12-04-2014 02:44 PM - edited 03-17-2019 04:43 PM
As you might have heard, Certification Authorities announced that starting November 1, 2015, certificates for internal domain names will no longer be trusted: https://www.digicert.com/internal-names.htm . Starting with November 1, 2014, Certification Authorities stopped issuing SSL certs for internal domain names.
As you know, CWMS solution uses SAN (Subject Alternative Names) SSL Certs or Wildcard SSL Certs. When you generate Certificate Signing Request (CSR) on CWMS, hostnames of internal CWMS VMs, Admin page FQDN, and WebEx Site FQDN are included in this CSR. Hence, when you request SAN SSL Cert, Certification Authority needs to provide you an SSL cert for all the hostnames listed in CSR.
The problem occurs if you use internal domain names in the names of internal CWMS VMs (e.g. adminvm.domain.local, or mediavm.domain.internal, etc.). If you have such domain names configured, Certification Authorities won't issue you a publicly signed SSL cert.
At this time, to work around this issue you can do one of the following:
1. Change FQDNs of your Internal CWMS VMs to use public domain names (e.g. adminvm.domain.com, adminvm.domain.org, etc.) and configure your Internal DNS server to host a Public Domain Zone (e.g. domain.com, domain.org, etc.). - Note: make sure you configure DNS first before you make the change on CWMS.
2. Configure a Public DNS that is hosting your public domain to resolved your CWMS Internal VM hostnames to the appropriate IP addresses of those VMs (e.g. adminvm.domain.com => resolved to Admin VM IP), and configure your Internal DNS server that CWMS VMs are referencing to forward all requests for domain.com to the Public DNS. Even in this case, you will of course need to change FQDNs of your Internal CWMS VMs to use public domain names (e.g. adminvm.domain.com, adminvm.domain.org, etc.)
Here is a link to the official documentation about the FQDN change: http://www.cisco.com/c/en/us/td/docs/collaboration/CWMS/2_5/Administration_Guide/Administration_Guide/Administration_Guide_chapter_01110.html#task_69757B2D9BF5405FB95E144F4E6EA054
Here is my recommendation for the process to be on a safe side:
We do have an enhancement request opened (https://tools.cisco.com/bugsearch/bug/CSCum98717) to change the way CWMS handles SSL certs which should address this issue, but until that is implemented, the above workarounds are only possible solutions.
I hope this will help.
08-06-2015 11:00 AM
The enhancement https://tools.cisco.com/bugsearch/bug/CSCum98717 has been implemented in CMWS 2.5 MR5 version and later, as well as in CWMS 2.0 MR9 and later.
-Dejan
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide