2. Transfer certificates to Avaya Aura
®
Web Gateway.
a. Transfer the signed .crt file to /opt/Avaya/AAWGportalCerts, and name it
frontEnd.crt.
b. Transfer the third-party root CA certificate to /opt/Avaya/AAWGportalCerts, and
name it rootCA.crt.
c. Transfer any third-party intermediary CA certificates to /opt/Avaya/
AAWGportalCerts, and name them intermediary1.crt, intermediary2.crt,
and so on in ascending order of the certificate chain until the root CA.
3. To create a certificate chain containing the front end certificate, arrange all intermediary CA
certificates (if any) and the root CA certificate in the correct order, and then run the
following command:
cat frontEnd.crt intermediary1.crt intermediary2.crt ... rootCA.crt >
frontEndCerts.crt
Applying third-party signed certificates to the Avaya Aura
®
Web Gateway
Procedure
1. Open the Linux shell using your Linux administrator account credentials.
The Linux administrator account is created during the deployment process.
2. To open the Avaya Aura
®
Web Gateway configuration utility, run the following command:
app configure
3. Select Front-end host, System Manager and Certificate Configuration.
4. Select Use System Manager for Certificates, and then select No.
5. Select the following options, type the file path shown, and then select OK for each option:
a. For REST interface key file, type /opt/Avaya/AAWGportalCerts/
frontEnd.key.
b. For REST interface certificate file, type value /opt/Avaya/
AAWGportalCerts/frontEndCerts.crt.
c. For OAM interface key file, type value /opt/Avaya/AAWGportalCerts/
frontEnd.key.
d. For OAM interface certificate file, type value /opt/Avaya/AAWGportalCerts/
frontEndCerts.crt.
e. For Keystore password, type the same keystore password that you used at the time
of installation.
Certificate configuration using the configuration utility
October 2018 Deploying the Avaya Aura
®
Web Gateway 150
Comments on this document? infodev@avaya.com