Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


Replacing SSL Certificates in JSA Products


By default, JSA is configured with a self-signed Security Sockets Layer certificate. When you use a self-signed certificate to access the web, you're prompted with a warning message that the certificate is unrecognized. You can replace this SSL certificate with either an updated self-signed certificate, an internal certificate authority (CA) signed, or a public CA signed certificate.

SSL Certificates Overview

Secure Sockets Layer (SSL) is a security protocol that provides communication privacy. With SSL, client/server applications can communicate in a way that is designed to prevent eavesdropping, tampering, and message forgery.

SSL is an industry standard and is used by websites to protect online transactions. To generate an SSL link, a web server requires an SSL certificate. SSL certificates are issued by software or trusted third-party certifying authorities.

Trusted Root

Browsers and operating systems include a preinstalled list of trusted certificates, which are installed in the Trusted Root Certification Authorities store. JSA products trust any certificate that is signed by a trusted root CA.

Table 1: JSA Supported Certificates




A self-signed certificate provides basic security, enabling data encryption between the user and the application. Because self-signed certificates cannot be authenticated by any existing known root certificate authorities, users are warned about this unknown certificate and must accept it to proceed.

Internal CA signed

Organizations that have their own internal root CA can create a certificate by using that internal CA. This certificate is supported by JSA, and the internal root CA is also imported into the JSA environment.

Public CA / Intermediate CA signed

Certificates that are signed by known public CAs and intermediate certificates are supported by JSA. Public signed certificates can be used directly in JSA, and certificates that are signed with Intermediate CA are installed by using both the signed certificate and the intermediate certificate to provide valid certificate functions.

Note: An intermediate certificate is commonly used by organizations that create multiple SSL keys in their environment, and want to have them signed by a known/commercial certificate vendor. When they use the intermediate key, they can then create sub-keys from this intermediate key. When this configuration is used, JSA must be configured with both the intermediate certificate and the host SSL certificate so that connections to the host can verify the full certificate path.

SSL Connections Between JSA Components

To establish all internal SSL connections between components, JSA uses the web server certificate that is preinstalled on the JSA Console. When the preinstalled certificate is replaced, the certificate installation process copies the certificate to all managed hosts in the deployment.

All trusted certificates for JSA must meet the following requirements:

  • The certificate must be an X.509 certificate and have PEM base64 encoding.

  • The certificate must have a .cert, .crt, .pem, or .der file extension.

  • Keystore files that contain certificates must have the .truststore file extension.

  • The certificate file must be stored in the /opt/qradar/conf/trusted_certificates directory.

If the SSL key is configured with a password, it must be manually entered each time that the service is restarted. With this configuration, the web UI service is unavailable until the password is entered, such as during a JSA patch installation, HA failover, or system restart. In this instance, users can't log in and JSA managed hosts can't retrieve configuration updates or report log source, rule and data storage status messages until the web service is available.

Creating an SSL Certificate Request with 1024-bit and 2048-bit RSA Keys

  1. Use an SSH client to log in JSA console.
  2. Generate a private key file by using one of the following commands:

    Do not use the private encryption options, because they can cause compatibility issues. The qradar.key file is created in the current directory. Keep this file to use when you install the certificate.

  3. Generate the certificate signing request (CSR) file. The qradar.csr file is used to create the SSL Certificate, with an internal CA or commercial certificate authorities. Run the following command, and provide necessary information as prompted:

    Example output:

  4. If you want to verify the information in the CSR before you send it, you can type the following command:

    If incorrect information was entered, run the OpenSSL command again to re-create the CSR file.

  5. Use the Secure File Transfer Protocol or another program to securely copy the CSR file to your computer.
  6. Submit the CSR to your internal or commercial certificate authority for signing according to their instructions.

The CSR is identified as a certificate in Apache format.

Certificates signed by an Internal Certificate Authority

If the certificate is issued by an internal certificate authority and not a commercial certificate provider, JSA must be updated to include the internal root certificate into the local certificate store for proper certificate validation. Root verification certificates are automatically included with the operating system.

To update the trust anchors root certificate store in RedHat:

  1. Copy the CA's root certificate to /etc/pki/ca-trust/source/anchors/.

    Run the following command at the SSH command line:

Installing a New SSL Certificate on the JSA Console

You must have the following:

  • The newly signed certificate from either your internal CA, or a public one.

  • The qradar.key private key to generate the CSR file.

  • An intermediate certificate, if used by your certificate provider.


If an intermediate certificate is used, run the "" command with the -i flag to install both the new certificate and the intermediate certificate. When used, it prompts for 3 file paths:

  • SSLCertifficateFile

  • SSLIntermediateCertificateFile

  • SSLCertificateKeyFile

  1. Use SSH to log in to your JSA console as the root user.
  2. Install the certificate by entering the following command:

    Example output:

    You have specified the following:

  3. On the navigation menu (), click Admin to open the admin tab.
  4. Click Advanced >Deploy Full Configuration.Note

    When you deploy the full configuration, JSA restarts all services. Data collection for events and flows stops until the deployment completes.


If you have issues with your certificate, such as an incorrect name or IP address, or if the expiration date passes, or you have a change of IP or host name on your console, you can choose to revert to a self-signed certificate.

To generate a self-signed certificate, follow these steps on the JSA Console:

  1. Back up the certificates that were installed previously that are not working. Existing certificates are detected and reported when you run certificate generation, causing the generation process to stop.
  2. Run the /opt/qradar/bin/ –generate command to generate new certificates. This process is also used during JSA installation to generate the initial SSL certificate.
  3. Move the newly generated certificates to a new directory. Use the script in Install mode to install and distribute the new SSL certificates.

    You have specified the following: