Solved

ConfigMgr SQL Server Identification Certificate Issued from Root CA not Self Signed

Posted on 2013-06-26
3
1,714 Views
Last Modified: 2013-07-25
Hi,

Can someone explain to me how to generate a certificate template for ConfigMgr SQL Server Identification Certificate and issue it from my root ca.

My sccm sql reporting services is using a self signed certificate and is reporting that its not trusted.

I want to install a ssl certificate from my root ca, but I cannot get reporting services to see the new certificate after I have installed it.
0
Comment
Question by:Tech Man
3 Comments
 
LVL 47

Expert Comment

by:dlethe
Comment Utility
all self-signed certificates are untrusted.  Think about it.  If they were trusted then you could just create a certificate saying you were Microsoft, Citibank, or even irs.gov and no browser would complain.

If you want a trusted certificate, you need to spend money.
0
 
LVL 1

Author Comment

by:Tech Man
Comment Utility
Even when using a root ca and internal clients?
0
 
LVL 29

Accepted Solution

by:
Rich Weissler earned 500 total points
Comment Utility
Using a certificate signed by an internal CA trusted by your domain should be fine.  You're already using that trust, internal to your domain... this would just be one more communication.  It would be self signed that would be untrusted, but even that's minutely better than having communication in the clear.

On the server with the SQL Reporting Services, start the 'Reporting Services Configuration Manager', connect to your reporting server instance, and select the 'Report Server Virtual Directory'... there should be a box to select SSL, and enter the certificate information.
(If you're using SQL 2012 RS, it'll under 'Web Service URL', then the 'advanced' tab...  and you can modify the SSL identities and bind a certificate.)
But the upshot is... all that configuration is done in the "SQL Server Reporting Services Configuration Manager' tool.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Suggested Solutions

Introduction Earlier I wrote an article about the new lookup functions (http://www.experts-exchange.com/A_3433.html) that ship with SQL Server 2008 R2.  In this article I’m going to show you another new feature of SSRS 2008 R2, this time in the vis…
Imagine a situation that you have installed SSL (http://en.wikipedia.org/wiki/Secure_Sockets_Layer) Certificate on your Cisco ASA (Cisco Adaptive Security Appliance) firewall. Installation of SSL certificate on ASA is an another topic for which you …
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now