Go Premium for a chance to win a PS4. Enter to Win

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 130
  • Last Modified:

How do I add the self-signed sbs 2011 certificate to an android phone?

How do I add the self-signed sbs 2011 certificate to an android phone?
0
Ken Macleish
Asked:
Ken Macleish
  • 4
5 Solutions
 
DIPRAJCommented:
place the certificate in your SD card.
go to your phone security settings and install the certificate.
0
 
btanExec ConsultantCommented:
pls see this if helps
https://coderwall.com/p/wv6fpq

Copy the .crt file to the root of the /sdcard folder inside your Android device
Inside your Android device, Settings > Security > Install from storage. It should detect the certificate and let you add it to the device

Browse to your development site. The first time it should ask you to confirm the security exception. That's all. The certificate should work with any browser installed on your Android (Browser, Chrome, Opera, Dolphin...)

Remember that if you're serving your static files from a different domain... you also need to add the certificate for that domain.

However, you should be careful to make sure your self-signed certificate has a reasonably strong key. As of 2012, a 2048-bit RSA signature with an exponent of 65537 expiring yearly is acceptable. When rotating keys, you should check for recommendations from an authority (such as NIST) about what is acceptable.

https://developer.android.com/training/articles/security-ssl.html#SelfSigned
0
 
Dirk MareSystems Engineer (Acting IT Manager)Commented:
If its the same key your OWA is using you can connect the phone to Wifi and browse to your OWA page and you should be able to install the certificate via your browser..

DirkMare
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
btanExec ConsultantCommented:
I was reviewing some public info and there is case where Android accept BKS certificates whereas most of the time a CER certificate with keytool is created instead. The suggested step to produce the BKS and import is as follows.

Download portecle (http://portecle.sourceforge.net/)
Run the program
File > New KeyStore > BKS
Tools > Import Trusted Certificate > alias = server
Save Keystore (pass = keypass) as C:\temp\server.bks
Copy the file to the Android project in res/raw/server.bks

http://transoceanic.blogspot.sg/2011/11/android-import-ssl-certificate-and-use.html
0
 
btanExec ConsultantCommented:
The approach for installing for android is shared,  the process is to change pem to CRT first

As is in Google’s documentation, you can add your own certificates to the phone, but it has to be in the DER or PKCS#12 format. This is different from the usual PEM format which you would set up for your website, but thankfully a few lines of a shell script and the OpenSSL toolkit will get you on your way:

echo | \
  openssl s_client -connect ${SERVER}:${PORT} 2>&1 | \
  sed -n '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' | \
  openssl x509 -outform DER -out ${SERVER}.crt
and thereafter

Pop that resulting .crt file into the root directory of your phone, then go to the Settings -> Personal -> Security -> Credential Storage -> Install from storage. It’ll find your self-signed cert, at which point you can use it without the error messages in any of your applications.

You can then remove any of these certificates via “Trusted credentials” under the similar “Credential Storage” area, and clicking on the “User” tab. Click on the certificate, and scroll the detail view to the bottom to reveal the (otherwise hidden) “Remove” button.
https://coderwall.com/p/wv6fpq/add-self-signed-ssl-certificate-to-android-for-browsing
http://rlaskey.org/words/2093/android-adding-your-self-signed-certs/
0
 
btanExec ConsultantCommented:
For consideration of ID: 41711585 and ID: 40213516 as solution.
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

  • 4
Tackle projects and never again get stuck behind a technical roadblock.
Join Now