Please follow the below steps to replace RiskVision Default certificate (based on your scenario).
Scenario 1: Without the Certificate chain file
- Stop Apache service
- Go to %Agiliance_Home%\apache\conf directory and take the backup of server.crt & server.key files
- Obtain your organization specific Server Certificate and Server Private key files
- Rename the certificate file to server.crt and key file to server.key
- Replace the original files with newly obtained server.crt and server.key files under %Agiliance_Home%\apache\conf directory
- If the password is used while generating the certificate then modify passphrase.bat file present under %Agiliance_Home%\apache\conf\extra directory. Once you open passphrase.bat file it will have the contents as? @echo agiliance ?. Replace ?agiliance? word with the actual password
- Start Apache service
Scenario 2: With the Certificate chain file
- Stop Apache service
- Go to %Agiliance_Home %\apache\conf directory and take the backup of server.crt server.key, STAR_agiliance_com.ca-bundle files
- Obtain your organization specific Server Certificate, Server Private key and Server Certificate chain files
- Rename the certificate file to server.crt, key file to server.key, Certificate chain file to STAR_agiliance_com.ca-bundle
- Replace the original files with newly obtained server.crt, server.key, STAR_agiliance_com.ca-bundle files under %Agiliance_Home%\apache2\conf directory
- Uncomment the below line from httpd-ssl.conf file present under %Agiliance_Home%\apache\conf\extra directory and save the file. # SSLCertificateChainFile conf/STAR_agiliance_com.ca-bundle
- If the password is used while generating the certificate then modify passphrase.bat file present under %Agiliance_Home %\apache\conf\extra directory. Once you open passphrase.bat file it will have the contents as? @echo agiliance?. Replace ?agiliance? word with the actual password
- Start Apache service