The Network Configuration Manager provides the ability to use certificates that are signed by a Certificate Authority (CA). An automated utility is available for generating a private key and certificate signing request (CSR), as well as installing and configuring the CA-signed certificate into Tomcat and Apache.

Use the following steps to enable the CA-signed SSL certificate on Network Configuration Manager.




Log into the server as a user with administrator privileges.

If you have already received the CA-signed certificate, skip to step 3.


Use the following steps to generate a Private Key and Certificate Signing Request (CSR).

  • Type the following command to change directories to [Product Directory]\tools\ssl, and then press Enter: cd [Product Directory]\tools\ssl

    Replace [Product Directory] with the path to the directory you installed Network Configuration Manager to initially.

  • Type the following command, and press Enter: perl –keygen

  • Follow the screen prompts. You will be asked for general security information about the location of the server, and the hostname; such as country, state, locality, and organization name. Any field you do not want to complete can be left blank, or you can enter a period (.) into that field.

The utility generates the following files:

  • server.key – the private key

  • server.csr – the certificate signing request (CSR)


Send the CSR file to your preferred Certificate Authority (CA). The CA then returns the signed certificate.


Save this file to [Product Directory]\tools\ssl\.