SSL CA Certificate Upgrade for Privacera Diagnostics¶
This document provides steps to handle Diagnostics SSL artifacts during a CA certificate upgrade to prevent certificate mismatches.
STEP 1: Backup Diagnostics SSL artifacts (before CA certificate upgrade)¶
Backup the following Diagnostics SSL artifacts (server and client):
-
Server
diagnostics-server-keystore.p12diagnostics-server-keystore-public-key.pemdiagnostics-server-keystore-private-key.pemdiagnostics-server-trust.cer
-
Client (only if client SSL is enabled in Privacera Manager via
DIAG_CLIENT_SSL_ENABLEDor when FIPS mode is enabled)diagnostics-client-keystore.p12diagnostics-client-keystore-public-key.pemdiagnostics-client-keystore-private-key.pemdiagnostics-client-trust.cer
STEP 2: Perform the CA certificate upgrade¶
Perform the CA certificate upgrade and ensure the new CA-signed inputs are placed/updated in the same config/ssl/ folder (their names are whatever you configured via the vars, but they must be the updated full chain + private key PEMs).
Update or verify the following variables in your vars.ssl.yml file to point to the updated full-chain and private key PEMs (uncomment and set as needed):
| Text Only | |
|---|---|
STEP 3: Force refresh derived artifacts (after CA certificate upgrade)¶
To prevent certificate mismatch, delete the derived Diagnostics artifacts (the ones in Step 1), then re-run the Diagnostics SSL generation step (or rerun the Diagnostics role) so it recreates:
diagnostics-*-keystore.p12diagnostics-*-trust.cerdiagnostics-*-keystore-public-key.pemdiagnostics-*-keystore-private-key.pem
STEP 4: Apply changes using Privacera Manager¶
Run the following commands to apply the updated SSL certificates and regenerated artifacts:
Note
- Mismatch occurs when new CA certs are updated but Diagnostics keystores/derived PEMs are not regenerated (deployment may skip regeneration if files already exist).
- The backup is for rollback, not to import old certs into the new keystore. The new keystore should be rebuilt from the new CA-signed material.