Can a Self-Signed cert support an alias?
We are using self-signed certs on a private web network, and would like to know if it is possible to issue a self-signed certificate valid for multiple aliases?
For example, the FQDN of the server is apsmxgd-omrjts.devnet1.hill.af.mil, and we have an alias "jts.devnet1.hill.af.mil". We would, therefore, like a certificate to be valid for the following addresses: apsmxgd-omrjts.devnet1.hill.af.mil apsmxgd-omrjts jts.devnet1.hill.af.mil jts Does anyone have instructions on how to create such a self-signed cert? Thanks, Dave |
Accepted answer
One other answer
It's my understanding that an SSL certificate can be used on multiple servers. In other words, you don't need to match the CN of the certificate to the FQDN of the server. That's why it never crossed my mind that "they will still receive an address mismatch warning for the cert". You can see a live sample by visiting the below website:
https://www.freessl.com/ Notice that the certificate is issued to "www.chainedssl.com". In your case, all the certificate needs to do is to identify itself as "the server", whatever the CN you use for it does not matter. Comments
Dave Evans
commented Dec 08 '15, 8:54 a.m.
The reason it works for multiple websites is that the SAN (Subject Alternative Name) contains the following:
DNS Name=www.freessl.com
However, I do not see a way to specify the SAN property in iKeyMan or WAS. That is why I am asking this question here. |
Your answer
Dashboards and work items are no longer publicly available, so some links may be invalid. We now provide similar information through other means. Learn more here.
Comments
What is the purpose of doing so? Strictly speaking, a self-signed certificate is not a "valid" one because it cannot be trusted. A browser will always prompt a warning when receiving a self-signed (i.e. untrusted) certificate. A certificate is just an identity. It seems like you want to use a single certificate as multiple identities? I can't understand the reason behind this.
The purpose is that we would like to be able to use the alias, and even the hostname only, since that would be easier than typing out our ugly URL. If we had it to do over, the original URL would have been much shorter. But since the Public URL is difficult to change, and would produce many broken links, we would rather create a cert which is valid for both the FQDN and also just the DN.
As I said before, this is for our own private web network (NOT ON THE INTERNET), a stand-alone network. That said, we can readily distribute our self-signed cert to all trusted key stores so that people don't receive the warning. The problem here is that if we don't have a certificate which is valid for both addresses, then they will still receive an address mismatch warning for the cert.