Cisco Cisco Prime Service Catalog 10.0 Technical References

Page of 216
 
5-51
Cisco Prime Service Catalog 10.0 Configuration Guide
OL-31034-01
Chapter 5      System Administration
Configuring SSL for Service Link Inbound Documents
Step 6
If you decide to disable the nonsecure port for the Service Link service, send file 
“C:\temp\default_signer.cer” to the system administrator who manages the external system. This file 
contains the signer certificate for the “default” certificate. It must be imported into the truststore of the 
external system, so that the external system can establish a trusted handshake with the Service Link 
service during SSL connection. In addition, the external system needs to connect to the https URL of 
the Service Link service. For example, previously, the Service Link URL may look like “http:// 
<servername>:9080/IntegrationServer/ishttplistener/<agent_name>”. The URL must now be changed to 
“https://<servername>:9443/IntegrationServer/ ishttplistener/<agent_name>.
Using the “slkeystore.jks” file
Step 1
Copy file “slkeystore.jks” (that you created at the beginning of this chapter) to a temporary directory on 
the machine where the WebSphere Administration Server is running. For example, copy the file to 
C:\temp\slkeystore.jks.
Step 2
On the Personal certificates page, click Import.
Step 3
Enter the following values:
Field
Value
Key file name 
C:\temp\slkeystore.jks.
Type 
jks.
Key file password 
slpassword.
“Get key file aliases” button
Click the button to refresh the list of aliases.
Certificate alias to import 
servicelink.