Update SSL Certificates Using Cohesity CA or Customer CA certificate

21 October 2025

Cohesity software packages ship with an auto-generated self-signed certificate. You must accept the self-signed certificate to access the Cohesity clusters. This topic describes two scenarios for updating the cluster certificate from the Cohesity cluster (User Interface):

  • Load a Certificate Authority (CA) signed certificate.

  • Refresh the factory shipped (Cohesity signed) certificate if it expires.

Important Notes on SSL Certificates

  • Cohesity does not recommend using self-signed certificates.

  • Cohesity cluster supports X.509 certificates in PEM format only.

  • The certificate must have the "Common Name" field set to the server's hostname (for example, a VIP's DNS name). The Common Name must be the same as the name you plan to use to access the Cohesity cluster.
  • Private Key Files must not be encrypted.

  • If the certificate admin provides a single file, ensure to separate the file to obtain the certificate and key files.

  • By default, OCSP validation is disabled. Contact your Cohesity account team to enable the feature.

  • Cohesity does not support ECDSA certificates.

Examples

Configuring Cohesity Cluster with a CA Signed Certificate

A Certificate Authority (CA) signed certificate is a digital certificate issued by a trusted organization called Certificate Authority. It authenticates the identity of the entity (certificate holder) before digitally signing the certificate, thereby assuring users that they are interacting with a legitimate and secure entity.

You can replace the Cohesity cluster's self-signed certificate with a Certificate Authority (CA) signed certificate. Optionally you can use the Subject Alternative Name (SAN) field to specify additional host names (such as sites, IP addresses, and common names) to be protected by a single SSL certificate, such as a Multi-Domain or Extend Validation Multi-Domain Certificate.

This procedure applies to configuring the Cohesity cluster using SHA256 and SHA384 cryptographic hash algorithms. When configuring, update the default_md parameter in step 3 accordingly. To configure a Cohesity cluster with a CA certificate using SHA256 or SHA384:

  1. Copy the following template to a text editor, replace the sample values in red color with actual values, and save the file in your local directory.
  2. Run the following command to the SCP file saved in the local directory to support user:

    scp "/path_to_file/filename" user@ip_address:"/Path to destination/"

    Example

    scp cert_req.conf support@111.1.1.1:/var/tmp/
  3. Get the IP address for any Cohesity Cluster node (You can get the list of IP addresses by selecting Settings > Summary and then opening the Nodes tab). Use the IP address to log into that node as the support user.

    Command

    ssh support@<node IP address>

    Example

    ssh support@111.1.1.1

    When prompted, enter the password of the support user account.

    [support@111.1.1.1's password:

    Once your password is successfully authenticated, the prompt changes to the Secure Shell prompt.

    [support@restricted-8888222f444 ~]\>

  4. Generate the private key and certificate signing request files using cert_req.conf file:

    openssl req -out cert_req.csr -newkey rsa:2048 -nodes -keyout cert_key.key -config <path to file>/cert_req.conf

    Example

    openssl req -out cert_req.csr -newkey rsa:2048 -nodes -keyout cert_key.key -config /var/tmp/cert_req.conf

    Private key must not be encrypted.

  5. Convert the cert_key.key to a PEM private key using the following command:

    openssl rsa -in cert_key.key -out /var/tmp/key.pem
  6. Make sure all users (owners, groups, others) have read permissions for the private key (key.pem) file:

    To check the current permissions settings, run the following command:

    ls -ltr <key.pem>

    Run the following command to set the required permissions for all users:

    chmod 600 <key.pem>

    Sample Output:

    [support@restricted-a121 ~]\> chmod 600 key.pem
    [support@restricted-a121 ~]\> ls -ltr key.pem
    -rw------. 1 support support 1704 Jun 13 08:23 key.pem
  7. Run the following command to verify that the CSR file includes the Subject Alternative Name.

    openssl req -text -noout -verify -in cert_req.csr

  8. Use WinSCP or SCP command to download the cert_req.csr file from the Cohesity node to your local computer and upload it to the Certificate Authority (CA) for signature. Obtain the certificate in PEM format(cert.pem).

    Submit a certificate request to the CA using the contents of the CSR file, following the CA's enrollment process.

    • Cohesity cluster only supports X.509 certificates in PEM format only with Base64 encoded.

    • When you are getting the cert_req.csr certificate file signed to create the cert.pem file, ensure not to choose chain certificates.

    • If the certificate is in DER format, run the following command to convert it into PEM format:

      openssl x509 -in cert.cer -outform PEM -out cert.pem
    • If the server certificate is signed by an intermediate CA then the cert.pem file must have the server certificate first and then the intermediate certificate.

      Example

      -----BEGIN CERTIFICATE-----
      Server Certificate
      -----END CERTIFICATE-----
      -----BEGIN CERTIFICATE-----
      Intermediate CA Certificate
      -----END CERTIFICATE-----
  9. After you obtain the certificate (cert.pem), copy it to the Cohesity cluster so you can update the cluster with the new certificate. Copy the file to a node on the cluster using the scp command on Linux systems as follows:

    scp cert.pem support@<Node IP Address>:/var/tmp
    If you created the key pair on your enterprise certificate management tool, you must import both the files (signed certificate and key) on the Cohesity cluster. Copy the file to a node on the cluster using the scp command on Linux systems as follows:
    scp cert.pem key.pem support@<Node IP Address>:/var/tmp
  10. Make sure all users (owners, groups, others) have read permissions for the self-signed certificate (cert.pem) file:

    To check the current permissions settings, run the following command:

    ls -ltr <cert.pem>

    Run the following command to set the required permissions for all users:

    chmod 600 <cert.pem>
  11. Replace the Cohesity cluster’s current SSL certificate with the new certificate you created in the previous steps:

    1. Start the Cohesity CLI using the following command:

      support@restricted-test-cluster-005056ba314a-node-1 ~]\> iris_cli 

      When prompted, enter the Username and password you use to log into the Cohesity Cluster’s User Interface. Once the password is successfully authenticated, the Cohesity CLI console opens.

    2. Replace the certificate by running the following command:

      cluster update-ssl-certificate ssl-certificate=<absolute path of the cert.pem file> ssl-cert-private-key=<absolute path of the key.pem file>

      Example

      admin@127.0.0.1>cluster update-ssl-certificate ssl-certificate=/var/tmp/cert.pem ssl-cert-private-key=/var/tmp/key.pem
    3. Restart the UI and REST API Services using the following command:

      admin@198.51.100.12>cluster restart service-names=iris

      It is recommended to wait a minute before proceeding with the next command.

    4. Restart the I/O Operations service using the following command:

      admin@198.51.100.12>cluster restart service-names=bridge

Configuring Cohesity Cluster with a Cohesity CA Issued Certificate

Before you Begin

You need Host Shell Access for the Cohesity cluster to run the last four commands in this procedure. For details, see Using the Secure Shell.

  1. Get the IP address for any Cohesity Cluster node (You can get the list of IP addresses by selecting Settings > Summary and then opening the Nodes tab). Use the IP address to log into that node as the support user.

    Command

    ssh support@<node IP address>

    Example

    ssh support@111.1.1.1

    When prompted, enter the password of the support user account.

    [support@111.1.1.1's password:

    Once your password is successfully authenticated, the prompt changes to the Secure Shell prompt.

    [support@restricted-8888222f444 ~]\>

  2. Run the following command to start Cohesity CLI.

    Command

    $ iris_cli

    When prompted, enter the Username and password you use to log into the Cohesity Cluster’s User Interface. Once the password is successfully authenticated, the Cohesity CLI console opens.

    Example

  3. Run the following command to generate Cohesity CA certificate.

    Command

    cert-manager new-cert city="San Jose" country-code=US organization-unit=IT organization="Cohesity Inc" state=California san-list="fqdn ipaddresses comma separated" common-name="common-name" output-dir=/home/support/

    Certificate and Private Key will be written to following path:

    • /home/support/new-cert/privateKey.pem

    • /home/support/new-cert/certificate.pem

  4. Run the following command to replace the certificate:

    Command

    cluster update-ssl-certificate ssl-certificate=<absolute path of the cert.pem file> ssl-cert-private-key=<absolute path of the key.pem file

    Example

    admin@127.0.0.1>cluster update-ssl-certificate ssl-certificate=/home/support/new-cert/certificate.pem ssl-cert-private-key=/home/support/new-cert/privateKey.pem

  5. Run the following command to restart bridge and iris services:

    Command

    iris_cli cluster restart service-names=bridge,iris

Related Topic

Generate SSL Certificates with a Subject Alternate Name