The MCU supports certificate-based user authentication over HTTPS, and is capable of mutual TLS authentication with the client. The client presents a certificate, signed by a certificate authority (CA), which the MCU trusts if it recognizes the CA from its trust store. Similarly, the client requests the MCU's local certificate and checks the signing CA against its own trust store.
To manage the MCU's local certificate and its trust stores for HTTPS and SIP TLS, and optionally to configure OCSP checks (Online Certificate Status Protocol) for HTTPS connections, go to
.The SSL certificates page is also used to allow or enforce certificate-based login in place of standard, password-based login. Any attempts to authenticate with a revoked certificate are recorded in the MCU's
.In this topic:
You should have your own local certificate and trust store(s), which must be in .pem format (Base64 encoded text).
HTTPS access to the web user interface requires the following prerequisites:
To make SIP TLS calls between the MCU and remote parties requires the following prerequisites:
Caution: A local certificate and private key are pre-installed on the MCU and are used by default for HTTPS access. As all MCUs have identical default certificates and keys, to ensure security we recommend that you replace it with your organization's own certificate and private key (see below).
Click Private key field to navigate to the private key file that accompanies your certificate.
for theYou must upload the certificate and its key simultaneously.
Click
.The uploaded certificate overwrites the previously held certificate.
A trust store is a collection of certificates from intermediate and root certificate authorities against which the MCU can attempt to verify client certificates it receives.
The MCU can hold three trust store files - one for HTTPS connections, one for SIP TLS connections and one for Call Home connections to verify the connection to the Smart Call Home server. When you upload a new trust store file, the previously held file is overwritten.The MCU has a certificate pre-installed, however, it is possible to delete and upload new certificates. You can also reset the certificate to default.’
-----Begin Certificate-----
to -----End Certificate-----
(inclusive).Paste the text block at the end of yourfilename.pem.
Repeat this to copy as many certificate blocks into your .pem file as you need to, making sure not to modify any of the pasted text.
Confirm that you wish to proceed.
The trust store is uploaded, replacing the previous one (if it existed).
Each certificate in the trust store appears in its own table row that shows pertinent certificate details in plain text.
Confirm that you wish to proceed.
The trust store is deleted.
Confirm that you wish to proceed.
The trust store is reset to default.
You can configure the MCU to secure incoming and outgoing SIP calls using TLS. The MCU uses its SIP trust store to verify the certificate presented by the remote end of a SIP TLS connection.
SIP verification options | |
No verification | All outgoing connections are permitted, even if the remote end does not present a valid and trusted certificate (remote end always trusted). |
Outgoing calls only | Outgoing SIP TLS connections are only permitted if the remote end has a trusted certificate. |
Outgoing and incoming calls | Outgoing and incoming SIP TLS connections are only permitted if the remote end has a trusted certificate. |
For an outgoing SIP TLS call, when inspecting the received certificate as part of the SIP TLS handshake, the MCU looks for either an IP address or a domain identifier for the remote party in the URI
and DNS
fields of the certificate's subject alternative name (subjectAltName
) extension. If the subjectAltName
is not present, the MCU looks for either an IP address or a domain identifier in the certificate's Common Name (CN
) field.
For an incoming SIP TLS call, the received certificate should be trusted by MCU's SIP Trust store.
You should ensure that the certificates presented by your SIP entities to the MCU contain both the SIP URI and the IP address of the entity.
The remote party must similarly be able to verify the MCU's local certificate against its trust store, so the local certificate must also be generated according to the guidelines above.
Note: If you require TLS on non-proxied SIP calls from the MCU, the MCU's local certificate must identify the MCU by its IP address. This requirement arises because the remote endpoint will be establishing TLS connections directly to the MCU, which provides its IP address as its identity.
The
section is where you can configure certificate-based authentication for users logging in to the web interface and for applications interacting with the API. This section also lets you configure whether the MCU should verify server certificates, presented by an OCSP server or by feedback receivers, before allowing these connections.CAUTION: If you transition from solely password-based client authentication to any level of certificate-based client authentication (including those that permit but do not require certificates), it is possible inadvertently to block client access to the MCU. This can happen if HTTP is disabled or if HTTP to HTTPS redirection is enabled. In such cases, a certificate that is trusted by the MCU must be presented by the client side (typically you the administrator) in order to log in. If no such client certificate exists then no one can log in.
We strongly recommend that you first review the option descriptions below and then follow the process in Transitioning to certificate-based security.
Client certificate security options | |
Not required | Certificate-based client authentication is not required (default) and client certificates are ignored. Password-based authentication is required for all client access, whether by users over HTTPS or applications making API calls. |
Verify certificate | Incoming HTTPS connections are only permitted if the client certificate is signed by an authority that the MCU trusts, but password-based login is still required to authenticate the client, for HTTPS, API, and other client connections. |
Certificate-based authentication allowed | Incoming HTTPS connections are only permitted if the client certificate is signed by an authority that the MCU trusts and, if the certificate's common name matches a stored username, the client logs in as that user. However, if the certificate is trusted and the common name does not match, the client may log in with username and password. |
Certificate-based authentication required |
Incoming HTTPS connections are only permitted if the client certificate is signed by an authority that the MCU trusts. The common name of the certificate must also match a stored username and password-based client authentication is not allowed. HTTP and FTP logins are blocked. If Require administrator login is checked (on Settings > Security), then console access is restricted to functions that do not require a login. Note: The MCU requires every user account to have a password, even if Certificate-based authentication required is selected and thus clients may not use their passwords. Furthermore, if the MCU is in advanced account security mode, passwords must be replaced every 60 days. Users are not prompted to change their passwords when they log in using certificate-based authentication, so the passwords will expire and generate security warnings. For the purpose of any timed access restrictions that exist on user accounts (typically password change intervals and inactive account expiry rules) any log in using a certificate is treated as a standard password-based login and will reset the timer accordingly. For information about how these options affect the API interface, see the Cisco TelePresence MCU API Reference Guide. |
Server certificate security options | |
No verification | The MCU does not verify the server's certificate (if one is presented) when it makes an OCSP request or when it sends HTTPS feedback messages. |
Verify certificate | The MCU requires a server certificate from the OCSP server or feedback receiver, and must be able to verify that the certificate is trusted by one of the authorities in its HTTPS trust store, before it completes the OCSP request or sends the HTTPS feedback message. |
You can optionally configure an external OCSP server, which the MCU will use to check the revocation status of client certificates presented with incoming HTTPS connection requests. The following details describe the MCU's OCSP checking mechanism.
CAUTION: If you enable OCSP checking for the MCU it is possible inadvertently to block all login access (including administrators) to the MCU. If you want to enable OCSP checking, we strongly recommend that you first review the option descriptions below and then follow the process in Transitioning to certificate-based security.
When you click None you will disable the check.
, the OCSP check for HTTPS certificates will be enabled; if you selectOnline certificate status protocol (OCSP) field descriptions | |
Certificates to check | None to disable OCSP checks or HTTPS client certificates to enable OCSP checks of HTTPS client certificates' revocation status. |
OCSP server |
The URL of the external OCSP server.
|
Require nonce |
Determines whether OCSP queries must include a nonce extension (to prevent replay attacks).
|
Maximum clock skew of OCSP server | Specifies the maximum acceptable time (in seconds) for clock skew in OCSP responses. In this context the skew is the divergence between the respective system clocks on the MCU and on the OCSP server. If the skew exceeds this setting, then the OCSP responses may be treated as invalid. |
Maximum age of OCSP server records |
Specifies the maximum acceptable age (in days) for certificates. The certificate age is derived from the response field 'thisUpdate' which indicates when the returned status was last known to be correct. How this value is determined depends on the OCSP server configuration (often it is the last time the server was updated with a new Certificate Revocation List). The MCU rejects any response where the value of 'thisUpdate' is later in the past than the time derived by counting back from current time by the number of days specified here (after accounting for clock skew). |
Field | Description |
---|---|
Subject |
The business to which the certificate has been issued:
|
Issuer |
The issuer of the certificate. Where the certificate has been self-issued, these details are the same as for Subject. |
Issued |
Date on which the certificate was issued. |
Expires |
Date on which the certificate will expire. |
Private key |
Your web browser uses the SSL certificate public key to encrypt the data that it sends back to the MCU. The private key is used by the MCU to decrypt that data. The private key field is only present for the local certificate. |
(c) Copyright Cisco Systems 2003-2014, License information |