<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cretificate Update Test in Administration and Deployment</title>
    <link>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/953703#M29416</link>
    <description>&lt;P&gt;Good call. The .pem files have additional text from the creation tool:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Bag Attributes&lt;BR /&gt;localKeyID: 90 4D C7 DB 9F 31 E5 4D B6 99 2F E3 BA A8 17 3B 44 28 6A 0E &lt;BR /&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;-----BEGIN CERTIFICATE-----&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not completely invalid as certutil.exe can read it :&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;certutil -verify "C:\temp\xxx.pem"&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;FONT size="4"&gt;Returns&lt;/FONT&gt; 'CertUtil: -verify command completed successfully.'&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;Some manual editing is needed and I will ask for a specific format next time.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Dec 2024 17:54:52 GMT</pubDate>
    <dc:creator>Acf2</dc:creator>
    <dc:date>2024-12-16T17:54:52Z</dc:date>
    <item>
      <title>Cretificate Update Test</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/925342#M28417</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have recieved three certificates root, intermediate and the server certificate to apply in the Linux server.&lt;/P&gt;
&lt;P&gt;How do i verify the validity/correctness of the existing certificate, before applying new certificates?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Mushy&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2024 09:56:30 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/925342#M28417</guid>
      <dc:creator>Mushy</dc:creator>
      <dc:date>2024-04-23T09:56:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cretificate Update Test</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/925618#M28431</link>
      <description>You can use openssl commands to check a certificate against a key and against a certificate authority.&lt;BR /&gt;&lt;BR /&gt;For example:&lt;BR /&gt;&lt;BR /&gt;#Check if key matches certificate, these modulus would match.&lt;BR /&gt;openssl rsa -noout -modulus -in server.key&lt;BR /&gt;openssl x509 -noout -modulus -in server.crt&lt;BR /&gt;&lt;BR /&gt;# Check if a certificate is valid for a given CA/Intermediate.&lt;BR /&gt;openssl verify -CAfile root.crt -untrusted intermediate.crt server.crt&lt;BR /&gt;</description>
      <pubDate>Wed, 24 Apr 2024 18:01:35 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/925618#M28431</guid>
      <dc:creator>gwootton</dc:creator>
      <dc:date>2024-04-24T18:01:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cretificate Update Test</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/925714#M28443</link>
      <description>&lt;P&gt;&lt;a href="https://communities.sas.com/t5/user/viewprofilepage/user-id/78975"&gt;@gwootton&lt;/a&gt;&amp;nbsp; Thanks for the guidance!&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 08:10:30 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/925714#M28443</guid>
      <dc:creator>Mushy</dc:creator>
      <dc:date>2024-04-25T08:10:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cretificate Update Test</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/953122#M29380</link>
      <description>&lt;P&gt;&lt;a href="https://communities.sas.com/t5/user/viewprofilepage/user-id/78975"&gt;@gwootton&lt;/a&gt;&amp;nbsp;, could you please help with steps how we can apply this certificates ?&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2024 17:38:28 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/953122#M29380</guid>
      <dc:creator>Rahulmahajan129</dc:creator>
      <dc:date>2024-12-10T17:38:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cretificate Update Test</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/953132#M29382</link>
      <description>&lt;P&gt;Similar issue. Do we know what mechanism SAS Deployment Manager uses to validate .pem files ? We have added a new root certificate but the intermediate chain.pem and .pem files are being rejected as not Base-64. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No validation details are being written to %SASHOME%&lt;SPAN&gt;\InstallMisc\InstallLogs\certframe_wx6_certadd_2024-12-09-13.45.29.log&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Both certutil.exe -verify and openssl.exe rsa -modulus are accepting the format but not sasdm.exe. Waiting to hear from SAS TS. &lt;BR /&gt;I think the documentation at&amp;nbsp;&lt;A href="https://documentation.sas.com/doc/en/pgmsascdc/9.4_3.5/secref/n0n1y5gwevy312n13h5bm4yf6quy.htm" target="_blank"&gt;SAS Help Center: Manage Certificates in the Trusted CA Bundle Using the SAS Deployment Manager&lt;/A&gt;&amp;nbsp;could be improved with Greg's approach.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2024 18:47:29 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/953132#M29382</guid>
      <dc:creator>Acf2</dc:creator>
      <dc:date>2024-12-10T18:47:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cretificate Update Test</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/953144#M29383</link>
      <description>Sounds like Deployment Manager doesn't think your .pem files are in the correct format. If you open those files with a text editor do they follow this format?&lt;BR /&gt;-----BEGIN CERTIFICATE-----&lt;BR /&gt;...&lt;BR /&gt;-----END CERTIFICATE-----</description>
      <pubDate>Tue, 10 Dec 2024 21:42:06 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/953144#M29383</guid>
      <dc:creator>gwootton</dc:creator>
      <dc:date>2024-12-10T21:42:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cretificate Update Test</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/953282#M29389</link>
      <description>To add certificates to your trusted CA bundle in SAS 9.4 you would use the associated SAS Deployment Manager task. &lt;BR /&gt;This is documented here:&lt;BR /&gt;&lt;A href="https://go.documentation.sas.com/doc/en/pgmsascdc/9.4_3.5/secref/n0n1y5gwevy312n13h5bm4yf6quy.htm" target="_blank"&gt;https://go.documentation.sas.com/doc/en/pgmsascdc/9.4_3.5/secref/n0n1y5gwevy312n13h5bm4yf6quy.htm&lt;/A&gt;</description>
      <pubDate>Wed, 11 Dec 2024 20:46:40 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/953282#M29389</guid>
      <dc:creator>gwootton</dc:creator>
      <dc:date>2024-12-11T20:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cretificate Update Test</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/953703#M29416</link>
      <description>&lt;P&gt;Good call. The .pem files have additional text from the creation tool:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Bag Attributes&lt;BR /&gt;localKeyID: 90 4D C7 DB 9F 31 E5 4D B6 99 2F E3 BA A8 17 3B 44 28 6A 0E &lt;BR /&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;-----BEGIN CERTIFICATE-----&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not completely invalid as certutil.exe can read it :&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;certutil -verify "C:\temp\xxx.pem"&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;FONT size="4"&gt;Returns&lt;/FONT&gt; 'CertUtil: -verify command completed successfully.'&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;Some manual editing is needed and I will ask for a specific format next time.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 17:54:52 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/953703#M29416</guid>
      <dc:creator>Acf2</dc:creator>
      <dc:date>2024-12-16T17:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cretificate Update Test</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/953716#M29417</link>
      <description>&lt;P&gt;I ran into this exact problem myself. Since I knew I had a valid certificate as it was working in SAS web apps, I just exported the certificate out of the MS Edge browser using the Certificate Viewer and applied it successfully in Deployment Manager. That workaround was provided by Tech Support.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 19:08:56 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/953716#M29417</guid>
      <dc:creator>SASKiwi</dc:creator>
      <dc:date>2024-12-16T19:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cretificate Update Test</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/954104#M29423</link>
      <description>&lt;P&gt;Another mystery.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Where is&amp;nbsp; &lt;SPAN class="fontstyle0"&gt;SAS Usage Note 57370. 2016. “Downloading, installing, and using the TLS/SSL Diagnostic Tool for SAS&lt;/SPAN&gt;&lt;SPAN class="fontstyle0"&gt;® &lt;/SPAN&gt;&lt;SPAN class="fontstyle0"&gt;9.4.” Available at &lt;/SPAN&gt;&lt;SPAN class="fontstyle0"&gt;&lt;A href="http://support.sas.com/kb/57/370.html" target="_blank"&gt;http://support.sas.com/kb/57/370.html&lt;/A&gt;&amp;nbsp;?&lt;BR /&gt;&lt;BR /&gt;It is the last reference from Stuart Rogers' definitive 2016 paper Tips and Techniques for Using Site-Signed HTTPS with SAS® 9.4&amp;nbsp; :&amp;nbsp;&lt;A href="https://support.sas.com/resources/papers/proceedings16/SAS3441-2016.pdf" target="_blank"&gt;Paper Template &lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fontstyle0"&gt;Could it be referencing keytool.exe or openssl.exe?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 22:35:01 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/954104#M29423</guid>
      <dc:creator>Acf2</dc:creator>
      <dc:date>2024-12-18T22:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cretificate Update Test</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/954165#M29434</link>
      <description>That SAS Note linked to a custom JAR file that is no longer published, but it was similar to the functionality of keytool.exe in terms of viewing what was in trustedcerts.jks but in a visual interface, and viewing the contents of the Windows certificate store, similar to the certificates snap-in for Microsoft Management Console (certlm/certmgr).</description>
      <pubDate>Thu, 19 Dec 2024 15:07:17 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/954165#M29434</guid>
      <dc:creator>gwootton</dc:creator>
      <dc:date>2024-12-19T15:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cretificate Update Test</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/954171#M29435</link>
      <description>&lt;P&gt;Thanks Greg. From your description, this approach should give similar details :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN&gt;D:\Program Files\SASHome\SASPrivateJavaRuntimeEnvironment\9.4\jre\bin\keytool.exe&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN&gt; -list -v&lt;/SPAN&gt;&lt;SPAN&gt;^&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;-keystore &lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN&gt;D:\Program Files\SASHome\SASSecurityCertificateFramework\1.1\cacerts\trustedcerts.jks&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN&gt;^&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;-storepass xxxx&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;gt;&lt;/SPAN&gt; &lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN&gt;D:\sas\Batch\Sysadmin\Security\trustedcerts_jks.lst&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;I can see how an app might be useful. There 142 occurences of trustedCertEntry in our listing !&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;It is tempting to start over and create a new .jks file with just our 2 entries .&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 19 Dec 2024 15:32:31 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/954171#M29435</guid>
      <dc:creator>Acf2</dc:creator>
      <dc:date>2024-12-19T15:32:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cretificate Update Test</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/954173#M29436</link>
      <description>By default trustedcerts includes a number of built-in well-known CA certificates, so you'll see many that are not related to your internal certificates.</description>
      <pubDate>Thu, 19 Dec 2024 15:43:58 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/Cretificate-Update-Test/m-p/954173#M29436</guid>
      <dc:creator>gwootton</dc:creator>
      <dc:date>2024-12-19T15:43:58Z</dc:date>
    </item>
  </channel>
</rss>

