Client with multiple JDSes around the world.
Their JSS is configured with a new Tomcat keystore, and a certificate issued by their Active Directory Certificate Authority. This is being used for client-to-JSS and web console connections.
However, the JSS-to-JDS traffic uses the Built-in CA from when the JSS was installed. And now the client wants to use WebSeal network appliances to shape and/or control the JDS replication traffic.
To inspect this traffic, the WebSeal needs the JSS Built-in CA, which we can download from the Management Settings->Global Management->PKI.
To actually shape this traffic, the WebSeal also needs the private key for this certificate. However, I have apparently stumped JAMF Support in figuring out where this private key may be stored (perhaps in the MySQL database somewhere? It's not in the Tomcat keystore, which was deleted/replaced with a new one when the AD CA was installed)?
Alternatively, is it possible to have JSS-to-JDS replication use the AD cert and private key? We have the certificate and know everything about the Tomcat keystore and could use Portecle to dump out the private key...