Steps to generate a self-signed certificate (X.509) for the Merge1 server

Article: 100051880
Last Published: 2021-12-06
Ratings: 0 1
Product(s): Enterprise Vault

Description

Perform the following steps to generate a self-signed certificate for the Merge1 server:

  1. Open IIS Manager on the Merge1 Server.
  2. Select Server Certificates and click on Create Self-Signed Certificate.
  3. Enter a name for your self-signed certificate and click OK. This creates a new certificate in Server certificates.
  4. Select the certificate and then select Export in the right panel. Enter a password for your certificate and the destination at which you want to save the certificate.
  5. Right-click on the certificate file which you exported, and select Install. Select the Local Machine option.
  6. Ensure that the file you have selected to import is correct and click Next.
  7. Type the password of the certificate file and click Next.
  8. Select Trusted Root Certification Authorities and click Next.

  9. Click Finish to complete the import of the .PFX certificate.

  10. Open mmc.exe from the Run command.

  11. Right-click on File and select Add or Remove Snap-ins.

  12. In the Snap-in section, select Certificates and then select Computer Account. Click Finish.

  13. Click OK.

  14. Navigate to Certificates in Trusted Root Certification Authorities. Right-click on the self-signed certificate. Click Export.

  15. To export the certificate in Base 64 and .cer format, click Next.

  16. The selected option must be – No, do not export the private key.

  17. Select Base 64 encoded X.509 (.CER) and click Next.

  18. Provide the path where you want to export the .cer file.

  19. Click Finish to complete the export of the .cer file.

    You have the following certificate files:

    1. .CER certificate (without password)

    2. .PFX certificate (with password)

  20. Install the .CER certificate in the Registered Application in Azure portal.
    Note: You may need assistance from the Azure portal administrator to install the .cer certificate on the Azure portal.

  21. Use the .PFX certificate and its password to create a Microsoft 365 connection in Enterprise Vault.


     

    Optionally you can also use the thumbprint of the certificate to create the Microsoft 365 connection in Enterprise Vault.

    Note: To use the certificate in Enterprise Vault, you must copy it to the Enterprise Vault machine and install it there as well.

  22. To get the thumbprint of the certificates you just created, run the following command in PowerShell:
    Get-ChildItem -path cert:\LocalMachine\My


    Alternatively, you can also see the thumbprint of your certificate in the Certificate Hash column in IIS Manager > Server Certificates.

Was this content helpful?