mattKnight
Programmer
Morning,
AES 8.0.1 patch 2
I'm struggling with adding a 3rd part signed certifcate to an AES server.
CSR was generated from a different server as I need (strongly prefer) a SAN entry in certificates and there is no way to generate a CSR from the GUI with a SAN. I'm also required to include an email address in the DN / subject.
CSR is signed by an intermediate certificate. I have both this intermediate and the root CA available
I've tested the signed certificate P12 file on a "spare" web-server and, ignoring the obvious hostname mis-matches, it works well.
When I try to apply this certificate to the relevant AES server I receive an "Invalid Certificate Chain" error.
1) I've added and confirmed that the intermediate root and the root CA are in the Trusted Certificates store on the AES
2) I've done a stare and compare of the new certificate and other certficates in use on other AES servers. The differences are
[ul]
[li]Working certs do not have an intermediate root. IOW are signed directly by the root CA[/li]
[li]Working certs only have a simple DN of CN=FQDN. Non working has a full DN (CN, OOU,O,L,st,c,EMAILADDRESS) applied[/li]
[li]Working certs do not have a SAN. Non working has a SAN (DNS:FQDN,DNS:hostname,IP:ipaddr)
[/ul]
Because the error message is "Invalid Certificate Chain" I'm guessing that the AES is struggling with teh use of an intermediate certificate, but I can find no documents that define the requirements (or restrictions) for an AES certificate.
Anybody have any ideas on how to fix this or am I stuck with having to use a certificate signed directly by the CA (which is for many reasons a poor solution)?
Take Care
Matt
I have always wished that my computer would be as easy to use as my telephone.
My wish has come true. I no longer know how to use my telephone.
AES 8.0.1 patch 2
I'm struggling with adding a 3rd part signed certifcate to an AES server.
CSR was generated from a different server as I need (strongly prefer) a SAN entry in certificates and there is no way to generate a CSR from the GUI with a SAN. I'm also required to include an email address in the DN / subject.
CSR is signed by an intermediate certificate. I have both this intermediate and the root CA available
I've tested the signed certificate P12 file on a "spare" web-server and, ignoring the obvious hostname mis-matches, it works well.
When I try to apply this certificate to the relevant AES server I receive an "Invalid Certificate Chain" error.
1) I've added and confirmed that the intermediate root and the root CA are in the Trusted Certificates store on the AES
2) I've done a stare and compare of the new certificate and other certficates in use on other AES servers. The differences are
[ul]
[li]Working certs do not have an intermediate root. IOW are signed directly by the root CA[/li]
[li]Working certs only have a simple DN of CN=FQDN. Non working has a full DN (CN, OOU,O,L,st,c,EMAILADDRESS) applied[/li]
[li]Working certs do not have a SAN. Non working has a SAN (DNS:FQDN,DNS:hostname,IP:ipaddr)
[/ul]
Because the error message is "Invalid Certificate Chain" I'm guessing that the AES is struggling with teh use of an intermediate certificate, but I can find no documents that define the requirements (or restrictions) for an AES certificate.
Anybody have any ideas on how to fix this or am I stuck with having to use a certificate signed directly by the CA (which is for many reasons a poor solution)?
Take Care
Matt
I have always wished that my computer would be as easy to use as my telephone.
My wish has come true. I no longer know how to use my telephone.