<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NCS import web management certificate in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854621#M34213</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Justin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created a certificate through a windows client. The hostname of NCS is not the name of the certificate because of a DNS alias. Wil give the keytool method a try. I hit the correct answer button accidentally. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 22 Feb 2012 09:00:27 GMT</pubDate>
    <dc:creator>Thomasvdk</dc:creator>
    <dc:date>2012-02-22T09:00:27Z</dc:date>
    <item>
      <title>NCS import web management certificate</title>
      <link>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854617#M34209</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have some trouble uploading a certificate in NCS.&lt;/P&gt;&lt;P&gt;When I upload the certificate it says:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;XX-XX-NCS01/admin# &lt;STRONG&gt;ncs key importsignedcert wlan_xx_xxxx_nl.pem repository ncs-tftp-repo &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;INFO: no staging url defined, using local space.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rval:2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;The WCS server is running&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Changes will take affect on the next server restart&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Importing signed certificate for key&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Error importing key java.security.cert.CertificateParsingException: invalid DER-encoded certificate data&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ERROR: ncs key importsignedcert command failed. rval:256&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif;"&gt;The PEM is made with openSSL, the source is a pfx. Command used:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: 'courier new', courier; "&gt;pkcs12 −in wlan_xx_xxx_nl.pfx −out&amp;nbsp; wlan_xx_xxxx_nl.pem −passin pass:xxxx −passout pass:xxxx&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; "&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also tried to upload key and certificate seperately but no succes:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;XX-XX-NCS01/admin# &lt;STRONG&gt;ncs key importkey wlan_xx_xxxx_nl_key.pem &lt;STRONG style="font-family: 'courier new', courier;"&gt;wlan_xx_xxxx_nl&lt;/STRONG&gt;_cert.pem repository ncs-tftp-repo &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;INFO: no staging url defined, using local space.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rval:2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;INFO: no staging url defined, using local space.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rval:2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;The WCS server is running&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Changes will take affect on the next server restart&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Importing RSA key and matching certificate&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Error importing key java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: Invalid RSA private key&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ERROR: ncs key importkey command failed.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rval:256&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif;"&gt;It looks like the certificate encoded the wrong way but I can't think of another way.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif;"&gt;Anyone any suggestions or experience with this?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Thanks!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Thomas&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 04:37:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854617#M34209</guid>
      <dc:creator>Thomasvdk</dc:creator>
      <dc:date>2021-07-04T04:37:06Z</dc:date>
    </item>
    <item>
      <title>NCS import web management certificate</title>
      <link>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854618#M34210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've seen and heard of weird issues with different versions of OpenSSL. I use v0.9.8 and have had consistenly good results with this version. Which version are you using?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Justin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2012 08:20:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854618#M34210</guid>
      <dc:creator>Justin Kurynny</dc:creator>
      <dc:date>2012-02-22T08:20:27Z</dc:date>
    </item>
    <item>
      <title>NCS import web management certificate</title>
      <link>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854619#M34211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I also use OpenSSL 0.9.8. I used this OpenSSL version to create certificates for the WLC Web Auth portal and had no issues. Any other suggestions?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2012 08:42:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854619#M34211</guid>
      <dc:creator>Thomasvdk</dc:creator>
      <dc:date>2012-02-22T08:42:07Z</dc:date>
    </item>
    <item>
      <title>NCS import web management certificate</title>
      <link>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854620#M34212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you try the keytool method as outlined in the NCS config guide appendix for server hardening (and substitute openssl for keytool), or are you following another outlined procedure somewhere?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Justin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2012 08:52:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854620#M34212</guid>
      <dc:creator>Justin Kurynny</dc:creator>
      <dc:date>2012-02-22T08:52:04Z</dc:date>
    </item>
    <item>
      <title>NCS import web management certificate</title>
      <link>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854621#M34213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Justin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created a certificate through a windows client. The hostname of NCS is not the name of the certificate because of a DNS alias. Wil give the keytool method a try. I hit the correct answer button accidentally. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2012 09:00:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854621#M34213</guid>
      <dc:creator>Thomasvdk</dc:creator>
      <dc:date>2012-02-22T09:00:27Z</dc:date>
    </item>
    <item>
      <title>NCS import web management certificate</title>
      <link>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854622#M34214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Justin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The keytool method doesn't make much sense to me. I can't translate this method to my own environment. It doesn't say in which format the certificate must be when I upload it to NCS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The certificate I want to upload is one of my own domain (so its not a public one). The trusted CA is already uploaded to NCS with command: "ncs key importcacert". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The procedure I was following is:&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://www.cisco.com/en/US/products/ps6305/products_configuration_example09186a00808a94ca.shtml"&gt;http://www.cisco.com/en/US/products/ps6305/products_configuration_example09186a00808a94ca.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The certificate I have is a .pfx which I converted to a .pem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or should I convert the .pfx to a .p7b&amp;nbsp;&amp;nbsp; and then the .p7b to a pem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2012 09:35:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854622#M34214</guid>
      <dc:creator>Thomasvdk</dc:creator>
      <dc:date>2012-02-22T09:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: NCS import web management certificate</title>
      <link>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854623#M34215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The procedure you linked is for WCS.  You will need to follow the NCS procedure, which is different.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/en/US/docs/wireless/ncs/1.0/configuration/guide/hard.html#wp1042818&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You generate your CSR from the NCS command line, submit it to your CA, and then your CA needs to issue the cert in a pkcs7 (p7b) format.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Import that signed p7b cert into NCS via CLI per the instructions an that's all you should need to do. As long as your CA root cert is trusted on your client, you should be able to hit NCS management without a warning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Finally, it looks like the keytool method is only required when you need to put a cert on your client, which I don't gather from your post you need to do, so you can probably ignore the keytool section altogether.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Justin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2012 10:25:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854623#M34215</guid>
      <dc:creator>Justin Kurynny</dc:creator>
      <dc:date>2012-02-22T10:25:05Z</dc:date>
    </item>
    <item>
      <title>NCS import web management certificate</title>
      <link>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854624#M34216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Justin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the response so far.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I import the p7b certificate I get the following error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;XX-XX-NCS01/admin# ncs key importsignedcert wlan_xx_xxxx_nl.p7b repository ncs-ftp-repo&lt;/P&gt;&lt;P&gt;INFO: no staging url defined, using local space.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rval:2&lt;/P&gt;&lt;P&gt;The WCS server is running&lt;/P&gt;&lt;P&gt;Changes will take affect on the next server restart&lt;/P&gt;&lt;P&gt;Importing signed certificate for key&lt;/P&gt;&lt;P&gt;Error importing key java.security.KeyStoreException: New certificate does not match key for tomcat&lt;/P&gt;&lt;P&gt;ERROR: ncs key importsignedcert command failed. rval:256&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Feb 2012 10:25:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854624#M34216</guid>
      <dc:creator>Thomasvdk</dc:creator>
      <dc:date>2012-02-24T10:25:13Z</dc:date>
    </item>
    <item>
      <title>Re: NCS import web management certificate</title>
      <link>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854625#M34217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using NCS to generate the CSR?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;# &lt;STRONG&gt;ncs key genkey -csr &lt;/STRONG&gt;&lt;CSRFILENAME&gt;&lt;STRONG&gt; repository &lt;/STRONG&gt;&lt;REPOSITORYNAME&gt;&lt;/REPOSITORYNAME&gt;&lt;/CSRFILENAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Justin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Feb 2012 17:52:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854625#M34217</guid>
      <dc:creator>Justin Kurynny</dc:creator>
      <dc:date>2012-02-24T17:52:11Z</dc:date>
    </item>
    <item>
      <title>NCS import web management certificate</title>
      <link>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854626#M34218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to give you an update: I have this built in my lab and I have been running into a host of issues with this procedure as documented. It has taken a TAC case and special file access so far, but the short version of the story is that the certificate request process is [natively] broken in NCS, even on version 1.1.0.58, and requires a root patch to get it working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have finally gotten the CSR generated and off the box. My next step, as soon as I get a chance in the next couple of days, is to submit the CSR to the CA and then import the issued cert into NCS. Hopefully that will go a little more smoothly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope to post an update soon.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Justin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Feb 2012 03:00:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854626#M34218</guid>
      <dc:creator>Justin Kurynny</dc:creator>
      <dc:date>2012-02-28T03:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: NCS import web management certificate</title>
      <link>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854627#M34219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Justin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have it working, use the following steps:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Add root CA certificate of your domain in NCS with: ncs key importcacert xxxxca.cer&lt;/LI&gt;&lt;LI&gt;Generate a CSR on NCS with: ncs key genkey -csr csrnamexxx repository ncs-ftp-repo&lt;/LI&gt;&lt;LI&gt;CSR is used for a offline request to the domain CA, a subject alternate name (SAN) is used for the use of another DNS name then the NCS domain name. The SA is added with help of Microsoft Technet article “How to add a Subject Alternative Name to a secure LDAP certificate” &lt;A href="http://support.microsoft.com/kb/931351"&gt;http://support.microsoft.com/kb/931351&lt;/A&gt;&amp;nbsp;&amp;nbsp; DNS name of NCS is xx-dc-nsc01.xx.xxxx.nl, the SAN is wlan.xx.xxxx.nl (DNS records are already updated)&lt;/LI&gt;&lt;LI&gt;Upload the created certificate to NCS with: ncs key importsignedcert xx-dc-ncs01.cer repository ncs-ftp-repo&lt;/LI&gt;&lt;LI&gt;There is no need to import a private key&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;When I go to &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://wlan.xx.xxxx.nl"&gt;https://wlan.xx.xxxx.nl&lt;/A&gt;&lt;SPAN&gt; I see the inlog screen of NCS with no certificate error (client system has to be in the same domain)&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Feb 2012 10:53:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854627#M34219</guid>
      <dc:creator>Thomasvdk</dc:creator>
      <dc:date>2012-02-28T10:53:43Z</dc:date>
    </item>
    <item>
      <title>Re: NCS import web management certificate</title>
      <link>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854628#M34220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thomas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some users (such as me) will run into bug CSCty04253, which exists in 1.0.58 but is fixed in 1.1.1 (not available from CCO as of this post). There is a workaround for it. From the bug ID:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;STRONG style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11px; text-align: -webkit-auto; background-color: #ffffff;"&gt;Symptom:&lt;/STRONG&gt;&lt;P&gt;&lt;BR style="line-height: 11px; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11px; text-align: -webkit-auto; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 11px; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11px; text-align: -webkit-auto; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;Trying to generate CSR fails with error 256&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 11px; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11px; text-align: -webkit-auto; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;STRONG style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11px; text-align: -webkit-auto; background-color: #ffffff;"&gt;&lt;STRONG&gt;Conditions&lt;/STRONG&gt;:&lt;/STRONG&gt;&lt;P&gt;&lt;BR style="line-height: 11px; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11px; text-align: -webkit-auto; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 11px; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11px; text-align: -webkit-auto; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;Using NCS 1.1.0.58 to try to generate a CSR fails with error 256&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 11px; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11px; text-align: -webkit-auto; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;STRONG style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11px; text-align: -webkit-auto; background-color: #ffffff;"&gt;Workaround:&lt;/STRONG&gt;&lt;P&gt;&lt;BR style="line-height: 11px; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11px; text-align: -webkit-auto; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 11px; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11px; text-align: -webkit-auto; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;1. install root enable package on NCS&lt;/P&gt;&lt;P&gt;2. Login as 'root' user into NCS via SSH&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 11px; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11px; text-align: -webkit-auto; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;3. a) For signed certificate from CA:&lt;/P&gt;&lt;P&gt;i. Execute the below command ' /opt/CSCOncs/bin/keyadmin.sh -newdn -csr genkey &amp;lt; /localdisk/ftp/filename.csr&amp;gt;'&lt;/P&gt;&lt;P&gt;ii. Download the &amp;lt; filename.csr&amp;gt; CSR file from NCS to get it signed from the CA&lt;/P&gt;&lt;P&gt;iii. After receiving CA certificate, signed certificates/key, please use 'ncs key importXXX' cli to install on NCS.&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 11px; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11px; text-align: -webkit-auto; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;b) For newly generated self signed certificate:&lt;/P&gt;&lt;P&gt;If user wants to use newly generate self-signed certificate in NCS, please execute the below command alone in NCS root enable prompt:&lt;/P&gt;&lt;P&gt;' /opt/CSCOncs/bin/keyadmin.sh -newdn genkey '&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 11px; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 11px; text-align: -webkit-auto; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;4. After installing the certificates, please do 'ncs stop/start' once to make the changes into effect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that the "root enable package" identified in Step 1 must be requested from TAC. When the ticket is opened, ID this bug and they'll likely send you the root package with install instructions on first response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The workaround also states that in order to run the keyadmin.sh command, you should log into NCS as root via SSH. In my testing, SSH access was blocked on the root account, even after resetting the account password. I also ran into other issues with these instructions. After some exhaustive clicking and typing, here's what I came up with as modified steps to achieve the above workaround:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Log into the NCS as &lt;STRONG&gt;admin&lt;/STRONG&gt; on the console:&lt;UL&gt;&lt;LI&gt;If you have NCS on a physical appliance, use the physical console port&lt;/LI&gt;&lt;LI&gt;If you have NCS on a virtual appliance, use the VMWare console window to the guest machine&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="line-height: 0px;"&gt;Note: ﻿If you try the following steps logged in through SSH instead of console, expect one or more of them to fail&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="line-height: 0px;"&gt;﻿Install the root enable package per TAC instructions&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="line-height: 0px;"&gt;Again, make sure you are logged in as &lt;STRONG&gt;admin&lt;/STRONG&gt; via the console, then:&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="line-height: 0px;"&gt;Execute the &lt;STRONG&gt;root_enable&lt;/STRONG&gt; command to enable root access and set the root password&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="line-height: 0px;"&gt;Execute the &lt;STRONG&gt;root&lt;/STRONG&gt; command. This will prompt for root login and invoke a shell to &lt;STRONG&gt;ADE#&lt;/STRONG&gt;. You will have full system access (now you're in Linux; all the NCS CLI commands don't work here)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="line-height: 0px;"&gt;Execute the key generation steps as outlined above in Step 3(a)i or 3(b).&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="line-height: 0px;"&gt;Type &lt;STRONG&gt;exit&lt;/STRONG&gt; to leave the ADE# shell. You should now be back at the &lt;STRONG&gt;admin/#&lt;/STRONG&gt; shell and your familiar NCS CLI commands are available again.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="line-height: 0px;"&gt;Execute dir disk:/ftp. You should see your CSR file&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="line-height: 0px;"&gt;If you see it, proceed to Steps 3(a)ii and 3(a)iii to get your CSR signed by the CA and then your cert imported into NCS&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="line-height: 0px;"&gt;Proceed to Step 4 to stop and restart NCS services&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Justin&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 0px;"&gt;﻿&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Feb 2012 02:41:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854628#M34220</guid>
      <dc:creator>Justin Kurynny</dc:creator>
      <dc:date>2012-02-29T02:41:24Z</dc:date>
    </item>
    <item>
      <title>Re: NCS import web management certificate</title>
      <link>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854629#M34221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to update this, as I run now also into: &lt;/P&gt;&lt;P&gt;Error importing key java.security.KeyStoreException: New certificate does not match key for tomcat&lt;/P&gt;&lt;P&gt;I had a CPI 1.2.1.x where I successfully installed a company signed certificate. That worked fine and the browser showed it as valid. I did had an issue, Chrome 24 didn't anymore load the site after logging in. It did work in Firefox though, so it might be a Chrome issue. I can load the website in Chrome if I connect to the IP address of the server. &lt;/P&gt;&lt;P&gt;Some days ago I updated to 1.3 and this reverted or replaced my certificate. It's now again a selfsigned certificate?!?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I tried to install again my old certificate, but this time I receive the above error.&lt;/P&gt;&lt;P&gt;cpi1/admin# ncs key importsignedcert cpi1.domain.com.pem repository defaultRepo &lt;/P&gt;&lt;P&gt;INFO: no staging url defined, using local space.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rval:2&lt;/P&gt;&lt;P&gt;truststore used is /opt/CSCOlumos/conf/truststore&lt;/P&gt;&lt;P&gt;The NCS server is running&lt;/P&gt;&lt;P&gt;Changes will take affect on the next server restart&lt;/P&gt;&lt;P&gt;Importing signed certificate for key&lt;/P&gt;&lt;P&gt;Error importing key java.security.KeyStoreException: New certificate does not match key for tomcat&lt;/P&gt;&lt;P&gt;cpi1/admin# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas, or is it broken again in 1.3?&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Feb 2013 15:30:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854629#M34221</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2013-02-22T15:30:36Z</dc:date>
    </item>
    <item>
      <title>The Prime 2.0 server</title>
      <link>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854630#M34222</link>
      <description>&lt;P&gt;The Prime 2.0 server hardening guide (http://www.cisco.com/c/en/us/td/docs/net_mgmt/prime/infrastructure/2-0/administrator/guide/PIAdminBook/config_server_settings.html) does not specify what format the signed certificate should be imported as.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It appears to be PKCS#7 (Base 64)...which for me was provided as a *.crt (not *.cer) file. This worked on Prime 2.1.0.0.87.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Trying to import a standard X509 (Base 64) signed cert failed with the dreaded "Error importing key java.security.KeyStoreException: New certificate does not match key for tomcat".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also you can skip FTP and just SCP from admin mode on the controllers from whatever system you have (it's Linux underneath).&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2014 00:30:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ncs-import-web-management-certificate/m-p/1854630#M34222</guid>
      <dc:creator>Kitri Waterman</dc:creator>
      <dc:date>2014-12-04T00:30:41Z</dc:date>
    </item>
  </channel>
</rss>

