Jump to content

Recommended Posts

Posted

I would like to install SSL for HTTPS on MDM Server,

I have already crate PFX File, and put it on connector (server.xml)

But my hhtps MDM is still "Not Secure"

What should I do???

Anyway, I have already successfully install SSL on ESMC.

Posted

+1

I can find information for ERA 6.5 but it's says don't use this process for ESMC 7

John

  • ESET Staff
Posted

To have "secure" as in trusted by browser, You need to purchase 3rd party certificate from common internet certification authority.

One of such certificate authorities is let's encrypt who provide certificates for free.

ESMC creates self-signed certificates which are not trusted unless their root CA is imported into device certificate store.

@Command IT What You probably mean was certificate chain installation which was required till 6.5 due to TLS layer we used. In 7.0+ we use different TLS layer on windows (openssl) and PKCS#12 is newly required to contain entire certificate chain including root CA - system certificate store is not used anymore.

Posted (edited)

Thanks Mirek. I have a certificate from GoDaddy, but if I configure in the MDM policy it says it's not a valid chain.  Is that because GoDaddy certificates require an Intermediate certificate?

John 

Edited by Command IT
Posted (edited)

Hi,

 

You should create a full chain certificate which contains SSL cert, intermediate, root and private key.

 

- Download XCA and install it.

- Download OpenSSL and install it.

1.) Create a empty file (C:\temp\cert-chain.txt) on your PC and past the following inside it:

-----BEGIN CERTIFICATE-----
(Your Primary SSL certificate from C:\temp\your_domain_name.crt)
-----END CERTIFICATE----- 
-----BEGIN CERTIFICATE-----
(Your Intermediate certificate from C:\temp\TheIntermediateCA.crt)
-----END CERTIFICATE----- 
-----BEGIN CERTIFICATE-----
(Your Root certificate part from C:\temp\TheTrustedRoot.crt)
-----END CERTIFICATE-----

2.) Now replace the content inside the brackets with your certificates (which you can export via XCA; PEM txt format). The order above is VERY important so do not mix it!

2.) Export the private key (unencrypted in text format) with XCA from your certificate and store it inside  C:\temp\server.pemkey

3.) Now merge everything together as pkcs12 (filename extension for PKCS #12 files is .p12 or .pfx). To do that open a CMD (run as admin) and perform:

cd C:\OpenSSL-Win32

openssl pkcs12 -export -inkey C:\temp\server.pemkey -in C:\temp\cert-chain.txt -password pass:ABCD -out C:\temp\certificate(chain_and_key).pfx

4.) Your PFX file is now ready to be used.

Edited by Perry
  • ESET Staff
Posted

Hello,

As @Perry noted 3rd party certification authorities typically provide pem or pkcs#12 web certificate which does not contain root CA as that is not required for common webservers - this certificate is typically preinstalled on devices so that chain of trust can be established. MDM does a "bit more" than typical webserver - during enrollment we also install root CA to enrolled device to establish trust (we can't guess whether certificate is selfsigned or signed by CA already trusted by device) so we have extra requirement.

I'll look into improving documentation wrt to 3rd party certificates as openssl command line how to convert between formats and appending root CA to existing certificates should help some users.

HTH

  • 4 weeks later...
Posted

Thanks all,

But Basically my problem is not on PFX file. I have already successfully install on my ESMC.

But, I dunno how to install it on MDM Server. (I use linux)

 

Thanks,

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...