Console and web tier virtual host certificates no longer trusted by Google Chrome 58.0.3029.81 in RSA Authentication Manager 8.x
Originally Published: 2017-07-05
Article Number
Applies To
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x
Issue
Your connection is not private
This server could not prove that it is <FQDN>: its security certificate is from [missing_subjectAltName]
NET::ERR_CERT_COMMON_NAME_INVALID
This may be caused by a misconfiguration or an attacker intercepting your connection
This server could not prove that it is <FQDN>: its security certificate is from [missing_subjectAltName]
NET::ERR_CERT_COMMON_NAME_INVALID
This may be caused by a misconfiguration or an attacker intercepting your connection
Cause
New versions of Chrome (Chrome 58) and Firefox check the Subject Alternative Name (SAN) field, looking for a DNS name or IP address. Historically, Authentication Manager has never used this field in our certificates because it was not required and it is sometimes used for a wildcard certificate (i. e., *.company.com), which is not supported by Authentication Manager and would break an Authentication Manager server.
The Authentication Manager server consoles and web tiers bind a Fully Qualified Domain Name (FQDN) of the Authentication Manager server to the Common Name or CN in the Subject field.
Defect AM-31165 (Authentication Manager 8.2 CSRs have empty Subject Alternative Name fields which Chrome/FF no longer trust) has been raised for this issue.
Resolution
- Disable the Chrome policy that checks for a SAN, which will not work after 2017. See the Workaround below.
- Use a third party tool or your Certificate Authority to generate a CSR that includes a DNS entry in the SAN field or use the CSR generated in the Authentication Manager Operations Console, but request that your CA sign the reply with a DNS entry in the SAN field.
- Upgrade to Authentication Manager 8.3 or higher. This addresses both self-signed internal RSA console certificates and virtual host certificates, as well as CSRs.
Workaround
The descriptions is as follows:
When this setting is enabled, Google Chrome will use the commonName of a server certificate to match a hostname if the certificate is missing a subjectAlternativeName extension, as long as it successfully validates and chains to a locally-installed CA certificates.
Note that this is not recommended, as this may allow bypassing the nameConstraints extension that restricts the hostnames that a given certificate can be authorized for.
If this policy is not set, or is set to false, server certificates that lack a subjectAlternativeName extension containing either a DNS name or IP address will not be trusted.
Related Articles
java.lang.NoClassDefFoundError when saving a JAVA Code Based AFX Connector in version 7.0.2 of RSA Identity Governance & L… 68Number of Views RSA Self Service module will not allow special characters in the username. 41Number of Views RSA Token Client returns error 40032 - R_TC_ERR_REGISTRATION_FAIL 15Number of Views Authentication agent for Windows, AAWin autoregistration fails after update to RSA Authentication Manager 8.4 Patch 14 127Number of Views Login prompt is failing to display in the web browser for the RSA Community 74Number of Views
Trending Articles
How to recover the Application and AFX after an unexpected database failure in RSA Identity Governance & Lifecycle RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide Troubleshooting AFX Connector issues in RSA Identity Governance & Lifecycle Provisioning-Termination Rule fails to filter on Custom Attributes that have the same Display Names across Multiple Object… RSA MFA Agent 2.4 for Microsoft Windows Installation and Administration Guide
Don't see what you're looking for?