Configure the Server Certificate

. Before you configure the Server Certificate, you must Manage CA Trusted Root Certificates in Universal ZTNA.

Before a Server Certificate can be requested, a Certificate Signing Request (CSR) needs to be generated on behalf of Universal ZTNA to be signed by the Certificate Authority or Intermediate Certificate Authority.

Use this task to create a SAN configuration file, and execute a command against that file to create a new certificate file as well as a new private key file with no password.

  1. Access any Linux environment using SSH.
  2. After accessing the machine, generate a key file using the following comment.
    openssl genrsa -out serverkey.pem 2048
  3. Use vi, vim, or another editor to create a file named san.cnf.
  4. Edit the file and then copy in the text below.
    Edit the [dn] and [alt_names] fields to reflect the current environment. Ensure that the FQDN and and DNS name is reflective of the values shown in the Resources > RADIUS Server field section.

    [ req ] default_bits = 2048 prompt = no default_md = sha256 distinguished_name = dn req_extensions = req_ext

    [ dn ] CN = radius.va2-uz.extremecloudiq emailAddress = remote_demo@extremenetworks.com O = Extreme Networks OU = Solutions Engineering L = Salem ST = New Hampshire C = US

    [ req_ext ] subjectAltName = @alt_names

    [ alt_names ] DNS.1=radius.va2-uz.extremecloudiq.com

  5. Save the file and then run the following command:
    openssl req -new -key -serverkey.pem -out va2-uz-server.csr -config san.cnf
    This command will create a .csr file to be used to create a new server certificate to be used along with the serverkey.pem file to update the server certificate in Universal ZTNA.
  6. Go back to Microsoft Active Directory Certificate Services: https://<domain name>/certsrv.
  7. Select Request a Certificate and advanced certificate request.
  8. Copy the contents of the CSR file and paste it into the Save Request field.
  9. Select Web Server from the template drop-down and select Submit.
  10. Once complete, select Base 64 encoded and Download Certificate.
  11. The certificate request can also be made using powershell by issuing the following command:
    certreq -submit -attrib “CertificateTemplate: WebServer” va2-uz-server.csr
  12. Go to Universal ZTNA, select Resources > Certificate Management.
  13. Within the Server & Intermediate Certificates section, select Elipses and select Update Certificate.
    Note

    Note

    Both certificate and key files must be renamed be renamed using a .pem extension before being uploaded.
  14. Select Certificate with Embedded Key or Certificate with Separate Key.
  15. To upload the newly created certificate as well as the key file drag and drop or browse for the file.
  16. Select Update.
    Validation of the certificate will take upwards of two minutes to complete. Once this is accomplished, clients should be able to connect using 802.1X EAP-TLS.
  17. To invalidate RADIUS server certificates, select Elipses and select Invalidate Certificate from the drop-down menu.