" /> Configuration server with TLS, certificate signed by an intermediate CA - Genesys CTI User Forum

Author Topic: Configuration server with TLS, certificate signed by an intermediate CA  (Read 2732 times)

Offline gawix

  • Newbie
  • *
  • Posts: 28
  • Karma: 1
Advertisement
Hi,

TLS is enabled on our configuration server ("upgrade mode", but this isn't relevant).  The server certificate is signed by an intermediate CA.  Our admin insists that we must include the intermediate CA certificate and root CA certificate to our trust store (our client application uses Java PSDK).  We told him that he should rather put the CA certificates (root and intermediate) on the server side but he says that he can only put one certificate and not a list (the whole chain). I cannot believe that, it doesn't make sense to ask all clients to add intermediate CA to their trust stores.  For a self-signed certificate, it obvious but for a certificate ultimately signed by a root CA, it just can't be the case.

Is there such limitation with Genesys TLS support?

Offline cavagnaro

  • Administrator
  • Hero Member
  • *****
  • Posts: 7641
  • Karma: 56330
Re: Configuration server with TLS, certificate signed by an intermediate CA
« Reply #1 on: February 14, 2013, 05:37:24 PM »
I'd say it is a Java issue, not a Genesys one...you have an option for example on all domain PCs to add a trusted CA via domain policies, but in Java you don't have such option, having to add each new trusted CA into its security file...one by one...so as this new CA is unknown to Java to must indicate that you trust him

Offline gawix

  • Newbie
  • *
  • Posts: 28
  • Karma: 1
Re: Configuration server with TLS, certificate signed by an intermediate CA
« Reply #2 on: February 14, 2013, 06:30:09 PM »
Any TLS server (WebServer, VPN, SSH, etc...) must provide 1) the server certificate and 2) the complete CA chain (all the CA certificates).  All those certificates are sent by the Server during the handshake.  Surely it is possible for Genesys servers to specify the CA chain somehow. The "trusted CA" field in "Network Security" section, maybe?