Agreed that if you are going to have external machines beyond your IT
system's control then the only way to go is with a Verisign cert.

Jason

On Mon, Jan 3, 2011 at 12:23 PM, Craig Carter <
[email protected]> wrote:

> **
> Hi Jason,
>
> I'm not 100% sure whether there is a basic cert from Verisign that would
> eliminate the warnings while still not turning the banner green.  I wasn't
> personally involved in the discussions with Verisign and went with our web
> administrator recommendations.  I'd be surprised to hear there is a cheaper
> option that we could have gone with--Verisign wasn't even willing to give us
> a pro-rated upgrade when we swapped out hardware/sites and added a load
> balancer and needed new certificates issued.
>
> Even a self-published cert will display the lock icon but in our case, we
> wanted to eliminate the warnings since our external customers constantly
> complained that our web site was "broken".  Our customers were getting the
> "phishing" error message and recommendation "not to proceed" message.
> Although we were using certs issued by a trusted authority and we pushed
> that to all systems within our domain (which worked great for those users),
> we had no control over our external customers accessing the site from home
> and other non-domain locations.  We even provided instructions for them to
> include our certificate authority to IE (along with the program they could
> run to handle it for them) but it just became too much of a hassle trying to
> walk all of the external customers through that process.  The amount of time
> our Contact Center was on the phone with customers greatly exceeded the cost
> of the certificates--which were not cheap for multiple certificates.
>
> Agree it's a bad practice to train users to click through
> warnings--especially for common sites where people purposefully register
> similiar names to catch people who accidentally make a typing error.  My
> point was that once the warnings are clicked-through, everything does work
> properly.
>
> Another option is to use other browsers--which do not have the same IE
> problems.  In our case, that wasn't a valid choice...  Recommend those
> interested check with Verisign and other "Microsoft Approved" authorities to
> see what certificate options are out there.  In our case, it was cheaper to
> pay the annual certificate cost than the employee cost and customer concerns
> generated by not having them.
>
> Craig Carter
> RSP
>
>  ------------------------------
> *From:* Action Request System discussion list(ARSList) [
> [email protected]] On Behalf Of Jason Miller [[email protected]]
> *Sent:* Monday, January 03, 2011 12:24 PM
>
> *To:* [email protected]
> *Subject:* Re: IS I.E 8.0 Compatible ?
>
>  ** Craig, isn't the green banner triggered by an EV (Extended Validation)
> cert?  We have a few but I was not involved in the purchasing end.  It is my
> understanding that EV certs are considerably more expensive than a
> traditional basic cert.  A basic cert will still show the lock icon in the
> browser but will not change the banner color.  I think we'll see things move
> more and more to EV certs but if budget is a concern they should be able to
> get a basic cert from a well recognized issuer (Verisign) to get rid of the
> warning message.
>
>
> Craig touched on another (free) option; to have a cert issued/signed by an
> internal CA (Certificate Authority) that is trusted by all of computer on
> the domain.  For example all the computers on our AD domain automatically
> trust one of our Domain Controllers as a CA.  For some of our internal
> support sites we use certs issued/signed by this CA to give us the security
> of SSL. This works well because we do not have to worry about machines
> outside of our internal environment accessing these pages.  Worst case if a
> machine not on the domain accesses the page they will receive the warning
> that Rajesh described and can click through it.
>
> <personal note>
> In general it is probably a bad practice to educate users to ignore the
> certificate warning (although business must go on and may be the only
> choice).  These warnings are there for a reason and conditioning people who
> may not be all too Net savvy to ignore them could lead them to trouble out
> on the big bad Net when confronted with sites like https: //amaz0n.com or
> https: //b0fa.com ((note the letter "O" replaced with a zero) (intentional
> space between "https:" and "//"))
> </personal note>
>
> Jason
>
> On Mon, Jan 3, 2011 at 7:10 AM, Craig Carter <
> [email protected]> wrote:
>
>> **
>> The problem you are seeing is with the Enhanced Security added in IE8.  If
>> you click through the warnings, everything will still work fine.  It can be
>> a problem though if you have customers who believe the message and refuse to
>> click through the warnings.
>>
>> We've always run a secure site (https) and we ran into this when IE8 was
>> released.  IE7 had a simliar problem but was not nearly as noticeable and
>> "in your face" with the messages.
>>
>> The problem is that Microsoft IE8 does not automatically accept all secure
>> certificates as "authenticated" and will present that warning.  If you
>> have a controlled user population, you can simply add your certificate
>> issuing authority as a trusted certificate authority in their browser
>> configuration (for IE8) and the problem will go away.  However, if you are
>> not able to do that, your only real choices are to either educate your users
>> or purchase certificates that are automatically accepted (like Verisign).
>> We took the second route and although not cheap, you then get the nice green
>> banner versus the red one and the problem goes away.
>>
>> This is not a BMC/Remedy problem or an HTTPS problem--it's increased
>> security added to that browser.  The only thing you can do is to use a
>> certificate issued by an authority Microsoft has deemed worthy or add your
>> own issuing authority to all of their browsers.
>>
>> Craig Carter
>> RSP
>>
>>
>>  ------------------------------
>> *From:* Action Request System discussion list(ARSList) [
>> [email protected]] On Behalf Of Ali A. Musa [[email protected]]
>> *Sent:* Monday, January 03, 2011 6:36 AM
>>
>> *To:* [email protected]
>> *Subject:* Re: IS I.E 8.0 Compatible ?
>>
>>   **
>>
>> This implementation has been working for 7-years and I have upgrade to
>> many IE 6,7,8 and none ha scaused a problem, unless you mean https:// the
>> secure which I did not deploy.
>>
>>  *From:* Action Request System discussion list(ARSList) [mailto:
>> [email protected]] *On Behalf Of *Nair, Rajesh SISPL
>> *Sent:* Monday, January 03, 2011 3:41 PM
>> *To:* [email protected]
>> *Subject:* Re: IS I.E 8.0 Compatible ?
>>
>> **
>>
>> Is their any setting you have done on IE Side..
>>
>>   With Best Regards
>>
>> *Rajesh *
>>  ------------------------------
>>
>> *From:* Action Request System discussion list(ARSList) [mailto:
>> [email protected]] *On Behalf Of *Ali A. Musa
>> *Sent:* Monday, January 03, 2011 6:10 PM
>> *To:* [email protected]
>> *Subject:* Re: IS I.E 8.0 Compatible ?
>>
>> Its working fine with me our environment, client IE8 and Mid-tier 6.3 with
>> jsp-engine  using IIS.
>>
>>  *From:* Action Request System discussion list(ARSList) [mailto:
>> [email protected]] *On Behalf Of *Nair, Rajesh SISPL
>> *Sent:* Monday, January 03, 2011 3:25 PM
>> *To:* [email protected]
>> *Subject:* IS I.E 8.0 Compatible ?
>>
>> **
>>
>> Dear List,
>>
>> need to know whether IE is compatible to run with ARSYTEM 6.3 with Midtier
>> 6.3
>>
>> Our Organization is made a mandate of using IE 8 on every system and while
>> testing I found out that I am getting an error every time I open the link.
>>
>>
>>  There is a problem with this website's security certificate.
>>
>>
>>
>>
>>
>>  The security certificate presented by this website was issued for a
>> different website's address.
>> Security certificate problems may indicate an attempt to fool you or
>> intercept any data you send to the server.
>>
>>
>>  We recommend that you close this webpage and do not continue to this
>> website.
>>
>>
>>
>>  We are on ARSYTEM 6.3 patch 23 ITSM 5.5 and Midtier server V 6.3 patch
>> 24
>>
>> Note:  Site work with Server Certificate https:
>>
>> Any way out of this.
>>
>>  With Best Regards
>>
>> *Rajesh*
>>
>> **
>>
>> _attend WWRUG11 www.wwrug.com ARSlist: "Where the Answers Are"_
>>
>> _attend WWRUG11 www.wwrug.com ARSlist: "Where the Answers Are"__attend
>> WWRUG11 www.wwrug.com ARSlist: "Where the Answers Are"_
>> _attend WWRUG11 www.wwrug.com ARSlist: "Where the Answers Are"_
>>  _attend WWRUG11 www.wwrug.com ARSlist: "Where the Answers Are"_
>>
>
> _attend WWRUG11 www.wwrug.com ARSlist: "Where the Answers Are"_
> _attend WWRUG11 www.wwrug.com ARSlist: "Where the Answers Are"_
>

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug11 www.wwrug.com ARSList: "Where the Answers Are"

Reply via email to