This document describes certificate authentication on the Video Communication Server (VCS). A certificate identifies the VCS and contains names by which it is known and to which traffic is routed. If the VCS is known by multiple names for these purposes, such as if it is part of a cluster, this must be represented in the X.509 subject data. The certificate must contain the Fully Qualified Domain Name (FQDN) of both the VCS itself and of the cluster. If a certificate is shared across cluster peers, it must list all possible peer FQDNs.
A VCS needs certificates for:
It uses its list of trusted Certificate Authority (CA) certificates and associated Certificate Revocation Lists (CRLs) in order to validate other devices that connect to it.
There are no specific requirements for this document.
The information in this document is based on these software and hardware versions:
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.
VCS Release 8.1.1 supports the Collab Edge Mobile Remote Access (MRA) feature and requires a TLS connection between VCS-Control and VCS-Expressway.
In order to set up TLS, you need to upload necessary certificates on the VCS. You can complete this with these three methods:
The TLS connection between VCS-Control and VCS-Expressway requires these two attributes:
This document concentrates on the Enterprise CA method as OpenSSL is already discussed in the VCS Certificate Deployment Guide.
When you install the CA, the web server certificate comes by default. However, this template cannot be used to generate the certificate for the TLS connection between VCS-Control and VCS-Expressway. If you try to upload the certificate to VCS, which is generated with just the web server attribute, you receive this error.
In order to verify this, select Maintenance > Server Certificate. Click Decode Certificate. Check the section "Extended Key Usage".
As stated earlier, for the TLS connection you need a client and web server attribute. Since there is not a default template, you can create one. Complete these steps in order to generate the new template with both the TLS Client Authentication and TLS Web Server Authentication attributes:
Use this section to confirm that your configuration works properly.
Complete these steps:
This section provides information you can use in order to troubleshoot your configuration.
If the template is not available for web enrollment, determine if the user that accesses certsrv has the necessary permissions.
As stated previously, the Windows 2008 template will not be available for web enrollment. For more details, see 2008 Web Enrollment and Version 3 Templates.
Revision | Publish Date | Comments |
---|---|---|
1.0 |
04-Nov-2014 |
Initial Release |