![]() The output from this program includes a section titled "CertificateĬhain".Use OpenSSL to test the server connection.Mozilla Firefox 3.5 or later: Select the lock icon to the left of the URL address > Connection Secure > More information > View Certificate.Microsoft Edge: Select the lock icon to the left of the URL address > Connection is secure > certificate icon.Internet Explorer 7.0 or later: Select the lock icon to the right of the URL address > View Certificates.Use your browser to view the certificate.Page, if using a "browser-friendly" certificate. Verify no browser warnings display when you access the web.or the ExtremeCloud IQ - Site Engine web page at Access the ExtremeControl Dashboard web page at.Restarts, use one of the following methods to verify the server is now using the proper ![]() When the new server certificate is installed and the server ![]() Restart the ExtremeCloud IQ - Site Engine server to deploy the new private key and server.Proceed with the certificate replacement.Ĭertificate updates on the ExtremeCloud IQ - Site Engine server. Confirm that the information you provided.Select Use a password to access the PKCS#12 keystore if the keystore file is protected with a password.Select Use a password to access the private key if the private key is encrypted in the key file or the keystore file.Use a PKCS#12 keystore file to provide the private key, or certificates, or both. Use a certificate file as the server certificate and any intermediate or chained certificates. Select in the box to browse for the file.Ī private key file must be encoded as a PKCS #8 file. Drag and drop a private key, certificate file, or a keystore file.Select the Update Server Certificate button.To replace the server private key and server certificate: For more information, see Update ClientĬertificate Trust Mode window and Update Server Certificate Trust Mode window. ![]() Server trust modes are configured to trust the new certificate. ExtremeCloud IQ - Site Engine clients and other serversĬertificates using the client certificate trust mode and server certificate trust mode settings.īefore updating the ExtremeCloud IQ - Site Engine server certificate, be sure that the client and Whenever the ExtremeCloud IQ - Site Engine server certificate is changed, other ExtremeCloud IQ - Site Engine componentsĬan be affected by the change and stop trusting the server. The following steps assume you generated a replacement server Openssl pkcs8 -topk8 -in -out server-pkcs8.key -nocrypt The server.key file can be copied and converted on either engine.) (OpenSSL is available on ExtremeCloud IQ - Site Engine and ExtremeControl engines. Use the following OpenSSL command where is the original non‑PKCS #8 formatted key file to convert your key file to a PKCS #8 format. ExtremeCloud IQ - Site Engine also accepts PKCS#12 keystore files, which can contain both a private key and certificates. Individual files, in a bundle file, or in the same file as the serverĬertificate. Use the intermediateĬertificates in whatever format the CA provides them: in If your certificate authority (CA) provides additional intermediateĬertificates, provide those as well. "browser-friendly" certificates, the server certificate should identify theĮxtremeCloud IQ - Site Engine server by its fully qualified host name. Generate the server certificate using the RSA or DSA server private key
0 Comments
Leave a Reply. |