WheelOfFish
1 Copper

Configuring a Custom SSL Certificate

I've searched through the community and have seen similar problems there wasn't a sure-fire solution. I am attempting to install a custom SSL cert in the Data Storage Manager Data Collector. So far, every attempt has resulted in failure with the Data collector telling me "Error Registering Certificate on Data Collector. Verify certificate and key are in a supported format.

I've tried the cert in DER, PEM and the private key in .p12 and .PFX. I don't know what else to try at this point. I've verified the alias is correct with portecle, I know the password is correct...has anyone successfully imported a cert?

This is all based on recent nessus scans identifying the self-signed cert.

0 Kudos
4 Replies
DELL-Bob Mi
3 Argentium

Re: Configuring a Custom SSL Certificate

I just sent you a private message so I can work with you on fixing this issue.

Bob

If my answer was helpful, please click: Kudos
Forum Member since 2012
#iwork4Dell
0 Kudos
nunciate1
1 Copper

Re: Configuring a Custom SSL Certificate

Did you ever get this fixed?  I am having the same problem.  I am not really sure what it is asking for on the Alias part either.  I have the certificate exported and I have a the password but not sure what I am doing wrong.

 

 

0 Kudos
Highlighted
hutcha4113
2 Iron

Re: Configuring a Custom SSL Certificate

I am also having issues with this. I have downloaded open SSL, and think I have the Private Key created properly. I have also created the CSR and generated a certificate from my Windows CA. However when I go to "Register" the certificate on Datacenter, I get a big red x (no error message).
0 Kudos
goe-blex
1 Copper

Re: Configuring a Custom SSL Certificate

Got the same Problem!!!!

# cat > <servername>.admin.int.txt <<-EOF
> [req]
> default_bits = 2048
> prompt = no
> default_md = sha256
> req_extensions = req_ext
> distinguished_name = dn
>
> [ dn ]
> C=DE
> ST=NDS
> L=<city>
> O=<companyname>
> OU=EDV
> emailAddress=<mailaddr>
> CN=<servername>.admin.int
>
> [ req_ext ]
> subjectAltName=@alt_names
>
> [ alt_names ]
> DNS.1=<servername>.admin.int
> IP.1 = <serverip>
> EOF

openssl req -new -sha256 -nodes -out <servername>.admin.int.csr -newkey rsa:2048 -keyout <servername>.admin.int.key

Singed this at the windows CA. And converted the key in pkcs#12.

openssl pkcs12 -export -out <servername>.admin.int.pfx -inkey <servername>.admin.int.key

Also getting only the big red box with the x and no message at all.

0 Kudos