Link to home
Start Free TrialLog in
Avatar of butlertg
butlertg

asked on

Intranet Certificate

I have a certificate that I created w/ MS Certificate Server that I would like to use on an Intranet.  How do I resolve the issue of the site warning the visitor that the certificate is from an untrusted source.  I believe this must be done on the client's browser?  Can this been done programmatically like thru ASP or something?

Thanx,
butlertg
Avatar of Mark Franz
Mark Franz
Flag of United States of America image

I am not positive, but I think this will help...
http://www.microsoft.com/security/tech/Certificates/enroll.asp?RLD=287

There are security levels that can be set on IE that could have an effect on the certs.

Mark
I don't think you can program that.  For something to come from
a trusted host it must be signed from at trusted CA (There are very
few...  Verisign)

CJ
Avatar of TTom
TTom

The answer is that each browser will have to contact the server which issued the certificate and install the root certificate.  I do not think you can do this programmatically.

At one time, I was fairly certain that there was an option in IE4 and/or 5 to "add the issuer to the trusted issuers list", but I have been unable to confirm that with M$ or any of my regular sources.

Tom
Avatar of butlertg

ASKER

So is there no way to use a "home-made" certificate w/o getting those warnings?  I mean without changing the option in every users browser.

butlertg
ASKER CERTIFIED SOLUTION
Avatar of TTom
TTom

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
If you notice sometimes you will even get M$ certificate warnings.
Trust me if there was a way to do it programmatically ... they would
have done it.

CJ
[As cheekycj noted] you can prevent them by asking versign [www.versisign.com] or some other trusted CA to sign your key.
Verisign (or any other trusted CA) will probably not "sign" your key, but, rather, sell you their own certificate.  This defeats the purpose of creating a M$ certificate in the first place.
Well, I think they could sign yours. But the price will be the same.

The reason for generating your own vs buing from say verisign is that in case you generate it, certificate's secret key _NEVER_ leaves your hands and NO ONE but you have it. This could make difference for paranoid. And if you are using SSL you should be one.
Thanx to everybody for your help!!
Hopefully I these problems will be acceptable to users.  Dang M$!

butlertg