![](/images/backgrounds/285925/hp-van-sdn-controller-software-products-administrators-guide-66988663x1.png)
5 SDN Controller authentication
5.1 SDN Controller security guidelines
The HP VAN SDN controller communicates with different components, both internal and external to the controller, via secure channels. This section documents these channels, their defaults, and how to configure them in a deployment environment.
5.2 SDN Controller authentication
The SDN Controller identifies itself via
The controller ships with a
5.3Creating SDN Controller keystore and truststore
1.Login to the system running the SDN Controller and stop the controller.
2.As the SDN user (i.e. sudo - sdn), do the following:
3.Back up your default /opt/sdn/admin/keystore and /opt/sdn/admin/truststore to a safe location.
4.Create a new keystore using the following commands: cd /opt/sdn/admin
rm keystore truststore
keytool
You must specify a fully qualified domain for your server for the "first and last name" question as some CAs, such as VeriSign, expect it.
5.Generate a CSR (Certificate Signing Request) for signing:
keytool
6.Send the
The CA will authenticate you and return a signed certificate and its CA certificate chain. We assume the signed certificate from the CA is named signed.cer and the CA's certificate is root.cer. If root.cer is from your own internal CA, then you need to import root.cer into your browser as an authority.
7.Import the signed root certificate into your keystores:
keytool
keytool
5.1 SDN Controller security guidelines 63