Issue
Check the host and intermediate certificates with a CA certificate to verify the authentication chain before importing them into EBO servers.
Product Line
EcoStruxure Building Operation
Environment
- Enterprise Central
- Enterprise Server
- Automation Server
- Edge Server
Cause
Certificates are provided and can be assigned incorrectly or to the incorrect server; therefore, they do not function as expected.
Resolution
- Verify you have the following:
- Host certificate in PEM file format
- Intermediate Certificates in one pem file, not including Certificate Authority (CA) cert
- CA Certificate where Issuer and Subject Name are the same, indicating it is self-signed.
- OpenSSL is installed on the computer with the files. Use OpenSSL installed with EBO or install as mentioned in Ensuring the SSL Host Certificate and key file are a matching pair
- Use this command:
openssl verify -CAfile ca.pem -untrusted intermediate.pem server.pem
- The explanation of the command is as follows:
- openssl verify: This initiates the certificate verification process.
- -CAfile ca.pem: Specifies the path to the PEM file containing the trusted CA (Certificate Authority) certificate.
- -untrusted intermediate.pem: Indicates the path to the PEM file containing the intermediate certificates. They are marked as untrusted because the system does not directly trust them, but their validity will be checked against the CA certificate.
- server.pem: Specifies the path to the PEM file containing the host server certificate you want to verify.
- The expected responses are:
server.pem: OK: Verification successful, indicating the server certificate is valid and its chain of trust is established. - Error messages: If any errors occur during verification, they'll be displayed in the output. Common errors include certificate expiration, invalid signatures, or missing intermediate certificates
- Additional information:
- Ensure the file paths are correct and the certificates are in PEM format
- Ensure the host and intermediate certificates are installed on the server device and the CA Certificate on the client device.
- If you encounter issues, double-check the validity of the file permissions and certificates.
- For more detailed output, add the -verbose option to the command.
- To check expiration dates, use
openssl x509 -in server.pem -noout -dates