So here's the thing. I am still working on my Win2012 RDS test
project. We use self-signed certificates here, issued through a Linux
VM running openssl. That's been working fine for years; IIS requests a
cert; I issue it; import it into IIS; everybody is happy. (I'm alread
imported my Linux CA root certificate, so all my self-issued certs are
trusted).

BUT: my Win2012 RDS servers don't like the cert I am issuing, when I
try to use it in RDS deployment (IIS on Win2012 has no problems with
it; I get https traffic to my Win2012 IIS just fine). When I try to
point to the existing certificate during RDS deployment, it tells me:

"The specified certificate is not valid. The certificate properties
must match the requirements of the role service."

Much digging tells me that:

----------
Certificates for RD Gateway must meet these requirements:

The intended purpose of the certificate is server authentication. The
Extended Key Usage (EKU) is Server Authentication (1.3.6.1.5.5.7.3.1).
----------

I think I have figured it out - my Linux openssl needs a
"extendedKeyUsage=serverAuth" in it's config.

But what do I do about the fact that I have already imported a
certificate? The cert is valid, just not valid for RDS purposes. Do I
need to revoke the current cert somehow? Make a new request; sign it
with the new extension properties; re-import it? I'm not sure how to
deal with the current cert, so I can remove it and use a new one with
new extension properties.


Reply via email to