During installation we package in our own root CA plus internal Agent and IDP certificates. Some of our long-term customers may see this warning when updating the DualShield Framework
This is because the RSA key used in the installation of their original older version of DualShield Authentication Server would have been 1024 bit, which was acceptable at the time.
It is now recommended to update this key to 2048 Bits. There are quite a few steps to this process. All the instructions in this guide should be followed precisely.
Upgrade DualShield
Upgrade to DualShield 7.3.0 or later version, 7.3.4 is recommended.
Step 5: Restart the DualShield Server Service again.
Step 6: After restarted the dualshield service, log back in to the Admin console and go to Administration>Tasks. Check to see if the task has been executed succesfully.
Step 7: Go to Authentication>Agents and view any internal agent, such as Single Sign-On, Admin Console or Service Console
Step 8: Select Client Certificate and then click on Read More at the bottom of the window.
Step 9: Check the date of issue to ensure the certificate has updated succesfully.
Step 10: Go back to Administration>Tasks and delete the Renew all agent certificate task.
Method 2
If you do not plan to use the client agent certificate any more (for example, you have enabled OAuth2.0 authentication), you can just run the Update SSO IDP Certificate task to only update the IDP certificates.
SAML Integrations
IMPORTANT IF YOU HAVE A SAML INTEGRATION!
After completion of the above steps, you MUST provide the third party Service Provider with the updated IDP Metadata/Certficate.
Go to SSO> SSO Servers, click on the corresponding ellipsis and select the files you need to download from the menu..