04-17-2016 10:36 PM - edited 03-17-2019 06:02 PM
I have a Cisco Expressway 8.7, i did the integration successfully, everything works as expected except for the certificates.
I went over the Guide: "Cisco Expressway Certificate Creation and Use" and i signed the CSR of Expressway E using GoDaddy CA.
no meter what convension of signing i used, i am still getting an untrusted certificate message while i am trying to connect the expressway threw Jabber on android.
attached is the respons i am getting from the server.
Is there a chance that Jabber doesnt trust Go Daddy Secure Certificate Authority - G2 ?
04-17-2016 11:02 PM
This is the same as any other Jabber client, if the certificate IS NOT in the trust store of the device, you'll be prompted to accept it, or not.
The question would be, did you distributed that certificate to your device, BEFORE trying to use MRA??
If the answer is no, then what you're seeing, is the expected behavior.
If yes, then you might need to look into Android and why it's not using it.
05-15-2016 02:24 AM
The Android device has in it's Trusted Cardentials folder many kinds of Public Roout CAs.
one of the is the The Go Daddy Group, Inc.
the Jabber client doesnt need to have the Express E certificate in order to trust it, the Jabber needs to have the Express E Root CA in its trusted certificates store, exactlly like Jabber that works internaly when it register to IMP, CUCM and CUC, the hosted PC doesnt have all the certificatess from all servers installed.
if they are coming from the same Domain and all the UC servers have been signed by the local CA the PC will trust the servers.
05-15-2016 07:21 AM
No, you are wrong in all of that.
Both for on-prem, and MRA, you NEED to deploy the certificates.
Cisco Jabber validates server certificates when authenticating to services. When attempting to establish secure connections, the services present Cisco Jabber with certificates. Cisco Jabber validates the presented certificate against what is in the client device's local certificate store. If the certificate is not in the certificate store, the certificate is deemed untrusted and Cisco Jabber prompts the user to accept or decline the certificate.
If the user accepts the certificate, Cisco Jabber connects to the service and saves the certificate in the certificate store or keychain of the device . If the user declines the certificate, Cisco Jabber does not connect to the service and the certificate is not saved to the certificate store or keychain of the device.
If the certificate is in the local certificate store of the device, Cisco Jabber trusts the certificate. Cisco Jabber connects to the service without prompting the user to accept or decline the certificate.
05-18-2016 01:35 PM
No, you don't need to deploy the server certificate to the devices. In this case a public well known CA is being used and therefore the problem is with the endpoint or the certificate itself. It's not that deployment has not been completed.
From your reference links -
"If you use a well-known public CA, then the CA certificate may already exist on the client certificate store or keychain. If so, you need not deploy CA certificates to the clients."
shacharalon7 is correct in his statement that he should not have to deploy certificates for the Expressway edge functionality to work correctly.
shacharalon7 You'll want to check that the certificate is actually valid. I see that it is missing details....
EDIT: I went back and looked and you're missing the services domain in the SAN - add only 'netafin.com' as a SAN entry and you should be good to go.
11-02-2016 06:38 AM
Thanks for your replay, can you please elaborate on where do i need to add the "services domain".
Should it be in the CSR from the Expressway E ?
11-02-2016 08:11 AM
I have the same issue guys,
04-19-2016 10:39 PM
Does it work for your Win or iOS client?
05-15-2016 06:01 AM
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: