How to delete the RSA Authentication Manager 8.x virtual host Certificate Signing Requests (CSR) which show Pending/Inactive
Originally Published: 2015-06-25
Article Number
Applies To
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x
Issue
Resolution
- Login to the RSA Authentication Manager 8.x primary's Operations Console.
- Navigate to Deployment Configuration > Certificates > Virtual Host Certificate Management.
- In Virtual Host Certificate Management, the Virtual Host Certificate Signing Requests (CSR) exists, which was imported and showing a status of either Pending or Inactive.
Remove the Pending or Inactive virtual host CSR
- SSH to the primary Authentication Manager server or connect to it directly with a monitor and keyboard.
- Login as rsaadmin with the operating system password.
- To remove the Virtual Host CSR aliases from /opt/rsa/am/server/security/vh-inactive.jks, the administrator will require the SSL Server Identity Certificate Keystore File Password.
This can be obtained using the command: ./rsautil manage-secrets -a list com.rsa.signing.key in the /opt/rsa/am/utils directory.
cd /opt/rsa/am/utils ./rsautil manage-secrets -a list com.rsa.signing.key Please enter OC Administrator username: <enter the Operations Console administrator user name> Please enter OC Administrator password: <enter the Operations Console administrator password> Secrets stored in ./etc/systemfields.properties. Command API Client User ID ............................: CmdClient_9uwbaoze Command API Client User Password ......................: N04vujpJYzkePDn0vf0zjnu2NmEJ1f SSL Server Identity Certificate Private Key Password ..: jkN1075giQ9IIFD8Pg6uVq4BGFB9yU SSL Server Identity Certificate Keystore File Password : g972SpITERSGMtYCZWevKd4UTVuZUw Root Certificate Private Key Password .................: rSl0jKaSPUFww2fb0KVfJdbUIFwQK3 Root Certificate Keystore File Password ...............: Rg10rVYLQW8fNHEdMxbgucWlMQ1mAX The "listkeys" action displays the key names to use when setting the values. rsaadmin@srhw8018:/opt/rsa/am/utils>
- Backup the vh-inactive.jks file before making any changes. Virtual host CSRs that are left in a pending state reside in /opt/rsa/am/server/security/vh-inactive.jks.
- Navigate to /opt/rsa/am/server/security and make a copy of the vh-inactive.jks file.
cd /opt/rsa/am/server/security cp vh-inactive.jks vh-inactive.jks.BAK ls -l total 124 -rw-r--r-- 1 rsaadmin rsaadmin 4156 Mar 19 11:10 biztier-identity.jks -rw-r--r-- 1 rsaadmin rsaadmin 444 Mar 11 13:33 boot.properties -rw-r--r-- 1 rsaadmin rsaadmin 3215 Mar 11 13:33 caStore.jks -rw-r--r-- 1 rsaadmin rsaadmin 4171 Mar 11 13:33 console-identity.jks -rw-r--r-- 1 rsaadmin rsaadmin 4097 Mar 11 13:33 DefaultAuthenticatorInit.ldift -rw-r--r-- 1 rsaadmin rsaadmin 2398 Mar 11 13:33 DefaultRoleMapperInit.ldift -rw-r--r-- 1 rsaadmin rsaadmin 64 Mar 11 13:33 SerializedSystemIni.dat -rw-r--r-- 1 rsaadmin rsaadmin 4906 Apr 28 15:07 trust.jks -rw------- 1 rsaadmin rsaadmin 1084 May 4 13:36 VHCertRequest-Webtier.csr -rw------- 1 rsaadmin rsaadmin 4151 Apr 28 14:48 vh-identity.jks -rw------- 1 rsaadmin rsaadmin 7588 May 4 13:54 vh-inactive.jks -rw------- 1 rsaadmin rsaadmin 7588 Jun 23 10:13 vh-inactive.jks.BAK <<<< -rw------- 1 rsaadmin rsaadmin 7327 Mar 19 11:10 webserver-identity.jks -rw-r--r-- 1 rsaadmin rsaadmin 4172 Mar 19 11:10 webserver-inactive.jks -rw------- 1 rsaadmin rsaadmin 7312 Apr 28 15:06 webtier-identity-rba.jks -rw-r--r-- 1 rsaadmin rsaadmin 22654 Mar 11 13:33 XACMLRoleMapperInit.ldift
List the contents of the keystore through the keytool utility
To list the contents of the file using the keytool utility at the command line to confirm the alias you want to delete, run the following command:
/opt/rsa/am/appserver/jdk/jre/bin/keytool -list -keystore /opt/rsa/am/server/security/vh-inactive.jks Enter keystore password: <enter the SSL Server Identity Certificate Keystore File Password captured above> Keystore type: JKS Keystore provider: SUN Your keystore contains 4 entries webtier, May 4, 2015, PrivateKeyEntry, Certificate fingerprint (MD5): BA:9F:FD:91:DA:22:E3:35:75:A7:9B:C0:62:E7:04:52 rsa-am-ca, Apr 28, 2015, trustedCertEntry, Certificate fingerprint (MD5): 70:01:3C:ED:74:27:9C:BF:CE:FE:48:19:8C:2F:91:86 virtualhost-id-key, Apr 28, 2015, PrivateKeyEntry, Certificate fingerprint (MD5): ED:D4:64:57:30:5D:60:1F:6F:5D:40:56:46:32:F3:77 a3ce4d08120510ac1f349ff8664cdfa0-signing-ca, May 4, 2015, trustedCertEntry, Certificate fingerprint (MD5): 8C:CA:DC:0B:22:CE:F5:BE:72:AC:41:1A:11:A8:D8:12
Note: The vh-inactive.jks file contains four entries. In this example, the alias “webtier” is a pending entry. The other three entries are the defaults.
To delete any unwanted alias from the keystore
- To delete the unwanted alias shown in the example, an administrator can use the keytool utility at the command line.
/opt/rsa/am/appserver/jdk/jre/bin/keytool -delete -alias webtier -keystore /opt/rsa/am/server/security/vh-inactive.jks Enter keystore password: <enter the SSL Server Identity Certificate Keystore File Password captured above> /opt/rsa/am/appserver/jdk/jre/bin/keytool -list -keystore /opt/rsa/am/server/security/vh-inactive.jks Enter keystore password: <enter the SSL Server Identity Certificate Keystore File Password captured above> Keystore type: JKS Keystore provider: SUN Your keystore contains 3 entries virtualhost-id-key, Apr 28, 2015, PrivateKeyEntry, Certificate fingerprint (MD5): ED:D4:64:57:30:5D:60:1F:6F:5D:40:56:46:32:F3:77 rsa-am-ca, Apr 28, 2015, trustedCertEntry, Certificate fingerprint (MD5): 70:01:3C:ED:74:27:9C:BF:CE:FE:48:19:8C:2F:91:86 a3ce4d08120510ac1f349ff8664cdfa0-signing-ca, May 4, 2015, trustedCertEntry, Certificate fingerprint (MD5): 8C:CA:DC:0B:22:CE:F5:BE:72:AC:41:1A:11:A8:D8:12 rsaadmin@srhw8018:/opt/rsa/am>
- Go back to the primary's Authentication Manager 8.x Operations Console and select Deployment Configuration > Certificates > Virtual Host Certificate Management to see that the Pending or Inactive certificate has been removed
Related Articles
Delete unwanted Certificate Signing Requests (CSR) from the RSA Authentication Manager Operations Console Certificate Mana… 2.46KNumber of Views How to delete old or pending certificate signing requests for RSA Authentication Manager console or virtual host replaceme… 1.54KNumber of Views R_KM_KEY_get_security_obj_meta_data returned 10017 17Number of Views How to Generate SSL Certificate Request and Private Key from the RSA SecurID Access Admin Console 419Number of Views How to generate a Certificate Signing Request (CSR) with the Subject Alternative Name (SAN) field using openssl on RSA Aut… 477Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.9 Release Notes (January 2026) An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide
Don't see what you're looking for?