I have an IP Office 500 V2 on 9.1.6 and the Application Server running vmpro and onexportal.
I have been down several roads trying to get a fully valid certificate installed across the solution. I have a wildcard certificate and the private key that I can manipulate into whatever format that I want and import, which I have done for several applications in our stack, but I can't get it working for the entire IP Office solution. Our certificate is from namecheap, I think like a RapidSSL, issued to *.example.com.
When I attempt to import the certificate into the Application Server, it uses that certificate to try to generate additional certificates, so I end up with a certificate chain that is invalid, that goes root CA -> *.example.com -> appserver.example.com, which the *example.com certificate isn't valid for signing additional certificates and still generates errors in browsers.
I have some linux knowledge and have managed to get parts of the IPO solution to present a valid certificate by manually replacing the certificate .cer and .pem files in the filesystem of the Avaya Applications, but this isn't ideal, isn't reliable, and isn't working for all components.
Does anyone know what I need to do to get this certificate mess sorted out solution wide? Do I need to buy a specific type of certificate? The biggest thing I want is to be able to use Avaya Communicator for Web without having to install certificates, I just want an already valid and trusted certificate in place solution wide.
If anyone knows of a way to use let's encrypt certificates in the IP Office components, that would even be better but that is a dream goal, not a necessity.
I have been down several roads trying to get a fully valid certificate installed across the solution. I have a wildcard certificate and the private key that I can manipulate into whatever format that I want and import, which I have done for several applications in our stack, but I can't get it working for the entire IP Office solution. Our certificate is from namecheap, I think like a RapidSSL, issued to *.example.com.
When I attempt to import the certificate into the Application Server, it uses that certificate to try to generate additional certificates, so I end up with a certificate chain that is invalid, that goes root CA -> *.example.com -> appserver.example.com, which the *example.com certificate isn't valid for signing additional certificates and still generates errors in browsers.
I have some linux knowledge and have managed to get parts of the IPO solution to present a valid certificate by manually replacing the certificate .cer and .pem files in the filesystem of the Avaya Applications, but this isn't ideal, isn't reliable, and isn't working for all components.
Does anyone know what I need to do to get this certificate mess sorted out solution wide? Do I need to buy a specific type of certificate? The biggest thing I want is to be able to use Avaya Communicator for Web without having to install certificates, I just want an already valid and trusted certificate in place solution wide.
If anyone knows of a way to use let's encrypt certificates in the IP Office components, that would even be better but that is a dream goal, not a necessity.