<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic OK I finally found a straight in Web Security</title>
    <link>https://community.cisco.com/t5/web-security/how-do-i-renew-an-expired-quot-issuing-ca-quot-cert-on-s170-wsa/m-p/3005085#M7101</link>
    <description>&lt;P&gt;OK I finally found a straight forward easy to follow HOW TO on this and I am working again. &amp;nbsp;I'm not sure why I had "Issuing CA" in between our Root CA and the website Cert, but now doing these steps It just simply shows our Root CA at the top and the website CA at the bottom in the certificate details in IE.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I followed the steps here to get a .cer and .key file to import into the WSA HTTPS proxy page.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/118339-technote-wsa-00.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;TABLE width="1212" style="width: 909.0pt; border-collapse: collapse;"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="border: solid #CCCCCC 1.0pt; background: silver; padding: 3.75pt 3.75pt 3.75pt 5.25pt;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'inherit',serif; border: none windowtext 1.0pt; padding: 0in; background: silver;"&gt;&amp;nbsp;Exporting the Certificate and private key from MS CA server&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="border: solid #CCCCCC 1.0pt; border-top: none; background: white; padding: 3.75pt 3.75pt 3.75pt 5.25pt;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'inherit',serif; border: none windowtext 1.0pt; padding: 0in;"&gt;1.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'inherit',serif;"&gt;&amp;nbsp;Go to&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Start'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Run'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;MMC&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;2.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Click on&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'File'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Add / Remove Snap-in'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;3.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Click the&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Add...'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;button&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;4.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Select&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Certificates'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;then click&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Add'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;5.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Select&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Computer Account'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Next'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Local Computer'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Finish'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;6.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;click&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Close'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'OK'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;The MMC is now loaded with the Certificates snap-in.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;&lt;BR /&gt; &lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;7.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Expand&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;Certificates&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt; and click on&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Personal'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Certificates'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;8.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Right click the appropriate CA cert and choose&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'All Tasks'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Export'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;The Certificate Export Wizard will launch&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;/SPAN&gt;&lt;/EM&gt;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;9.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Click&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Next'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt; Select&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Yes, Export the private key'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Next'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;10.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;Uncheck all&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;of the options here. PKCS 12 should be the only option available. Click&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Next'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;11.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Give the&amp;nbsp;private key a password of your choice&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;12.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Give&amp;nbsp;a filename to save as and click&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Next'&lt;/SPAN&gt;&lt;/STRONG&gt;, then&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Finish'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;You now have your CA signing certificate and root exported as a PKCS 12 (PFX) file.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="border: solid #CCCCCC 1.0pt; border-top: none; background: silver; padding: 3.75pt 3.75pt 3.75pt 5.25pt;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'inherit',serif; border: none windowtext 1.0pt; padding: 0in;"&gt;&amp;nbsp;&lt;SPAN style="background: silver;"&gt;Extracting the Public key (certificate)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="border: solid #CCCCCC 1.0pt; border-top: none; background: white; padding: 3.75pt 3.75pt 3.75pt 5.25pt;"&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'inherit',serif;"&gt;You will need access to a computer running OpenSSL. Copy your PFX file over to this computer and run the following command:&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;openssl pkcs12 -in &amp;lt;filename.pfx&amp;gt; -clcerts -nokeys -out certificate.cer&lt;BR /&gt; &lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt; This creates the public key file named "certificate.cer"&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P style="margin-bottom: 12.0pt; line-height: 15.0pt; vertical-align: baseline;"&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'inherit',serif; color: #525252; border: none windowtext 1.0pt; padding: 0in;"&gt;Note:&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'inherit',serif; color: #525252; border: none windowtext 1.0pt; padding: 0in;"&gt;&amp;nbsp;These instructions have been verified using OpenSSL on Linux. Some syntax may vary on the Win32 version.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;TABLE width="1212" style="width: 909.0pt; border-collapse: collapse;"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="border: solid #CCCCCC 1.0pt; background: silver; padding: 3.75pt 3.75pt 3.75pt 5.25pt;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'inherit',serif; border: none windowtext 1.0pt; padding: 0in;"&gt;&amp;nbsp;&lt;SPAN style="background: silver;"&gt;Extracting and decrypting the Private key&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="border: solid #CCCCCC 1.0pt; border-top: none; background: white; padding: 3.75pt 3.75pt 3.75pt 5.25pt;"&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'inherit',serif;"&gt;The WSA requires that the private key be unencrypted. Use the following OpenSSL commands:&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;openssl pkcs12 -in &amp;lt;filename.pfx&amp;gt; -nocerts -out privatekey-encrypted.key&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;BR /&gt; &lt;BR /&gt; You will be prompted for "&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;Enter Import Password&lt;/SPAN&gt;&lt;/STRONG&gt;". This is the password created in&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;step 11&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;above.&lt;BR /&gt; You will also be prompted for "&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;Enter PEM pass phrase&lt;/SPAN&gt;&lt;/STRONG&gt;". The is the encryption password (used below).&lt;BR /&gt; &lt;BR /&gt; This will create the encrypted private key file named "privatekey-encrypted.key"&lt;BR /&gt; &lt;BR /&gt; To create a decrypted version of this key, use the following command:&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;openssl rsa -in privatekey-encrypted.key -out private.key&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P style="line-height: 15.0pt; vertical-align: baseline;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'inherit',serif; color: #525252;"&gt;&lt;BR /&gt; The public and decrypted private keys can be installed on the WSA from&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Security Services'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'HTTPS Proxy'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 18 Jan 2017 21:59:53 GMT</pubDate>
    <dc:creator>keithsauer507</dc:creator>
    <dc:date>2017-01-18T21:59:53Z</dc:date>
    <item>
      <title>How do I renew an expired "Issuing CA" cert on S170 WSA for https decryption?</title>
      <link>https://community.cisco.com/t5/web-security/how-do-i-renew-an-expired-quot-issuing-ca-quot-cert-on-s170-wsa/m-p/3005082#M7098</link>
      <description>&lt;P style="margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;Certificates, the bane of an IT administrators existence. &amp;nbsp;There are many of them, they expire at different times and need to be renewed. &amp;nbsp;With as many as there are to manage usually you don't find out about an expired certificate until the moment it expires. Your on the hook to figure out how to renew it as quickly as possible. &amp;nbsp;Here is my problem.&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="outline: none; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; word-spacing: 0px; margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="outline: none; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; word-spacing: 0px; margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;We have an Internal Windows CA and our Kiosks use wccp redirection for HTTPS and when I look at the certificate structure of our website I see:&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="outline: none; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; word-spacing: 0px; margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;Domain Root CA (doesn't expire until 2019)&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="outline: none; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; word-spacing: 0px; margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;&amp;nbsp; &amp;nbsp;\ Issuing CA (Expired 1/15/2017)&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="outline: none; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; word-spacing: 0px; margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;\ Web site certificate (doesn't expire until 2018).&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="outline: none; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; word-spacing: 0px; margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="outline: none; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; word-spacing: 0px; margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;Since the nagging Internet Explorer engine renders the site in our kiosk software, users are relentlessly nagged about proceeding or not because that middle guy, "Issuing CA" is expired and not trusted.&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="outline: none; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; word-spacing: 0px; margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="outline: none; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; word-spacing: 0px; margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;I look in our WSA and I do see under HTTPS proxy settings the common name "Issuing CA" and expiration date "Jan 15 17:10:06 2017 GMT". &amp;nbsp;How do I renew this? &amp;nbsp;I forget how I even did this in the first place. &amp;nbsp;Why isn't there just a simple renew button on there? &amp;nbsp;Why are certificates so dang hard?&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="outline: none; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; word-spacing: 0px; margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="outline: none; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; word-spacing: 0px; margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;Please help!&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jan 2017 14:55:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/how-do-i-renew-an-expired-quot-issuing-ca-quot-cert-on-s170-wsa/m-p/3005082#M7098</guid>
      <dc:creator>keithsauer507</dc:creator>
      <dc:date>2017-01-16T14:55:05Z</dc:date>
    </item>
    <item>
      <title>You need to go to your</title>
      <link>https://community.cisco.com/t5/web-security/how-do-i-renew-an-expired-quot-issuing-ca-quot-cert-on-s170-wsa/m-p/3005083#M7099</link>
      <description>&lt;P&gt;You need to go to your intermediate ca, and renew it's "base" cert. &amp;nbsp;You may be able to just load the "Certificates" mmc and click on the cert and hit renew. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;And then export that cert and put it on your wsa...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you're digging in you probably ought to make sure you're using SHA2&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jan 2017 15:29:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/how-do-i-renew-an-expired-quot-issuing-ca-quot-cert-on-s170-wsa/m-p/3005083#M7099</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2017-01-16T15:29:50Z</dc:date>
    </item>
    <item>
      <title>We don't have an intermediate</title>
      <link>https://community.cisco.com/t5/web-security/how-do-i-renew-an-expired-quot-issuing-ca-quot-cert-on-s170-wsa/m-p/3005084#M7100</link>
      <description>&lt;P&gt;We don't have an intermediate CA, unless the WSA S170 is acting as it, and if it is there is no mmc or way to renew it there. &amp;nbsp;I can download the cert but it is a pem file that ends up opening in notepad++. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Our hierarchy is we have a Windows 2008 R2 server that is our internal certification authority. &amp;nbsp;Our root cert on here does not expire until 2019. &amp;nbsp;I could try to import this "Issuing CA" pem file to my local workstation if I can get it converted to a format that the local certificates can read, and then see if I can right click and renew it.... &amp;nbsp;But in the WSA there is an option to upload certificate and key as two separate files. &amp;nbsp;I can't just upload our root cert because there is no key for that and the system balks at trying to upload it when I have no key file chosen.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Why can't they just have a renew button in the WSA S170 web ui? &amp;nbsp;Windows dominates the business market, why can't they create a workflow for using Windows based CA's on your domain right there in the UI? &amp;nbsp;I'm on 9.1.2 010 so maybe there is an update in the future.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For now there will have to be no https filtering. &amp;nbsp;Firewall command entered..&lt;/P&gt;
&lt;P&gt;no access-list proxylist-https extended permit tcp object-group KIOSK any eq https&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jan 2017 16:42:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/how-do-i-renew-an-expired-quot-issuing-ca-quot-cert-on-s170-wsa/m-p/3005084#M7100</guid>
      <dc:creator>keithsauer507</dc:creator>
      <dc:date>2017-01-16T16:42:14Z</dc:date>
    </item>
    <item>
      <title>OK I finally found a straight</title>
      <link>https://community.cisco.com/t5/web-security/how-do-i-renew-an-expired-quot-issuing-ca-quot-cert-on-s170-wsa/m-p/3005085#M7101</link>
      <description>&lt;P&gt;OK I finally found a straight forward easy to follow HOW TO on this and I am working again. &amp;nbsp;I'm not sure why I had "Issuing CA" in between our Root CA and the website Cert, but now doing these steps It just simply shows our Root CA at the top and the website CA at the bottom in the certificate details in IE.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I followed the steps here to get a .cer and .key file to import into the WSA HTTPS proxy page.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/118339-technote-wsa-00.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;TABLE width="1212" style="width: 909.0pt; border-collapse: collapse;"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="border: solid #CCCCCC 1.0pt; background: silver; padding: 3.75pt 3.75pt 3.75pt 5.25pt;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'inherit',serif; border: none windowtext 1.0pt; padding: 0in; background: silver;"&gt;&amp;nbsp;Exporting the Certificate and private key from MS CA server&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="border: solid #CCCCCC 1.0pt; border-top: none; background: white; padding: 3.75pt 3.75pt 3.75pt 5.25pt;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'inherit',serif; border: none windowtext 1.0pt; padding: 0in;"&gt;1.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'inherit',serif;"&gt;&amp;nbsp;Go to&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Start'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Run'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;MMC&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;2.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Click on&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'File'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Add / Remove Snap-in'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;3.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Click the&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Add...'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;button&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;4.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Select&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Certificates'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;then click&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Add'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;5.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Select&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Computer Account'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Next'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Local Computer'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Finish'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;6.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;click&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Close'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'OK'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;The MMC is now loaded with the Certificates snap-in.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;&lt;BR /&gt; &lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;7.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Expand&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;Certificates&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt; and click on&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Personal'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Certificates'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;8.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Right click the appropriate CA cert and choose&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'All Tasks'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Export'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;The Certificate Export Wizard will launch&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;/SPAN&gt;&lt;/EM&gt;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;9.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Click&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Next'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt; Select&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Yes, Export the private key'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Next'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;10.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;Uncheck all&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;of the options here. PKCS 12 should be the only option available. Click&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Next'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;11.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Give the&amp;nbsp;private key a password of your choice&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;12.&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;Give&amp;nbsp;a filename to save as and click&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Next'&lt;/SPAN&gt;&lt;/STRONG&gt;, then&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Finish'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;You now have your CA signing certificate and root exported as a PKCS 12 (PFX) file.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="border: solid #CCCCCC 1.0pt; border-top: none; background: silver; padding: 3.75pt 3.75pt 3.75pt 5.25pt;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'inherit',serif; border: none windowtext 1.0pt; padding: 0in;"&gt;&amp;nbsp;&lt;SPAN style="background: silver;"&gt;Extracting the Public key (certificate)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="border: solid #CCCCCC 1.0pt; border-top: none; background: white; padding: 3.75pt 3.75pt 3.75pt 5.25pt;"&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'inherit',serif;"&gt;You will need access to a computer running OpenSSL. Copy your PFX file over to this computer and run the following command:&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;openssl pkcs12 -in &amp;lt;filename.pfx&amp;gt; -clcerts -nokeys -out certificate.cer&lt;BR /&gt; &lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt; This creates the public key file named "certificate.cer"&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P style="margin-bottom: 12.0pt; line-height: 15.0pt; vertical-align: baseline;"&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'inherit',serif; color: #525252; border: none windowtext 1.0pt; padding: 0in;"&gt;Note:&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'inherit',serif; color: #525252; border: none windowtext 1.0pt; padding: 0in;"&gt;&amp;nbsp;These instructions have been verified using OpenSSL on Linux. Some syntax may vary on the Win32 version.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;TABLE width="1212" style="width: 909.0pt; border-collapse: collapse;"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="border: solid #CCCCCC 1.0pt; background: silver; padding: 3.75pt 3.75pt 3.75pt 5.25pt;"&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'inherit',serif; border: none windowtext 1.0pt; padding: 0in;"&gt;&amp;nbsp;&lt;SPAN style="background: silver;"&gt;Extracting and decrypting the Private key&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="border: solid #CCCCCC 1.0pt; border-top: none; background: white; padding: 3.75pt 3.75pt 3.75pt 5.25pt;"&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12.0pt; font-family: 'inherit',serif;"&gt;The WSA requires that the private key be unencrypted. Use the following OpenSSL commands:&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;openssl pkcs12 -in &amp;lt;filename.pfx&amp;gt; -nocerts -out privatekey-encrypted.key&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;BR /&gt; &lt;BR /&gt; You will be prompted for "&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;Enter Import Password&lt;/SPAN&gt;&lt;/STRONG&gt;". This is the password created in&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;step 11&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;above.&lt;BR /&gt; You will also be prompted for "&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;Enter PEM pass phrase&lt;/SPAN&gt;&lt;/STRONG&gt;". The is the encryption password (used below).&lt;BR /&gt; &lt;BR /&gt; This will create the encrypted private key file named "privatekey-encrypted.key"&lt;BR /&gt; &lt;BR /&gt; To create a decrypted version of this key, use the following command:&lt;BR /&gt; &lt;BR /&gt; &lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;openssl rsa -in privatekey-encrypted.key -out private.key&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P style="line-height: 15.0pt; vertical-align: baseline;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'inherit',serif; color: #525252;"&gt;&lt;BR /&gt; The public and decrypted private keys can be installed on the WSA from&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'Security Services'&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="border: none windowtext 1.0pt; padding: 0in;"&gt;'HTTPS Proxy'&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 21:59:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/how-do-i-renew-an-expired-quot-issuing-ca-quot-cert-on-s170-wsa/m-p/3005085#M7101</guid>
      <dc:creator>keithsauer507</dc:creator>
      <dc:date>2017-01-18T21:59:53Z</dc:date>
    </item>
    <item>
      <title>You had an issuing CA there</title>
      <link>https://community.cisco.com/t5/web-security/how-do-i-renew-an-expired-quot-issuing-ca-quot-cert-on-s170-wsa/m-p/3005086#M7102</link>
      <description>&lt;P&gt;You had an issuing CA there because its "best-practice" to NOT use your root for this. You may not have ever actually built one, just issued a cert for one, and called it done.&lt;/P&gt;
&lt;P&gt;Typically you build the root, issue the issuing CAs their certs and then shut the root down so it can't be compromised.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Glad you're up and going...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 22:06:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/how-do-i-renew-an-expired-quot-issuing-ca-quot-cert-on-s170-wsa/m-p/3005086#M7102</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2017-01-18T22:06:21Z</dc:date>
    </item>
  </channel>
</rss>

