You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Updated instructions for configuring CA certificates on Unix/Linux servers, including manual and script methods. Adjusted commands for exporting private keys and certificates, and added permission settings.
Copy file name to clipboardExpand all lines: support/system-center/scom/use-ca-certificate-on-scx-agent.md
+70-26Lines changed: 70 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,50 +75,39 @@ On a CA server in your SCOM environment, follow these steps to create a certific
75
75
1. Export the CA and Intermediate CA certificate (if applicable) to the *root* store of all the management servers/gateways in the UNIX/Linux resource pool.
76
76
77
77
## Copy and edit the certificate on the Unix/Linux server
78
+
Use one of the following methods to configure the certificate on the the Unix/Linux server:
78
79
80
+
### Method 1: Configure Certificate Manually
79
81
1. Copy the certificate to the Unix/Linux server for which the certificate was issued.
80
82
1. Export the private key by using the following command:
While exporting the private key from the certificate store, a new password has to be set for the new key file.
87
-
88
-
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-export-private-key.png" alt-text="Screenshot that shows the command to export the private key.":::
89
-
90
-
After the export is completed, you should see a *key.pem* file:
91
-
92
-
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-get-key-dot-pem-file.png" alt-text="Screenshot that shows the command to get the private key file.":::
88
+
> [!NOTE]
89
+
> While exporting the private key from the certificate store, a new password has to be setforthe new key file, unless you specify the `-nodes`, This option stands for `no DES` encryption which instructs OpenSSL to output the private keyin an unencrypted format.
93
90
94
91
1. Export the certificate by using the following command:
While exporting the certificate from the certificate store, you have to enter the password for the *\<FileName>.pfx* file.
101
-
102
-
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-export-certificate.png" alt-text="Screenshot that shows the command to export the certificate.":::
103
-
104
-
After the export is completed, you should see an *omi.pem* file:
105
-
106
-
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-get-omi-dot-pem-file.png" alt-text="Screenshot that shows the command to get the certificate file.":::
107
-
108
-
1. Remove the password from the private key by using the following command:
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-remove-password-from-private-key.png" alt-text="Screenshot that shows the command to remove password from the private key.":::
115
-
116
-
This action is needed since the Linux agent doesn't know the password for the file.
117
-
118
-
1. Move the *omikey.pem* file to the Open Management Infrastructure (OMI) directory by using the following command:
103
+
104
+
1. Set the correct permissions and ownership on omikey.pem, Certificate and Symbolic Link:
1. Restart the SCX agent by using the following command:
@@ -135,6 +124,58 @@ On a CA server in your SCOM environment, follow these steps to create a certific
135
124
136
125
:::image type="content" source="media/use-ca-certificate-on-scom-linux-agent/command-validate-omi-processes.png" alt-text="Screenshot that shows the command to validate omi processes running." lightbox="media/use-ca-certificate-on-scom-linux-agent/command-validate-omi-processes.png":::
137
126
127
+
### Method 2: Configure Certificate with Bash Script
## Validate that the certificate is signed by the CA
139
180
140
181
1. Run the following command on the agent to verify that the certificate is signed by the CA:
@@ -159,6 +200,9 @@ On a CA server in your SCOM environment, follow these steps to create a certific
159
200
notAfter=Jul 25 12:12:14 2033 GMT
160
201
```
161
202
203
+
> [!NOTE]
204
+
> The path `/etc/opt/microsoft/scx/ssl` contains a symbolic link `scx.pem -> /etc/opt/omi/ssl/omi.pem` that is used by the SCX agent to use the OMI certificate that was created earlier.
205
+
162
206
1. Run a network trace on one of the management servers/gateways in the UNIX/Linux resource pool.
163
207
1. Run the following `WinRM` command against the agent and make sure you get the instance output:
0 commit comments