Multiple certificates on SAA

I need to have different certificates for several types of connections on a SAA.  One certificate for AnyConnect SSL connections and another certificate for SSL connections without client.  I was able to install the two certificates on the SAA.  But, I am unable to assign based on the connection.  When creating a connection type and assign the certificate on the external interface changes.

Anyone know if I can do this within the ASA?

No, unfortunately, certificate is bound to the interface of the ASA and you will not be able to have different certificates for different connections/types of SSL VPN.

Tags: Cisco Security

Similar Questions

  • How can I print multiple "certificates of class completion" with a list of students?

    Sorry to ask this in two different forums - I didn't know which was more appropriate.

    that I have no need of instructions of the community - just to remind the appropriate documentation. I want to learn and it work on mine. Just having trouble finding exactly what I need.

    I think it starts by either:

    • importing a text file, or
    • type/paste the list in a PDF form

    Then, the user clicks a button that does the following:

    • Adds a page for each student's name
    • Inserts the name in a form field (with formatting such as the police and alignment)

    My main question at this point is, should the script add new, blank pages with a layer containing the certificate of "substance" or use a stamp that places the certificate image? Or, maybe, the page after the form (or the "Import the names" button) is the certificate of dynamic text field and the script simply duplicate this page for each student, by inserting the name.

    The remaining task is to add a date, but that seems pretty easy - I have not decided who will be by the dynamic/automatic or if the user must type in another area (in the original form).

    I came up with the solution the most impressive in the history of the universe and published a tutorial on my bloggy blog. Check it out!

    Generate multiple certificates using a template PDF and JavaScript | jotascript

  • Question about multiple certificates on a SAA

    I have a 8.4 (3) ASA5540 running which has AC certificates and identity of installed godaddy.com, identification of the ASA for remote user VPN (are using the client anyconnect.)

    There is also a separate certificate server located inside the LAN, which is used for internal purposes.  All the client workstations have this internal server identity certificates.

    We would like to be able to continue to use existing godaddy CA/identity certificates to identify the ASA for customers, but we would like to use the internal CA server to identify customers when they start up the session for the SAA AnyConnect.

    Is this possible?  I've seen other assignments that you can have more than one green on an interface, but it's a little different - only cert must be used to identify the ASA.  The other is only to identify users.  ASA has allowed me to import the internal CA cert.

    If possible, can someone point me to an example config?

    Thank you

    -Mathew

    Hello Matthew,.

    Your statement is correct.

    You can have the GoDaddy certificate to identify the ASA for the customers, this certificate of identity is that you apply on the external interface.

    Then, you can have certificate from another CA (Certificate Authority), in your case and CA internal to identify customers with the SAA. You just need to install root certificates and intermediaries (as applicable) of this new CA in your ASA.

    The ASA will verify the identity of the customer against all CA certificates installed in it until there is a validation of the certificate or refuses the connection.

    You use certificate authentication in the tunnel used by your customers Anyconnect group:

    tunnel-group Anyconnect-group webvpn-attributes

    authentication certificate

    I hope this helps.

    Daniel Moreno

    VPN

  • With the help of own certificate on SAA for SSLVPN

    Hello

    I searched the forum for a definitive answer to this question, but I'm afraid I can't find one, can someone help plase

    I have ASA a client to which I created SSLVPN Client and Clientless SSLVPN.

    The customer has of its own certificate which he wishes to use to stop this message "problem with certificate secure Web sites," boring.

    The problem is that his certificate has not been issued as a result of the SAA CSR

    Is it possible to do so and if so, how would you please.

    I told him that the ASA must generate a CSR that is then sent to Versign (for example) who then send a cert to add to the ASA.

    But he saw the link below...

    http://http :// www.cisco.com/en/US/docs/security/asa/asa80/release/notes/asarn80.html#wp242704

    I think it's Java and I'm not sure of that step 1. is referring to:

    Step 1. Export the certificate with the PKCS12 files (with a private key)?

    Any help would be greatly appreciated

    Regards Tony

    Yes, this link is exactly what you are after.

    Given that CSR is not generated from the ASA, you must export the certificate including the private keys for the ASA will have a copy of these private keys. The certificate you want to export to the ASA must be in PKCS12 format and you can convert a PFX format certificate (this typically includes private keys) PKCS12 using OpenSSL as described in the documentation.

    Hope that answers your question.

  • problem with the certificates on SAA

    Hello

    I am trying up\a tunnell of remote access with an ASA which is natted behind a Checkpoint firewall. Shared key works perfectly, but when I try with client certificates abandons the connection because that;

    482 16:30:34.581 10-27-05 Sev = WARNING/3 IKE/0xE3000080

    Invalid Remote certificate ID: ID_IPV4_ADDR: ID = 0x02001EAC, certificate = 0 x 00000000

    It is the private address 172.30.0.2 instead of the external address. I tried to add the ip address in the registration process, but it won't. Th CA is a company MS CA. the model is a CERT offline ipsec, that I tried to add the IP address for the FQDN name, changing the cn to the ip address, but nothing helped. I think I need to add the ability to add the ip address for the microsoft model, but don't know how to do... any ideas appreciated

    Thank you

    Vincent

    ISAKMP identify auto

    Identity automatically determined by the type of connection: IP address for pre-shared key and Cert DN for Cert-based connections

    That should do it.

  • Need help with multiple certificates in a course.

    Hello. I'm new to Captivate.

    I'm working on a course where there is more than one certificate at the end of the course. This is because it is a training course, but is taken by people who, although they do the same exact material, have different requirements on their certificates according to their profession. My problem is that I have to lead the student to one of the three certificates. Is that what I can have a drop down at the beginning of course where the student chooses their profession, then based on this variable, goes to the appropriate end of the course after certificate that they have completed the quiz? Thank you!

    Hello

    Thank you to the Adobe community.

    You can perform the task mentioned above using advanced actions. You can create a fast action with clues.

    For example: you can put a box of text at the beginning of the project with captions for their respective profession. You can give to each profession, a trade for example, id 1 to 11, profession 2 id has 12 and so forth.

    Now the user will enter the id in the text entry box and it will speak to a particular section of the course according to their profession.

    You must use this advanced action on the text input area.

    Please refer to the below images:

    The first page:

    The advanced Actions panel:

    Where on 11, 12 and 13 at the top are the clues for profession 2 and 3.

    I hope this helps!

    Thank you!

  • I want to remove server certificates in the store of certificates permeantly

    I have notices that there are multiple certificates on the SERVER tab. I think that these are the exceptions. I want to delete them, but they reappear at each start of firefox.

    Examples:
    DigiNotar
    Entrusted.NET
    GTE Corp.
    USERTRUST NETWORK
    etc.

    I want to remove the exceptions. Why are they install Firefox and why when removing them after they are back after each launch?

    Those are exceptions of permanent block, and should not be deleted. You can see that if you click on the button to edit, so just leave them.

  • Certificate on ASA VPN

    Hello

    I want to apply AnyConnect VPN of RA IPSec on SAA with the users that can connect using cards to chip. So I need to install digital certificates on SAA.

    Follows 4 things of my contacts (who is on holiday and so I have to find via this portal what exactly what I need to do with them)

    1 root-ORG - CA.cer - Root CA from our own CA .cer format

    2 Proc-ORG - CA.cer - he says that it is of "issued by: root-ORG-CA. Do not know what exactly is this certificate. Again the extension is .cer.

    3 ASA - CERT.cer - here, he argues that it is "issued by: Proc-ORG-CA. The name I guess that's the identity certificate should I install on ASA. Once the extension is .cer

    4 ASA - Priv.key - it is the private key in the .key file, I can read in Notepad.

    Now according to my knowledge goes, I think: I have to install the root-ORG - CA.cer on SAA. Then, I need some kind installation private key + certificate of individual or combined identity. But I am confused how to proceed

    (a) what could be the Proc-ORG - CA.cer ?

    (b) what is the exact order in which I should install things?

    (c) is the most convenient for these things or paste content in CLI ASDM?

    (d) for each file what extensions do I need? I need to convert certificates in other formats?

    Thanks in advance!

    Hello

    Here are answers to your questions:

    a. Proc-ORG - CA.cer seems to be the server intermediate CA that signs the certificate and it has been authorized by your certification authority root to do it.

    b. you must first import the root CA, then intermediate authority and finally the ASA CA

    c. you can do both using ASDM and CLI. However, I personally prefer CLI

    d. REB is good for the intermediate and root. For SAA, if you RECs and a private key, you must convert the pkcs12 format.

    Hope this is clear.

    Thank you

    PS: Please do not forget to rate and score as correct answer if this answered your question

  • Signature of a PDF using pkcs #11 module

    Hey Adobe,

    I'm trying to sign a document in Adobe Reader DC, using a digital certificate and the module PKCS #11 for this token.

    After update to Adobe Reader DC I get the same error of old 2148073485 and I tried to fix the module symbolic because, being so old, I can't update the drivers for this smart card. The module works well and sign correctly (I tried with a card chip which has only a single certificate stored on it), but the problem is displayed if the smart card has multiple certificates because it recognizes only the oldest (2011-2012).

    I can't remove the old certificates because I need them.

    Is there any solution to access all my certificates in Adobe?

    Thank you very much

    C.

    Hi djc25661862,

    We have published a patch that solves the problem of digital certificates which was introduced recently. If you're not already updated to the latest patch, simply open Acrobat and go to help > check updates apply this hotfix.

    More details about this release and bug fixes is available here: help Acrobat | Release notes | DC Acrobat, Acrobat Reader DC | Update

    Let us know if you still experience the problem.

    Kind regards

    Meenakshi

  • Consolidation of entities with different COA

    Hello

    I would like to ask if HFM supports the consolidation of entities with different COA. For example, if the child entity has COST that differs from the COA parent, how the consolidation process will look like?

    Thank you
    Ahmed

    Hello
    In general, it is not a good practice to have multiple modes of action in a single application of HFM. The most common practice is to have a single certificate for all entities and use FDM to the COST of each entity of the ACO group mapping.

    However, if you follow the multiple COA in a single application path, HFM can be customized to do this. However, this means a lot of custom code in the rules, a high rate of bug, a complexity, a very long time to implement, a populated account dimension and minimum maintainability. To get an idea, over rules of building custom, the code must handle each account separately to proportionalize the amount to another account in the ACO group, which looks like to do the mapping in the consolidation instead of FDM rules.

    Just try to eliminate the need for multiple certificates of authenticity.

    -Kostas

  • Dreamweaver (on Windows 7) does not connect to the server, IIS (v7) using "FTP over SSL/TLS...". »

    I am weather evauating to buy Dreamweaver CS6...

    Trial of Dreamweaver CS6 (on Windows 7) does not connect to the IIS server (v7) using "FTP over SSL/TLS (explicit encryption).  I have a NEW Godaddy SSL certificate installed on the IIS server.

    On the connection between States Dreamweaver: "server certificate expired or contains invalid data."connectionerror.png

    I tried:

    -ALL Dreamweaver Server configuration options

    -L' use of multiple certificates (I tried 2048 and 4096-bit Godaddy SSL certificates)

    -Make sure the certificate "issued to the"domain name is my domain name. "

    I am able to connect without a problem with Filezilla, Filezilla equivalent affecting 'explicitly require FTP over TLS.  I can connect both using Microsoft Expression web.

    This has been discussed previously. I recommend reading my old thread for details:

    http://forums.Adobe.com/thread/889530

    But to make a long story short, Godaddy is incorrectly signed SSL certificates on shared servers.  The servers/ips/domains and the certificate do not match.  So DW and many other tools fail authenticate with Godaddy SSL connections.  Some users have stated that other tools FTP, such as Filezilla as you mentioned, bypass and automatically change your connection to insecurity, but DW is very picky.  Once you modify encryption against zero, the connection will be accepted.  Best solution is if you want a certificate SSL correctly signed move to another host because Godaddy refuses to admit that they are wrong with SSL certificates on their sites.  These warnings will appear also to your users if you have a store saying the SSL certificate does not match the domain/ip and this can make users checking in a very nervous showcase.

  • Restrict the application of Digital Signatures

    Hello

    I am trying to determine what options are available natively in Acrobat to restrict the type of certificate that is used to apply a digital signature.  AFAIK, Acrobat, default, seems to allow the use of a certificate that has the extension 'Digital Signature'  This has the potential to create big problems in a regulated environment.

    In my organization, our users receive multiple certificates for different applications.  For example, a user can have a certificate for VPN, one for SMIME email access and, finally, one that is specifically for the application of electronic signatures.  There is a more rigorous selection process for obtaining a certificate of electronic signature, and it also invites for a password every time that the private key is available.  Each type of certificate has a separate certification authority.

    We have configured the identities approved each user in Acrobat by deploying a file of address book for them.  We have only our CA electronic signature as a CA approved in Acrobat (with some other universally approved authorities).  The result is that, when a signature that has been applied by using any other AC, Acrobat does not check the signature.  It's good, but it isn't enough since the dynamic images that come with Acrobat digital signatures do not appear on the documents printed or flattened.

    Basically, I am trying to determine if there is a way to configure Acrobat (in native, out-of-the-box mode) such that it will only request digital signatures using certificates that are issued by an authority that is defined as a trusted identity.

    If anyone has encountered this before?

    Hi Mike,.

    You should apply the starting value for each signature field that you want to restrict. The starting value becomes part of the properties of the signature field.

    You can use the JavaScript debugger included in Acrobat. To select bring him the Advanced > Document Processing > JavaScript debugger menu item (providing you use Acrobat Pro v9).

    Here is an example of code that you can apply where you need a specific issuer and the use of the key:

    var f = this.getField ("Signature1");
    caCert var = security.importFromFile ("Certificate", "/ C/Documents and Settings / / My Documents/myCA.cer");

    f.signatureSetSeedValue({)
    certspec: {}
    Issuer: [caCert],
    keyUsage: [0x7FFFFFF7], //Insure the certificate has value KeyUsage nonrepudiation
    flags: 0 x 34 / / 2 requires transmitter + 32 requires the use of keys
    },
    });

    Let me know if you are looking to apply a different condition.

    Steve

  • Where certificates are used on the SAA (8.4)?

    I access a ASA 8.4 running and I need to copy the config to another, she has as a spare.

    All the configuration was coppied well except for this part in the config.

    Crypto ca trustpoint ASDM_TrustPoint0

    registration auto

    name of the object CN = GS2-NT-FIR-01

    Proxy-loc-transmitter

    Configure CRL

    string encryption ca ASDM_TrustPoint0 certificates

    certificate c4999f4f

    308201b 1 30820248 a0030201 020204c 4 999f4f30 0d06092a 864886f7 0d 010105

    05003036 31163014 06035504 03130d 47 53322d4e 542d 4649 522d 3031 311c301a

    ........

    .. lots of HEX

    .......

    quit smoking

    So first of all, I guess that this certificate is for the SSL vpn that is configured on the SAA? Second, it would not copy across (the HEXAGONAL part). But I think that this ASA uses a self cert signed to remedy this I probably have ned to generate a new on this ASA to spare, so how do I do this?

    Thank you very much

    J.

    The cert is self-signed, so you can sign up for one on the second ASA.

    Depending on your config, it might still not be that you are missing relevant parts as many things with the VPN is not in the config a plus. Instead, they are stored in flash.

    To have a backup you can use the ASDM where you have a backup - and restore the features included.

    --
    Don't stop once you have upgraded your network! Improve the world by lending money to low-income workers:
    http://www.Kiva.org/invitedBy/karsteni

  • Could not import the Wildcard on SAA certificate

    Hi all

    I'm trying to implement a GoDaddy Wildcard (*. mydomain.mytld) cert for a number of clubs, among which there is our ASA. I put away the old certs and did some housekeeping on their trustpoints, etc., with the result pretty much own config. (I'm on 8.3).

    I needed to register for the cert in a different area (Exchange 2010) and I exported the cert in cisco-pasteable format REB to make it ready for deployment ahead on the ASA. Here's what I've done (with cry ca debugging on), causing a failure to import the wildcard certificate. Can anyone shed light on what I'm doing wrong? What I was doing was essentially installation TP for root and intermediate and then import the actual device cert.

    The installation program two trustpoints for RootCA and intermediate TP:

    gate0 (config) # crypto ca trustpoint gdroot
    gate0(config-ca-Trustpoint) # Terminal registration
    gate0(config-ca-Trustpoint) # revo no
    ---------

    gate0 (config) # crypto ca trustpoint gdinter
    gate0(config-ca-Trustpoint) # register terminal
    domain name full mydomain.tld gate0(config-ca-Trustpoint) #.

    ----------------

    These authenticate:

    authenticate the cry ca gate0 (config) # gdroot
    Enter the base-64 encoded certificate authority.
    End with the word "quit" on a line by itself
    -BEGIN CERTIFICATE-

    -CERTIFICATE OF END-
    quit smoking

    INFO: Certificate has the following attributes:
    Fingerprints: [snip]
    Do you accept this certificate? [Yes/No]: Yes

    Certificate of the CA Trustpoint accepted.

    % Certificate imported successfully
    CRYPTO_PKI: Recording of Cert not found, return E_NOT_FOUND
    View the contents of the current certificate:
    1 certificate:
    SERIES: 00
    ISSUER: OU = Go Daddy class 2 Certification Authority, o = Go Daddy Group\, Inc., c = US
    CRYPTO_PKI: crypto_process_ra_certs (trust_point = gdroot)

    authenticate the cry ca gate0 (config) # gdinter
    Enter the base-64 encoded certificate authority.
    End with the word "quit" on a line by itself
    -BEGIN CERTIFICATE-
    -CERTIFICATE OF END-
    quit smoking

    INFO: Certificate has the following attributes:
    Fingerprints: [snip]
    Do you accept this certificate? [Yes/No]: Yes

    Trustpoint "gdinter" is a subordinate certification authority and is a non self-signed certificate.

    Certificate of the CA Trustpoint accepted.

    % Certificate imported successfully
    gate0 (config) # CRYPTO_PKI: Cert record not found, return E_NOT_FOUND
    CRYPTO_PKI: No appropriate trustpoints not found to validate the serial number of certificate: 0301, object name: serialNumber = 07969287, cn = Go Daddy Secure Certification Authority, or =http://certificates.godaddy.com/repository, o is GoDaddy.com------, Inc., l is Scottsdale, st = Arizona, c = US, name of the issuer: OU = Go Daddy class 2 Certification Authority, o = Go Daddy Group\, Inc., c = US.

    CRYPTO_PKI: Recording of Cert not found, return E_NOT_FOUND
    View the contents of the current certificate:
    1 certificate:
    SERIES: 0301
    ISSUER: OU = Go Daddy class 2 Certification Authority, o = Go Daddy Group\, Inc., c = US
    Certificate 2:
    SERIES: 00
    ISSUER: OU = Go Daddy class 2 Certification Authority, o = Go Daddy Group\, Inc., c = US
    CRYPTO_PKI: crypto_process_ra_certs (trust_point = gdinter)

    Import the "peripheral": wildcard cert

    Crypto ca import gdinter RECs
    ATTENTION: Registration certificate is configured with a complete domain name
    that differs from the fqdn of the system. If this certificate will be
    used for VPN authentication, this can cause connection problems.

    You want to continue with this registration? [Yes/No]: Yes

    % The FQDN in the certificate name will be: mydomain.tld

    Enter the base 64 encoded certificate.
    End with the word "quit" on a line by itself

    -BEGIN CERTIFICATE-
    -CERTIFICATE OF END-
    quit smoking

    ERROR: Cannot analyse or check the imported certificate
    CRYPTO_PKI: cannot define ca cert object (0 x 722)
    CRYPTO_PKI: status = 65535: could not get the key of the cert usage

    You can see a problem due to not have generated the CSR on the SAA (with ASA's private key) because you use a character generic cert.

    There is a here document which explains how to get around that.

  • JAX - WS: how to choose among multiple client certificates on the fly?

    I have a webapp that calls a web service provided by a supplier. The seller requires the use of client certificates for authentication, and with success, I called their service using the keystore PKCS #12 they gave us with JAX - WS 2.2 using code like this:
        System.setProperty("javax.net.ssl.keyStore", "myKeyStore.p12");<br />
        System.setProperty("javax.net.ssl.keyStoreType", "pkcs12");<br />
        System.setProperty("javax.net.ssl.keyStorePassword", "password");
    The problem is, my webapp will support multiple profit centers, and the seller makes a distinction between our business units by issuing separate certificates for each. So I'm faced with a dilemma: I have four PKCS #12 files, one per unit of my webapp, and business will have to decide which one to use when running. In addition, this webapp could be highly used by many concurrent users, and therefore more than one of the CERT can should be used at the same time. So whatever the solution is, it must be thread-safe.

    I was able to combine all four certificates in a single key JKS file using the JDK 1.6 operation "keytool - importkeystore ' with each of my four certificates PKCS #12, so I have now all four in a single JKS keystore. The above code would be this:
        System.setProperty("javax.net.ssl.keyStore", "myKeyStore.jks");<br />
        System.setProperty("javax.net.ssl.keyStoreType", "jks");<br />
        System.setProperty("javax.net.ssl.keyStorePassword", "password");
    So my challenge now is to select between the four possible certs program during the call to the provider's web service. How do I with JAX - WS RI 2.2?

    Thank you
    Bill

    1.6 I think you can set a default value for custom SSLContext. So you do that and equip with a customized KeyManager you can control outside to ask what keystore alias to use.

Maybe you are looking for