Avaya 3100 Mobile Communicator and Security User Manual Page 107

  • Download
  • Add to my manuals
  • Print
  • Page
    / 116
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 106
Important:
The admin-ssl-keystore password must always be mobility.
4. Respond to the prompts. For the common name (first and last name), enter a FQDN
such as mg.domain.com.
5. Change ownership of the Avaya 3100 Mobile Communicator Gateway
Administration keystore from root to mobility with the following command:
chown mobility:mobility admin-ssl-keystore
chmod 755 admin-ssl-keystore
6. Generate the client certificate for the Avaya 3100 Mobile Communicator Gateway
Administration server.
/usr/java/jdk1.6.0_03/bin/keytool -export -keystore admin-
ssl-keystore -alias smog-ssl -file admin-ssl-keystore.der -
storepass <password> -keypass <password>
Important:
The admin-ssl-keystore password must always be mobility.
Important:
If the clients use the Over the air download mechanism exclusively, you do not
require the client certificate for the Administration server.
7. Use the password specified in step
3 on page 106 to program the HTTPS certificate
password for the Avaya 3100 Mobile Communicator Gateway Administration
Server.
/usr/java/jdk1.6.0_03/bin/java -cp ../lib/jbosssx.jar
org.jboss.security.plugins.FilePassword mobility 13
<password> keystore.password
8. Restart the server:
appstart restart
Important:
Do not use the Web Administration Console to restart the server.
Variable definitions
Variable
Definition
<password> The password for the keystore. Must be mobility.
Generating a self-signed certificate for Avaya 3100 Mobile Communicator Gateway Administration Server
Administration and Security October 2010 107
Page view 106
1 ... 106 107 108 ... 116

Comments to this Manuals

No comments