Enable HTTPS on a private networkApache in front of Glassfish: mod_jk on https(443)What will happen if I force https for my image hosting site via .htaccess but embed an image with an http link?
Manager is threatning to grade me poorly if I don't complete the project
If Earth is tilted, why is Polaris always above the same spot?
How to improve/restore vintage Peugeot bike, or is it even worth it?
60s (or earlier) SF short story with FTL Travel using electron psychology aka addiclenendar technology
In Avengers 1, why does Thanos need Loki?
I caught several of my students plagiarizing. Could it be my fault as a teacher?
Can't remove one character of space in my environment
Transfer over $10k
Is it cheaper to drop cargo than to land it?
What word means "to make something obsolete"?
Why do we use caret (^) as the symbol for ctrl/control?
Identifying my late father's D&D stuff found in the attic
Why is C# in the D Major Scale?
Returning the outputs of a nested structure
Point of the the Dothraki's attack in GoT S8E3?
How did Arya get her dagger back from Sansa?
Do I really need diodes to receive MIDI?
Where can I go to avoid planes overhead?
Alias to source .bashrc after it's been edited?
In a Latex Table, how can I automatically resize cell heights to account for superscripts?
Should I replace my bicycle tires if they have not been inflated in multiple years
Besides the up and down quark, what other quarks are present in daily matter around us?
Can Ghost kill White Walkers or Wights?
What happens if I start too many background jobs?
Enable HTTPS on a private network
Apache in front of Glassfish: mod_jk on https(443)What will happen if I force https for my image hosting site via .htaccess but embed an image with an http link?
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;
My company is creating presentation software. When in use, presenters sign on through an HTTPS-enabled web site to send text, documents, authentication tokens, etc.
How do I enable HTTPS communication when:
- There is only a dynamic internal IPv4 (196.168.0.x) address and some IPv6 address.
- The web site might be an internal-only site. (https://letsencrypt.org/ can't reach it.)
- No manual steps allowed. The customer installs the software and it is good to go.
For those interested, I'm using the C# control Httplistener and PowerShell.
Some of my research:
- Httplistener with HTTPS support
- How To Enable HTTPS🔒 On Your Website For Free
- How to get HTTPS: Setting up SSL on your website
- Generate self-signed certificate on the fly
http-server
add a comment |
My company is creating presentation software. When in use, presenters sign on through an HTTPS-enabled web site to send text, documents, authentication tokens, etc.
How do I enable HTTPS communication when:
- There is only a dynamic internal IPv4 (196.168.0.x) address and some IPv6 address.
- The web site might be an internal-only site. (https://letsencrypt.org/ can't reach it.)
- No manual steps allowed. The customer installs the software and it is good to go.
For those interested, I'm using the C# control Httplistener and PowerShell.
Some of my research:
- Httplistener with HTTPS support
- How To Enable HTTPS🔒 On Your Website For Free
- How to get HTTPS: Setting up SSL on your website
- Generate self-signed certificate on the fly
http-server
6
TLS certificates are almost exclusively assigned to host names and not to ip-addresses.It does not matter that a host has only an private use IPv4 address, as long as you are the legitimate owner / delegated_admin of the domain you can get a valid certificate. Also most larger organizations have their own CA and should be able to issue your hosts valid internal use certificates
– HBruijn
Apr 22 at 22:28
add a comment |
My company is creating presentation software. When in use, presenters sign on through an HTTPS-enabled web site to send text, documents, authentication tokens, etc.
How do I enable HTTPS communication when:
- There is only a dynamic internal IPv4 (196.168.0.x) address and some IPv6 address.
- The web site might be an internal-only site. (https://letsencrypt.org/ can't reach it.)
- No manual steps allowed. The customer installs the software and it is good to go.
For those interested, I'm using the C# control Httplistener and PowerShell.
Some of my research:
- Httplistener with HTTPS support
- How To Enable HTTPS🔒 On Your Website For Free
- How to get HTTPS: Setting up SSL on your website
- Generate self-signed certificate on the fly
http-server
My company is creating presentation software. When in use, presenters sign on through an HTTPS-enabled web site to send text, documents, authentication tokens, etc.
How do I enable HTTPS communication when:
- There is only a dynamic internal IPv4 (196.168.0.x) address and some IPv6 address.
- The web site might be an internal-only site. (https://letsencrypt.org/ can't reach it.)
- No manual steps allowed. The customer installs the software and it is good to go.
For those interested, I'm using the C# control Httplistener and PowerShell.
Some of my research:
- Httplistener with HTTPS support
- How To Enable HTTPS🔒 On Your Website For Free
- How to get HTTPS: Setting up SSL on your website
- Generate self-signed certificate on the fly
http-server
http-server
edited Apr 23 at 13:26
Peter Mortensen
2,15142124
2,15142124
asked Apr 22 at 22:10
Trevy BurgessTrevy Burgess
264
264
6
TLS certificates are almost exclusively assigned to host names and not to ip-addresses.It does not matter that a host has only an private use IPv4 address, as long as you are the legitimate owner / delegated_admin of the domain you can get a valid certificate. Also most larger organizations have their own CA and should be able to issue your hosts valid internal use certificates
– HBruijn
Apr 22 at 22:28
add a comment |
6
TLS certificates are almost exclusively assigned to host names and not to ip-addresses.It does not matter that a host has only an private use IPv4 address, as long as you are the legitimate owner / delegated_admin of the domain you can get a valid certificate. Also most larger organizations have their own CA and should be able to issue your hosts valid internal use certificates
– HBruijn
Apr 22 at 22:28
6
6
TLS certificates are almost exclusively assigned to host names and not to ip-addresses.It does not matter that a host has only an private use IPv4 address, as long as you are the legitimate owner / delegated_admin of the domain you can get a valid certificate. Also most larger organizations have their own CA and should be able to issue your hosts valid internal use certificates
– HBruijn
Apr 22 at 22:28
TLS certificates are almost exclusively assigned to host names and not to ip-addresses.It does not matter that a host has only an private use IPv4 address, as long as you are the legitimate owner / delegated_admin of the domain you can get a valid certificate. Also most larger organizations have their own CA and should be able to issue your hosts valid internal use certificates
– HBruijn
Apr 22 at 22:28
add a comment |
3 Answers
3
active
oldest
votes
If your internal domain name matches an external domain name (e.g. sales.corp.example.com
) you can still get a certificate from most public CAs, as they will accept ownership of example.com
assuming whoever owns admin@example.com
/webmaster@example.com
/whatever is happy to approve your certificate request. The site itself does not need to be accessible over the internet. There are other providers that implement Let's Encrypt's ACME protocol so if you can't abide by their requirements you may still be able to use the same protocol with a different provider.
If no part of your internal domain is publicly resolvable (e.g. you used a fake TLD like sales.corp.example.local
), then your only option is to use an internal CA.
If you want to use an internal CA to sign your certificates, then you'll need to install that CA as a trusted provider on all your devices. And if you want to do this "properly" then it's a fairly extensive thing to set up (typically you have a root CA that lives offline that signs a subordinate CA that actually signs your certificates). You'll need processes in place to rotate the root certificates when they come up for expiry and a way to distribute them (if you're fully integrated on a Windows domain with no Linux devices, this is actually not that hard).
Once upon a time it was possible to go to a CA and ask them to issue a certificate for an internal domain and go through a lengthy and expensive validation procedure, however new procedures introduced on 1st July 2012 banned any CA from issuing any certificate containing an internal common name from 2015, and revoke existing certificates by 2016. So unless you have a time machine that's not going to happen.
As an aside:
The customer installs the software and it is good to go
That's highly unlikely to ever happen. I've installed a lot of enterprise software over the years, and TLS configuration is something that I have always had to do by hand. There's a bunch of reasons why you cannot assume you can configure certificates automagically:
- Customer may not have internet access from the host so you can't contact an external authority
- Customer may have a very restricted list of approved CAs, and you have to have a certificate issued by them
- Customer may require auditing of all certificates being issued for internal hostnames
In fact if your appliance was on my network with an automatically configured, valid, trusted SSL certificate out of the box I would be extremely suspicious. There are plenty of appliances that allow you to one-click configure Let's Encrypt but it is never, ever a default. It is always opt in.
add a comment |
No manual steps allowed. The customer installs the software and it is
good to go.
If you do not control end user devices, no additional steps means you must use a CA already in their root certificate stores (OS or browser). The customer's internal PKI could sign your certificates, but that assumes they have one, and it won't work for unmanaged devices. Which leaves a well-known "public" CA.
The web site might be an internal-only site. (https://letsencrypt.org/
can't reach it.)
Ownership challenges need not be from the host that gets the certificate. You mentioned Let's Encrypt, their DNS challenge can be done from any Internet visible DNS. Including wildcards, so you can issue *.present.example.com
.
add a comment |
In my company we've got multiple Intranet-only web sites.
Due to recent/current browser policy changes we've been setting them up with HTTPS/TLS support.
As these sites are for internal use only we decided to set-up an in-house certificate authority using the Microsoft Active Directory Certificate Authority (MS AD CA) service.
Additionally we're using [Company Name].local URLs for the websites.
Using the AD CA service we created a RootCA certificate which gets distributed to all domain connected systems via the domain controller.
Using the AD CA service we are then able to issue certificates for the various internal websites and devices with web interfaces.
We then use the active directory DNS service to set-up the [Company Name].local domain to assign the correct IP-addresses to the correct URLs. As the internal AD DNS is the primary DNS for our network.
The only issue we've had with this approach is the fact that the Firefox browser doesn't use the Windows certificate store and needs to have the created RootCA certificate imported manually.
From my limited research it does seem to be possible to automatically import the RootCA certificate into the Firefox certificate store but due to the limited amount of Firefox users we decided to go the manual approach.
Additionally if I recall correctly there is a feature request ticket pending with the Firefox development team to enable access to the Windows certificate store.
This seemed to use to be to most robust solution for our situation, your mileage may differ :)
For any external facing sites we use certificates from reputable sources.
There’s an about:config setting for Firefox that tells it to use the Windows cert store (security.enterprise_roots.enabled).
– Greg W
Apr 23 at 11:22
@GregW Thanks, my latest research from a couple of months ago indicated that, that was still a work in progress. Can you confirm it works correctly? If so, I can edit it into the answer.
– yetanothercoder
Apr 23 at 12:13
add a comment |
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "2"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f964119%2fenable-https-on-a-private-network%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
3 Answers
3
active
oldest
votes
3 Answers
3
active
oldest
votes
active
oldest
votes
active
oldest
votes
If your internal domain name matches an external domain name (e.g. sales.corp.example.com
) you can still get a certificate from most public CAs, as they will accept ownership of example.com
assuming whoever owns admin@example.com
/webmaster@example.com
/whatever is happy to approve your certificate request. The site itself does not need to be accessible over the internet. There are other providers that implement Let's Encrypt's ACME protocol so if you can't abide by their requirements you may still be able to use the same protocol with a different provider.
If no part of your internal domain is publicly resolvable (e.g. you used a fake TLD like sales.corp.example.local
), then your only option is to use an internal CA.
If you want to use an internal CA to sign your certificates, then you'll need to install that CA as a trusted provider on all your devices. And if you want to do this "properly" then it's a fairly extensive thing to set up (typically you have a root CA that lives offline that signs a subordinate CA that actually signs your certificates). You'll need processes in place to rotate the root certificates when they come up for expiry and a way to distribute them (if you're fully integrated on a Windows domain with no Linux devices, this is actually not that hard).
Once upon a time it was possible to go to a CA and ask them to issue a certificate for an internal domain and go through a lengthy and expensive validation procedure, however new procedures introduced on 1st July 2012 banned any CA from issuing any certificate containing an internal common name from 2015, and revoke existing certificates by 2016. So unless you have a time machine that's not going to happen.
As an aside:
The customer installs the software and it is good to go
That's highly unlikely to ever happen. I've installed a lot of enterprise software over the years, and TLS configuration is something that I have always had to do by hand. There's a bunch of reasons why you cannot assume you can configure certificates automagically:
- Customer may not have internet access from the host so you can't contact an external authority
- Customer may have a very restricted list of approved CAs, and you have to have a certificate issued by them
- Customer may require auditing of all certificates being issued for internal hostnames
In fact if your appliance was on my network with an automatically configured, valid, trusted SSL certificate out of the box I would be extremely suspicious. There are plenty of appliances that allow you to one-click configure Let's Encrypt but it is never, ever a default. It is always opt in.
add a comment |
If your internal domain name matches an external domain name (e.g. sales.corp.example.com
) you can still get a certificate from most public CAs, as they will accept ownership of example.com
assuming whoever owns admin@example.com
/webmaster@example.com
/whatever is happy to approve your certificate request. The site itself does not need to be accessible over the internet. There are other providers that implement Let's Encrypt's ACME protocol so if you can't abide by their requirements you may still be able to use the same protocol with a different provider.
If no part of your internal domain is publicly resolvable (e.g. you used a fake TLD like sales.corp.example.local
), then your only option is to use an internal CA.
If you want to use an internal CA to sign your certificates, then you'll need to install that CA as a trusted provider on all your devices. And if you want to do this "properly" then it's a fairly extensive thing to set up (typically you have a root CA that lives offline that signs a subordinate CA that actually signs your certificates). You'll need processes in place to rotate the root certificates when they come up for expiry and a way to distribute them (if you're fully integrated on a Windows domain with no Linux devices, this is actually not that hard).
Once upon a time it was possible to go to a CA and ask them to issue a certificate for an internal domain and go through a lengthy and expensive validation procedure, however new procedures introduced on 1st July 2012 banned any CA from issuing any certificate containing an internal common name from 2015, and revoke existing certificates by 2016. So unless you have a time machine that's not going to happen.
As an aside:
The customer installs the software and it is good to go
That's highly unlikely to ever happen. I've installed a lot of enterprise software over the years, and TLS configuration is something that I have always had to do by hand. There's a bunch of reasons why you cannot assume you can configure certificates automagically:
- Customer may not have internet access from the host so you can't contact an external authority
- Customer may have a very restricted list of approved CAs, and you have to have a certificate issued by them
- Customer may require auditing of all certificates being issued for internal hostnames
In fact if your appliance was on my network with an automatically configured, valid, trusted SSL certificate out of the box I would be extremely suspicious. There are plenty of appliances that allow you to one-click configure Let's Encrypt but it is never, ever a default. It is always opt in.
add a comment |
If your internal domain name matches an external domain name (e.g. sales.corp.example.com
) you can still get a certificate from most public CAs, as they will accept ownership of example.com
assuming whoever owns admin@example.com
/webmaster@example.com
/whatever is happy to approve your certificate request. The site itself does not need to be accessible over the internet. There are other providers that implement Let's Encrypt's ACME protocol so if you can't abide by their requirements you may still be able to use the same protocol with a different provider.
If no part of your internal domain is publicly resolvable (e.g. you used a fake TLD like sales.corp.example.local
), then your only option is to use an internal CA.
If you want to use an internal CA to sign your certificates, then you'll need to install that CA as a trusted provider on all your devices. And if you want to do this "properly" then it's a fairly extensive thing to set up (typically you have a root CA that lives offline that signs a subordinate CA that actually signs your certificates). You'll need processes in place to rotate the root certificates when they come up for expiry and a way to distribute them (if you're fully integrated on a Windows domain with no Linux devices, this is actually not that hard).
Once upon a time it was possible to go to a CA and ask them to issue a certificate for an internal domain and go through a lengthy and expensive validation procedure, however new procedures introduced on 1st July 2012 banned any CA from issuing any certificate containing an internal common name from 2015, and revoke existing certificates by 2016. So unless you have a time machine that's not going to happen.
As an aside:
The customer installs the software and it is good to go
That's highly unlikely to ever happen. I've installed a lot of enterprise software over the years, and TLS configuration is something that I have always had to do by hand. There's a bunch of reasons why you cannot assume you can configure certificates automagically:
- Customer may not have internet access from the host so you can't contact an external authority
- Customer may have a very restricted list of approved CAs, and you have to have a certificate issued by them
- Customer may require auditing of all certificates being issued for internal hostnames
In fact if your appliance was on my network with an automatically configured, valid, trusted SSL certificate out of the box I would be extremely suspicious. There are plenty of appliances that allow you to one-click configure Let's Encrypt but it is never, ever a default. It is always opt in.
If your internal domain name matches an external domain name (e.g. sales.corp.example.com
) you can still get a certificate from most public CAs, as they will accept ownership of example.com
assuming whoever owns admin@example.com
/webmaster@example.com
/whatever is happy to approve your certificate request. The site itself does not need to be accessible over the internet. There are other providers that implement Let's Encrypt's ACME protocol so if you can't abide by their requirements you may still be able to use the same protocol with a different provider.
If no part of your internal domain is publicly resolvable (e.g. you used a fake TLD like sales.corp.example.local
), then your only option is to use an internal CA.
If you want to use an internal CA to sign your certificates, then you'll need to install that CA as a trusted provider on all your devices. And if you want to do this "properly" then it's a fairly extensive thing to set up (typically you have a root CA that lives offline that signs a subordinate CA that actually signs your certificates). You'll need processes in place to rotate the root certificates when they come up for expiry and a way to distribute them (if you're fully integrated on a Windows domain with no Linux devices, this is actually not that hard).
Once upon a time it was possible to go to a CA and ask them to issue a certificate for an internal domain and go through a lengthy and expensive validation procedure, however new procedures introduced on 1st July 2012 banned any CA from issuing any certificate containing an internal common name from 2015, and revoke existing certificates by 2016. So unless you have a time machine that's not going to happen.
As an aside:
The customer installs the software and it is good to go
That's highly unlikely to ever happen. I've installed a lot of enterprise software over the years, and TLS configuration is something that I have always had to do by hand. There's a bunch of reasons why you cannot assume you can configure certificates automagically:
- Customer may not have internet access from the host so you can't contact an external authority
- Customer may have a very restricted list of approved CAs, and you have to have a certificate issued by them
- Customer may require auditing of all certificates being issued for internal hostnames
In fact if your appliance was on my network with an automatically configured, valid, trusted SSL certificate out of the box I would be extremely suspicious. There are plenty of appliances that allow you to one-click configure Let's Encrypt but it is never, ever a default. It is always opt in.
edited Apr 23 at 2:08
answered Apr 23 at 2:03
Mark Henderson♦Mark Henderson
61.5k29163248
61.5k29163248
add a comment |
add a comment |
No manual steps allowed. The customer installs the software and it is
good to go.
If you do not control end user devices, no additional steps means you must use a CA already in their root certificate stores (OS or browser). The customer's internal PKI could sign your certificates, but that assumes they have one, and it won't work for unmanaged devices. Which leaves a well-known "public" CA.
The web site might be an internal-only site. (https://letsencrypt.org/
can't reach it.)
Ownership challenges need not be from the host that gets the certificate. You mentioned Let's Encrypt, their DNS challenge can be done from any Internet visible DNS. Including wildcards, so you can issue *.present.example.com
.
add a comment |
No manual steps allowed. The customer installs the software and it is
good to go.
If you do not control end user devices, no additional steps means you must use a CA already in their root certificate stores (OS or browser). The customer's internal PKI could sign your certificates, but that assumes they have one, and it won't work for unmanaged devices. Which leaves a well-known "public" CA.
The web site might be an internal-only site. (https://letsencrypt.org/
can't reach it.)
Ownership challenges need not be from the host that gets the certificate. You mentioned Let's Encrypt, their DNS challenge can be done from any Internet visible DNS. Including wildcards, so you can issue *.present.example.com
.
add a comment |
No manual steps allowed. The customer installs the software and it is
good to go.
If you do not control end user devices, no additional steps means you must use a CA already in their root certificate stores (OS or browser). The customer's internal PKI could sign your certificates, but that assumes they have one, and it won't work for unmanaged devices. Which leaves a well-known "public" CA.
The web site might be an internal-only site. (https://letsencrypt.org/
can't reach it.)
Ownership challenges need not be from the host that gets the certificate. You mentioned Let's Encrypt, their DNS challenge can be done from any Internet visible DNS. Including wildcards, so you can issue *.present.example.com
.
No manual steps allowed. The customer installs the software and it is
good to go.
If you do not control end user devices, no additional steps means you must use a CA already in their root certificate stores (OS or browser). The customer's internal PKI could sign your certificates, but that assumes they have one, and it won't work for unmanaged devices. Which leaves a well-known "public" CA.
The web site might be an internal-only site. (https://letsencrypt.org/
can't reach it.)
Ownership challenges need not be from the host that gets the certificate. You mentioned Let's Encrypt, their DNS challenge can be done from any Internet visible DNS. Including wildcards, so you can issue *.present.example.com
.
answered Apr 23 at 1:55
John MahowaldJohn Mahowald
9,4041713
9,4041713
add a comment |
add a comment |
In my company we've got multiple Intranet-only web sites.
Due to recent/current browser policy changes we've been setting them up with HTTPS/TLS support.
As these sites are for internal use only we decided to set-up an in-house certificate authority using the Microsoft Active Directory Certificate Authority (MS AD CA) service.
Additionally we're using [Company Name].local URLs for the websites.
Using the AD CA service we created a RootCA certificate which gets distributed to all domain connected systems via the domain controller.
Using the AD CA service we are then able to issue certificates for the various internal websites and devices with web interfaces.
We then use the active directory DNS service to set-up the [Company Name].local domain to assign the correct IP-addresses to the correct URLs. As the internal AD DNS is the primary DNS for our network.
The only issue we've had with this approach is the fact that the Firefox browser doesn't use the Windows certificate store and needs to have the created RootCA certificate imported manually.
From my limited research it does seem to be possible to automatically import the RootCA certificate into the Firefox certificate store but due to the limited amount of Firefox users we decided to go the manual approach.
Additionally if I recall correctly there is a feature request ticket pending with the Firefox development team to enable access to the Windows certificate store.
This seemed to use to be to most robust solution for our situation, your mileage may differ :)
For any external facing sites we use certificates from reputable sources.
There’s an about:config setting for Firefox that tells it to use the Windows cert store (security.enterprise_roots.enabled).
– Greg W
Apr 23 at 11:22
@GregW Thanks, my latest research from a couple of months ago indicated that, that was still a work in progress. Can you confirm it works correctly? If so, I can edit it into the answer.
– yetanothercoder
Apr 23 at 12:13
add a comment |
In my company we've got multiple Intranet-only web sites.
Due to recent/current browser policy changes we've been setting them up with HTTPS/TLS support.
As these sites are for internal use only we decided to set-up an in-house certificate authority using the Microsoft Active Directory Certificate Authority (MS AD CA) service.
Additionally we're using [Company Name].local URLs for the websites.
Using the AD CA service we created a RootCA certificate which gets distributed to all domain connected systems via the domain controller.
Using the AD CA service we are then able to issue certificates for the various internal websites and devices with web interfaces.
We then use the active directory DNS service to set-up the [Company Name].local domain to assign the correct IP-addresses to the correct URLs. As the internal AD DNS is the primary DNS for our network.
The only issue we've had with this approach is the fact that the Firefox browser doesn't use the Windows certificate store and needs to have the created RootCA certificate imported manually.
From my limited research it does seem to be possible to automatically import the RootCA certificate into the Firefox certificate store but due to the limited amount of Firefox users we decided to go the manual approach.
Additionally if I recall correctly there is a feature request ticket pending with the Firefox development team to enable access to the Windows certificate store.
This seemed to use to be to most robust solution for our situation, your mileage may differ :)
For any external facing sites we use certificates from reputable sources.
There’s an about:config setting for Firefox that tells it to use the Windows cert store (security.enterprise_roots.enabled).
– Greg W
Apr 23 at 11:22
@GregW Thanks, my latest research from a couple of months ago indicated that, that was still a work in progress. Can you confirm it works correctly? If so, I can edit it into the answer.
– yetanothercoder
Apr 23 at 12:13
add a comment |
In my company we've got multiple Intranet-only web sites.
Due to recent/current browser policy changes we've been setting them up with HTTPS/TLS support.
As these sites are for internal use only we decided to set-up an in-house certificate authority using the Microsoft Active Directory Certificate Authority (MS AD CA) service.
Additionally we're using [Company Name].local URLs for the websites.
Using the AD CA service we created a RootCA certificate which gets distributed to all domain connected systems via the domain controller.
Using the AD CA service we are then able to issue certificates for the various internal websites and devices with web interfaces.
We then use the active directory DNS service to set-up the [Company Name].local domain to assign the correct IP-addresses to the correct URLs. As the internal AD DNS is the primary DNS for our network.
The only issue we've had with this approach is the fact that the Firefox browser doesn't use the Windows certificate store and needs to have the created RootCA certificate imported manually.
From my limited research it does seem to be possible to automatically import the RootCA certificate into the Firefox certificate store but due to the limited amount of Firefox users we decided to go the manual approach.
Additionally if I recall correctly there is a feature request ticket pending with the Firefox development team to enable access to the Windows certificate store.
This seemed to use to be to most robust solution for our situation, your mileage may differ :)
For any external facing sites we use certificates from reputable sources.
In my company we've got multiple Intranet-only web sites.
Due to recent/current browser policy changes we've been setting them up with HTTPS/TLS support.
As these sites are for internal use only we decided to set-up an in-house certificate authority using the Microsoft Active Directory Certificate Authority (MS AD CA) service.
Additionally we're using [Company Name].local URLs for the websites.
Using the AD CA service we created a RootCA certificate which gets distributed to all domain connected systems via the domain controller.
Using the AD CA service we are then able to issue certificates for the various internal websites and devices with web interfaces.
We then use the active directory DNS service to set-up the [Company Name].local domain to assign the correct IP-addresses to the correct URLs. As the internal AD DNS is the primary DNS for our network.
The only issue we've had with this approach is the fact that the Firefox browser doesn't use the Windows certificate store and needs to have the created RootCA certificate imported manually.
From my limited research it does seem to be possible to automatically import the RootCA certificate into the Firefox certificate store but due to the limited amount of Firefox users we decided to go the manual approach.
Additionally if I recall correctly there is a feature request ticket pending with the Firefox development team to enable access to the Windows certificate store.
This seemed to use to be to most robust solution for our situation, your mileage may differ :)
For any external facing sites we use certificates from reputable sources.
answered Apr 23 at 10:38
yetanothercoderyetanothercoder
1111
1111
There’s an about:config setting for Firefox that tells it to use the Windows cert store (security.enterprise_roots.enabled).
– Greg W
Apr 23 at 11:22
@GregW Thanks, my latest research from a couple of months ago indicated that, that was still a work in progress. Can you confirm it works correctly? If so, I can edit it into the answer.
– yetanothercoder
Apr 23 at 12:13
add a comment |
There’s an about:config setting for Firefox that tells it to use the Windows cert store (security.enterprise_roots.enabled).
– Greg W
Apr 23 at 11:22
@GregW Thanks, my latest research from a couple of months ago indicated that, that was still a work in progress. Can you confirm it works correctly? If so, I can edit it into the answer.
– yetanothercoder
Apr 23 at 12:13
There’s an about:config setting for Firefox that tells it to use the Windows cert store (security.enterprise_roots.enabled).
– Greg W
Apr 23 at 11:22
There’s an about:config setting for Firefox that tells it to use the Windows cert store (security.enterprise_roots.enabled).
– Greg W
Apr 23 at 11:22
@GregW Thanks, my latest research from a couple of months ago indicated that, that was still a work in progress. Can you confirm it works correctly? If so, I can edit it into the answer.
– yetanothercoder
Apr 23 at 12:13
@GregW Thanks, my latest research from a couple of months ago indicated that, that was still a work in progress. Can you confirm it works correctly? If so, I can edit it into the answer.
– yetanothercoder
Apr 23 at 12:13
add a comment |
Thanks for contributing an answer to Server Fault!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f964119%2fenable-https-on-a-private-network%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
6
TLS certificates are almost exclusively assigned to host names and not to ip-addresses.It does not matter that a host has only an private use IPv4 address, as long as you are the legitimate owner / delegated_admin of the domain you can get a valid certificate. Also most larger organizations have their own CA and should be able to issue your hosts valid internal use certificates
– HBruijn
Apr 22 at 22:28