EasyManua.ls Logo

Avaya Aura - Signing Identity Certificates for Avaya Aura; Web Gateway Using Third-Party CA Certificates

Avaya Aura
162 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Procedure
1. Create an OpenSSL configuration file.
For example:
[ req ]
req_extensions = v3_req
distinguished_name = req_distinguished_name
[req_distinguished_name]
[ v3_req ]
basicConstraints = CA:FALSE
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
subjectAltName = @alt_names
[alt_names]
DNS.1 = dnsserver10927.company.com
DNS.2 = dnsserver10938.company.com
DNS.3 = dnsserver10955.company.com
The alt_names section defines the Subject Alternative Names list and must contain
FQDNs of all nodes in the cluster.
2. Run the following command:
openssl req -out <CSR_request_file>.csr -newkey rsa:2048 -nodes –keyout
<CSR_key_file>.key -config <configuration_file>
In this command:
<CSR_request_file>.csr specifies a CSR file name.
<CSR_key_file>.key specifies a file containing a private key that is used to add the
signed certificate to the system.
<configuration_file> specifies the OpenSSL configuration file that was created in
the previous step.
For example:
openssl req -out createCSR.csr -newkey rsa:2048 -nodes –keyout keyCSR.key -config
configCSR.config
Signing identity certificates for Avaya Aura
®
Web Gateway
using third-party CA certificates
About this task
You can use the following procedure to sign identity certificates for Avaya Aura
®
Web Gateway
using third-party CA certificates.
Note:
In the following procedure, the third-party CA certificate can be a public CA or an internal
private CA.
Certificate configuration using the configuration utility
October 2018 Deploying the Avaya Aura
®
Web Gateway 152
Comments on this document? infodev@avaya.com

Table of Contents

Related product manuals