Digicert lets you put specific hosts into the SAN in addition to the wildcard. 
I haven't seen any other certificate provider with anything close to the 
flexibility of Digicert. I haven't tried them on CUCM but they work perfectly 
on VCS, even for the connection to WebEx.

Eric

From: cisco-voip [mailto:[email protected]] On Behalf Of 
Norton, Mike
Sent: 07 April 2016 5:13 PM
To: [email protected]; [email protected]; [email protected]
Subject: Re: [cisco-voip] Digicert Wildcard cert

I use Digicert wildcard certs a lot for totally unrelated uses. Just did one 
yesterday. I have never seen them want to generate the private key for me. That 
would be silly. If anyone other than me had the private key, then it wouldn’t 
be very private, would it? Maybe there is a way to have them generate the 
private key, but I can confirm it certainly isn’t mandatory.

After submitting the CSR, before signing, they do allow you to change the CN to 
wildcard on their site.

They do allow you to get multiple certs with the same wildcard CN using 
different keypairs. They call it “Get a duplicate” and it doesn’t cost anything 
extra.

The only piece I’m not sure about is if they allow multiple SANs on a wildcard 
cert. Other than possibly that, I know the rest is doable.

Like I said, I am using them for non-UC stuff. If Cisco says they don’t support 
it then I’d be hesitant to do it even if it is doable.

-mn


From: cisco-voip [mailto:[email protected]] On Behalf Of 
Daniel Ohnesorge via cisco-voip
Sent: April-07-16 4:18 PM
To: [email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>; Cisco VOIP 
<[email protected]<mailto:[email protected]>>
Cc: Cisco VOIP <[email protected]<mailto:[email protected]>>
Subject: Re: [cisco-voip] Digicert Wildcard cert

Jose,

A few things to know; most wildcard certs from Verisign, GoDaddy etc. generate 
a key pair (private and public key) for you and send you a passphrase protected 
.pfx or .p12 file which can then be imported to IIS, Apache or any application 
(even Expressway for that matter). CUCM however does not allow private key 
import as it sees it a security risk and mandates that keys must be generated 
on CUCM via CSR.

The next thing to know is how CUCM deals with changes between its CSR and the 
certificate. The rule is that the Common Name of the CSR doesn't have to match 
but the SAN entries must match. So if you generate a Multi-SAN certificate CSR, 
CUCM will automatically put all CUCM/CUPS nodes in the list and you/the CA are 
expected to ensure those entries match. Theoretically, the CA could change the 
Common Name to *.domain.com<http://domain.com> during signing and you could 
actually import it in to CUCM. The challenge here is a) finding a CA which 
allows distinct individual keys/certs for the same wildcard Common Name and b) 
finding a CA that allows multiple SAN entries although the Common Name is a 
wildcard.

You would be better off to work with the CA to refund the Wildcard certificate 
and swap it with a Multi-SAN product.

Sent from my iPhone

On 8 Apr 2016, at 07:34, Ryan Huff 
<[email protected]<mailto:[email protected]>> wrote:
As far as I am aware, true wildcard certificates (*.domain.tld) are not 
supported with UCOS (despite whether they work or not).

Thanks,

Ryan

On Apr 7, 2016, at 5:30 PM, Jose Colon II 
<[email protected]<mailto:[email protected]>> wrote:
After reading the numerous posts saying that the wildcard certs would work I 
purchased the wild card cert. Just wondering how people got them to work.

Thanks

On Thu, Apr 7, 2016 at 4:24 PM, Ryan Huff 
<[email protected]<mailto:[email protected]>> wrote:
Jose,

I believe what you want are multi server (SAN) certificates for tomcat. You 
specify the distribution when generating the CSR.

Thanks,

Ryan

> On Apr 7, 2016, at 5:21 PM, Jose Colon II 
> <[email protected]<mailto:[email protected]>> wrote:
>
> I have read a lot on forums that the digicert wildcard certs work great for 
> UC apps as long as I am on 10.5 which I am.
>
> Can someone lay out the process of uploading these certs as I am having a 
> hard time with them. What format do I need them. What cert goes where etc.
>
> Thanks in advance.
>
> Jose
> _______________________________________________
> cisco-voip mailing list
> [email protected]<mailto:[email protected]>
> https://puck.nether.net/mailman/listinfo/cisco-voip<https://puck.nether.net/mailman/listinfo/cisco-voip>

_______________________________________________
cisco-voip mailing list
[email protected]<mailto:[email protected]>
https://puck.nether.net/mailman/listinfo/cisco-voip<https://puck.nether.net/mailman/listinfo/cisco-voip>
 
 
The contents of this message may contain confidential and/or privileged 
subject matter. If this message has been received in error, please contact 
the sender and delete all copies. Like other forms of communication, 
e-mail communications may be vulnerable to interception by unauthorized 
parties. If you do not wish us to communicate with you by e-mail, please 
notify us at your earliest convenience. In the absence of such 
notification, your consent is assumed. Should you choose to allow us to 
communicate by e-mail, we will not take any additional security measures 
(such as encryption) unless specifically requested. 

If you no longer wish to receive commercial messages, you can unsubscribe 
by accessing this link:  http://www.bennettjones.com/unsubscribe
_______________________________________________
cisco-voip mailing list
[email protected]
https://puck.nether.net/mailman/listinfo/cisco-voip

Reply via email to