Client Management Suite

 View Only
  • 1.  SMP communication profile changes CA cert friendly name

    Posted Jul 14, 2020 03:10 AM
    Hi,

    Our customer has distributed their internal root CA & enterprise CA certs with the agent communication profiles when they setup SSL originally on 8.0, now since they upgraded on some servers the root CA friendly name is changed and causes an issue with other software referencing the same cert.

    Has anyone seen this issue and is it needed to include the internal root CA & enterprise CA certs? if not can we safely remove the cert from the communication profile and our of the cert manager on the NS?

    Thanks,
    Rufus

    Cert name as seen in MMC:
     

    Communication Profile link to servers excluding root and ent CA certs:

    Default Communication profile:


    ------------------------------
    ProServe Consulting
    ------------------------------


  • 2.  RE: SMP communication profile changes CA cert friendly name
    Best Answer

    Broadcom Employee
    Posted Jul 14, 2020 03:37 AM
    This behavior changed in 8.5 RU4 release so now Symantec Management Agent doesn't change cert friendly name

    In 8.5 RU3 and earlier, Symantec Management Agent sets friendly names for certificates.
    Starting from 8.5 RU4, the following changes are introduced:
    - After installation, the agent does not set friendly names for certificates.
    - After upgrade, the agent removes the friendly names that it has previously set.

    If you have 8.5 RU3, then you can apply point fix so after Symantec Management Agent update, certificate names will be ok.

    Thanks,
    IP.

    ------------------------------
    Software QA Engineer 3
    Broadcom Inc.
    ------------------------------



  • 3.  RE: SMP communication profile changes CA cert friendly name

    Broadcom Employee
    Posted Jul 15, 2020 03:17 AM
    Hello, as Igor already said SMA 8.5 RU4 and the latest RU3 PF do not set friendly name to the certificates anymore but I'm wondering what kind of problems SMA friendly name caused to other software? Friendly name is not a part of certificate itself it is just a name added locally on the machine, local user can easily change it to whatever he/she likes. SMA does not care if friendly name was changed for any certificates it installed. If some software depends on the friendly name then it can be easily broken.

    Pre RU4 SMA set friendly name for certificates it installs only if those certificates have not been installed on the machine before. If a certificate was on the machine, the name would not be changed. We assumed since admin decided to redistribute some certificates using SMA profiles, then they "kind of" belong to us and we can set the friendly name.

    If you redistribute certificates using some other method (AD for example) then you can remove these certificates from SMA profiles. SMA simply needs certificates to be presented on the machine when it makes https connections.