Self-Signed Certificate for the Local License Server

When evaluating the local license server, you may not wish to acquire a proper server certificate. It’s possible to use a self-signed certificate instead, although this is not recommended for production use.

This section explains how to set up the server to communicate with the FlexNet License Server Administrator command-line tool (flexnetlsadmin) using a self-signed certificate.

The following procedure uses the keytool utility to generate the certificate; other tools are available.

To configure communication between the local license server and flexnetlsadmin using a self-signed certificate

1. Use a command similar to the following to create a self-signed PKCS#12 certificate:

# HTTPS server mode

$ keytool \

-genkeypair \

-ext san=dns:yourhost.yourcompany.com \

-storetype PKCS12 -keystore self-signed.p12 \

-storepass self-signed-password \

-alias self-signed \

-keyalg RSA \

-keysize 4096 \

-validity 360 \

-dname "C=,S=,L=,O=,OU=,CN=yourhost.yourcompany.com"

2. Specify the certificate that you just created in local-configuration.yaml:

# HTTPS server mode
https-in:

  # Set to true to enable

  enabled: true

  # HTTPS listening port

  port: 1443

  # Path to keystore

  keystore-path: self-signed.p12

  # Keystore password. You can obfuscate this with
  java -jar flexnetls.jar -password your-password-here

  keystore-password: self-signed-password

3. Export the certificate in PEM format for flexnetlsadmin:

$ keytool -exportcert -alias self-signed -keystore self-signed.p12 -rfc -file self-signed.pem

4. Start the local license server.
5. Use a command such as the following to test the communication between the server and flexnetlsadmin:

$ flexnetls-admin --partitions -custom-trust self-signed.pem

[ {

  "id" : 1,

  "name" : "default",

  "activeFeatureSlices" : [ ],

  "lastModified" : "2023-02-13T11:31:53.622Z"} ]