How to install a SSL certificate on Azure?

Hi,
I am trying to install an SSL cert on my Azure instance. I followed this tutorial: http://www.windowsazure.com/en-us/documentation/articles/cloud-services-configure-ssl-certificate/
However, when I deploy the package on to the staging instance it does not start up. And we can't retrieve detailed bug, and can't connect remotely to that instance.
I am not sure what else can be done? Please help?

hi,
Did you upload cert into staging environment? How did you set the Https endpoint on your service definition file ?Did you try to change http to https to access cloud service? I suggest you could try to use https to visit your cloudservice firstly. If it
doesn't work, please check your endpoints setting in your project.
>>And we can't retrieve detailed bug, and can't connect remotely to that instance.
Did you enable the Remote desktop? You could enable the remote desktop on your deployment (http://msdn.microsoft.com/en-us/library/windowsazure/gg443832.aspx ). Any latest info,
please let me know.
Hope this helps.
Will
We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
Click
HERE to participate the survey.

Similar Messages

  • Does anyone know how to install an SSL certificate on 10.3 Server?

    Can't find this in the documentation.

    You cannot install a spam filter on iPad. Spam is generally controlled by your email provider at the server level, though mail clients do often have a secondary filter that learns from your behavior.
    Who is your email provider? Have you tried adjusting their spam filters?

  • Trouble installing Verisign SSL certificate

    I'm using WebLogic 7.0 and need to figure out how to install the SSL certificate.
    I've followed the instruction from both Verisign and BEA to install the certificate.
    But I could not get pass this error:
    ####<Oct 24, 2002 3:16:18 PM EDT> <Warning> <Security> <prodmvision02> <myserver>
    <main> <kernel identity> <> <090088> <SSL did not find the private key alias on
    server myserver for realm myrealm even though this server is configured as a 7.0
    server. This data was required by SSL to load the server private key.>
    ####<Oct 24, 2002 3:16:19 PM EDT> <Alert> <WebLogicServer> <prodmvision02> <myserver>
    <main> <kernel identity> <> <000297> <Inconsistent security configuration, java.security.KeyManagementException:
    ASN.1: Lengths longer than 32 bits are not supported>
    ####<Oct 24, 2002 3:16:19 PM EDT> <Emergency> <Security> <prodmvision02> <myserver>
    <main> <kernel identity> <> <090034> <Not listening for SSL, java.io.IOException:
    Inconsistent security configuration, java.security.KeyManagementException: ASN.1:
    Lengths longer than 32 bits are not supported.>
    Curently I'm clueless on what has happened. This is the third time I tried to
    follow the instruction. Please help.

    Hello Patrick,
    Thanks for the information:
    you created a keypair for SSL in the Key Store service interface in the Visual Administrator, generated a CSR response and sent it to Verisign. Now you have the CSR response from Verisign - is my understanding of the situation correct?
    Absolutely right
    You can import this into the Key Store service, by highlighting the private key of the keypair and choosing 'Import CSR Response'. Now your key pair is signed.
    Successfully done.
    After this i can see that PRIVATE KEY (IssueDN has been changed to Verisign)
    But CERTIFICATE ISSUER DN is not changed.
    Now if i try to access the site with https, able to do properly and if click on the Lock icon on the browser, i can see certificate is 3 Chained
    Verisign Trial Secure Server Root CA - G2
    ----> Verisign Trial Secure Server CA - G2
    ----> -> Training.pearson.com (this is my Common Name)
    So it looks to be working fine.
    However there is no chain formed. You need to now follow the aforementioned note and export the private key and public key certificate separately by higlighting the private key and choosing 'Export'. Export with the 'Files of type' drop down box set to (*p8), and after exporting the private key you will be able to export the public key cert. This is step 6 and 7 of the note. Now follow steps 8-12 to form the chain
    No Chains has been made in Visual Admin, and i tried these on another server - it works as you are saying.
    But is there any benefit of importing Intermediate, Root Certificates - as mentioned in SAP note steps 8 to 12.
    If yes, then is it mandatory to make the chain till 3rd level (means Root Certificate also).
    Once the chain is loaded into the Key Store, you need to ensure that the Java dispatcher is configured to send the signed server certificate for the relevant SSL ports - see here http://help.sap.com/saphelp_nw04/helpdata/en/5c/15f73dd0408e5be10000000a114084/content.htm
    Edited by: Julius Bussche on Aug 10, 2009 3:44 PM
    code --> quote

  • Installing Verisign SSL Certificate on NW 700 Java system

    Hello Experts,
    For our NW700 Java system, we have got Verisign SSL Certificate. Installation instructions from Verisign says - we need to install Intermediate Certificate also along with SSL certificate for our Common Name.
    Can you please let me know how we install Verisign SSL Certificate on NW700 JAVA system using Visual Admin.
    Instructions from Verisgn says:
    Install Intermediate Certificate on server.
    Install SSL certificate.
    Thanks
    Davinder

    Hello Patrick,
    Thanks for the information:
    you created a keypair for SSL in the Key Store service interface in the Visual Administrator, generated a CSR response and sent it to Verisign. Now you have the CSR response from Verisign - is my understanding of the situation correct?
    Absolutely right
    You can import this into the Key Store service, by highlighting the private key of the keypair and choosing 'Import CSR Response'. Now your key pair is signed.
    Successfully done.
    After this i can see that PRIVATE KEY (IssueDN has been changed to Verisign)
    But CERTIFICATE ISSUER DN is not changed.
    Now if i try to access the site with https, able to do properly and if click on the Lock icon on the browser, i can see certificate is 3 Chained
    Verisign Trial Secure Server Root CA - G2
    ----> Verisign Trial Secure Server CA - G2
    ----> -> Training.pearson.com (this is my Common Name)
    So it looks to be working fine.
    However there is no chain formed. You need to now follow the aforementioned note and export the private key and public key certificate separately by higlighting the private key and choosing 'Export'. Export with the 'Files of type' drop down box set to (*p8), and after exporting the private key you will be able to export the public key cert. This is step 6 and 7 of the note. Now follow steps 8-12 to form the chain
    No Chains has been made in Visual Admin, and i tried these on another server - it works as you are saying.
    But is there any benefit of importing Intermediate, Root Certificates - as mentioned in SAP note steps 8 to 12.
    If yes, then is it mandatory to make the chain till 3rd level (means Root Certificate also).
    Once the chain is loaded into the Key Store, you need to ensure that the Java dispatcher is configured to send the signed server certificate for the relevant SSL ports - see here http://help.sap.com/saphelp_nw04/helpdata/en/5c/15f73dd0408e5be10000000a114084/content.htm
    Edited by: Julius Bussche on Aug 10, 2009 3:44 PM
    code --> quote

  • Installing an SSL certificate for a CSS 11503

    I'm having the hardest time searching for clear instructions on how to request and install an SSL certificate for a CSS 11503 Content Switch. Can anyone help or point me in the right direction?
    I'm also looking for instructions on how to replace an SSL certificate once it's been installed. Thanks!

    Allen,
    The portion of the configuration guide related to SSL certificates and keys can be found here:
    http://cisco.com/en/US/products/hw/contnetw/ps792/products_configuration_guide_chapter09186a00801eea82.html#1422544
    To replace an SSL certificate, you'll need to remove the current certificate and re-import/create the new one.
    ~Zach

  • Exchange 2010: How to renew an SSL certificate?

    Hi all.  I have done some reading but it seems I can't find just a simple step-by-step on how to renew an SSL certificate issued by a 3rd party CA for Exchange 2010.  I really don't want to mess this one up by cobbling together partial answers
    from various forums and end up omitting something, then being stuck unable to figure out why I broke email while the CEO flips out. 
    This is a standard GoDaddy 5-domain UCC certificate.  There is only one Exchange server, SP3 (I don't think I have Rollup 6 on yet).  The existing certificate expires in a month or so. 
    I have some specific questions but perhaps these would be answered via what I hope will be a step by step instruction set in your reply :) Sorry to appear lazy by asking for the full instructions just that so far no single forum post nor MS TechNet article
    has addressed all my concerns, or in some cases information conflicts.  So my concerns for example are:  can you do a renewal for a certificate before the old one expires?  It is actually a renewal, or are you adding a 2nd certificate? 
    Do you have to do anything in IIS or does EMC or EMS do all that for you? 
    Thank you. 

    -->Can you do a renewal for a certificate before the old one expires? 
    Yes. Normally 3rd party CA allows you to renew certificate before the current one expires.
    -->It is actually a renewal, or are you adding a 2nd certificate? 
    You have to renew the certificate and a new/second certificate will be added to your server certificate store. Please check below for detailed step of Godaddy renewal. http://stevehardie.com/2013/10/how-to-renew-a-godaddy-exchange-2010-ssl-certificate/
    -->Do you have to do anything in IIS or does EMC or EMS do all that for you? 
    You will have to do it from MMC or EMS. No need to do anything from IIS.
    Follow the steps below to make your work easy or follow the video in this site site.http://www.netometer.com/video/tutorials/Exchange-2010-how-to-renew-SSL-certificate/
    1. Run this command from EMS to generate CSR. You can see the CSR named "newcsr.txt" in C:\CSR
    folder
    Set-Content -path "C:\CSR\newcsr.txt" -Value (New-ExchangeCertificate -GenerateRequest -KeySize 2048 -SubjectName "c=US, s=WA, l=Bellavue, o=Contoso, cn=commonname.domain.com" -DomainName autodiscover.domain.com -PrivateKeyExportable $True)
    2. Renew the certificate from Godaddy (from Godaddy portal) using the new CSR (i.e. newcsr.txt). Download the certificate from Godaddy after renewal.
    3. Open Exchange MMC. Go to Server configuration. Right click on the pending request.  Click on complete pending request and browse to the newly downloaded certificate. Make sure you have internet when doing this.
    4. Assign services using the steps in the below site. Make sure you have selected the new certificate. You will see the thumbprint just before completion http://exchangeserverpro.com/how-to-assign-an-ssl-certificate-to-exchange-server-2010-services/
    5.Delete the old one certificate from MMC.
    From EMS use this command 
    Remove-ExchangeCertificate -Thumbprint <old cert thumprint>
    You can see the the certificate thumprints using Get-ExchangeCertificate command
    MAS. Please dont forget to mark as answer if it helped.

  • How to install and use certificates on client?

    Hello everyone, and first of all sorry for my poor, italian-accented english.
    I have some questions about SSL and certificates. I'm developing a java desktop application, which should connect to a https server, authenticate with a previously downloaded certificate and then gain access. Some specs: I work on a Windows Xp Pro machine with Netbeans 6.1 and jdk 1.6.0_07.
    Now, I'm using HttpUnit libraries to connect the first time, login with basic authentication and download the certificate, but after i get it I'm not sure how to install the certificate (using java, it has to be an automated procedure) on the client machine and then how to use it to connect to the server. I've tried to use the code I've found here and after using it I can see the certificate inside Control Panel > Java > Securiy > Certificates > System, but I'm not sure I'm installing it in the correct way and/or in the correct path.
    Everytime I try to connect to the server I get back a HTTP 403 forbidden exception. Does someone know any tutorials/howtos/example codes to suggest to me? Or could tell me what's the right installation procedure using java? Any help would be very appreciated.
    Thanks in advance
    K.

    After banging my head on my keyboard for a lot of hours, I've got it!
    I was trying to install a *.pfx certificate, and that was bad. I tried to convert it in *.p12 or *.cer but that workaround didn't work. Finally I've found a small code to use a *.pfx certificate without installing it and... it works! No more 403 errors now, I can get that damn page. :)
    Here is the class I've used (I've found it somewhere googling around but I've lost the link, sorry. Anyway, I've modified it a little)
    import java.io.BufferedReader;
    import java.io.FileInputStream;
    import java.io.InputStreamReader;
    import java.net.*;
    import java.security.KeyStore;
    import javax.net.*;
    import javax.net.ssl.*;
    public class ConnectWithPfx {
       static final int HTTPS_PORT = 443;
       public static void main(String argv[]) throws Exception {
          // Get a Socket factory
          SocketFactory factory = SSLSocketFactory.getDefault();
          SSLSocketFactory socketFactory = null;
          try {
                KeyStore keyStoreKeys;
                KeyManagerFactory keyMgrFactory;
                SSLContext sslContext;
                keyStoreKeys = KeyStore.getInstance("PKCS12");               
                keyStoreKeys.load(new FileInputStream("mycertificate.pfx"),"certpassword".toCharArray());
                keyMgrFactory = KeyManagerFactory.getInstance("SunX509");
                keyMgrFactory.init(keyStoreKeys, "certpassword".toCharArray());
                sslContext = SSLContext.getInstance("SSL");
                sslContext.init(keyMgrFactory.getKeyManagers(), null, null);
                socketFactory = sslContext.getSocketFactory();
                Socket socket2 = factory.createSocket("www.my.host", HTTPS_PORT);
          } catch (Exception e) {
                e.printStackTrace();
            URL url = new URL("https://www.my.host/mypage");      
            // Open a HTTP connection to the URL assigning the SocketFactory we created before
            HttpsURLConnection conn = null;
            conn.setDefaultSSLSocketFactory(socketFactory);
            conn = (HttpsURLConnection) url.openConnection();              
            // Allow Inputs
            conn.setDoInput(true);
            // Allow Outputs
            conn.setDoOutput(true);
            // Don't use a cached copy.
            conn.setUseCaches(false);
            conn.setRequestProperty("Connection", "Keep-Alive");
            BufferedReader in = new BufferedReader(new InputStreamReader(conn.getInputStream()));
            String line;
            String response = "";
            while ((line = in.readLine()) != null) {
                response += line+"\n";
            System.out.println(response);
    }Hope this could be useful for someone else. Thanks to everyone who read or replied to my thread. :)

  • How to generate a SSL certificate for Adobe Connect?

    My organization uses adobe connect across the internet and we
    would like to enable SSL on the server. I have instructions for
    enabling SSL once a CSR is generated, but I do not know how to
    actually generate the CSR using Adobe Connect.
    Any info on how to generate a SSL CSR would be great,
    thanks.

    There is no 'built-in' method in Connect to do this. We used
    a open-source product called OpenSSL to generate our CSR file for
    Connect. Just Google OpenSSL and download/install it (it's free).
    Then use something like this command for creating a cert:
    openssl
    req -new -key <exisiting private key file> -out <csr
    file you want to make>
    Example:
    OpenSSL> req -new -key privatekey.pem -out connectcert.csr
    After you get the new certificate from the CA, put in
    d:\breeze directory. Then update the adaptor.xml file with the new
    cert name (make sure backup the existing file).
    Make sure you REBOOT the server to enable changes! Simply
    restarting services will not work.
    Hope this helps!

  • How to get the ssl-certificate trusted on lion-server

    I'm in the process of setting up lion server to create a small (international) research group collaborating on a project.
    So I want to use the server to exchange data, use a common calendar, address-book etc.
    To do so you need to get a SSL-certiifcate (unless you do everything on VPN).
    So I selected the server in server.app (Hardware) and selected SSL certificate edit
    created a certificate signing request that I exported and saved on my computer
    I received a ssl.crt that I also saved and dragged into the window and replace the original certificate with the signed one
    and also imported the certificate in to the keychain
    All following the steps described in:
    Managing iOS deviceswith OS X Lion Server by Arek Dryer
    the book describes that the certiifcate should now be trusted and valid. However, I keep the message "This certificate was signed by an unkown authority"
    So I somehow did something wrong.
    Any suggestions what I should do?

    ok let me add some info in the hope I will get some guidance:
    using the site http://www.sslshopper.com/ssl-checker.html
    I was able to check on the status of the certificate:
    The certificate is not trusted in all web browsers. You may need to install an Intermediate/chain certificate to link it to a trusted root certificate. Learn more about this error. The fastest way to fix this problem is to contact your SSL provider.
    since it is a non-commercial server I used a 'free?' SSL-certificate provider that will charge you when you contact them, so you have to figure it out by yourselve
    I guess I would be helped if there is a step by step manual how to install a root certificate

  • How we can get SSL certificate for any site?

    i want to know how can get SSL certificate for any website and what is the main benefit for particular website with the help of this certificate.

    Hi,
    Would you please let me know edition information of the SBS server? Was it SBS 2008 or SBS 2011?
    Based on your description, I’m a little confused with your question. Did you mean that want to know why need
    SSL certificate for website?
    Certificate Services and SSL protect sensitive information by encrypting the data sent between client browsers
    and your server.
    An SSL Certificate is used for two reasons (1) to validate the remote server to the client before the client sends any data to that server (2) to encrypt the data between the client and server over an un-secure network (ie. the Internet). You can use
    a self-issued certificate or a third-party trusted certificate. For more details, please refer to following articles and check if can help you.
    Managing Certificates
    SSL and Certificates
    Understanding Self-Issued
    Certificates in SBS 2003 & SBS 2008
    Installing a GoDaddy Standard
    SSL Certificate on SBS 2008
    Please Note: Since the web site is not hosted by Microsoft, the link may change without notice. Microsoft
    does not guarantee the accuracy of this information.
    If anything I misunderstand or any update, please don’t hesitate to let me know.
    Hope this helps.
    Best regards,
    Justin Gu

  • ACS Not installing renewed SSL Certificate for PEAP/EAP-TLS?

    We recently renewed our SSL certificate through RapidSSL. While attempting to install the new certificate into ACS, I was given the prompt to showing the updated dates, confirmed and installed the new certificate, deleting the old. I restarted ACS, as required, but when trying to enable PEAP or EAP-TLS, I am getting the error "Failed to initialize PEAP or EAP-TLS authentication protocol because ACS certificate is not installed."
    The worst part, is that I when I tried to reinstall the old certificate, I am now getting the same problem.
    Any suggestions?

    Matt,
    How did you perform the CSR.... did you use ACS or OpenSSL? Also, did you verify that the certificate is in the trusted personal folder on the server?
    Scott

  • How to install & use x509 certificate in XI 3.0

    Hi gurus,
    Somebody knows as install a x509 certificate in XI 3.0? Is it in Visual Admin?
    Is There some guide?
    When this installed, how we test it? What configuration we must do in Communication Channels and the Receiver Agreement/Sender Agreement? What tool we can use to test the scenario?
    Kind regards

    Hi,
    This is used when you are using FTPS in your communicaiton channel. The Certificates are installed in the visual administration. I have not seen any guide on how to install this. But you have a detailed step  by step procedure of how to install in this link:
    http://help.sap.com/saphelp_nw04/helpdata/en/53/b221e3b466b346860715a550ca987d/content.htm
    Apart from this you may also need to install SAP Java Cryptographic Toolkit. You get some help on this at this link:
    http://help.sap.com/saphelp_nw04/helpdata/en/8d/cb71b8046e6e469bf3dd283104e65b/content.htm
    Once when you do this your certificates can be seen from the communicaiton channel. In your communication channel in the FTP Conneciton parameters you have to select Conneciton security as FTPS and check the check box X.509 certificates. In keystore if you press F4 you will see the keystore which were installed earlier. Select the keystore and the X.509 Certificate.
    Once you are done with this run your scenario. If you have any errors you will see in communicaiton channel monitoring.
    ---Satish

  • How to install Open-SSL tool kit for Key conversion

    Hi Expert,
    Can you please suggest how do i install Open-SSL tool kit for Key conversion .
    I need this for creating public and private keys for a key based SFTP connection.

    SAP PI donnot support SFTP protocol. If you have a third party SFTP adapter and wanted to generate a keypair, you can use tools like PuttyGen.
    But you need to download the tool on to the PI server to generate a key pair.
    Instead, you can use the unix command to generate key pair (Recommended) -
    ssh-keygen -t rsa
    http://linuxmafia.com/pub/os2/stahl-ssh/snafu-mirror/ssh-keygen.html

  • How to install IPSec Client Certificate for Apple products (iPad,iPhoe and Mac)

    We need  Ipsec vpn client authentication with certificate (instead of pre-shared key). We tested the same with Windows client and its works fine. However when we used the same certificates with Apple products (iPad, iPhoe and Mac) it doesnt work.
    We have two types of certificates installed on the client from the CA server.
    One is the root certificate with the extenstion .cer
    and the other one is client certificate with the extension of .pfx (personal informaiton exchange)
    We can not find a proper document to install certificates and client configuration for iPad,iPhoe and Mac. We need to know what type of certificates needed, what are the certificate formats and how to install etc.
    Appreciate if someone has implemented this and share any documents.
    thanks

    This will be helpful for you :-
    http://images.apple.com/iphone/business/docs/iOS_Certificates_Mar12.pdf
    Manish

  • How to install enterprise trust certificate in iphone

    I am trying to use the outlook mail account. But i need to install the enterprise trust certificate before using it. Where i can find the link and how to install it?

    Apple have restrictions against adobe on the iphone, ipod touch and ipad. There will not be any flash in the near future.

Maybe you are looking for