Answer the question
In order to leave comments, you need to log in
SSL certificate. Which CA to choose for protecting subdomains/devices?
There are a number of devices with a web muzzle, windows servers, all sorts of ilo muzzles, ip PBX and other things.
You need to somehow protect all these webmords, and you can’t start your own SA, because. all sorts of cunning browsers have stopped using the system certificate store and I can’t explain why the browser yells when entering the next switch in the face.
There is AD, the domain name is chosen with an eye to issuing a valid certificate (corp.companyname.com), there is a desire to drag valid certificates there as well.
In total, I want to get a certificate at the output, which I can somehow load into my devices.
If I understand the essence of ssl correctly, I need a certificate that supports wildcard. Or am I misunderstanding and I need something else? Well, do not buy a certificate for each subdomain?
Explain for Comodo Essential SSL Wildcard - do I understand the sequence of steps correctly.
1. I buy
2. I confirm ownership of the domain, for example, via email or via DNS
3. At the output, I get a bunch of public / private keys
4. I spread the private key across all my hardware / web servers and other tripe
5. At the output, I get a valid ssl for domains like device. corp.companyname.com?
P.S. naturally, nothing looks out into the world, split dns will be configured.
Answer the question
In order to leave comments, you need to log in
CryptoPro is in your head ... I wish I had suffered)))
A lot happened - that’s why it’s not like a comment)))
I didn’t climb deeply, but ....
1. Private keys are never laid out anywhere . As far as I understand, based on the private key, a public key is formed, but it is built into the system (server). When a device\user enters the server, he is given a public key - WHO AM I. The device\user system checks whether the public key matches the set of parameters for identification and checks with the certificate authority.
Winda at hand?
start - run - mmc
file - add or remove snap - certificates - add - my user account - done - ok
Look - Trusted Root Certification Authorities - Certificates.
Windows will not swear at certificates issued ... how to say it right? ... firms ... services.
What will happen to your devices? if you don’t try, you won’t know)))
Browsers can suddenly have their own system ....
Yours
unwillingness to distribute the root cert on hrenalion machinescan lead exactly to this)))
If I understand the essence of ssl correctly, I need a certificate that supports wildcard.
There are no other options other than your own CA. Dot. "unwillingness to distribute the root certificate on dokhrenillion machines" is not a reason to fence crutches in the infrastructure. The layout of certificates is easily automated, and I would suggest that you direct your efforts to just such automation, and not to inventing how to fence a garden with the organization of multi-tiered wildcard certificates.
As for "narrow-minded auditors" - gently hint to the authorities of your organization about the competence of such auditors who do not know what a corporate PKI is.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question