Long time reader first time poster so bear with me.
In my environment there is a legal need to scan every incoming and outgoing connection using our firewall (fortigate - deep ssl ) . The only functionality that is broken is no mail fetching due to ssl mismatch.
So my real question is : does the platform use different keystone than windows server root authority for outgoing connections ? I need to place my certificate somewhere, but all my tries were failed to say the least. Any ideas fellow sysaiders ?
(Have searched the docs , forums, to N/A)
I’m going to assume you are on-prem…
This is what I have running on my install
Export the windows cert to PKCS12 (3DES) and make sure you have the password, save it wherever you want, I usually use c:\program files\sysaidserver
Cert path and password get put into the tomcat conf… and it strange as it may seem put the password in plain text. The system will hash it after you restart tomcat
C:\Program Files\SysAidServer\tomcat\conf\server.conf around line 70
this also assumes you get the port to 443 from the default 8443, so your mileage may vary
hope that helps
Please go to Email integration, click on a test button to check the connection, and provide us with the exact error that you receive.
I will try it on the next maintenance window, for the time being the deep ssl rule affecting the ticketing platform has been turned off.