P
P
poisons2018-11-07 16:17:37
System administration
poisons, 2018-11-07 16:17:37

SSL certificate. Which CA to choose for protecting subdomains/devices?

There are a number of devices with a web muzzle, windows servers, all sorts of ilo muzzles, ip PBX and other things.
You need to somehow protect all these webmords, and you can’t start your own SA, because. all sorts of cunning browsers have stopped using the system certificate store and I can’t explain why the browser yells when entering the next switch in the face.
There is AD, the domain name is chosen with an eye to issuing a valid certificate (corp.companyname.com), there is a desire to drag valid certificates there as well.
In total, I want to get a certificate at the output, which I can somehow load into my devices.
If I understand the essence of ssl correctly, I need a certificate that supports wildcard. Or am I misunderstanding and I need something else? Well, do not buy a certificate for each subdomain?
Explain for Comodo Essential SSL Wildcard - do I understand the sequence of steps correctly.
1. I buy
2. I confirm ownership of the domain, for example, via email or via DNS
3. At the output, I get a bunch of public / private keys
4. I spread the private key across all my hardware / web servers and other tripe
5. At the output, I get a valid ssl for domains like device. corp.companyname.com?
P.S. naturally, nothing looks out into the world, split dns will be configured.

Answer the question

In order to leave comments, you need to log in

3 answer(s)
A
Alexander, 2018-11-07
@UPSA

CryptoPro is in your head ... I wish I had suffered)))
A lot happened - that’s why it’s not like a comment)))
I didn’t climb deeply, but ....
1. Private keys are never laid out anywhere . As far as I understand, based on the private key, a public key is formed, but it is built into the system (server). When a device\user enters the server, he is given a public key - WHO AM I. The device\user system checks whether the public key matches the set of parameters for identification and checks with the certificate authority.
Winda at hand?
start - run - mmc
file - add or remove snap - certificates - add - my user account - done - ok
Look - Trusted Root Certification Authorities - Certificates.
Windows will not swear at certificates issued ... how to say it right? ... firms ... services.
What will happen to your devices? if you don’t try, you won’t know)))
Browsers can suddenly have their own system ....
Yours

unwillingness to distribute the root cert on hrenalion machines
can lead exactly to this)))
Therefore...
Either you buy a certificate from a third-party certification authority in the hope that everything will work.
Either you install your center and install the OPEN certificate of the center everywhere. Then devices\users, having logged into the server, having received the public key, will contact your certificate authority with a check. Works only inside the company / enterprise or post instructions on how poor people can install a certificate in trusted certification authorities.

C
CityCat4, 2018-11-08
@CityCat4

If I understand the essence of ssl correctly, I need a certificate that supports wildcard.

No.
The whole point of "widely known" CAs, the whole basis of their gigantic business, is the fact that their certificates are already listed as root certificates in all popular browsers. And none of them will ever issue you a SubCA certificate, which gives you the right to issue their own certificates, which will eventually be confirmed by them.
In a corporate environment - only your own CA, the certificate of which is distributed by politicians on Windows machines and manually on webmords, printers, etc.
Well, or buy for each device - if there is a lot, a lot, a lot of money ...
The private key is not laid out anywhere. It is generated once and lies where the certificate request was created, without getting into the CA. The certificate received from CA can confirm one domain, well, two (with www and without www). You can do more with SAN - but such a certificate costs a lot more ...

A
athacker, 2018-11-08
@athacker

There are no other options other than your own CA. Dot. "unwillingness to distribute the root certificate on dokhrenillion machines" is not a reason to fence crutches in the infrastructure. The layout of certificates is easily automated, and I would suggest that you direct your efforts to just such automation, and not to inventing how to fence a garden with the organization of multi-tiered wildcard certificates.
As for "narrow-minded auditors" - gently hint to the authorities of your organization about the competence of such auditors who do not know what a corporate PKI is.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question