Configure Certificate For Servers Manage
Configure Certificate For Servers Manage
Intersight
Contents
Introduction
Prerequisites
Requirements
Components Used
Background Information
Configure
Create the Configuration File (.cnf)
Generate a Private Key (.key)
Generate CSR
Generate the Certificate File
Create the Certificate Management Policy in Intersight
Add the Policy to a Server Profile
Troubleshoot
Introduction
This document describes the process to generate a Certificate Signed Request (CSR) to create customized
Certificates for servers managed by Intersight.
Prerequisites
Requirements
• Intersight
• Third-Party Certificates
• OpenSSL
Components Used
The information in this document is based on these software and hardware versions:
The information in this document was created from the devices in a specific lab environment. All of the
devices used in this document started with a cleared (default) configuration. If your network is live, ensure
that you understand the potential impact of any command.
Background Information
In Intersight Managed Mode, the Certificate Management policy allows you to specify the certificate and
private key-pair details for an external certificate and attach the policy to servers. You can upload and use
the same external certificate and private key-pair for multiple Intersight Managed Servers.
Configure
This document uses OpenSSL in order to generate the files required to obtain the certificate chain and the
private key-pair.
Step 1. Create the .cnf file which has all the details of the certificate (it must include the IP addresses for the
IMC connection to the servers).
Step 2. Create the private key and the .csr files through OpenSSL.
Step 3. Submit the CSR file to a CA in order to sign the certificate. If your organization generates its own
self-signed certificates, you can use the CSR file in order to generate a self-signed certificate.
Create the Certificate Management Policy in Intersight and paste the Certificate and Private Key-
Step 4.
pair chains.
Use a file editor in order to create the configuration file with a .cnf extension. Fill in the settings based on
your organization details.
<#root>
[ req ]
default_bits =
2048
distinguished_name =
req_distinguished_name
req_extensions =
req_ext
prompt =
no
[ req_distinguished_name ]
countryName =
US
stateOrProvinceName =
California
localityName =
San Jose
organizationName =
Cisco Systems
commonName =
esxi01
[ req_ext ]
subjectAltName =
@alt_names
[alt_names]
DNS.1 =
10.31.123.60
IP.1 =
10.31.123.32
IP.2 =
10.31.123.34
IP.3 =
10.31.123.35
Caution: Use the Subject Alternate Name(s) in order to specify additional host names or IP addresses
for your Server(s). Not configuring it or excluding it from the uploaded certificate can result in
browsers blocking access to the Cisco IMC interface.
<#root>
Test-Laptop$
<#root>
Test-Laptop$
Generate CSR
Use openssl req -new in order to request a .csr file using the private key and .cnf files created earlier.
<#root>
Test-Laptop$
<#root>
Test-Laptop$
Note: If your organization uses a Certificate Authority (CA), you can submit this CSR in order to get
the certificate signed by your CA.
<#root>
Test-Laptop$
openssl x509 -in cert.csr -out certificate.cer -req -signkey cert.key -days 4000
Login to your Intersight account, navigate to Infrastructure Service, click the Policies tab, and then, click Create Policy.
Use the cat command In order to copy the contents of the Certificate (certificate.cert file) and the key file
(cert.key file) and paste them onto the Certificate Management Policy in Intersight.
<#root>
Test-Laptop$
cat certificate.cert
Test-Laptop$
cat cert.key
Verify that the policy is created with no errors.
Navigate to the Profiles tab and modify a server profile or create a new profile and attach additional policies if
required. This example modifies a service profile. Click edit and continue, attach the policy, and deploy the
server profile.
Troubleshoot
If you need to check the information within a Certificate, CSR, or Private Key, use the OpenSSL commands
as mentioned.
<#root>
Test-Laptop$
<#root>
Test-Laptop$