Manage Gateway certificates

By default, a Gateway Instance on Identity as a Service contains a self-signed SSL certificate that you can download. You can replace the self-signed certificate with one signed by a certificate authority (CA). The CA can be a public CA such as Entrust Certificate Services (ECS) or a private CA.

The CA-signed certificate is generated in response to a certificate signing request (CSR) generated by Identity as a Service. The CSR is a PKCS#10 file that is provided to the CA. The CA responds by issuing a signed certificate in PKCS#7 format or a list of certificates. The signed certificate is then uploaded to the Identity as a Service account. Once uploaded, Identity as a Service signals the Enterprise Service Gateway to download the new certificate and update its keystore.

SSL certificates are required for the following:

       Identity as a Service Gateway Instances with RADIUS and Entrust Identity Enterprise agents require an SSL certificate to support authentication to RADIUS and Entrust Identity Enterprise applications.

       The RADIUS agent requires an SSL certificate for EAP RADIUS authentication.

       Entrust Identity Enterprise agents require a certificate to form a secure connection as an HTTPS service.

This section explains how to view or export an SSL certificate and generate CA-signed certificates from a Gateway Instance.

View SSL certificate

Export SSL certificate

Generate CA-signed certificates