I am having trouble updating the server certificate for ePO. I have followed How to generate a custom SSL certificate for use with ePO using the OpenSSL toolkit (trellix.com) without any luck. I followed the entire document and generated a new CSR and certificate, then converted the private key using the openssl rsa command for OpenSSL 1.0. This never creates a PKCS1 formatted file, as it looks the same as a file in PKCS8 format.
I have had luck in changing the header and footer of the converted private key to include "RSA". This gets me passed the error "server certificate could not be updated since the uploaded private key file did not contain a valid private key", however I get a new error of "Error occurred while decoding the private key's PEM".
Solved! Go to Solution.
I manually edited it to see if it made a difference. I was running OpenSSL 1.0.X off a RHEL 7 box while following the documentation I referenced. For whatever reason OpenSSL 1 was not changing the format of the PKCS8 pem file. We were able to install OpenSSL 3.0.8 on a Windows machine and follow the documentation for the OpenSSL 3.0 commands and this resolved the issue.
You can't just manually edit the pem file to change headers and footers. Are you sure you are using openssl version 1? This will tell you whether you have pkcs1 or pkcs8 format in an unedited pem file.
Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?
I manually edited it to see if it made a difference. I was running OpenSSL 1.0.X off a RHEL 7 box while following the documentation I referenced. For whatever reason OpenSSL 1 was not changing the format of the PKCS8 pem file. We were able to install OpenSSL 3.0.8 on a Windows machine and follow the documentation for the OpenSSL 3.0 commands and this resolved the issue.
Openssl version 1 does not create the pem file in pkcs8 format. Only 3.x and above. So that command to convert the file would not have done anything for that. There are instructions in the kb to remove the password from the pkcs1 file that openssl 1 would have created. Either way, glad you got it working.
Was my reply helpful?
If this information was helpful in any way or answered your question, will you please select Accept as Solution in my reply and together we can help other members?
New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.
Thousands of customers use our Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership: