Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations strongm on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Wildcard certificate not working for One X Mobile Preferred 3

Status
Not open for further replies.

atcom

IS-IT--Management
Aug 20, 2005
409
CA
My Comodo wildcard cert works for web control (7070 & 7071) and One X (9443), but my Android mobile client comes back with "Invalid Certificate". There's a solution on Avaya Support that mentions "Offer ID Certificate Chain" must be on, but it already was. This is Virt SE 10.0.0.1

-----------------------------------
4771494_orig.jpg

Calgary Telephone Systems, Avaya LG Asterisk (FreePBX) VOIP & TDM
 
easy answer - cough up for a fqdn cert
hard answer - fight with android :)
 
Maybe. But Avaya will tell you to bugger off if you start playing with your own httpd.conf and apache stuff and ask for help later. That's for "my webserver" not for "Avaya's blessed single configuration that doesn't take into account what you're trying to do".


Though, look it up in the knowledge base. There seems to be some new documentation relating to wildcard certs in release 10. You might not be left out in the cold on it, and might be able to call 'em out on a few things if it doesn't work they way it should. I always like busting their chops about stuff like this!
 
Is it a new certificate using SHA256?

I have a Comodo Wildcard cert, don't have an recent android phone available to test though.

"Trying is the first step to failure..." - Homer
 
Got it! Thanks for the input.

Had to download the SHA-2 intermediate #1, intermediate #2(domain), and root certs from Comodo here:
Then combine them into a single .crt file in linux:
cat comodo-int1.crt comodo-int2.crt comodo-root.crt /etc/ssl/certs/ca-bundle.crt > intermediates.crt

Then create the pk12 file:
openssl pkcs12 -export -in mydomain.com.crt -inkey mydomain.com.key -chain -CAfile intermediates.crt -out mydomain.com.pfx

And finally upload the .pfx file to the Server Edition:
Security Manager>Certificates>Set

Now I can browse to the https One-X address from a PC browser as well as an Android browser. And the mobility app doesn't spit out the certificate error either :)


Thanks to these two sites as well:


-----------------------------------
4771494_orig.jpg

Calgary Telephone Systems, Avaya LG Asterisk (FreePBX) VOIP & TDM
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top