2. Transfer certificates to Avaya Aura
®
Web Gateway.
a. Transfer the signed
.crt
file to
/opt/Avaya/AAWGportalCerts
, and name it
frontEnd.crt
.
b. Transfer the third-party root CA certificate to
/opt/Avaya/AAWGportalCerts
, and
name it
rootCA.crt
.
c. Transfer any third-party intermediary CA certificates to
/opt/Avaya/
AAWGportalCerts
, and name them
intermediary1.crt
,
intermediary2.crt
,
and so on in ascending order of the certificate chain until the root CA.
3. To create a certificate chain containing the front end certificate, arrange all intermediary CA
certificates (if any) and the root CA certificate in the correct order, and then run the
following command:
cat frontEnd.crt intermediary1.crt intermediary2.crt ... rootCA.crt >
frontEndCerts.crt
Applying third-party signed certificates to the Avaya Aura
®
Web Gateway
Procedure
1. Open the Linux shell using your Linux administrator account credentials.
The Linux administrator account is created during the deployment process.
2. To open the Avaya Aura
®
Web Gateway configuration utility, run the following command:
app configure
3. Select
Front-end host, System Manager and Certificate Configuration
.
4. Select
Use System Manager for Certificates
, and then select
No
.
5. Select the following options, type the file path shown, and then select
OK
for each option:
a. For
REST interface key file
, type
/opt/Avaya/AAWGportalCerts/
frontEnd.key
.
b. For
REST interface certificate file
, type
value /opt/Avaya/
AAWGportalCerts/frontEndCerts.crt
.
c. For
OAM interface key file
, type
value /opt/Avaya/AAWGportalCerts/
frontEnd.key
.
d. For
OAM interface certificate file
, type
value /opt/Avaya/AAWGportalCerts/
frontEndCerts.crt
.
e. For
Keystore password
, type the same keystore password that you used at the time
of installation.
Certificate configuration using the configuration utility
October 2018
Deploying the Avaya Aura
®
Web Gateway
150