Next steps
Generate a new CSR with a subject alternate name of the IP
Address (or hostname or wildcard) that is defined in User Check. We recommend
to sign the webserver certificate with the same Microsoft root CA we used to
sign the HTTPS inspection cert. Because now both certs are signed be the same
root CA and the root CA has already been imported into the certificate store
BCBSMA will not have to push out another certificate.
To complete this following the following steps:
1.
Backup and edit the file $CPDIR/conf/openssl.cnf
on the machine.
cp $CPDIR/conf/openssl.cnf
$CPDIR/conf/openssl.cnf.orig
2.
In the [ req ] section, uncomment the line:
Change: #req_extensions = v3_req
To: req_extensions = v3_req
3.
In the [ v3_req ] section, add the following
line:
subjectAltName=DNS:<FQDN>,DNS:*.<FQDN>
Example:
subjectAltName=DNS:sslvpn.example.com,DNS:*.sslvpn.example.com
Save the file, run csr_gen and
create the CSR. When asked for CommonName (CN), enter
"*.sslvpn.example.com".
[Expert@GW]# cpopenssl req -new
-out <CERT.CSR> -keyout <KEYFILE.KEY> -config
$CPDIR/conf/openssl.cnf
Notes:
i.
This command generates a private key.
ii.
Enter a password and confirm.
iii.
Fill in the required data:
o The
Common Name field is mandatory. This field must have the Fully Qualified Domain
Name (FQDN). This is the site that users access. For example: portal.example.com.
o All
other fields are optional.
To verify that the CSR was
generated properly, run: cpopenssl req -in requestFile.csr -text
4.
After generating the CSR, use the backup to
restore the openssl.cnf file to its previous state.
cp $CPDIR/conf/openssl.cnf. orig
$CPDIR/conf/openssl.cnf
5.
Submit the CSR file to your 3rd-party CA vendor
in order to receive the signed server certificate.
Note: There is not a standard
submission procedure. Some CAs have a Web form for submitting the CSR file.
Others have a Web form with individual certificate fields. Those cannot be used
with the above procedure since our gateway generates a CSR file. Some CAs
receive the CSR file by email.
6.
Open Security Gateway properties.
Go to UserCheck
In the Certificate section, click
on "Import" button, or "Replace" button - import the new
certificate.
Click on 'OK' to save the changes.
Install the policy on the Security
Gateway.