Enable HTTPS on a private networkApache in front of Glassfish: mod_jk on https(443)What will happen if I force https for my image hosting site via .htaccess but embed an image with an http link?

Manager is threatning to grade me poorly if I don't complete the project

If Earth is tilted, why is Polaris always above the same spot?

How to improve/restore vintage Peugeot bike, or is it even worth it?

60s (or earlier) SF short story with FTL Travel using electron psychology aka addiclenendar technology

In Avengers 1, why does Thanos need Loki?

I caught several of my students plagiarizing. Could it be my fault as a teacher?

Can't remove one character of space in my environment

Transfer over $10k

Is it cheaper to drop cargo than to land it?

What word means "to make something obsolete"?

Why do we use caret (^) as the symbol for ctrl/control?

Identifying my late father's D&D stuff found in the attic

Why is C# in the D Major Scale?

Returning the outputs of a nested structure

Point of the the Dothraki's attack in GoT S8E3?

How did Arya get her dagger back from Sansa?

Do I really need diodes to receive MIDI?

Where can I go to avoid planes overhead?

Alias to source .bashrc after it's been edited?

In a Latex Table, how can I automatically resize cell heights to account for superscripts?

Should I replace my bicycle tires if they have not been inflated in multiple years

Besides the up and down quark, what other quarks are present in daily matter around us?

Can Ghost kill White Walkers or Wights?

What happens if I start too many background jobs?



Enable HTTPS on a private network


Apache in front of Glassfish: mod_jk on https(443)What will happen if I force https for my image hosting site via .htaccess but embed an image with an http link?






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








5















My company is creating presentation software. When in use, presenters sign on through an HTTPS-enabled web site to send text, documents, authentication tokens, etc.



How do I enable HTTPS communication when:



  1. There is only a dynamic internal IPv4 (196.168.0.x) address and some IPv6 address.

  2. The web site might be an internal-only site. (https://letsencrypt.org/ can't reach it.)

  3. No manual steps allowed. The customer installs the software and it is good to go.

For those interested, I'm using the C# control Httplistener and PowerShell.



Some of my research:



  1. Httplistener with HTTPS support

  2. How To Enable HTTPS🔒 On Your Website For Free

  3. How to get HTTPS: Setting up SSL on your website

  4. Generate self-signed certificate on the fly









share|improve this question



















  • 6





    TLS certificates are almost exclusively assigned to host names and not to ip-addresses.It does not matter that a host has only an private use IPv4 address, as long as you are the legitimate owner / delegated_admin of the domain you can get a valid certificate. Also most larger organizations have their own CA and should be able to issue your hosts valid internal use certificates

    – HBruijn
    Apr 22 at 22:28

















5















My company is creating presentation software. When in use, presenters sign on through an HTTPS-enabled web site to send text, documents, authentication tokens, etc.



How do I enable HTTPS communication when:



  1. There is only a dynamic internal IPv4 (196.168.0.x) address and some IPv6 address.

  2. The web site might be an internal-only site. (https://letsencrypt.org/ can't reach it.)

  3. No manual steps allowed. The customer installs the software and it is good to go.

For those interested, I'm using the C# control Httplistener and PowerShell.



Some of my research:



  1. Httplistener with HTTPS support

  2. How To Enable HTTPS🔒 On Your Website For Free

  3. How to get HTTPS: Setting up SSL on your website

  4. Generate self-signed certificate on the fly









share|improve this question



















  • 6





    TLS certificates are almost exclusively assigned to host names and not to ip-addresses.It does not matter that a host has only an private use IPv4 address, as long as you are the legitimate owner / delegated_admin of the domain you can get a valid certificate. Also most larger organizations have their own CA and should be able to issue your hosts valid internal use certificates

    – HBruijn
    Apr 22 at 22:28













5












5








5


1






My company is creating presentation software. When in use, presenters sign on through an HTTPS-enabled web site to send text, documents, authentication tokens, etc.



How do I enable HTTPS communication when:



  1. There is only a dynamic internal IPv4 (196.168.0.x) address and some IPv6 address.

  2. The web site might be an internal-only site. (https://letsencrypt.org/ can't reach it.)

  3. No manual steps allowed. The customer installs the software and it is good to go.

For those interested, I'm using the C# control Httplistener and PowerShell.



Some of my research:



  1. Httplistener with HTTPS support

  2. How To Enable HTTPS🔒 On Your Website For Free

  3. How to get HTTPS: Setting up SSL on your website

  4. Generate self-signed certificate on the fly









share|improve this question
















My company is creating presentation software. When in use, presenters sign on through an HTTPS-enabled web site to send text, documents, authentication tokens, etc.



How do I enable HTTPS communication when:



  1. There is only a dynamic internal IPv4 (196.168.0.x) address and some IPv6 address.

  2. The web site might be an internal-only site. (https://letsencrypt.org/ can't reach it.)

  3. No manual steps allowed. The customer installs the software and it is good to go.

For those interested, I'm using the C# control Httplistener and PowerShell.



Some of my research:



  1. Httplistener with HTTPS support

  2. How To Enable HTTPS🔒 On Your Website For Free

  3. How to get HTTPS: Setting up SSL on your website

  4. Generate self-signed certificate on the fly






http-server






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Apr 23 at 13:26









Peter Mortensen

2,15142124




2,15142124










asked Apr 22 at 22:10









Trevy BurgessTrevy Burgess

264




264







  • 6





    TLS certificates are almost exclusively assigned to host names and not to ip-addresses.It does not matter that a host has only an private use IPv4 address, as long as you are the legitimate owner / delegated_admin of the domain you can get a valid certificate. Also most larger organizations have their own CA and should be able to issue your hosts valid internal use certificates

    – HBruijn
    Apr 22 at 22:28












  • 6





    TLS certificates are almost exclusively assigned to host names and not to ip-addresses.It does not matter that a host has only an private use IPv4 address, as long as you are the legitimate owner / delegated_admin of the domain you can get a valid certificate. Also most larger organizations have their own CA and should be able to issue your hosts valid internal use certificates

    – HBruijn
    Apr 22 at 22:28







6




6





TLS certificates are almost exclusively assigned to host names and not to ip-addresses.It does not matter that a host has only an private use IPv4 address, as long as you are the legitimate owner / delegated_admin of the domain you can get a valid certificate. Also most larger organizations have their own CA and should be able to issue your hosts valid internal use certificates

– HBruijn
Apr 22 at 22:28





TLS certificates are almost exclusively assigned to host names and not to ip-addresses.It does not matter that a host has only an private use IPv4 address, as long as you are the legitimate owner / delegated_admin of the domain you can get a valid certificate. Also most larger organizations have their own CA and should be able to issue your hosts valid internal use certificates

– HBruijn
Apr 22 at 22:28










3 Answers
3






active

oldest

votes


















9














If your internal domain name matches an external domain name (e.g. sales.corp.example.com) you can still get a certificate from most public CAs, as they will accept ownership of example.com assuming whoever owns admin@example.com/webmaster@example.com/whatever is happy to approve your certificate request. The site itself does not need to be accessible over the internet. There are other providers that implement Let's Encrypt's ACME protocol so if you can't abide by their requirements you may still be able to use the same protocol with a different provider.



If no part of your internal domain is publicly resolvable (e.g. you used a fake TLD like sales.corp.example.local), then your only option is to use an internal CA.



If you want to use an internal CA to sign your certificates, then you'll need to install that CA as a trusted provider on all your devices. And if you want to do this "properly" then it's a fairly extensive thing to set up (typically you have a root CA that lives offline that signs a subordinate CA that actually signs your certificates). You'll need processes in place to rotate the root certificates when they come up for expiry and a way to distribute them (if you're fully integrated on a Windows domain with no Linux devices, this is actually not that hard).



Once upon a time it was possible to go to a CA and ask them to issue a certificate for an internal domain and go through a lengthy and expensive validation procedure, however new procedures introduced on 1st July 2012 banned any CA from issuing any certificate containing an internal common name from 2015, and revoke existing certificates by 2016. So unless you have a time machine that's not going to happen.




As an aside:




The customer installs the software and it is good to go




That's highly unlikely to ever happen. I've installed a lot of enterprise software over the years, and TLS configuration is something that I have always had to do by hand. There's a bunch of reasons why you cannot assume you can configure certificates automagically:



  • Customer may not have internet access from the host so you can't contact an external authority

  • Customer may have a very restricted list of approved CAs, and you have to have a certificate issued by them

  • Customer may require auditing of all certificates being issued for internal hostnames

In fact if your appliance was on my network with an automatically configured, valid, trusted SSL certificate out of the box I would be extremely suspicious. There are plenty of appliances that allow you to one-click configure Let's Encrypt but it is never, ever a default. It is always opt in.






share|improve this answer
































    3















    No manual steps allowed. The customer installs the software and it is
    good to go.




    If you do not control end user devices, no additional steps means you must use a CA already in their root certificate stores (OS or browser). The customer's internal PKI could sign your certificates, but that assumes they have one, and it won't work for unmanaged devices. Which leaves a well-known "public" CA.




    The web site might be an internal-only site. (https://letsencrypt.org/
    can't reach it.)




    Ownership challenges need not be from the host that gets the certificate. You mentioned Let's Encrypt, their DNS challenge can be done from any Internet visible DNS. Including wildcards, so you can issue *.present.example.com.






    share|improve this answer






























      1














      In my company we've got multiple Intranet-only web sites.
      Due to recent/current browser policy changes we've been setting them up with HTTPS/TLS support.



      As these sites are for internal use only we decided to set-up an in-house certificate authority using the Microsoft Active Directory Certificate Authority (MS AD CA) service.
      Additionally we're using [Company Name].local URLs for the websites.



      Using the AD CA service we created a RootCA certificate which gets distributed to all domain connected systems via the domain controller.
      Using the AD CA service we are then able to issue certificates for the various internal websites and devices with web interfaces.



      We then use the active directory DNS service to set-up the [Company Name].local domain to assign the correct IP-addresses to the correct URLs. As the internal AD DNS is the primary DNS for our network.



      The only issue we've had with this approach is the fact that the Firefox browser doesn't use the Windows certificate store and needs to have the created RootCA certificate imported manually.
      From my limited research it does seem to be possible to automatically import the RootCA certificate into the Firefox certificate store but due to the limited amount of Firefox users we decided to go the manual approach.
      Additionally if I recall correctly there is a feature request ticket pending with the Firefox development team to enable access to the Windows certificate store.



      This seemed to use to be to most robust solution for our situation, your mileage may differ :)



      For any external facing sites we use certificates from reputable sources.






      share|improve this answer























      • There’s an about:config setting for Firefox that tells it to use the Windows cert store (security.enterprise_roots.enabled).

        – Greg W
        Apr 23 at 11:22











      • @GregW Thanks, my latest research from a couple of months ago indicated that, that was still a work in progress. Can you confirm it works correctly? If so, I can edit it into the answer.

        – yetanothercoder
        Apr 23 at 12:13











      Your Answer








      StackExchange.ready(function()
      var channelOptions =
      tags: "".split(" "),
      id: "2"
      ;
      initTagRenderer("".split(" "), "".split(" "), channelOptions);

      StackExchange.using("externalEditor", function()
      // Have to fire editor after snippets, if snippets enabled
      if (StackExchange.settings.snippets.snippetsEnabled)
      StackExchange.using("snippets", function()
      createEditor();
      );

      else
      createEditor();

      );

      function createEditor()
      StackExchange.prepareEditor(
      heartbeatType: 'answer',
      autoActivateHeartbeat: false,
      convertImagesToLinks: true,
      noModals: true,
      showLowRepImageUploadWarning: true,
      reputationToPostImages: 10,
      bindNavPrevention: true,
      postfix: "",
      imageUploader:
      brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
      contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
      allowUrls: true
      ,
      onDemand: true,
      discardSelector: ".discard-answer"
      ,immediatelyShowMarkdownHelp:true
      );



      );













      draft saved

      draft discarded


















      StackExchange.ready(
      function ()
      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f964119%2fenable-https-on-a-private-network%23new-answer', 'question_page');

      );

      Post as a guest















      Required, but never shown

























      3 Answers
      3






      active

      oldest

      votes








      3 Answers
      3






      active

      oldest

      votes









      active

      oldest

      votes






      active

      oldest

      votes









      9














      If your internal domain name matches an external domain name (e.g. sales.corp.example.com) you can still get a certificate from most public CAs, as they will accept ownership of example.com assuming whoever owns admin@example.com/webmaster@example.com/whatever is happy to approve your certificate request. The site itself does not need to be accessible over the internet. There are other providers that implement Let's Encrypt's ACME protocol so if you can't abide by their requirements you may still be able to use the same protocol with a different provider.



      If no part of your internal domain is publicly resolvable (e.g. you used a fake TLD like sales.corp.example.local), then your only option is to use an internal CA.



      If you want to use an internal CA to sign your certificates, then you'll need to install that CA as a trusted provider on all your devices. And if you want to do this "properly" then it's a fairly extensive thing to set up (typically you have a root CA that lives offline that signs a subordinate CA that actually signs your certificates). You'll need processes in place to rotate the root certificates when they come up for expiry and a way to distribute them (if you're fully integrated on a Windows domain with no Linux devices, this is actually not that hard).



      Once upon a time it was possible to go to a CA and ask them to issue a certificate for an internal domain and go through a lengthy and expensive validation procedure, however new procedures introduced on 1st July 2012 banned any CA from issuing any certificate containing an internal common name from 2015, and revoke existing certificates by 2016. So unless you have a time machine that's not going to happen.




      As an aside:




      The customer installs the software and it is good to go




      That's highly unlikely to ever happen. I've installed a lot of enterprise software over the years, and TLS configuration is something that I have always had to do by hand. There's a bunch of reasons why you cannot assume you can configure certificates automagically:



      • Customer may not have internet access from the host so you can't contact an external authority

      • Customer may have a very restricted list of approved CAs, and you have to have a certificate issued by them

      • Customer may require auditing of all certificates being issued for internal hostnames

      In fact if your appliance was on my network with an automatically configured, valid, trusted SSL certificate out of the box I would be extremely suspicious. There are plenty of appliances that allow you to one-click configure Let's Encrypt but it is never, ever a default. It is always opt in.






      share|improve this answer





























        9














        If your internal domain name matches an external domain name (e.g. sales.corp.example.com) you can still get a certificate from most public CAs, as they will accept ownership of example.com assuming whoever owns admin@example.com/webmaster@example.com/whatever is happy to approve your certificate request. The site itself does not need to be accessible over the internet. There are other providers that implement Let's Encrypt's ACME protocol so if you can't abide by their requirements you may still be able to use the same protocol with a different provider.



        If no part of your internal domain is publicly resolvable (e.g. you used a fake TLD like sales.corp.example.local), then your only option is to use an internal CA.



        If you want to use an internal CA to sign your certificates, then you'll need to install that CA as a trusted provider on all your devices. And if you want to do this "properly" then it's a fairly extensive thing to set up (typically you have a root CA that lives offline that signs a subordinate CA that actually signs your certificates). You'll need processes in place to rotate the root certificates when they come up for expiry and a way to distribute them (if you're fully integrated on a Windows domain with no Linux devices, this is actually not that hard).



        Once upon a time it was possible to go to a CA and ask them to issue a certificate for an internal domain and go through a lengthy and expensive validation procedure, however new procedures introduced on 1st July 2012 banned any CA from issuing any certificate containing an internal common name from 2015, and revoke existing certificates by 2016. So unless you have a time machine that's not going to happen.




        As an aside:




        The customer installs the software and it is good to go




        That's highly unlikely to ever happen. I've installed a lot of enterprise software over the years, and TLS configuration is something that I have always had to do by hand. There's a bunch of reasons why you cannot assume you can configure certificates automagically:



        • Customer may not have internet access from the host so you can't contact an external authority

        • Customer may have a very restricted list of approved CAs, and you have to have a certificate issued by them

        • Customer may require auditing of all certificates being issued for internal hostnames

        In fact if your appliance was on my network with an automatically configured, valid, trusted SSL certificate out of the box I would be extremely suspicious. There are plenty of appliances that allow you to one-click configure Let's Encrypt but it is never, ever a default. It is always opt in.






        share|improve this answer



























          9












          9








          9







          If your internal domain name matches an external domain name (e.g. sales.corp.example.com) you can still get a certificate from most public CAs, as they will accept ownership of example.com assuming whoever owns admin@example.com/webmaster@example.com/whatever is happy to approve your certificate request. The site itself does not need to be accessible over the internet. There are other providers that implement Let's Encrypt's ACME protocol so if you can't abide by their requirements you may still be able to use the same protocol with a different provider.



          If no part of your internal domain is publicly resolvable (e.g. you used a fake TLD like sales.corp.example.local), then your only option is to use an internal CA.



          If you want to use an internal CA to sign your certificates, then you'll need to install that CA as a trusted provider on all your devices. And if you want to do this "properly" then it's a fairly extensive thing to set up (typically you have a root CA that lives offline that signs a subordinate CA that actually signs your certificates). You'll need processes in place to rotate the root certificates when they come up for expiry and a way to distribute them (if you're fully integrated on a Windows domain with no Linux devices, this is actually not that hard).



          Once upon a time it was possible to go to a CA and ask them to issue a certificate for an internal domain and go through a lengthy and expensive validation procedure, however new procedures introduced on 1st July 2012 banned any CA from issuing any certificate containing an internal common name from 2015, and revoke existing certificates by 2016. So unless you have a time machine that's not going to happen.




          As an aside:




          The customer installs the software and it is good to go




          That's highly unlikely to ever happen. I've installed a lot of enterprise software over the years, and TLS configuration is something that I have always had to do by hand. There's a bunch of reasons why you cannot assume you can configure certificates automagically:



          • Customer may not have internet access from the host so you can't contact an external authority

          • Customer may have a very restricted list of approved CAs, and you have to have a certificate issued by them

          • Customer may require auditing of all certificates being issued for internal hostnames

          In fact if your appliance was on my network with an automatically configured, valid, trusted SSL certificate out of the box I would be extremely suspicious. There are plenty of appliances that allow you to one-click configure Let's Encrypt but it is never, ever a default. It is always opt in.






          share|improve this answer















          If your internal domain name matches an external domain name (e.g. sales.corp.example.com) you can still get a certificate from most public CAs, as they will accept ownership of example.com assuming whoever owns admin@example.com/webmaster@example.com/whatever is happy to approve your certificate request. The site itself does not need to be accessible over the internet. There are other providers that implement Let's Encrypt's ACME protocol so if you can't abide by their requirements you may still be able to use the same protocol with a different provider.



          If no part of your internal domain is publicly resolvable (e.g. you used a fake TLD like sales.corp.example.local), then your only option is to use an internal CA.



          If you want to use an internal CA to sign your certificates, then you'll need to install that CA as a trusted provider on all your devices. And if you want to do this "properly" then it's a fairly extensive thing to set up (typically you have a root CA that lives offline that signs a subordinate CA that actually signs your certificates). You'll need processes in place to rotate the root certificates when they come up for expiry and a way to distribute them (if you're fully integrated on a Windows domain with no Linux devices, this is actually not that hard).



          Once upon a time it was possible to go to a CA and ask them to issue a certificate for an internal domain and go through a lengthy and expensive validation procedure, however new procedures introduced on 1st July 2012 banned any CA from issuing any certificate containing an internal common name from 2015, and revoke existing certificates by 2016. So unless you have a time machine that's not going to happen.




          As an aside:




          The customer installs the software and it is good to go




          That's highly unlikely to ever happen. I've installed a lot of enterprise software over the years, and TLS configuration is something that I have always had to do by hand. There's a bunch of reasons why you cannot assume you can configure certificates automagically:



          • Customer may not have internet access from the host so you can't contact an external authority

          • Customer may have a very restricted list of approved CAs, and you have to have a certificate issued by them

          • Customer may require auditing of all certificates being issued for internal hostnames

          In fact if your appliance was on my network with an automatically configured, valid, trusted SSL certificate out of the box I would be extremely suspicious. There are plenty of appliances that allow you to one-click configure Let's Encrypt but it is never, ever a default. It is always opt in.







          share|improve this answer














          share|improve this answer



          share|improve this answer








          edited Apr 23 at 2:08

























          answered Apr 23 at 2:03









          Mark HendersonMark Henderson

          61.5k29163248




          61.5k29163248























              3















              No manual steps allowed. The customer installs the software and it is
              good to go.




              If you do not control end user devices, no additional steps means you must use a CA already in their root certificate stores (OS or browser). The customer's internal PKI could sign your certificates, but that assumes they have one, and it won't work for unmanaged devices. Which leaves a well-known "public" CA.




              The web site might be an internal-only site. (https://letsencrypt.org/
              can't reach it.)




              Ownership challenges need not be from the host that gets the certificate. You mentioned Let's Encrypt, their DNS challenge can be done from any Internet visible DNS. Including wildcards, so you can issue *.present.example.com.






              share|improve this answer



























                3















                No manual steps allowed. The customer installs the software and it is
                good to go.




                If you do not control end user devices, no additional steps means you must use a CA already in their root certificate stores (OS or browser). The customer's internal PKI could sign your certificates, but that assumes they have one, and it won't work for unmanaged devices. Which leaves a well-known "public" CA.




                The web site might be an internal-only site. (https://letsencrypt.org/
                can't reach it.)




                Ownership challenges need not be from the host that gets the certificate. You mentioned Let's Encrypt, their DNS challenge can be done from any Internet visible DNS. Including wildcards, so you can issue *.present.example.com.






                share|improve this answer

























                  3












                  3








                  3








                  No manual steps allowed. The customer installs the software and it is
                  good to go.




                  If you do not control end user devices, no additional steps means you must use a CA already in their root certificate stores (OS or browser). The customer's internal PKI could sign your certificates, but that assumes they have one, and it won't work for unmanaged devices. Which leaves a well-known "public" CA.




                  The web site might be an internal-only site. (https://letsencrypt.org/
                  can't reach it.)




                  Ownership challenges need not be from the host that gets the certificate. You mentioned Let's Encrypt, their DNS challenge can be done from any Internet visible DNS. Including wildcards, so you can issue *.present.example.com.






                  share|improve this answer














                  No manual steps allowed. The customer installs the software and it is
                  good to go.




                  If you do not control end user devices, no additional steps means you must use a CA already in their root certificate stores (OS or browser). The customer's internal PKI could sign your certificates, but that assumes they have one, and it won't work for unmanaged devices. Which leaves a well-known "public" CA.




                  The web site might be an internal-only site. (https://letsencrypt.org/
                  can't reach it.)




                  Ownership challenges need not be from the host that gets the certificate. You mentioned Let's Encrypt, their DNS challenge can be done from any Internet visible DNS. Including wildcards, so you can issue *.present.example.com.







                  share|improve this answer












                  share|improve this answer



                  share|improve this answer










                  answered Apr 23 at 1:55









                  John MahowaldJohn Mahowald

                  9,4041713




                  9,4041713





















                      1














                      In my company we've got multiple Intranet-only web sites.
                      Due to recent/current browser policy changes we've been setting them up with HTTPS/TLS support.



                      As these sites are for internal use only we decided to set-up an in-house certificate authority using the Microsoft Active Directory Certificate Authority (MS AD CA) service.
                      Additionally we're using [Company Name].local URLs for the websites.



                      Using the AD CA service we created a RootCA certificate which gets distributed to all domain connected systems via the domain controller.
                      Using the AD CA service we are then able to issue certificates for the various internal websites and devices with web interfaces.



                      We then use the active directory DNS service to set-up the [Company Name].local domain to assign the correct IP-addresses to the correct URLs. As the internal AD DNS is the primary DNS for our network.



                      The only issue we've had with this approach is the fact that the Firefox browser doesn't use the Windows certificate store and needs to have the created RootCA certificate imported manually.
                      From my limited research it does seem to be possible to automatically import the RootCA certificate into the Firefox certificate store but due to the limited amount of Firefox users we decided to go the manual approach.
                      Additionally if I recall correctly there is a feature request ticket pending with the Firefox development team to enable access to the Windows certificate store.



                      This seemed to use to be to most robust solution for our situation, your mileage may differ :)



                      For any external facing sites we use certificates from reputable sources.






                      share|improve this answer























                      • There’s an about:config setting for Firefox that tells it to use the Windows cert store (security.enterprise_roots.enabled).

                        – Greg W
                        Apr 23 at 11:22











                      • @GregW Thanks, my latest research from a couple of months ago indicated that, that was still a work in progress. Can you confirm it works correctly? If so, I can edit it into the answer.

                        – yetanothercoder
                        Apr 23 at 12:13















                      1














                      In my company we've got multiple Intranet-only web sites.
                      Due to recent/current browser policy changes we've been setting them up with HTTPS/TLS support.



                      As these sites are for internal use only we decided to set-up an in-house certificate authority using the Microsoft Active Directory Certificate Authority (MS AD CA) service.
                      Additionally we're using [Company Name].local URLs for the websites.



                      Using the AD CA service we created a RootCA certificate which gets distributed to all domain connected systems via the domain controller.
                      Using the AD CA service we are then able to issue certificates for the various internal websites and devices with web interfaces.



                      We then use the active directory DNS service to set-up the [Company Name].local domain to assign the correct IP-addresses to the correct URLs. As the internal AD DNS is the primary DNS for our network.



                      The only issue we've had with this approach is the fact that the Firefox browser doesn't use the Windows certificate store and needs to have the created RootCA certificate imported manually.
                      From my limited research it does seem to be possible to automatically import the RootCA certificate into the Firefox certificate store but due to the limited amount of Firefox users we decided to go the manual approach.
                      Additionally if I recall correctly there is a feature request ticket pending with the Firefox development team to enable access to the Windows certificate store.



                      This seemed to use to be to most robust solution for our situation, your mileage may differ :)



                      For any external facing sites we use certificates from reputable sources.






                      share|improve this answer























                      • There’s an about:config setting for Firefox that tells it to use the Windows cert store (security.enterprise_roots.enabled).

                        – Greg W
                        Apr 23 at 11:22











                      • @GregW Thanks, my latest research from a couple of months ago indicated that, that was still a work in progress. Can you confirm it works correctly? If so, I can edit it into the answer.

                        – yetanothercoder
                        Apr 23 at 12:13













                      1












                      1








                      1







                      In my company we've got multiple Intranet-only web sites.
                      Due to recent/current browser policy changes we've been setting them up with HTTPS/TLS support.



                      As these sites are for internal use only we decided to set-up an in-house certificate authority using the Microsoft Active Directory Certificate Authority (MS AD CA) service.
                      Additionally we're using [Company Name].local URLs for the websites.



                      Using the AD CA service we created a RootCA certificate which gets distributed to all domain connected systems via the domain controller.
                      Using the AD CA service we are then able to issue certificates for the various internal websites and devices with web interfaces.



                      We then use the active directory DNS service to set-up the [Company Name].local domain to assign the correct IP-addresses to the correct URLs. As the internal AD DNS is the primary DNS for our network.



                      The only issue we've had with this approach is the fact that the Firefox browser doesn't use the Windows certificate store and needs to have the created RootCA certificate imported manually.
                      From my limited research it does seem to be possible to automatically import the RootCA certificate into the Firefox certificate store but due to the limited amount of Firefox users we decided to go the manual approach.
                      Additionally if I recall correctly there is a feature request ticket pending with the Firefox development team to enable access to the Windows certificate store.



                      This seemed to use to be to most robust solution for our situation, your mileage may differ :)



                      For any external facing sites we use certificates from reputable sources.






                      share|improve this answer













                      In my company we've got multiple Intranet-only web sites.
                      Due to recent/current browser policy changes we've been setting them up with HTTPS/TLS support.



                      As these sites are for internal use only we decided to set-up an in-house certificate authority using the Microsoft Active Directory Certificate Authority (MS AD CA) service.
                      Additionally we're using [Company Name].local URLs for the websites.



                      Using the AD CA service we created a RootCA certificate which gets distributed to all domain connected systems via the domain controller.
                      Using the AD CA service we are then able to issue certificates for the various internal websites and devices with web interfaces.



                      We then use the active directory DNS service to set-up the [Company Name].local domain to assign the correct IP-addresses to the correct URLs. As the internal AD DNS is the primary DNS for our network.



                      The only issue we've had with this approach is the fact that the Firefox browser doesn't use the Windows certificate store and needs to have the created RootCA certificate imported manually.
                      From my limited research it does seem to be possible to automatically import the RootCA certificate into the Firefox certificate store but due to the limited amount of Firefox users we decided to go the manual approach.
                      Additionally if I recall correctly there is a feature request ticket pending with the Firefox development team to enable access to the Windows certificate store.



                      This seemed to use to be to most robust solution for our situation, your mileage may differ :)



                      For any external facing sites we use certificates from reputable sources.







                      share|improve this answer












                      share|improve this answer



                      share|improve this answer










                      answered Apr 23 at 10:38









                      yetanothercoderyetanothercoder

                      1111




                      1111












                      • There’s an about:config setting for Firefox that tells it to use the Windows cert store (security.enterprise_roots.enabled).

                        – Greg W
                        Apr 23 at 11:22











                      • @GregW Thanks, my latest research from a couple of months ago indicated that, that was still a work in progress. Can you confirm it works correctly? If so, I can edit it into the answer.

                        – yetanothercoder
                        Apr 23 at 12:13

















                      • There’s an about:config setting for Firefox that tells it to use the Windows cert store (security.enterprise_roots.enabled).

                        – Greg W
                        Apr 23 at 11:22











                      • @GregW Thanks, my latest research from a couple of months ago indicated that, that was still a work in progress. Can you confirm it works correctly? If so, I can edit it into the answer.

                        – yetanothercoder
                        Apr 23 at 12:13
















                      There’s an about:config setting for Firefox that tells it to use the Windows cert store (security.enterprise_roots.enabled).

                      – Greg W
                      Apr 23 at 11:22





                      There’s an about:config setting for Firefox that tells it to use the Windows cert store (security.enterprise_roots.enabled).

                      – Greg W
                      Apr 23 at 11:22













                      @GregW Thanks, my latest research from a couple of months ago indicated that, that was still a work in progress. Can you confirm it works correctly? If so, I can edit it into the answer.

                      – yetanothercoder
                      Apr 23 at 12:13





                      @GregW Thanks, my latest research from a couple of months ago indicated that, that was still a work in progress. Can you confirm it works correctly? If so, I can edit it into the answer.

                      – yetanothercoder
                      Apr 23 at 12:13

















                      draft saved

                      draft discarded
















































                      Thanks for contributing an answer to Server Fault!


                      • Please be sure to answer the question. Provide details and share your research!

                      But avoid


                      • Asking for help, clarification, or responding to other answers.

                      • Making statements based on opinion; back them up with references or personal experience.

                      To learn more, see our tips on writing great answers.




                      draft saved


                      draft discarded














                      StackExchange.ready(
                      function ()
                      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f964119%2fenable-https-on-a-private-network%23new-answer', 'question_page');

                      );

                      Post as a guest















                      Required, but never shown





















































                      Required, but never shown














                      Required, but never shown












                      Required, but never shown







                      Required, but never shown

































                      Required, but never shown














                      Required, but never shown












                      Required, but never shown







                      Required, but never shown







                      Popular posts from this blog

                      Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

                      Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

                      Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020