01-21-2014 01:28 PM - edited 03-17-2019 03:53 PM
Hi,
I am helping a colleague of mine address a certificate question he is facing from the security department around their concerns on generating a certificate requested to be signed, The client is currently running on version 1.5.1.223a.
The concern the customer has is that they do not want any of their internal names/servers to be part of the SAN fields for the public facing cert...for example:
meet.example.com is the name of the public facing cert that clients use to connect externally for meetings, after looking at the default certificate it seems as if the entire deployment SANs are part of this certificate. I wanted to know when I have a certificate signed for this node and choose to use a certificate for only "meet.example.com" that I should be covered and I am not going to break the administration connection to this node.
Thanks,
Tarik Admani
*Please rate helpful posts*
Solved! Go to Solution.
01-26-2014 07:17 AM
Hi Tarik,
As you might know, CWMS support the use of either Wildcard or SAN certificates. Wildcard certs are more commonly used if the domain of the internal and external components is the same (e.g. *.cisco.com). If that is not the case, and you use different domains for public facing components and for internally facing components, you have to use the SAN certificate.
Since all the components are managed by Admin VM and all the administration is done on Admin VM, only a single cert is being used and is distributed by Admin VM to all other components. Hence, the use of SAN certificates. By design, SAN certificate includes all Subject Alternative Names (and in CWMS that is the list of FQDNs of all the components in the solution).
With that in mind, it is not possible to hide FQDN of the internal components included in the SAN certificate.
Here is a little bit more info about Wildcard and SAN certificates and their usage:
Wildcard Certificates
Wildcard certificates are widely used to secure multiple subdomains under a single unique fully qualified domain names. The benefit with this certificate is that that it not only makes it simple to manage the certificate, but it also helps you in lowering your administrative costs. It provides immediate protection to your current and future subdomains.
SAN Certificates
A SAN certificate is used to protect multiple domain names with a single certificate. They are different than wildcard certificates in a way that they can support an unlimited number of subdomains as long as the domain names are the same. SAN certificates only support the fully qualified domain names which are entered in the certificate. SAN certificates are impressive because they can support more than 100 different fully qualified domain names in a single certificate; this however, depends upon the issuing certificate authority.
I hope this information will be helpful to you.
Thank you.
-Dejan
01-22-2014 02:10 PM
Tarik - if you move your query to conferencing section, you will get more feedback on this. CWMS is generally discussed there and Dejan, Arun, Derek are Cisco guys along with others who are very quick to respond generally.
-Terry
Sent from Cisco Technical Support iPhone App
01-22-2014 03:19 PM
Thanks Terry, I will get it moved.
Thanks
Tarik Admani
*Please rate helpful posts*
01-26-2014 06:59 AM
I wanted to know if anyone has run into this issue before. I do not think each of the boxes need the hostname of each other.
Sent from Cisco Technical Support Android App
01-26-2014 07:17 AM
Hi Tarik,
As you might know, CWMS support the use of either Wildcard or SAN certificates. Wildcard certs are more commonly used if the domain of the internal and external components is the same (e.g. *.cisco.com). If that is not the case, and you use different domains for public facing components and for internally facing components, you have to use the SAN certificate.
Since all the components are managed by Admin VM and all the administration is done on Admin VM, only a single cert is being used and is distributed by Admin VM to all other components. Hence, the use of SAN certificates. By design, SAN certificate includes all Subject Alternative Names (and in CWMS that is the list of FQDNs of all the components in the solution).
With that in mind, it is not possible to hide FQDN of the internal components included in the SAN certificate.
Here is a little bit more info about Wildcard and SAN certificates and their usage:
Wildcard Certificates
Wildcard certificates are widely used to secure multiple subdomains under a single unique fully qualified domain names. The benefit with this certificate is that that it not only makes it simple to manage the certificate, but it also helps you in lowering your administrative costs. It provides immediate protection to your current and future subdomains.
SAN Certificates
A SAN certificate is used to protect multiple domain names with a single certificate. They are different than wildcard certificates in a way that they can support an unlimited number of subdomains as long as the domain names are the same. SAN certificates only support the fully qualified domain names which are entered in the certificate. SAN certificates are impressive because they can support more than 100 different fully qualified domain names in a single certificate; this however, depends upon the issuing certificate authority.
I hope this information will be helpful to you.
Thank you.
-Dejan
03-31-2014 04:22 AM
Hello Dejan
My customer is using a SPLIT HORIZON install of CWMS 2.0. Given that the internal and external domain are the same .example.com and the Admin URL and internal meeting url are shared "wmsadmin.example.com" and "meeting.example.com" would the "Wildcard Certificate" be the best choice?
http://www.cisco.com/c/en/us/td/docs/collaboration/CWMS/2_0/Administration_Guide/Administration_Guide_chapter_01101.html#concept_71CACA22EBB84FE58867C71B177AD752
The URL above talks about the process.
When I do this process and select Wildcard. I presume all i need to enter is *.example.com and generate the CERT Request. Then I get the Cert from a CA preferably one from a public CA that is already included on the trust lists for all devices such as Microsoft OS, Apple IOS, Android etc...
Given that the cert is for *.example.com this would cover requests internally and externally for url's wmsadmin.example.com and meeting.example.com
Are my assumputions correct?
03-31-2014 05:35 AM
Hi Ryan,
Keep in mind that all the CWMS VM hostnames as well as WebEx Site and Admin Site URLs must belong to the same domain (e.g example.com) in order to use wildcard cert. If that condition is satisfied, then you should be good.
As for which one is better, I don't know what the price difference is between SAN and Wildcard certs. If you are going to use this wildcard cert for some other components in your network, then it might be a good choice for you.
I hope this helps.
-Dejan
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide