To enable remote client stations to log in and users to establish connections, you can purchase an SSL certificate from a alternate third-party Certificate Authority and then import it onto the MSL server.
If you have an MSL application server deployed in LAN mode with an MBG / Web Proxy server in the demilitarized zone (DMZ) or network edge, your remote clients will connect to the MSL server through the MBG / Web Proxy server. For this configuration, purchase an SSL certificate for the MBG / Web Proxy server and then share the certificate and private key file with the LAN-based MSL servers.
If you have MSL application servers deployed in LAN mode behind a corporate firewall, your remote clients will connect to the MSL servers through the firewall. For this configuration, purchase a unique SSL certificate for each MSL server.
You can import third-party SSL certificates in either PEM or PKCS#12 format:
PEM certificates typically have extensions such as .pem, .crt, .cer, and .key. They are Base64 encoded ASCII files and contain "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----" statements. Server certificates, intermediate certificates, and private keys can all be put into the PEM format. Apache and similar servers use PEM format certificates. Several PEM certificates, including the private key, can be included in a single file, one below the other, but most platforms, such as Apache, expect the certificates and private key to be in separate files.
PKCS#12 or PFX format is a binary format for storing the server certificate, any intermediate certificates, and the private key in one encryptable file. PFX files usually have extensions such as .pfx and .p12. PFX files are typically used on Windows machines to import and export certificates and private keys.
MSL supports the SHA-2 cryptographic hash function, along with variants such as SHA-256.
The illustration,
below, demonstrates the five basic steps that must be completed
to implement a third-party SSL certificate when you have an have
an MSL application server in LAN mode with an MBG / Web Proxy on
the network edge. First, generate the certificate signing request
(CSR) on the MBG / Web Proxy. Second, submit the CSR to the CA,
complete the online registration forms and purchase your web server
certificate and intermediate certificates. Third, install the certificates
on the MBG / Web Proxy (the MSL server that was used to generate
the CSR). Fourth, download the certificates and private key from
the MBG / Web Proxy. Fifth, install the certificates and private
key on the MSL application server on the LAN. The application server
can be equipped with Mitel software such as , , Open
Integration Gateway, Oria or, as illustrated below, .
Programming Steps
To implement a third-party SSL certificate, complete the following procedures:
You need a certificate signing request (CSR) in order to purchase an SSL certificate from an alternate third-party Certificate Authority (CA).
To generate a CSR and purchase the third-party SSL certificate:
Field Name |
Description |
Country Name (two letter code) |
Enter the two letter country code for the country in which your organization is legally registered. Examples are, CA for Canada and US for United States. |
State or Province Name |
Enter the full name of state or province where your organization is located. Do not abbreviate. The first letter of the name entered must be a capital with remaining letters lower case. For example, you would enter “Ontario” for Mitel Corporation. |
Locality Name |
The Locality Name is the city, town, route used in the mail address of the organization that is submitting the CSR. Enter the full name of the city in which your organization is located. Do not abbreviate. |
Organization Name |
The Organization Name is the name used in the mail address of the organization / business submitting the CSR. Enter the name under which your organization / business is legally registered. The listed organization must be the legal registrant of the domain name in the trusted certificate request. If you are enrolling as an individual, please enter the certificate requestor's name in the Organization field, and the DBA (doing business as) name in the Organizational Unit field. |
Organizational Unit Name |
Enter the organization unit or department name. Use this field to differentiate between divisions within an organization. For example, “Engineering” or “Human Resources.” If applicable, you may enter the DBA (doing business as) name in this field. |
Common Name |
Enter the common name for the service to which you plan to apply your certificate. A web browser checks this field. It is required. The common name can be entered as a fully qualified domain name (FQDN) or as a domain name with a wild card character (e.g. *.example.com) in order to generate a wild card certificate request. The default value presented in this field is the FQDN of the server including the domain name (for example, mbg.example.com). |
If your CA requires you to open a number of intermediate certificates and assemble them into a single bundled file, perform this task with a text editor that employs Unix line formatting. Do not use an editor that employs Windows line formatting such as Notepad.
The intermediate certificate is required for deployments; without it, client connections will fail and users will be unable to download their deployment configurations.
Contact the administrator for the domain used in a CSR. The administrator is identified using information supplied when your organization originally registered its internet FQDN.
Upload the certificate files to a location that is accessible to the MSL server.
Use the following procedure to install the certificate files that you received from the alternate third-party Certificate Authority onto the MSL server that generated the CSR.
To install the SSL certificate files on the MSL server:
If your deployment includes LAN-based MSL application servers accessed via an MBG / Web Proxy server, use the following procedure to install the certificate files on them. This is a two-step process. First, you must download the web server certificate, intermediate certificates (if installed), and private key file corresponding to the SSL server certificate from the MBG / Web Proxy. Second, you must upload these files to the LAN-based MSL servers.
Download certificates
To download the SSL certificate files from the MBG / Web Proxy:
Upload certificates
To upload the SSL certificate files to a LAN-based MSL server:
Click the Web Server Certificate tab.
Select Upload and install a web server certificate, and then click Perform.
Select the SSL certificate:
Beside the SSL Certificate field, click Browse.
Navigate to the SSL certificate, select it and click Open.
If you also received an Intermediate SSL certificate, select it as well:
Beside the Intermediate SSL Certificate field, click Browse.
Navigate to the Intermediate SSL certificate, select it and click Open.
Import the private key pair created on the other MSL server:
Beside the SSL Private Key field, click Browse.
Navigate to the SSL Private Key file, select it and click Open.
Click Install Web Server Certificate.
To prevent fraudulent use of your certificates, delete the certificate and private key files from any media they are stored on.
To uninstall SSL certificate and resume using the self-signed certificate:
Log into the MSL Server Manager.
Under Security, click Web Server.
Click the Web Server Certificate tab.
Select Uninstall the third-party web server certificate, and then click Perform. The MSL system uninstalls the SSL certificate and returns to using the default self-signed certificate.
To view details regarding currently installed web server certificate:
Log into the MSL Server Manager.
Under Security, click Web Server.
Click the Web Server Certificate tab.
View details at the top of the page:
Field Name |
Details |
Issuer |
Lists the following information for the certificate authorization company that issued the certificate: |
C: country code |
|
ST: state or province |
|
L: locality name (for example: city name) |
|
O: name of the certificate authorization authority |
|
OU: name of the organizational unit |
|
CN: server hostname |
|
Authority/emailAddress: email address of the Certificate Authority |
|
Certificate Name |
The Common Name that identifies the fully qualified domain name associated with the certificate. |
Alternate Name(s) |
The FQDNs of each service (or "virtual host") included in the certificate. |
Valid From |
Date and time when the certificate takes effect. |
Expires |
Date and time when the certificate expires. Note: Events
are raised prior to, and on the date of expiry of the certificate. Ensure
to regularly check the event viewer or configure email alerts.
|