Server certificate requirements
All server certificates must have certain properties and be in the correct file format to function in the suite.
Certificate Subject Name
A crucial step in the process of configuring enterprise HTTPS is to ensure that the certificates have the correct Certificate Subject Name that matches the system configuration in the Enterprise Manager, as described in the table. Failure to comply with these naming conventions results in the client receiving a certificate address mismatch error.
The certificate subject name is specified in the Subject Alternative Name (SAN) field. During the TLS handshake, the target name is checked against the SAN field.
|
Communication |
Certificate used for TLS handshake |
Match this setting with the Certificate Subject Name |
|---|---|---|
|
Browser ➞ LB |
LB |
Application server's alias name (external address of LB) |
|
LB ➞ Application Server |
Application Server
(If data center SSL offload is enabled, communication between the LB and the application server is HTTP). |
Application server's server name |
|
Browser ➞ Server |
Target Server |
Target server's alias name |
|
Server ➞ Server |
Target Server |
Target server's server and alias name |
Certificate Properties
Prepare the certificates container file according to the requirements.
|
Server Certificate element |
Description |
|---|---|
|
File Name and Format |
File name must be svr_cert_key.p12 File format must be PKCS12 When using a certificate chain, you must include all CA certificates in the chain in the P12 file. The system does not support a P12 password with certain special characters such as &, ^, %, @. If a customer provided a P12 file with a password containing one of the unsupported characters, the customer is required to recreate a temporary P12 file with an alternative password. The temporary file can be deleted once the TLS server certificates are installed. |
|
Issuer |
All server certificates must be signed by one of the following:
NOTE: For the system to function, TLS certificates cannot be self-signed. A valid CA must sign each certificate. |
|
Private key |
The key used by the server to decrypt data transmitted to it over the network, and to encrypt responses back to clients. |
|
Public key |
The key used by the client encrypt requests sent to the server, and to decrypt server responses. The public key cryptography must be either ECC or RSA. |
|
Signature hash |
SHA2 algorithm is supported. NOTE: SHA1 is supported, but the SHA1 signature hash is no longer secure and may expose servers to spoofing or man-in-the-middle attacks. Therefore, SHA1 certificates may be blocked by modern browsers and 3rd party updates. |
|
Enhanced Key Usage |
This field in the certificate must contain “Server Authentication”. |
|
Certificate expiration date |
The date that the certificate expires. NOTE: It is the customer's responsibility to make sure certificates are kept up to date. |
|
Certificate revocation list (CRL) |
The CRL enumerates revoked certificates along with the reason(s) for revocation. It is the customer’s responsibility to keep the CRL up-to-date. Note: CRL distribution point must be accessible from all system servers and desktops. In case it is not accessible (for example, in case of a public CA and no internet connection), CRL check must be disabled as described in the Technology, Security, & Network Integration Deployment Reference Guide (DRG). |
Common Name (https://tools.ietf.org/html/rfc5280)