Start a Conversation

Solved!

Go to Solution

3003

February 5th, 2021 13:00

OpenManage Server Administrator Managed Node (OMSA) Subject Alternative Name Missing

I open Server Administrator (9.5 - the latest version) in Chrome or Edge and get a warning that the certificate is invalid. I go to Preferences > General Settings > X.509 Certificate > Certificate Maintenance > Certificate Signing Request (CSR) and generate a CSR. I submit the CSR to the domain CA and receive a P7B file back. I load the P7B file via Preferences > General Settings > X.509 Certificate > Import a certificate chain. Then I reload Server Administrator in Chrome or Edge and get a certificate warning. Why? - Because the CSR did not include a Subject Alternative Name (SAN) attribute, and it is missing from the certificate. Both Chrome and Edge reject certificates that don't have a SAN attribute, and Firefox is planning to do the same in a future version. The SAN attribute has been required by Chrome since April 2017. Why is the version of OMSA released 5 years later not generating proper CSRs?

101 Posts

November 22nd, 2022 15:00

This is finally resolved in OMSA 10.3.0.0.  The CSR OMSA generates results in a certificate that contains the NETBIOS name (SERVER) and the FQDN (SERVER.domain.local) in the SAN attribute.

Moderator

 • 

3.1K Posts

February 7th, 2021 19:00

Hi,

 

Unfortunately, OMSA doesn't have the capability to support Subject Alternative Name (SAN) in the certificate. I'll create up a case for the engineer to pull the requests on it and have them review it. 

4 Operator

 • 

3K Posts

February 7th, 2021 22:00

@MK1024 , As @DELL-Joey C mentioned OMSA CSR does not support SAN field. Another option is to create keypair and certificate outside OMSA with SAN field and upload the certificate with key to OMSA using PKCS12 format file.

101 Posts

February 9th, 2021 11:00

Thanks for the suggestion.  That sounds like a ton of extra work. Updating OMSA to include the SAN attribute would probably be very easy.  I bet I could get it done in half a day if I were on that team.

101 Posts

August 16th, 2021 06:00

Not fixed in OMSA 10.1.0.0.  I can generate a self-signed certificate with a SAN, but the CSR still lacks the attribute.

101 Posts

August 16th, 2021 08:00

Do you have any tips on how to do this, or a link to an article that demonstrates?  I previously used certreq.exe to generate certs for UBNT equipment.  That's not working with OMSA.  It displays a generic "HTTP Status 403 - Forbidden" error when I try to import the cert.

Moderator

 • 

3.3K Posts

August 16th, 2021 10:00

Hello MK1024 ,

 

Since this is new feature in this release I will have to do some checking and let you know what I find.

 

Initially I would recommend make sure to clear browser cache and try other browsers.

 

Are you getting the correct format back?

x.509 Certificate Management page 35 : https://dell.to/3ARi6Kx

 Import certificate chain — Allows you to import the certificate chain (in PKCS#7 format) signed by a trusted CA

Moderator

 • 

3.3K Posts

August 16th, 2021 13:00

Hello MK1024 ,

 

I see the last line on the OMSA certificate signing request, has the Subject Alternative Name field (see image).

 

If it's missing it could be you did an in place upgrade which does not mess with the webserver attributes.

I don't know if it would be missing that specific setting, but it may.

Uninstall/reinstall or deleting the apache-tomcat folder and running a repair should fix that.

1 Attachment

101 Posts

November 4th, 2021 16:00

Not fixed in 10.2.0.0.

101 Posts

November 4th, 2021 16:00

Charles,

That option that you show creates a self-signed ceritifcate.  Self signed certificates will produce certificare warnings from all browsers.  The function that needs the SAN attribute added is "Certificate Signing Request (CSR).  The CSR can be submitted to an internal CA to get back a signed certificate that corporate browsers will accept.OMSA CSR.png

Moderator

 • 

3.1K Posts

November 4th, 2021 19:00

Hi @MK1024,

 

Since the begin of your post, the feature is still have not been included in the new version, I would suggest that you should contact support to have a request raised. It would speed up the process as it's coming from a customer. I have been told previously that we're unsure when will the feature to be included, but a support request is raise, engineering may want to help include it soonest possible.

101 Posts

November 5th, 2021 05:00

You're telling us that engineering is aware that the Generate CSR function is broken such that the resulting certificate fails in all modern browsers in use today, and they're not interested in fixing it because they learned about it from an employee instead of through a support request?

That's a bit dysfunctional.  I'm a software developer.  If I learn about a bug in bug code, I fix it regardless of where the bug report came from.

Moderator

 • 

8.4K Posts

November 5th, 2021 08:00

Hi MK1024,

 

I think what Joey meant is that our Social Media team already reported the issue, and our engineering team is looking into it. If you would private message Joey and I the svc tag we can submit it for you as well, which can help it forward.

 

Let me know.

 

 

101 Posts

November 10th, 2021 11:00

I did open a support case.  The response I got was "The OMSA development team has confirmed that the missing SAN info in the CSR is a bug and they’re currently working to resolve it."

Moderator

 • 

3.1K Posts

November 11th, 2021 18:00

Hi @MK1024,

 

Thanks for letting us know that a call has been made. Apologies for the delay response here, as I too was waiting for an update on my social ticket. With your call to support, an engineering ticket has been created and like you mentioned they are currently working on it. I have no visibility on the engineer's timeline but hopefully it has been resolve on the next update. 

 

Since you have a call support case, let's monitor it and keep in contact with the case owner for updates. 

No Events found!

Top