Configuration Example, Security

Windows CA template – web server and private key export

René Jorissen on May 23, 2011 1 Comment • Tags: #ca #duplicate #export #grayed #key #out #private #server #template #web #windows

Creating a web server certificate request is very easy when using a Windows CA server. There is one disadvantage. The requested certificate is directly stored in the user store (by default) or the local computer store, if specified during the request. The disadvantage is that you cannot export the requested certificate including the private keys. … Read More

Configuration Example, Security

Import PKCS12 certificate on IOS router

René Jorissen on February 11, 2010 7 Comments • Tags: #ca #certificate #crypto #import #ios #passphrase #pkcs12 #pki #router #tftp #trustpoint

Nowadays IOS routers can be configured with WebVPN (Clientless SSL VPN) functionalities. WebVPN allows a user to securely access resources on the corporate LAN from anywhere with an SSL-enabled Web browser. To secure the connection you should use a SSL certificate to encrypt all transferred data. There are different ways of creating and importing SSL … Read More

Configuration Example

Microsoft CA certificate validity period

René Jorissen on June 15, 2009 0 Comments • Tags: #ca #certificate #client #microsoft #period #registry #validity

Using a Microsoft CA is very common in network to issue self-signed certificates. Last week I had to configure a Windows IIS server with client certificate authorization. Remote people (non Active Directory users) need a client certificate to browse to a specific website. The communication between the remote user and the website is secure by … Read More

Configuration Example, Proxy, Security

Change password through LDAPS on ISA server

René Jorissen on August 6, 2008 0 Comments • Tags: #2006 #authority #ca #fqdn #isa #key #ldaps #private #proxy #reverse #set #user

Today I received the question about allowing users to changes his/her password through webmail, whereby webmail is published via an ISA server 2006 reverse proxy. This is possible, but it requires the configuration of LDAPS to authenticate users. I started by configuring a Certificate Authority (CA) on a member server in the domain. During the … Read More