Title
Create new category
Edit page index title
Edit category
Edit link
OCM uses a server self-signed certificate without a chain
This section shows how to generate a self‑signed server certificate (without an intermediate/root CA chain).
In production, a self‑signed certificate is not recommended and is usually replaced by a certificate issued by your internal PKI or a public CA. The examples below are intended for testing or lab environments only.
1. Generate a Self‑Signed Server Certificate
In this scenario, the server certificate is self‑signed and acts as its own CA. There is no separate root CA or intermediate CA.
openssl genrsa -out server.key 2048 openssl req -x509 -new -key server.key -sha256 -days 825 \ -out server.crt \ -subj "/CN=myserver.local"
This creates:
server.key– private key used by the serverserver.crt– self‑signed server certificate (no chain)
In a real deployment, replace
myserver.localwith the actual FQDN of your OCM server.2. Use the Self‑Signed Certificate for OCM
After generating and verifying the self‑signed certificate:
- Use
server.key- Use
server.crtto configure the TLS/HTTPS certificate on your OCM on‑prem server.
