This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Knowledge Base

Find answers to your questions and identify resolutions for known issues with knowledge base articles written by SecurID experts.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Knowledge Base
  • :
  • How to generate a Certificate Signing Request (CSR) with the Subject Alternative Name (SAN) field us...
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content

How to generate a Certificate Signing Request (CSR) with the Subject Alternative Name (SAN) field using openssl on RSA Authentication Manager 8.x

Article Number

000036083

Applies To

RSA Product Set: SecurID
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x

Issue

  • The RSA Authentication Manager Security Console, Operations Console and Virtual Host certificates do not have a Subject Alternative Name (SAN).
  • The Authentication Manager Operations Console generated a Certificate Signing Request (CSR) for a replacement console or virtual host certificate currently has no way to enter a SAN.

Resolution

To resolve this issue,
  1. SSH to the RSA Authentication Manager server.
  2. Login as the  rsaadmin user with the operating system password created during setup.
  3. Create a new directory named /tmp/cert: 

login as: rsaadmin
Using keyboard-interactive authentication.
Password: <enter operating system password>
Last login: Wed Feb 21 22:47:51 2018 from jumphost.vcloud.local
RSA Authentication Manager Installation Directory: /opt/rsa/am
rsaadmin@am82p:~> mkdir /tmp/cert
  1. Navigate to the new directory:

rsaadmin@am82p:~> cd /tmp/cert
  1. Create a new configuration file named openssl_san.cnf.
  2. Using the text below as a template, cut and paste the text into the new openssl_san.cnf. 
  3. Save the file when done.

Make sure you enter the exact Authentication Manager server/virtual host server FQDN in the line for commonName and for DNS.1, otherwise this procedure will not work


rsaadmin@am82p:/tmp/cert> vi openssl_san.cnf 
[ req ] 
default_bits = 4096 
prompt = no 
encrypt_key = no 
default_md = sha256 
distinguished_name = req_distinguished_name 
req_extensions = v3_req 
[ req_distinguished_name ] 
countryName = Country Name (2 letter code) 
stateOrProvinceName = State or Province Name (full name) 
localityName = Locality Name (eg, city) 
organizationName = Organization Name (eg, company) 
commonName = Common Name (e.g. server FQDN) 
[ v3_req ] 
# Extensions to add to a certificate request 
basicConstraints = CA:FALSE 
keyUsage = nonRepudiation, digitalSignature, keyEncipherment 
subjectAltName = @alt_names 
[alt_names] DNS.1 = server FQDN 
DNS.2 = example1.com 
DNS.3 = example2.com 
~ 
~ 
~ 
:wq!
 
  1. Use the following command to generate the CSR and private key.  

rsaadmin@am82p:/tmp/cert> openssl req -nodes -newkey 2048 -nodes -keyout private.key -out csr.csr -config openssl_san.cnf
  1. Use a file transfer tool such as WinSCP or FileZilla to retrieve the csr.csr file from /tmp/cert.
  2. Sign the CSR from your CA and download the full certificate chain (.p7b)
  • The following example is for when your CA is a Windows Server Domain Controller:
    1. In your web browser address bar, type the IP address of the server where the Certificate Authority is installed, followed by /certsrv. For example: http://10.0.2.80/certsrv
    2. Click the Request a Certificate link.
    3. Click the Advanced certificate request link.
    4. Click Submit a certificate.
    5. Paste the contents of your CSR file into the Saved Request text box.
    6. From the Certificate Template drop-down list, select Web Server.
    7. Click Submit.
    8. Choose DER Encoding and click Download Certificate Chain.
  1. Use a file transfer tool to copy the full certificate chain (certnew.p7b) to /tmp/cert on  the Authentication Manager server.
  2. SSH to the appliance and login as rsaadmin user with the operating system password.
  3. Navigate to /tmp/cert and run the following commands: 
    
    rsaadmin@am82p:/tmp/cert> openssl pkcs7 -in certnew.p7b -inform DER -out result.pem -print_certs
    rsaadmin@am82p:/tmp/cert> openssl pkcs12 -export -inkey private.key -in result.pem -out console_certificate.p12 -descert

Note: You will be prompted to enter a password in the last command.  This password is used when importing the console_certificate.p12 through the Authentication Manager Operations Console.

  1. Login to the primary's Authentication Manager Operations Console.
  2. Navigate to Deployment Configuration > Certificates > Console Certificate Management.
  3. Click Import certificate.
  4. Click Choose File and browse to  the location of the console_certificate.p12 defined in  step 11.
  5. For Type of certificate to import, choose PKCS#12 (.pfx or .p12). 
  6. Enter the password and click Import.
  7. In the Operations Console navigate to Deployment Configuration > Certificates > Console Certificate Management
  8. Click on the newly imported certificate and select Activate.  The server will restart.

Notes

If you are planning to use this process for either a Web Tier or Virtual Host Certificate, then for steps 12 and 17 above, navigate to 
Deployment Configuration > Certificates > Virtual Host Certificate Management.
Tags (63)
  • 8
  • 8.0
  • 8.0.x
  • 8.1
  • 8.1.x
  • 8.2
  • 8.2.x
  • 8.3
  • 8.3.x
  • 8.x
  • AM
  • Appliance
  • Auth Manager
  • Authentication Manager
  • CLI
  • Command Line
  • Command Line Interface
  • Config
  • Configuration
  • Configure
  • Configuring
  • Console
  • Console Help
  • Customer Support Article
  • Helpful Hints
  • How To
  • Implementation
  • Implementing
  • Informational
  • Instructions
  • KB Article
  • Knowledge Article
  • Knowledge Base
  • Process Steps
  • RSA AM
  • RSA Auth Manager
  • RSA Authentication Manager
  • RSA SecurID
  • RSA SecurID Access
  • RSA SecurID Suite
  • SecurID
  • SecurID Access
  • SecurID Appliance
  • SecurID Suite
  • Set Up
  • Setup
  • Syntax
  • Syntax Help
  • Tip &amp Tricks
  • Tips and Tricks
  • Tutorial
  • Version 8
  • Version 8.0
  • Version 8.0.x
  • Version 8.1
  • Version 8.1.x
  • Version 8.2
  • Version 8.2.x
  • Version 8.3
  • Version 8.3.x
  • Version 8.x
  • Walk Through
  • Walkthrough
0 Likes
Was this article helpful? Yes No
Share
No ratings

In this article

Version history
Last update:
‎2021-04-23 02:02 PM
Updated by:
Administrator RSA-KB-Sync Administrator

Related Content

Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.