Please enable JavaScript to view this site.

The menu item SSL displays the certificate which is used for SSL access to the GINA - and/or the administration interface. This certificate is also used for TLS encryption to other systems.

 

Sections on this page:

Issued to

Issued by

Validity

Fingerprint

PKCS12 One-Time-Only Download

Backup

 

 

empty

anchor link Note:

SSL is a machine-related setting. This means that the certificate used here is not synchronised in the Cluster. If applicable, depending on the requirement and infrastructure (in particular, please refer to ADD TLS DOMAIN TLS Settings TLS setting "secure") - a separate certificate is to be used or the same certificate is to be imported on each cluster partner.

 

One exception is when using the option Use virtual hosting from the section Settings of the menu GINA Domains, since a separate certificate is to be integrated for each GINA domain here.

 

If a certificate is already included, it is displayed as follows.

Otherwise, the button Request or create a certificate... can be used to create a self-signed (or locally signed) SSL certificate or a certificate signing request (CSR).

The button Import existing certificate... can be used to import an already existing SSL certificate.

If the top of the status bar of the menu displays the information Remember to import the signed certificate, only the button Continue certificate signing request... is displayed. This button is used to continue or complete the obtainment of a certificate started by means of Request or create a certificate... via CSR.

 

empty

anchor link Note:

SSL server certificates must have both digital signature and key encryption as key usage as well as server authentication under extended usage.

Wildcard certificates are also permitted, for example *.firma.tld. "*.firma.tld". Here, it is to be noted that this type of certificate makes the TLS setting "secure" (see ADD TLS DOMAIN) impossible!

If TLS-secure is not required, the same certificate can also be used in the Cluster.

Subject Alternative Name (SAN) certificates (also called multi domain certificates) are also supported.

 

The root certificate and any associated intermediate certificates should be available under X.509 Root Certificates and classified as trustworthy.

This does not replace the import of the intermediate certificates (see also warning under IMPORT AN EXISTING CERTIFICATE (AUTHORITY)).

 

empty

anchor link Attention:

In the event of an error, the machine certificate must not be used.

This can lead to problems accessing the configuration interface. For this reason, before making any changes in this menu, the HTTP port should be temporarily released for access to the administration interface via System Advanced view Admin GUI HTTP port (http://<Appliance>:8080).

 

 

anchor link Section Issued to

 

This section displays information about the owner of the SSL certificate.

Depending on the certificate, not all parameters listed here must be given.

 

Parameters

Description

anchor link Name (CN)

Generally, this field contains the domain name via which the GINA portal can be reached, e.g. "securemail.mycompany.tld". If a wildcard certificate is used, the domain name would be "*.mycompany.tld".

With self-signed certificates, for instance "mycompany.local" could be displayed here. IP addresses, such as "10.0.0.10" should generally be avoided in this location.

anchor link Email address

Generally, the email address of the applicant or the administrator of the certificate or their department is entered.

anchor link Org. unit (OU)

Organisational unit, such as a department name, e.g. "Accounting"

anchor link Organisation (O)

Specifies the organisation for which the certificate was issued, for example "Company"

anchor link Locality (L)

Location, for example a town like "Neuenhof" or also a partial building like "Plant2"

anchor link State (ST)

Federal state, canton, province or similar, for example "AG" for "Aargau"

anchor link Country (C)

Country, for example "CH" for "Switzerland"

anchor link (Serial No.)

Serial number of the certificate

anchor link Subject Alternative Name

If the certificate is a so-called SAN or multi-domain certificate, the alternative applicant names can be seen here.

 

 

anchor link Section Issued by

 

This section displays information about the issuer of the SSL certificate (root certificate).

Depending on the issuer, not all parameters listed here have to be given.

 

Parameters

Description

anchor link Name (CN)

Name of the issuing certification authority

anchor link Email address

Generally, this is an email address for support enquiries to the issuer

anchor link Org. unit (OU)

Specifies an organisational unit of the issuer

anchor link Organisation (O)

Specifies the issuing organisation

anchor link Locality (L)

Indicates the location of the issuer

anchor link State (ST)

Indicates a federal state, canton, province or similar where the issuer is located

anchor link Country (C)

Specifies the country where the issuer is located

anchor link (Serial No.)

Serial number of the certificate

 

 

anchor link Section Validity

Shows the validity of the certificate.

 

Parameters

Description

anchor link Issued on

Issue date of the SSL certificate

anchor link Expires on

Expiration date of the SSL certificate

 

 

anchor link Section Fingerprint

 

The fingerprint is the checksum (also hash or fingerprint) and is used to verify a certificate. At this point, the hash algorithm (for example MD5 SHA1 or SHA256) with which the checksum was formed as well as the calculated value are displayed. If several fingerprints of different algorithms are available, each one is output in a separate line.

 

Parameters

Description

anchor link Hash algorithm of the certificate

Example of a SHA1 fingerprint:

48:2D:99:B1:64:C1:14:9C:B3:F2:C0:8D:FA:7F:40:9F:22:F5:11:F5

 

 

anchor link Section PKCS12 One-Time-Only Download

(new in 14.0.0)

 

The private key can be downloaded once directly after the certificate has been generated. This is no longer possible after refreshing the page.

 

anchor link Section Backup

 

Via Download certificate the SSL certificate (i.e. only the public key) can be downloaded in the PEN format.

If in the Cluster the same certificate is used for all cluster members, it can be distributed via the button Transfer to cluster members button to all members.

This transfer only works between backends (see Cluster Cluster members) or from the frontend (see Cluster Remote LDAP server) to the backend, but not from the backend to the frontend.

 

  

Keyboard Navigation

F7 for caret browsing
Hold ALT and press letter

This Info: ALT+q
Topic Header: ALT+t
Topic Body: ALT+b
Contents: ALT+c
Search: ALT+s
Exit Menu/Up: ESC