Maybe this will be helpfull to you?
http://www.openssl.org/docs/apps/x509v3_config.html#Subject_Alternative_Name_

I am not sure how well that extension is supported in browsers and other ssl
clients, or can you get a CA to sign a certificate that contains these
extensions. But, I wouldn't be surprised if  there were no problems with any
of that because there are scenarios in which its useful to have same
certificate be valid for a url that contains a host name or ip address..

What I do know is that I used a single self signed certificate (with subject
alt names for:
IP Address=10.0.100.11
IP Address=10.0.100.12
IP Address=10.0.100.13
IP Address=10.0.100.14
)
locally for testing on 4 app servers that ran a load balanced app. We tested
the app with urls like https://10.0.100.11/ https://10.0.100.12/ and so on.



On Wed, Jul 29, 2009 at 10:44 PM, <uma...@comcast.net> wrote:

>
> My second issue is perhaps more serious: is there an underlying assumption
> with
> virtual hosts that they are bound by distinct security constraints? I mean,
> is there
> an implicit assumption, for instance, that distinct virtual hosts would use
> distinct SSL certificates?
>
> I plan to (rather, need to) use the same SSL certificate for all vHosts.
>
> Thanx again!
>
> /U
>
>

-- 
Why?
Because YES!

Reply via email to