HTTPS Configuration for Table Reader Mappings in Streaming Mode for PowerExchange for SAP NetWeaver

HTTPS Configuration for Table Reader Mappings in Streaming Mode for PowerExchange for SAP NetWeaver

Creating a Certificate

Creating a Certificate

Create a certificate using OpenSSL and JAVA KeyTool.
  1. Set the
    OPENSSL_CONF
    variable to the absolute path to the
    openssl.cfg
    file. For example, at the command prompt, enter the following command:
    set OPENSSL_CONF= C:\OpenSSL-Win64\bin\openssl.cfg
  2. Navigate to the following directory:
    <openSSL installation directory>\bin
    .
    Verify that the
    openssl.exe
    file is available in this directory.
  3. To generate a 2048-bit RSA private key, enter the following command:
    openssl.exe req -new -newkey rsa:2048 -sha1 -keyout <rsakey_name>.key -out <rsakey_name>.csr
  4. When prompted, enter the following values:
    • Private key password. Private key password is also known as PEM pass phrase. Enter a phrase that you want to use to encrypt the secret key. Re-enter the password for verification.
      Make a note of the PEM password. You need to specify this value in the following steps.
    • Two letter code for country name.
    • State or province name.
    • Locality name. For example, you can enter the name of your city.
    • Organization name.
    • Organization unit name. For example, the business unit in your organization.
    • Common name (CN). Mandatory. Enter the fully qualified host name of the Data Integration Service machine.
    • Email address.
  5. Optionally, enter the following attributes you want to send along with the certificate request:
    • Challenge password. Enter a string, which is embedded in the CSR and is shared between you and the SSL issuer. If you ever need to re-install your certificate for any reason, you will be required to enter that password for authentication.
    • Optional company name.
    A new RSA private key of 2048-bit size is created. The
    <rsakey_name>.key
    and
    <rsakey_name>.csr
    files are generated in the current location.
  6. To generate a self-signed key using the RSA private key, enter the following commands:
    openssl x509 -req -days 11499 -in <rsakey_name>.csr -signkey
    <rsakey_name>.key –out <certificate_name>.crt
  7. When prompted, enter the PEM pass phrase for the RSA private key. This is the same password that you entered in step 4.
    The
    <certificate_name>.crt
    file is generated in the current location.
  8. Concatenate the contents of the
    <certificate_name>.crt
    file and the
    <rsakey_name>.key
    file to a
    .pem
    file.
    1. Open the
      <certificate_name>.crt
      file and the
      <rsakey_name>.key
      files in a Text editor.
    2. Create a new file and save it as
      <PEM file name>.pem
      .
    3. Copy the contents of the
      <certificate_name>.crt
      file and paste it in the
      .pem
      file. Copy text beginning from -----BEGIN CERTIFICATE----- to -----END CERTIFICATE-----.
    4. Copy the contents of the
      <rsakey_name>.key
      file and append it to the existing contents of the
      .pem
      file. Copy text beginning from -----BEGIN RSA PRIVATE KEY----- to -----END RSA PRIVATE KEY-----.
    5. Save the
      <PEM file name>.pem
      file.
  9. To create a PKCS#12 certificate, enter the following command at the command prompt:
    openssl pkcs12 -export -in <PEM file name>.pem -out <p12 file name>.p12 – name <domain name>
  10. When prompted, enter the following details:
    • PEM pass phrase for the .pem file. This is the same password that you entered in step 4.
    • Export password that will be used to protect the P12 file. Re-enter the password for verification.
      Make a note of this export password for the P12 file. You need to specify this value in some of the following steps and while creating the SAP Table connection in Developer tool.
      The
      <p12 file name>.p12
      file is generated in the current location.
  11. To create a Java keystore file, enter the following command:
    keytool -v -importkeystore -srckeystore <p12 file name>.p12 -srcstoretype
    PKCS12 -destkeystore <JKS file name>.jks -deststoretype JKS -srcalias
    <unique alias associated with the source keystore> –destalias <destination alias>
  12. When prompted, enter the following details:
    • Password for the destination keystore, the JKS file.
      Make a note of this password. You need to specify this password while creating the SAP Table connection in Developer tool.
    • Password for the source keystore, the P12 file. Enter the Export password you specified for the P12 file in step 10.
      The
      <JKS file name>.jks
      file is generated in the current location.
      While enabling HTTPS in an SAP Table connection, you must specify the name and location of this keystore file. You must also specify the destination keystore password as the Keystore Password and the source keystore password as the Private Key Password.

0 COMMENTS

We’d like to hear from you!