You are right. You don’t need intermediate cert, its optional. Installation procedure says that. I edited the section you pointed as well.
Thanks, -Nitin On 24/09/14 6:40 AM, "France" <mailingli...@isg.si> wrote: >I went down the route with custom DNS service (already working) and >custom certificate, because it feels safer than rolling out my RPM >packages. > >So, the instructions >(https://cwiki.apache.org/confluence/display/CLOUDSTACK/Procedure+to+Repla >ce+realhostip.com+with+Your+Own+Domain+Name#ProceduretoReplacerealhostip.c >omwithYourOwnDomainName-HowtogeneratemycustomrootCAandcertificate?) point >me to creating an intermediate certificate, which i do not think is >required. > >If I am my own CA, why should i create an intermediate certificate and >sign with that to complicate things? I guess i could sign my CSR with CA >directly. Can’t I? > >Then just use the GUI and no API calls, to add the certificate, the key >and domain info. As long as i keep secstorage.encrypt.copy to false, all >shoud work. Right? > >Regards, >F. > >On 20 Sep 2014, at 21:17, Amogh Vasekar <amogh.vase...@citrix.com> wrote: > >> ConsoleProxyInfo and ConsoleProxyManagerImpl.assignProxy has the >>relevant >> code to generate the URL for accessing console. >> The ConsoleProxyServlet handles the requests, and might be a good >>starting >> point if you wish to change the code. >> >> Amogh >> >> On 9/20/14 12:01 PM, "France" <mailingli...@isg.si> wrote: >> >>> Hi Amogh, >>> >>> thank you for your suggestions and instructions on disabling. >>> >>> We will not run a wildcard DNS resolver on certain subdomain as >>>required >>> for this option. >>> Once ACS supports single domain for console proxy access, we shall >>>enable >>> https once again with our signed/bought certificate. >>> >>> In the mean time, we either have to move to http from https making >>>access >>> to whole admin interface insecure or hack the code to display a link to >>> console instead of iframe. >>> I would rather go for the latter option. Does anyone who is following >>> this, know where is the code for that iframe link? >>> >>> Thank you. >>> >>> F. >>> >>> On 20 Sep 2014, at 20:33, Amogh Vasekar <amogh.vase...@citrix.com> >>>wrote: >>> >>>> Hi, >>>> >>>> I believe this is by design for SSL - a user would see a HTTPS site >>>> thinking everything is secure and encrypted, only to realize later >>>>that >>>> some part is in fact insecure. Hence, instead of trying to circumvent >>>> the >>>> security mechanism, you can try the steps at : >>>> >>>> >>>>https://cwiki.apache.org/confluence/display/CLOUDSTACK/Procedure+to+Rep >>>>la >>>> ce >>>> >>>> >>>>+realhostip.com+with+Your+Own+Domain+Name#ProceduretoReplacerealhostip. >>>>co >>>> mw >>>> ithYourOwnDomainName-HowtogeneratemycustomrootCAandcertificate? >>>> >>>> This would help create your own certificate chain. The downside being >>>> your >>>> users would need to add the custom root CA in the browser (a practice >>>> followed by many companies for internal network), or simply accept the >>>> security warning the first time they access your domain. >>>> Please note that this would still need a publicly resolvable domain >>>>(or >>>> add the mappings directly in /etc/hosts if it is more convenient) >>>> >>>> Thanks, >>>> Amogh >>>> >>>> On 9/20/14 11:22 AM, "France" <mailingli...@isg.si> wrote: >>>> >>>>> It worked for us. Well kind of. >>>>> >>>>> The problem is now, that we have https for default admin interface, >>>>> while >>>>> console opens as iframe to http content and browsers such as firefox >>>>> will >>>>> not load content, because it is not on https. >>>>> They call it: "Mixed Content Blocking Enabled²: >>>>> >>>>> >>>>>https://blog.mozilla.org/tanvi/2013/04/10/mixed-content-blocking-enabl >>>>>ed >>>>> -i >>>>> n-firefox-23/ >>>>> >>>>> Do you have any recommendations what to do in order to get around >>>>>this? >>>>> >>>>> We will not buy a wildcard certificate, because it is to expensive >>>>>for >>>>> us. >>>>> >>>>> Regards, >>>>> F. >>>>> >>>>> On 20 Sep 2014, at 15:21, France <mailingli...@isg.si> wrote: >>>>> >>>>>> I will just empty these two fields in global config: >>>>>> >>>>>> secstorage.ssl.cert.domain >>>>>> consoleproxy.url.domain >>>>>> >>>>>> restart CS and restart the console proxy.. >>>>>> >>>>>> Š and hope for the best. :-) >>>>>> >>>>>> If you do not hear from me on this, then this worked and others can >>>>>>do >>>>>> it too. >>>>>> >>>>>> Regards, >>>>>> F. >>>>>> >>>>>> >>>>>> On 20 Sep 2014, at 15:16, Aldis Gerhards <al...@hostnet.lv> wrote: >>>>>> >>>>>>> We got the same problem. It seemed like a bug :) we downgraded back >>>>>>> to >>>>>>> 4.3.0 because pf this issue. >>>>>>> >>>>>>> Sent from my iPhone >>>>>>> >>>>>>>> On 2014. gada 20. sept., at 15:39, France <mailingli...@isg.si> >>>>>>>> wrote: >>>>>>>> >>>>>>>> Hi guys, >>>>>>>> >>>>>>>> how do we disable realhostip.com service with its certificates on >>>>>>>> ACS >>>>>>>> 4.3.1, to get consoleproxy working without ties to realhostip.com >>>>>>>> service? >>>>>>>> We are happy with HTTP only for now. >>>>>>>> >>>>>>>> Regards, >>>>>>>> F. >>>>>> >>>>> >>>> >>> >> >