi-dot-pem-file.png" alt-text="Screenshot that shows the command to get the certificate file.":::
114
+
1. Restart the SCX agent by running the following command:
107
115
108
-
1. Remove the password from the private key by using the following command:
116
+
```console
117
+
scxadmin -restart
118
+
```
119
+
120
+
1. Make sure the Open Management Infrastructure (OMI) processes are running after restarting the agent:
109
121
110
122
```console
111
-
openssl rsa -in key.pem -out omikey.pem
123
+
ps -ef | grep omi | grep -v grep
112
124
```
113
125
114
-
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-remove-password-from-private-key.png" alt-text="Screenshot that shows the command to remove password from the private key.":::
126
+
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-validate-omi-processes.png" alt-text="Screenshot that shows the command to validate omi processes running." lightbox="media/use-ca-certificate-on-scom-linux-agent/command-validate-omi-processes.png":::
115
127
116
-
This action is needed since the Linux agent doesn't know the password for the file.
128
+
### Method 2: Configure certificate with bash script
117
129
118
-
1. Move the *omikey.pem* file to the Open Management Infrastructure (OMI) directory by using the following command:
130
+
1. Save the following bash script: `extract_scx_cert.sh`
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-validate-omi-processes.png" alt-text="Screenshot that shows the command to validate omi processes running." lightbox="media/use-ca-certificate-on-scom-linux-agent/command-validate-omi-processes.png":::
137
-
138
181
## Validate that the certificate is signed by the CA
139
182
140
183
1. Run the following command on the agent to verify that the certificate is signed by the CA:
@@ -159,6 +202,8 @@ On a CA server in your SCOM environment, follow these steps to create a certific
159
202
notAfter=Jul 25 12:12:14 2033 GMT
160
203
```
161
204
205
+
> The path `/etc/opt/microsoft/scx/ssl` contains a symbolic link `scx.pem -> /etc/opt/omi/ssl/omi.pem` that's used by the SCX agent in order to use the OMI certificate created earlier.
206
+
162
207
1. Run a network trace on one of the management servers/gateways in the UNIX/Linux resource pool.
163
208
1. Run the following `WinRM` command against the agent and make sure you get the instance output:
0 commit comments