Skip to content

Commit cdc08e2

Browse files
Update use-ca-certificate-on-scx-agent.md
1 parent 7e99de6 commit cdc08e2

File tree

1 file changed

+13
-10
lines changed

1 file changed

+13
-10
lines changed

support/system-center/scom/use-ca-certificate-on-scx-agent.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Convert self-signed SCX certificates to CA certificates
33
description: Introduces how to convert a self-signed certificate on an SCX agent to a Certificate Authority (CA) signed certificate.
44
ms.date: 04/15/2024
5-
ms.reviewer: alexkre, blakedrumm, edpaca, stparker, udmudiar, v-weizhu
5+
ms.reviewer: alexkre, blakedrumm, edpaca, stparker, udmudiar, v-weizhu, v-ryanberg
66
ms.topic: how-to
77
ms.custom: linux-related-content
88
---
@@ -75,17 +75,19 @@ On a CA server in your SCOM environment, follow these steps to create a certific
7575
1. Export the CA and Intermediate CA certificate (if applicable) to the *root* store of all the management servers/gateways in the UNIX/Linux resource pool.
7676

7777
## Copy and edit the certificate on the Unix/Linux server
78+
7879
Use one of the following methods to configure the certificate on the the Unix/Linux server:
7980

80-
### Method 1: Configure Certificate Manually
81+
### Method 1: Configure certificate manually
82+
8183
1. Copy the certificate to the Unix/Linux server for which the certificate was issued.
8284
1. Export the private key by using the following command:
8385

8486
```console
8587
openssl pkcs12 -in <FileName>.pfx -nocerts -out /etc/opt/omi/ssl/omikey.pem -nodes -passin pass:"pfxpassword"
8688
```
8789

88-
> While exporting the private key from the certificate store, include the `-nodes` paramter (stands for no DES) which instructs OpenSSL to output the private key in an unencrypted format, otherwise a new password has to be set for the new key file.
90+
While exporting the private key from the certificate store, include the `-nodes` paramter (which stands for no Desktop Environments (DEs)). This instructs OpenSSL to output the private key in an unencrypted format. Otherwise a new password has to be set for the new key file.
8991

9092
1. Export the certificate by using the following command:
9193

@@ -100,7 +102,7 @@ Use one of the following methods to configure the certificate on the the Unix/Li
100102
ln -s /etc/opt/omi/ssl/omi-host-$(hostname).pem /etc/opt/omi/ssl/omi.pem
101103
```
102104
103-
1. Set the correct permissions and ownership on the private key, certificate and symbolic link:
105+
1. Set the correct permissions and ownership on the private key, certificate, and symbolic link:
104106

105107
```console
106108
chmod 600 /etc/opt/omi/ssl/omikey.pem
@@ -115,16 +117,17 @@ Use one of the following methods to configure the certificate on the the Unix/Li
115117
scxadmin -restart
116118
```
117119

118-
1. Make sure the *omi* processes are running after restarting the agent:
120+
1. Make sure the Open Management Infrastructure (OMI) processes are running after restarting the agent:
119121

120122
```console
121123
ps -ef | grep omi | grep -v grep
122124
```
123125

124126
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-validate-omi-processes.png" alt-text="Screenshot that shows the command to validate omi processes running." lightbox="media/use-ca-certificate-on-scom-linux-agent/command-validate-omi-processes.png":::
125127

126-
### Method 2: Configure Certificate with Bash Script
127-
1. Save the following bash script extract_scx_cert.sh
128+
### Method 2: Configure certificate with bash script
129+
130+
1. Save the following bash script: `extract_scx_cert.sh`
128131

129132
```console
130133
#!/bin/bash
@@ -163,13 +166,13 @@ Use one of the following methods to configure the certificate on the the Unix/Li
163166
systemctl restart omid
164167
```
165168

166-
1. Change script permissions to be executed
169+
1. Change the script permissions to be run:
167170

168171
```console
169172
chmod +x /home/user/extract_scx_cert.sh
170173
```
171174

172-
1. Run he following command to execute the script with the two parameters; the path to the pfx file and the password for it
175+
1. Run the following command to run the script with these two parameters: the path to the PFX file and the password for it.
173176

174177
```console
175178
sudo ./extract_scx_cert.sh /path/to/certificate.pfx pfx_password
@@ -199,7 +202,7 @@ Use one of the following methods to configure the certificate on the the Unix/Li
199202
notAfter=Jul 25 12:12:14 2033 GMT
200203
```
201204

202-
> The path `/etc/opt/microsoft/scx/ssl` contains a symbolic link `scx.pem -> /etc/opt/omi/ssl/omi.pem` that is used by the SCX agent to use the OMI certificate that was created earlier.
205+
> The path `/etc/opt/microsoft/scx/ssl` contains a symbolic link `scx.pem -> /etc/opt/omi/ssl/omi.pem` that's used by the SCX agent in order to use the OMI certificate created earlier.
203206

204207
1. Run a network trace on one of the management servers/gateways in the UNIX/Linux resource pool.
205208
1. Run the following `WinRM` command against the agent and make sure you get the instance output:

0 commit comments

Comments
 (0)