Product:
Cognos Analytics
Microsoft Windows 2019 server
Issue:
Does the cert expire in 2026 on old Cognos installations?
Solution:
Upgrade to later version of Cognos. The new version of Cognos Analytics and Planning Analytics have updated cert files as of IBM.
“IBM will provide updates SSL certificates as part of the next Planning Analytics Local 2.0.9 release. The best course of action is to configure your own SSL certificates for use with any version of TM1. You really do not need to wait until IBM provides updates certificates.”
If you have older version of TM1 client software and CA11 services, you may need to replace the certificates.

You can check the date of the cert in Cognos Analytics (CA11) with the IKEYMAN.EXE program, then open the camkeystore and check the date on your certificates as picture above show.
The case is that some certificates end date are updated, when you from inside Cognos Configuration do a save.
Open the Cognos Configuration (as administrator) right click the root element –> “Test” then “Save” (re-save) and restart the service. Besides updating the cryptographic keys, you can also see transparency checking the details during this process.
This document describes the process to renew and import updated certificates into Cognos Analytics, where Third-Party certificate authority has been enabled.
Objective
- The certificate authority allows you to resubmit your original Certificate Signing Request (CSR) to obtain a renewed certificate.
- The certificate authority requires that you present a new Certificate Signing Request (CSR) to obtain a renewed certificate.
Environment
Steps
- Stop Cognos Analytics
- Open Cognos Configuration
- Export the Configuration to plain text by clicking File –> Export As (recommended file name: decrypt.xml)
- Close Cognos Configuration
- Take a backup of the ‘configuration’ folder (recommended name: configuration-existingcerts)
- Open iKeyman (located in <COGNOS_HOME>\ibm-jre\jre\bin)
- Click Key Database File –> Open
- Navigate to <COGNOS_HOME>\configuration\certs
- Choose the CAMKeystore file and click Open
- Set the Key Database Type to PKCS12S2 and click OK
- Enter the keystore password (default is: NoPassWordSet) and click OK
- Click the current ‘encryption’ certificate, and click “Re-create Request”
- Provide a filename, and click OK
- Exit iKeyman
- Submit the generated CSR to your certificate authority for signing, and obtain your new certificate.
- Stop Cognos Analytics
- Ensure that the correct ‘configuration’ folder is in-place (if you used Step 2 of this process, ensure that the ‘configuration-csk’ folder is renamed to ‘configuration’
- Open iKeyman
- Open the <COGNOS_INSTALL>\configuration\certs\CAMKeystore file
- Click ‘Receive’
- Locate the newly received certificate, select, and click OK. You should receive a “Validation Successful” message
- Close iKeyman
- Open Cognos Configuration
- Save the configuration
- Start Cognos Analytics
More Information:
https://community.ibm.com/community/user/question/use-our-own-certificats
For planning analytics this are the files used for certificates;
\bin64\ssl\ibmtm1.arm is the default certificate and it does not expire until 2035. ibmtm1.arm has been in use for a few years now, and even in 2020, its expiration was 2035. The “applixca” files in that folder are just there for some historical/nostalgic reason in my opinion, but I’m always focused on the latest releases, so there is that.
Inside of the \bin64\ssl\ibmtm1.kdb keystore, ibmtm1.arm has already been imported as “ibmtm1_server” and has been set as the default personal certificate. The “keystore” is what the components of PA will use to access the stored certificates and ibmtm1.sth is an encrypted password that PA uses to have access into the ibmtm1.kdb keystore while it is running.
New file \bin64\config.tm1admsrv.json replaces the Cognos Configuration node that accepted TM1 Admin server settings. It defaults to using the \bin64\ssl\ibmtm1.kdb keystore and referring to the server certificate label ibmtm1_server that represents the imported ibmtm1.arm certificate IBM provided. A fresh install should be all set using ibmtm1.arm inside of ibmtm1.kdb.
You may have a \bin\tm1api.config or \bin64\tm1api.config where Architect and Perspectives have been installed on the users machines. This text file just refers to where Architect/Perspectives can find the keystore if it has been moved from \bin64\ssl\ibmtm1.kdb, if it is at a networked shared location, or it has been renamed. You likely don’t have this tm1api.config file if you never used custom certificates, but I mentioned it just in case. See link but ignore the stale top half. Most of the old Architect and Perspectives SSL Options are deprecated, so the top half is stale.
If you want to see the inside of the \bin64\ssl\ibmtm1.arm cert yourself, make a copy of it, and rename the copy to ibmtm1.crt. Then right-click on it and select “Open”…not “Install”. Microsoft will show you the date, etc. 2035.
Custom certificates for PA are not impossible, but not simple to implement.
NEW for 2.0.9.21/2.1.8/2.1.9 default \bin64\config.tm1admsrv.json file:
{
“tm1AdminNonSSLPortNumber”: 5495,
“tm1AdminSSLPortNumber”: 5498,
“tm1AdminHTTPPortNumber”: 5895,
“tm1AdminHTTPSPortNumber”: 5898,
“tm1AdminSupportNonSSLClients”: false,
“tm1AdminKeyFile”: “./ssl/ibmtm1.kdb”,
“tm1AdminKeyStashFile”: “./ssl/ibmtm1.sth”,
“tm1AdminKeyLabel”: “ibmtm1_server”,
“tm1AdminTLSCipherList”: [],
“tm1AdminFIPSOperationMode”: 2,
“tm1AdminSupportPreTLSv12Clients”: false,
“tm1AdminNIST_SP800_131A_MODE”: false,
“tm1AdminIPVersion”: “IPv4”,
“tm1AdminActivityInterval”: 10,
“tm1AdminInactivityTimeout”: 10,
“tm1AdminRESTAPIToken”: “”
}
From the online documentation:
- applixca.der
- The original default certificate in DER format used for Java™ certificate stores.
- applixca.pem
- The original root authority certificate.
- ibmtm1.arm
- The default certificate file.
- ibmtm1.crl
- The certificate revocation list.
- ibmtm1.kdb
- The key database file, which contains the server certificate and trusted certificate authorities.
- ibmtm1.rdb
- The requested key pair and the certificate request data.
- ibmtm1.sth
- The key store, which contains passwords to the key database file.
- tm1ca_v2.der
- The updated default certificate.
- tm1ca_v2.pem
- The updated default root authority certificate.
- tm1store
- The Java certificate store containing the public root authority certificate.
https://www.ibm.com/support/pages/how-renew-third-party-ca-certificates-cognos-analytics
https://community.ibm.com/community/user/discussion/what-happens-when-configurationscerts-expire
























