Expired CIMOM or LDAP certificates
must be replaced. This topic describes a procedure for replacing an expired
certificate.
CIMOM and LDAP certificates can expire. When this happens, they must be
replaced. If you get an error saying: Invalid key in truststore,
you must update your LDAP certificate.
- Obtain the current certificate. LDAP certificates are obtained from the
LDAP administrator. CIMOM certificates are created by the mktruststore command. See step 4.
- On each node, run the stopConsole command, then
the stopCimom command.
- On the master console, change to /usr/tank/admin.
- Run the bin/mktruststore command. As
a parameter, use the path and file name of the LDAP certificate, if it exists.
- Use Secure copy (SCP) to copy the truststore to each node in the cluster.
Note: Do not run the mktruststore command on each
node. You must copy the truststore to each node.
- On each node, run the /usr/tank/admin/bin/startCimom command. Then run the /usr/tank/admin/bin/startConsole command.
- If needed, you can now extract the CIMOM certificate for your third-party
CIM application.