Managing Web Server Certificates on idrac



Similar documents
Installing idrac Certificate Using RACADM Commands

How To Create A Web Server On A Zen Nlb (Networking) With A Web Browser On A Linux Server On An Ipad Or Ipad On A Raspberry Web 2.4 (

Dell Wyse Datacenter for View RDS Desktops and Remote Applications

idrac7 Version With Lifecycle Controller 2 Version 1.1 Quick Start Guide

Dell Solutions Configurator Guide for the Dell Blueprint for Big Data & Analytics

Integrating idrac7 With Microsoft Active Directory

Integrating idrac 7 with Microsoft Active Directory

Using Dell EqualLogic and Multipath I/O with Citrix XenServer 6.2

Accessing Remote Desktop using VNC on Dell PowerEdge Servers

High Performance SQL Server with Storage Center 6.4 All Flash Array

Dell Fabric Manager Installation Guide 1.0.0

Recommended Methods for Updating Firmware on Dell Servers

Active Fabric Manager (AFM) Plug-in for VMware vcenter Virtual Distributed Switch (VDS) CLI Guide

Dell Server Management Pack Suite Version For Microsoft System Center Operations Manager And System Center Essentials User s Guide

Setting Up SSL on IIS6 for MEGA Advisor

SolarWinds Technical Reference

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0

Browser-based Support Console

HP Device Manager 4.7

Integrated Dell Remote Access Controller 7 (idrac7) Version User's Guide

DELL Remote Access Configuration Tool

LoadMaster SSL Certificate Quickstart Guide

X.509 Certificate Generator User Manual

Scenarios for Setting Up SSL Certificates for View

Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N REV A01 January 14, 2011

Configuring idrac6 for Directory Services

Configuring Single Sign-On for Application Launch in OpenManage Essentials

CLIENT CERTIFICATE (EAP-TLS USE)

RSA envision Windows Eventing Collector Service Deployment Overview Guide

Junio SSL WebLogic Oracle. Guía de Instalación. Junio, SSL WebLogic Oracle Guía de Instalación CONFIDENCIAL Página 1 de 19

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

etoken Enterprise For: SSL SSL with etoken

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Deploying Dell OpenManage Server Administrator on VMware ESXi Using Dell Online Depot and VMware Update Manager

Obtaining SSL Certificates for VMware Horizon View Servers

Generating an Apple Push Notification Service Certificate

Dell OpenManage Network Manager Version 5.3 Service Pack 2 Quick Start Guide

App Orchestration 2.5

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM. This guide provides information on...

How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (

Obtaining SSL Certificates for VMware View Servers

WHITE PAPER Citrix Secure Gateway Startup Guide

Manage Dell Hardware in a Virtual Environment Using OpenManage Integration for VMware vcenter

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration

Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0

Wavecrest Certificate

Generating SSH Keys and SSL Certificates for ROS and ROX Using Windows AN22

Systems Management Tools And Documentation Version 8.1 Installation Guide

Generating a Certificate Signing Request (CSR) from LoadMaster

Configuration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide

Remote Installation of VMware ESX Server Software Using Dell Remote Access Controller

Exchange 2010 PKI Configuration Guide

Installing Management Applications on VNX for File

Certificates for computers, Web servers, and Web browser users

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: October 08, 2014

Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1

Dell Compellent 6.5 SED Reference Architecture and Best Practices

Secure IIS Web Server with SSL

Foglight. Foglight for Virtualization, Free Edition Installation and Configuration Guide

App Orchestration 2.0

Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM. This guide provides information on...

Installation Guide. SafeNet Authentication Service

System Administration Training Guide. S100 Installation and Site Management

Role-Based Security and its Implementation

RSA Security Analytics

Marriott Enrollment Server for Web User Guide V1.4

idrac7 Licensing Dell Technical White Paper Dell Enterprise Solutions Group

Installing an SSL Certificate Provided by a Certificate Authority (CA) on the vwlan Appliance

Acano solution. Virtualized Deployment R1.1 Installation Guide. Acano. February B

PHD Virtual Backup for Hyper-V

Citrix XenServer Workload Balancing Quick Start. Published February Edition

User Manual. User Manual Version

Microsoft OCS with IPC-R: SIP (M)TLS Trunking. directpacket Product Supplement

SSL Insight Certificate Installation Guide

Mobility Manager 9.0. Installation Guide

Installation Procedure SSL Certificates in IIS 7

Managing Multi-Hypervisor Environments with vcenter Server

Certificate technology on Pulse Secure Access

How to Setup and Configure ESXi 5.0 and ESXi 5.1 for OpenManage Essentials

Reconfiguring VMware vsphere Update Manager

Certificate technology on Junos Pulse Secure Access

SSL Interception on Proxy SG

Administration Guide Certificate Server May 2013

Dlink DFL 800/1600 series: Using the built-in MS L2TP/IPSEC VPN client with certificates

IIS 6.0SSL Certificate Deployment Guide

Generating an Apple Enterprise MDM Certificate

webmethods Certificate Toolkit

VMware vcenter Support Assistant 5.1.1

Installing an SSL Certificate Provided by a Certificate Authority (CA) on the BlueSecure Controller (BSC)

Enterprise Manager. Version 6.2. Installation Guide

VMware ESX 2.5 Server Software Backup and Restore Guide on Dell PowerEdge Servers and PowerVault Storage

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background

APNS Certificate generating and installation

RealPresence Platform Director

XenClient Enterprise Synchronizer Installation Guide

GTA SSO Auth. Single Sign-On Service. Tel: Fax Web:

ADFS Integration Guidelines

Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide

SQL Server 2008 and SSL Secure Connection

Transcription:

Managing Web Server Certificates on idrac This Dell technical white paper explains how to configure the web server certificates on idrac to establish secure remote connections. Dell Engineering November 2014 Author: Doug Roberts Dell Enterprise Solutions Group A Dell Technical White Paper

THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT EXPRESS OR IMPLIED WARRANTIES OF ANY KIND. 2013 Dell Inc. All rights reserved. Reproduction of this material in any manner whatsoever without the express written permission of Dell Inc. is strictly forbidden. For more information, contact Dell. PRODUCT WARRANTIES APPLICABLE TO THE DELL PRODUCTS DESCRIBED IN THIS DOCUMENT MAY BE FOUND AT: http://www.dell.com/learn/us/en/19/terms-of-sale-commercial-and-public-sector Performance of network reference architectures discussed in this document may vary with differing deployment conditions, network loads, and the like. Third party products may be included in reference architectures for the convenience of the reader. Inclusion of such third party products does not necessarily constitute Dell s recommendation of those products. Please consult your Dell representative for additional information. Trademarks used in this text: Dell, the Dell logo, Dell Boomi, Dell Precision,OptiPlex, Latitude, PowerEdge, PowerVault, PowerConnect, OpenManage, EqualLogic, Compellent, KACE, FlexAddress, Force10 and Vostro are trademarks of Dell Inc. Other Dell trademarks may be used in this document. Cisco Nexus, Cisco MDS, Cisco NX- 0S, and other Cisco Catalyst are registered trademarks of Cisco System Inc. EMC VNX, and EMC Unisphere are registered trademarks of EMC Corporation. Intel, Pentium, Xeon, Core and Celeron are registered trademarks of Intel Corporation in the U.S. and other countries. AMD is a registered trademark and AMD Opteron, AMD Phenom and AMD Sempron are trademarks of Advanced Micro Devices, Inc. Microsoft, Windows, Windows Server, Internet Explorer, MS-DOS, Windows Vista and Active Directory are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat and Red Hat Enterprise Linux are registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell and SUSE are registered trademarks of Novell Inc. in the United States and other countries. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Citrix, Xen, XenServer and XenMotion are either registered trademarks or trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware, Virtual SMP, vmotion, vcenter and vsphere are registered trademarks or trademarks of VMware, Inc. in the United States or other countries. IBM is a registered trademark of International Business Machines Corporation. Broadcom and NetXtreme are registered trademarks of Broadcom Corporation. Qlogic is a registered trademark of QLogic Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and/or names or their products and are the property of their respective owners. Dell disclaims proprietary interest in the marks and names of others. 2 Managing Web Server Certificates on idrac

Table of contents Executive summary... 4 1 Introduction... 5 2 Dell Self-Signed SSL Certificates... 7 2.1 How to Trust Self-Signed Certificate on Windows Management Stations... 7 2.2 How to Trust Self-Signed Certificate on Linux Management Stations... 8 3 Custom Signed SSL Certificates... 10 3.1 Export the signing certificate in PKCS #12 format... 10 3.2 Upload the custom signing certificate to the idrac... 10 3.3 How to Trust CA Certificate on Windows Management Stations... 11 3.4 How to Trust CA Certificate on Linux Management Stations... 12 4 Certificate Authority Signed SSL Certificates... 14 4.1 Generate a Certificate Request... 14 4.2 Submit to a CA - Windows Server 2012 Certificate Authority... 14 4.3 Upload the new certificate to the idrac... 14 4.4 Download the CA Certificate - Windows Server 2012 CA... 15 4.5 How to Trust CA Certificate on Windows Management Stations... 15 4.6 How to Trust CA Certificate on Linux Management Stations... 16 A How to Access the Trusted Certificates Store on Windows Workstations... 17 B WSMAN Command Syntax with Trusted Certificates... 18 B.1 Windows Workstations (WinRM commands)... 18 B.2 Linux Workstations (OpenWSMAN commands)... 18 3 Managing Web Server Certificates on idrac

Executive summary Dell s integrated Dell Remote Access Controller (idrac) uses web server certificates (also known as SSL certificates) to establish and maintain secure communications with remote clients. Web browsers and command line utilities, such as RACADM and WS-Man, use these SSL certificates for server authentication and establishing an encrypted connection. There are several options available to secure the network connection using web server certificates. idrac s web server has a self-signed SSL certificate by default. The self-signed certificate can be replaced with a custom signing certificate or a certificiate signed by a well-known Certiicate Authority (CA). Which ever method is chosen, once idrac is configured and the SSL certificate is installed on the management stations, SSL enabled clients can access idrac securely and without certificate warnings. 4 Managing Web Server Certificates on idrac

1 Introduction This document describes the different methods available to use a web server certificate on the idrac and how to configure your Windows or Linux management station to trust the certificate authority that issued the certificate. Once configured, remote connections to the idrac via web browsers, racadm commands, and wsman commands will be properly secured and the associated warning messages will be eliminated. The idrac uses an SSL certificate to authenticate itself to web browsers and command line utilities, such as racadm and wsman, running on management stations. If the Certificate Authority that issued the certificate is not trusted by the management station, warning messages will be displayed on the management station. This document explains how to configure management stations to trust the certificate authority. There are three types of signed web server certificates that can be employed for securing communications with idrac, the Dell self-signed SSL certificate, the custom signed SSL certificate and Certificate Authority (CA) signed SSL certificate. Each type has advantages and disadvantages. Dell Self-Signed SSL Certificate - The certificate is auto generated and self-signed by the idrac. Starting with idrac7 version 2.10.10 and idrac8, each idrac has a unique self-signed certificate by default. Advantages: Do not have to maintain a Certificate Authority. Certificates are auto generated by the idrac. Disadvantage: The certificate for each idrac has to be added to the trusted certificates store on each management station. (Every idrac is its own Certificate Authority which must be trusted). Custom Signed SSL Certificate - The certificate is auto generated and signed using a signing certificate uploaded from your in-house Certificate Authority. Advantages: Only have to trust one Certificate Authority for all idrac. It's possible your in-house Certificate Authority is already trusted on your management stations. Certificates are auto generated by the idrac. Disadvantage Have to maintain your own Certificate Authority. CA Signed SSL Certificate - A certificate signing request (CSR) is generated and submitted to your inhouse Certificate Authority or by a 3 rd party Certificate Authority such as VeriSign, Thawte, Go Daddy, etc. for signing. Advantages: Can use a commercial Certificate authority. Only have to trust 1 Certificate Authority for all idrac. If a commercial CA is used it is very likely to be already trusted on your management stations. Disadvantage: Have to either purchase commercial certificates or maintain your own Certificate Authority. 5 Managing Web Server Certificates on idrac

A CSR has to be generated and submitted for every idrac. The SSL certificate configurations described in this document were performed using idrac8 but also applies to idrac7. For the remaining document, when referring to idrac it applies to both idrac7 and idrac8 unless otherwise specified. The steps describe in this document were developed using a Windows 7 Professional and Red Hat Linux 6.4 management station and a Windows Server 2012 Certificate Server The browsers on the management stations were latest available at the time this document was written. Steps will be similar, but may not be exact, on other product versions. Remote racadm commands shown use the default user name (root) and password. Replace these with your idrac Administrator user name and password. 6 Managing Web Server Certificates on idrac

2 Dell Self-Signed SSL Certificates Each idrac8 has the ability to auto-generate a unique self-signed SSL certificate good for ten years. This feature was added to idrac7 starting with firmware version 2.10.10.10. The certificate is generated using SHA2 algorithms and RSA 2048-bit key strength to provide a seure communication channel. An SSL certificate is generated at boot time if one is not found or corrupt. The Fully Qualified Domain Name (FQDN) provides a unique Common Name (CN) for each idrac. The FQDN of idrac consist of the RAC name attribute and the Domain name attribute. By default, each idrac has a unique RAC name which includes its Service Tag number, such as idrac-<service tag>. A new self-signed SSL certificate can be generated at anytime using the RACADM command sslresetcfg. This will replace the existing SSL certificate. An idrac reset is required to load the new certificate. When upgrading idrac7 1.xx.xx.xx to idrac7 2.xx.xx.xx, the old certificates remain valid until sslresetcfg command is executed. This section describe how to download idrac's self-signed SSL certificate and install it into the appropriate certificate store on your Windows and Linux management station. 2.1 How to Trust Self-Signed Certificate on Windows Management Stations Download the Certificate Web interface: Connect to the idrac with your browser, https://<idrac_fqdn>. Go to Overview > idrac Settings > Network > SSL tab. Under SSL Certicificate > Option, select Download SSL Certificate > Next. Where the certificate will be downloaded as <srvtag>-ssl_cert.pem. Rename the file, replacing the ".pem" extension with ".cer." For example, 1234xyz-ssl_cert.cer. Remote RACADM: From a command prompt, run the following command: racadm -r <idrac fqdn> -u root -p ****** sslcertdownload -f <filename.cer> -t 1 Where filename.cer is a name you choose for the certificate file. Install the Certificate in Microsoft Windows Store Double click on the.cer file downloaded from the idrac. Click Install Certificate. The Windows Certificate Import Wizard launches. Click Next > Place all certificates in the following store > Browse > Trusted Root Certification Authorities > OK > Next > Finish. Click Yes to install the certificate. "The import was successful" is displayed. OK > OK. 7 Managing Web Server Certificates on idrac

Internet Explorer and Google Chrome browsers, as well as racadm and WinRM (wsman) commands all use the same trusted certificate store on Windows 7 management stations. Once the certificate has been installed in the trusted store per the steps above, the certificate warning messages will no longer be received. Browsers will need to be closed/reopened first. Be sure to use the fully qualified domain name of the idrac in your browser and on the command line. Install the Certificate in Mozilla Firefox Browser Store Firefox uses a different trusted certificate location so the certificate must be trusted separately. Open Firefox, go to Tools > Options > Advanced > Encryption > View Certificates > Authorities Click Import, select.cer file downloaded from idrac. Click Open > check Trust this CA to identify websites > OK > OK > OK. Close / reopen Firefox and connect to the idrac (be sure to use the FQDN of the idrac, not the IP address). The certificate warning message should no longer be received. 2.2 How to Trust Self-Signed Certificate on Linux Management Stations Download Certificate Web interface: Connect to the idrac with your browser, https://<idrac_fqdn>. Go to Overview > idrac Settings > Network > SSL tab. Under SSL Certicificate > Option, select Download SSL Certificate > Next. Where the certificate will be downloaded as <srvtag>-ssl_cert.pem. Remote RACADM: From a command prompt, run the following command: $racadm -r <idrac fqdn> -u root -p ****** sslcertdownload -f <filename.pem> -t 1 Where filename.pem is a name you choose for the certificate file. Install the Certificate for Remote Racadm Commands Find the location of the default CA certificate bundle on the management station. For example, on RHEL6 x86_64 it is named /etc/pki/tls/cert.pem. Append the PEM formatted CA certificate to the management station CA certificate. $cat filename.pem >> /etc/pki/tls/cert.pem Remote racadm commands should now run without the certificate warning message. 8 Managing Web Server Certificates on idrac

Install the Certificate in Google Chrome Browser Store In Chrome, go to Settings > Show Advanced Settings > Manage certificates > Authorities Click Import, select.pem file downloaded from idrac. Click Open, check "Trust this certificate for identifying websites". OK > OK. Close / reopen Chrome and connect to the idrac (be sure to use the FQDN of the idrac, not the IP address). The certificate warning message should no longer be received. Install the Certificate for Mozilla Firefox Browser Store Open Firefox and go to Edit > Preferences > Advanced > Encryption > View Certificates > Authorities. Click Import, select.pem file downloaded from idrac. Click Open, check Trust this CA to identify websites. OK > OK > OK. Close / reopen Firefox and connect to the idrac (be sure to use the FQDN of the idrac, not the IP address). The certificate warning message should no longer be received. 9 Managing Web Server Certificates on idrac

3 Custom Signed SSL Certificates To use this method, you will need a Certificate Authority (CA) under your control since this involves uploading a certificate that includes the private key of the CA to the idrac. The idrac uses this certificate to generate a custom certificate signed by your CA. The benefit of this method is you only have to trust your CA, instead of all idracs individually on your management stations. This section will provide guidance on how to export your signing certificate and upload it to idrac. Then describe how to install it into the appropriate certificate store on your Windows and Linux management station. 3.1 Export the signing certificate in PKCS #12 format PKCS #12 is the format used to a store a certificate along with its private key. These files typically have the extension.pfx when exported from Windows CA's and.p12 when exported from OpenSSL CA's. The steps to do this will vary depending on the Certificate Authority you are using. For example, on a CA running on Windows Server 2012, do the following: Use MMC Certificate snap-in to export the signing certificate. Right click on the CA certificate > All Tasks > Export to open the Certificate Export Wizard. Click Next. Select Yes, export the private key > Next. Make sure Personal Information Exchange - PKCS #12 (.PFX) is selected > Next. Set a password > Next. Enter the file name > Save > Next > Finish. "The Export was successful" is displayed > OK. 3.2 Upload the custom signing certificate to the idrac Connect to the idrac in a browser, https://<fqdn_of_idrac> Go to Overview > idrac Settings > Network > SSL tab. Under "Custom SSL Certificate Signing Certificate", make sure "Upload Custom SSL Certificate Signing Certificate" is selected and click Next. Select Browse > Point to the certificate in PKCS #12 format (the.pfx file in this example) > Open. Next to PKCS#12 Password, enter the password > Apply. It will take a few minutes to generate a new SSL certificate signed by the CA. Once complete an Informational message will indicate a reset of idrac is required. Note: A new SSL certificate has been generated, signed by the CA. Now idrac needs to be restarted to consume the new SSL certificate. Until idrac has been reset the old SSL certificate is still in use. If the management stations already trust the Certificate Authority, browsers, racadm commands, and wsman commands should all work without certificate error messages at this point. Browsers may need to be closed / reopened first. 10 Managing Web Server Certificates on idrac

3.3 How to Trust CA Certificate on Windows Management Stations Note: This section can be skipped on management stations that already trust the Certificate Authority used in the steps above. Download the CA's Certificate Note: For security, the CA's certificate is downloaded in a format that does not contain the private key. Web interface: Connect to the idrac with your browser, https://<idrac_fqdn>. Go to Overview > idrac Settings > Network > SSL tab. Under Custom SSL Certificate Signing Certificate > Option, select Download Custom SSL Certificate Signing Certificate > Next. Where the certificate will be downloaded as host-custom-signing.crt. Remote RACADM: From a command prompt, run the following command: >racadm -r <idrac fqdn> -u root -p ****** sslcertdownload -f <filename.crt> -t 3 Where filename.crt is a name you choose for the certificate file. The -t 3 switch tells racadm to get the custom signing certificate. Install the Certificate in Microsoft Windows Store Double click on the.crt file downloaded from idrac. Click Install Certificate. The Windows Certificate Import Wizard launches. Click Next > Place all certificates in the following store > Browse > Trusted Root Certification Authorities > OK > Next > Finish. Click Yes to install the certificate. "The import was successful" is displayed. OK > OK. Internet Explorer and Google Chrome browsers, as well as racadm and WinRM (wsman) commands all use the same trusted certificate store on Windows 7 management stations. Once the certificate has been installed in the trusted store per the steps above, the certificate warning messages will no longer be received. Browsers will need to be closed/reopened first. Be sure to use the fully qualified domain name of the idrac in your browser and on the command line. Install the Certificate for Mozilla Firefox Browser Store Firefox uses a different trusted certificate location so the certificate must be trusted separately. Open Firefox, go to Tools > Options > Advanced > Encryption > View Certificates > Authorities Click Import, select.cer file downloaded from idrac. Click Open. check Trust this CA to identify websites > OK > OK > OK. Close / reopen Firefox and connect to the idrac (be sure to use the FQDN of the idrac, not the IP address). The certificate warning message should no longer be received. 11 Managing Web Server Certificates on idrac

3.4 How to Trust CA Certificate on Linux Management Stations The following steps were obtained using RHEL 6.4 x86_64 and the latest browsers available at the time of this writing. Steps will be similar, but may not be exact, on other product versions. Download the CA's Certificate Web interface: Connect to the idrac with your browser, https://<idrac_fqdn>. Go to Overview > idrac Settings > Network > SSL tab. Under Custom SSL Certificate Signing Certificate > Option, select Download Custom SSL Certificate Signing Certificate > Next. Where the certificate will be downloaded as host-custom-signing.crt. Remote RACADM: From a command prompt, run the following command: $racadm -r <idrac fqdn> -u root -p ****** sslcertdownload -f <filename.crt> -t 3 Where filename.crt is a name you choose for the certificate file. The -t 3 switch tells racadm to get the custom signing certificate. Install the Certificate for Remote Racadm Commands Convert the CA's certificate to PEM format: $openssl x509 -inform pem -in <certnew.cer> -outform pem -out <filename.pem> - text Find the location of the default CA certificate bundle on the management station. For example, on RHEL6 x86_64 it is named /etc/pki/tls/cert.pem. Append the PEM formatted CA certificate to the management station CA certificate. $cat filename.pem >> /etc/pki/tls/cert.pem Remote racadm commands should now run without the certificate warning message. Install the Certificate in Google Chrome Browser Store In Chrome, go to Settings > Show Advanced Settings > Manage certificates > Authorities Click Import, select.pem file downloaded from idrac. Click Open, check "Trust this certificate for identifying websites". OK > OK. Close / reopen Chrome and connect to the idrac (be sure to use the FQDN of the idrac, not the IP address). The certificate warning message should no longer be received. Install the Certificate Mozilla Firefox Browser Store Open Firefox and go to Edit > Preferences > Advanced > Encryption > View Certificates > Authorities. Click Import, select.pem file downloaded from idrac. Click Open, check Trust this CA to identify websites. OK > OK > OK. 12 Managing Web Server Certificates on idrac

Close / reopen Firefox and connect to the idrac (be sure to use the FQDN of the idrac, not the IP address). The certificate warning message should no longer be received. 13 Managing Web Server Certificates on idrac

4 Certificate Authority Signed SSL Certificates With this method, a certificate signing request (CSR) is generated and submitted to your in-house Certificate Authority or to a 3 rd party Certificate Authority such as VeriSign, Thawte, Go Daddy, etc. for signing. You will only have to trust one CA, but you will need to generate a CSR for every idrac. This section will provide guidance on how to generate a CSR, submit to CA and upload sign certificate to idrac. Then describe how to install it into the appropriate certificate store on your Windows and Linux management station. 4.1 Generate a Certificate Request Connect to the idrac with your browser, https://<idrac_fqdn>. Go to Overview > idrac Settings > Network > SSL tab. Select Generate Certificate Signing Request (CSR) and click Next. 1. For the Common Name, enter the FQDN of the idrac. For example, if the DNS DRAC Name entered earlier is "idrac-st12345", and your domain name is "test.lab", you would enter "idrac- ST12345.test.lab" (no quotes) here. This field is critical. 2. Fill out the remaining fields. Click Generate, and save the csr.txt file. (It will take a few seconds to generate the file.) Provide the csr file to a 3 rd party Certificate Authority or submit to your in-house CA. Note: idrac accepts only X509 Base 64 encoded Web Server certificates. 4.2 Submit to a CA - Windows Server 2012 Certificate Authority The following steps can be followed to generate a certificate from the CSR if you are running a CA on Windows Server 2012, configured to accept certificate requests over http: Browse to: http://<ip_of _CA>/certsrv Click Request a certificate > advanced certificate request Select Submit a certificate request by using a base-64 encoded CMC or PKCS#10 file. Copy the entire contents of the csr.txt file into the Base-64-encoded certificate request box. Under Certificate Template, select Web Server, click Submit. Select Base 64 encoded, click Download Certificate. Save the file, certnew.cer, to your Desktop. 4.3 Upload the new certificate to the idrac Once you have received your signed Web Server certificate (in X509 Base 64 format) from the 3 rd party or in-house CA: Connect to the idrac with your browser, https://<idrac_fqdn>. Go to Overview > idrac Settings > Network > SSL tab. Under SSL Certicificate > Option, select Upload Server Certificate > Next. 14 Managing Web Server Certificates on idrac

Browse to the path of the certificate (certnew.cer in the above example), click Apply. If successful, an Informational message is displayed. Click Reset idrac to apply new certificate. Note: idrac must be reset to apply new certificate. Until idrac has been reset, the old SSL certificate will be active. If the management stations already trust the Certificate Authority, browsers, racadm commands, and wsman commands should all work without certificate error messages at this point. Browsers may need to be closed / reopened first. Remember to use the FQDN of the idrac when connecting. 4.4 Download the CA Certificate - Windows Server 2012 CA The following steps can be followed to download a CA certificate if you are running a CA on Windows Server 2012, configured to accept certificate requests over http: Note: These steps only need to be followed if your Management Stations do not already trust the CA that issued the certificate. If not already trusted on your workstations, you will need to obtain a copy of the CA's certificate and add it to the appropriate trusted store. Browse to: http://<ip_of _CA>/certsrv Click Download a CA Certificate, certificate chain, or CRL Under CA certificate: select correct CA certificate. Under Encoding method: select Base 64 Click Download CA certificate The certificate will be downloaded as certnew.cer. 4.5 How to Trust CA Certificate on Windows Management Stations Install the Certificate in the Microsoft Windows Store Double click on the.crt file downloaded from idrac. Click Install Certificate. The Windows Certificate Import Wizard launches. Click Next > Place all certificates in the following store > Browse > Trusted Root Certification Authorities > OK > Next > Finish. Click Yes to install the certificate. "The import was successful" is displayed. OK > OK. Internet Explorer and Google Chrome browsers, as well as racadm and WinRM (wsman) commands all use the same trusted certificate store on Windows 7 management stations. Once the certificate has been installed in the trusted store per the steps above, the certificate warning messages will no longer be received. Browsers will need to be closed/reopened first. Be sure to use the fully qualified domain name of the idrac in your browser and on the command line. 15 Managing Web Server Certificates on idrac

Install the Certificate in Mozilla Firefox Browser Store Firefox uses a different trusted certificate location so the certificate must be trusted separately. Open Firefox, go to Tools > Options > Advanced > Encryption > View Certificates > Authorities Click Import, select.cer file downloaded from CA. Click Open, check Trust this CA to identify websites. OK > OK > OK. Close / reopen Firefox and connect to the idrac (be sure to use the FQDN of the idrac, not the IP address). The certificate warning message should no longer be received. 4.6 How to Trust CA Certificate on Linux Management Stations Install the Certificate for Remote Racadm Commands Convert the CA's certificate to PEM format: $openssl x509 -inform pem -in <certnew.cer> -outform pem -out <filename.pem> - text Find the location of the default CA certificate bundle on the management station. For example, on RHEL6 x86_64 it is named /etc/pki/tls/cert.pem. Append the PEM formatted CA certificate to the management station CA certificate. $cat filename.pem >> /etc/pki/tls/cert.pem Remote racadm commands should now run without the certificate warning message. Install the Certificate in Google Chrome Browser Store In Chrome, go to Settings > Show Advanced Settings > Manage certificates > Authorities Click Import, select.cer file downloaded from CA. Click Open, check "Trust this certificate for identifying websites". OK > OK. Close / reopen Chrome and connect to the idrac (be sure to use the FQDN of the idrac, not the IP address). The certificate warning message should no longer be received. Install the Certificate in Mozilla Firefox Browser Store Open Firefox and go to Edit > Preferences > Advanced > Encryption > View Certificates > Authorities. Click Import, select.cer file downloaded from CA. Click Open, check Trust this CA to identify websites. OK > OK > OK. Close / reopen Firefox and connect to the idrac (be sure to use the FQDN of the idrac, not the IP address). The certificate warning message should no longer be received. 16 Managing Web Server Certificates on idrac

A How to Access the Trusted Certificates Store on Windows Workstations The certificates trusted on the Windows management station can be viewed, added, and deleted with the Certificates Snap-in component of Microsoft Management Console. To launch Microsoft Management Console, click Start > in the Search box type mmc > Enter. To add the snap-in click File > Add / Remove Snap-In > highlight Certificates and click Add. Select "My user account" > Finish > OK. To access the certificates, expand Certificates - Current User > Trusted Root Certification Authorities > Certificates. 17 Managing Web Server Certificates on idrac

B WSMAN Command Syntax with Trusted Certificates The syntax used with wsman commands (WinRM on Windows and OpenWSMAN on Linux) will change slightly if you want to use a trusted certificate. B.1 Windows Workstations (WinRM commands) Without a trusted idrac certificate, a typical winrm command looks like this: winrm e cimv2/root/dcim/dcim_computersystem -u:root -p:****** -r:https://idrac- ST12345.test.lab/wsman -encoding:utf-8 -a:basic -SkipCNCheck -SkipCACheck The "-SkipCNCheck" and "-SkipCACheck" switches are required without a trusted certificate to avoid an error message. (Figure 3.) With a trusted idrac certificate, the "-Skip" switches can be dropped and the certificate can properly validated by the workstation. Be sure to use the FQDN of the idrac in the command or the certificate name check will fail. The resulting command will look like this: winrm e cimv2/root/dcim/dcim_computersystem -u:root -p:****** -r:https://idrac- ST12345.test.lab/wsman -encoding:utf-8 -a:basic Reminder: For winrm certificate validation, the certificate needs to be in the Windows Trusted Root Certificates store. This can be done using the racadm, Internet Explorer, or Google Chrome options covered earlier. B.2 Linux Workstations (OpenWSMAN commands) Without a trusted idrac certificate, a typical OpenWSMAN command looks like this: wsman enumerate http://schemas.dmtf.org/wbem/wscim/1/cimschema/2/root/dcim/dcim_computersystem -h idrac-st12345.test.lab -P 443 -u root -p ****** -y basic -c dummy.cert -V -v A dummy certificate file has to be used after the -c switch, and the -v and -V switches have to be included to skip the host name and CA checks. With a trusted idrac certificate, the valid certificate file is used in the command after the -c switch. The - v and -V switches are dropped so the certificate will be properly validated. The resulting command will look like this: wsman enumerate http://schemas.dmtf.org/wbem/wscim/1/cimschema/2/root/dcim/dcim_computersystem -h idrac-st12345.test.lab -P 443 -u root -p ****** -y basic -c /etc/pki/tls.cert.pem 18 Managing Web Server Certificates on idrac