
Use the procedure below to create or replace a PSE. For example, you may have to replace a PSE when the public-key certificate contained in the PSE is about to expire
You know the syntax for the Distinguished Name (DN) of the server. For more information, see the following tables.
| DN Part | Definition | Examples |
|---|---|---|
|
CN |
Common Name |
<SID> |
|
|
|
E-mail address for Subject Note
If you are using X.509v3 certificates, you must use third-party tools to integrate an e-mail address into a Subject Alternative Name. |
|
OU |
Organizational Unit (optional) |
Department name |
|
O |
Organization |
Company name |
|
C |
Country |
USA: US Germany: DE |
| PSE | Requirement |
|---|---|
|
System PSE |
Default Distinguished Name: CN=<SID> If no system PSE exists when the application server is started, then the system automatically creates the public-key certificate for the system PSE using the Distinguished Name CN=<SID>. If you replace this PSE, you can freely choose the new Distinguished Name. |
|
SNC PSE |
The Distinguished Name must correspond to snc/identity/as The Distinguished Name used for the SNC PSE's public-key certificate must match the Distinguished Name part of the server's SNC name (without the p:), which is specified in the application server's profile parameter snc/identity/as. |
|
SSL Server PSE |
CN part of Distinguished Name: CN=<fully_qualified_host_name> The Common Name (CN) part of the Distinguished Name for the SSL server PSE's public-key certificate must correspond to the fully qualified host name that users will use to access the application server, for example, CN=host123.example.com. |
|
Anonymous SSL Client PSE |
Distinguished Name: CN=anonymous The system automatically uses the Distinguished Name CN=anonymous for the anonymous SSL client PSE's public-key certificate. You cannot change this name. In addition, the application server cannot use this identity to authenticate itself. |
|
All Other PSEs |
Distinguished Name: No special requirements You can freely choose the Distinguished Name for the public-key certificates stored in the rest of the PSEs. |
If you use the SAP CA as the issuing CA, then the rest of the Distinguished Name (not the CN part) must be as follows:
OU=I<customer_number>-<company_name>, OU=SAP Web Application Server, O=SAP Trust Community, C=DE
For the first OU (Organizational Unit) part, you specify your customer number only. The SAP CA automatically extends the OU part to include your company name.
We recommend using the report SSFALRTEXP to automatically receive a system log message and alert in CCMS for certificates contained in the various PSEs that are about to expire. Alternatively, we also provide the report SSF_ALERTCERT_EXPIRE that you can use manually or plan as a background job.
For more information, see SAP Note 572035
.
The system creates a new public and private key pair and self-signed public-key certificate that are stored in the PSE. If the PSE is stored in the database and should be distributed, then the system automatically distributes the PSE to the individual application servers.