<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Yep the entire chain is there in Collaboration Applications</title>
    <link>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495747#M18995</link>
    <description>&lt;P&gt;Yep the entire chain is there and looking all the way through all are ok&lt;/P&gt;</description>
    <pubDate>Fri, 11 Jul 2014 18:38:21 GMT</pubDate>
    <dc:creator>jamieparr</dc:creator>
    <dc:date>2014-07-11T18:38:21Z</dc:date>
    <item>
      <title>Jabber certificates</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495745#M18993</link>
      <description>&lt;P&gt;Hi all, Looking for some help regarding a Jabber issue we are having. Currently have a UC 9 environment running and Jabber is fully operational; once you accept the certificates on the device. Our issue is that we are using publicly trusted certificates, with the entire chain loaded on the all the servers and in the PC's. As I understand it a public certificate should not need accepting, the Cisco documentation states "&lt;STRONG style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;Note&lt;/STRONG&gt;&lt;SPAN style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;: In the case of a Public CA, the root certificate should already be in the client trust store."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I have checked everything is in place, the certificate chain is correct within the Windows PC's, the trusted root certificate is in the store as well as the intermediary. When I view the certificate from my Windows Jabber client it says the certificate is ok, but still asks me to accept? Is this the default behaviour? I can't see any way around it. Adding more complexity, from my web browser I do not have to accept the certificate, the site is coming through as trusted! Which makes me think this is a Jabber specific issue and not my certificates&lt;/P&gt;&lt;P&gt;On a side note, when we try to login via Jabber for iphone we are not even getting prompted to accept a certificate. We are just being told the certificate is not trusted. Any input on this would be appreciated&lt;/P&gt;&lt;P&gt;CUCM version&amp;nbsp;9.1.2.11900-12&lt;/P&gt;&lt;P&gt;IM&amp;amp;P version&amp;nbsp;9.1.1.41900-1&lt;/P&gt;&lt;P&gt;Thanks, Jamie&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Mar 2019 23:19:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495745#M18993</guid>
      <dc:creator>jamieparr</dc:creator>
      <dc:date>2019-03-17T23:19:40Z</dc:date>
    </item>
    <item>
      <title>If you open the cert you need</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495746#M18994</link>
      <description>&lt;P&gt;If you open the cert you need to accept, does it look OK? does it find the root cert in your PC?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 18:20:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495746#M18994</guid>
      <dc:creator>Jaime Valencia</dc:creator>
      <dc:date>2014-07-11T18:20:28Z</dc:date>
    </item>
    <item>
      <title>Yep the entire chain is there</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495747#M18995</link>
      <description>&lt;P&gt;Yep the entire chain is there and looking all the way through all are ok&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 18:38:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495747#M18995</guid>
      <dc:creator>jamieparr</dc:creator>
      <dc:date>2014-07-11T18:38:21Z</dc:date>
    </item>
    <item>
      <title>Hi Jamie,Did you confirm that</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495748#M18996</link>
      <description>&lt;P&gt;Hi Jamie,&lt;/P&gt;&lt;P&gt;Did you confirm that the name on the certificate(s) matches the name(s) configured for those services&amp;nbsp;on the CUP (Jabber) server? If you go to the Jabber main window and navigate to Help &amp;gt; Show Connection Status, you'll see the name or IP address of each service listed in the "Address" field. The string in this field must match the string in the certificates, otherwise they will not be trusted by the client. You can either update the service addresses on the CUP server to match the existing certificates, or you can request from your CA to get an alias (subject alternative name)&amp;nbsp;added to the certificates that matches the names used on the CUP server.&lt;/P&gt;&lt;P&gt;For example, if your domain is domain.com, and your CM server name is CMSERVER, your CM tomcat certificate may only have "CMSERVER" as the name. Then, if your CUP server is configured to use "CMSERVER.domain.com" for phone control services, that doesn't&amp;nbsp;match the name on the certificate and now&amp;nbsp;Jabber will throw the error on logon.&lt;/P&gt;&lt;P&gt;Fyi: You can view the name on the cert by hitting the server from a web browser (since these are tomcat certs we're talking about) and then viewing the certificate via the browser when it prompts you to accept it. I hope this helps, best of luck.&lt;/P&gt;&lt;P&gt;-Cal&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 20:51:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495748#M18996</guid>
      <dc:creator>Cal Haasl</dc:creator>
      <dc:date>2014-07-11T20:51:39Z</dc:date>
    </item>
    <item>
      <title>Hi CalAll the services are</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495749#M18997</link>
      <description>&lt;P&gt;Hi Cal&lt;/P&gt;&lt;P&gt;All the services are configured to point to the FQDN, we have used the FQDN throughout the entire implementation. All certificates are signed to the FQDN&lt;/P&gt;&lt;P&gt;I don't understand why Jabber refuses to see the certificate as valid when a browser will show everything as OK...&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jul 2014 09:18:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495749#M18997</guid>
      <dc:creator>jamieparr</dc:creator>
      <dc:date>2014-07-14T09:18:23Z</dc:date>
    </item>
    <item>
      <title>Who is your public CA?</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495750#M18998</link>
      <description>&lt;P&gt;Who is your public CA?&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jul 2014 14:18:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495750#M18998</guid>
      <dc:creator>Cal Haasl</dc:creator>
      <dc:date>2014-07-14T14:18:55Z</dc:date>
    </item>
    <item>
      <title>We are using Terena SSL</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495751#M18999</link>
      <description>&lt;P&gt;We are using Terena SSL certificates. These should be ok?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2014 08:10:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495751#M18999</guid>
      <dc:creator>jamieparr</dc:creator>
      <dc:date>2014-07-15T08:10:58Z</dc:date>
    </item>
    <item>
      <title>Well, I do not believe Terena</title>
      <link>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495752#M19000</link>
      <description>&lt;P&gt;Well, I do not believe Terena is a trusted root CA by Windows natively, so I would treat this as an internal CA and follow the reccommendations for that configuration. Do not assume the CA will be trusted by the client as would be the case for say, GoDaddy or VeriSign or Entrust, for example.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jul 2014 15:38:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/collaboration-applications/jabber-certificates/m-p/2495752#M19000</guid>
      <dc:creator>Cal Haasl</dc:creator>
      <dc:date>2014-07-15T15:38:26Z</dc:date>
    </item>
  </channel>
</rss>

