Finally we get cluster-wide certificate management via multi-SAN certificate support. EDIT 6/10/2014 – and I immediately find a SEV2 bug working with TAC Bug ID:CSCup28852. Callmanager hates this certificate and sends group resets every ITL refresh meaning your phones reboot every 10 minutes or so. Fixed in a later CUCM version but not available for download at this time.
You need to properly set up your Microsoft CA to provide the proper certificate template.
New Certificate template “Web Server X509v3”
- Certificate purposes – Server authentication, client authentication, IP security end system
- Key usage – Digital signature, Non repudiation (I add this so this can also be used for the VMware hosts, Key encipherment, data encryption. When you are in “Key Usage” you cannot assign Key Agreement and Key Encryption. You want to select “key encipherment”
- Key length: 2048
- Hash: SHA256
Generate Multi-SAN certificate request from your CUCM publisher
- Certificate purpose: tomcat
- Distribution: Multi-server (SAN)
Common name: Can be left as-is of put in a vanity name
- Auto-populated Domains
- This should list all of your CUCM and IM&P nodes in the cluster.
- Be sure this is the parent DNS domain your SERVERS are residing in. There are some caveats here if you have servers in different domains
- Example: cucm1.site.domain.com
- ADD your directory URI domains (AKA e-mail domain).
- Example: domain.com
- Key Length: 2048
- Hash: SHA265
- Submit the CSR to the Microsoft CA via http://ca-server/certsrv
- Upload the CA root and any intermediates
- Upload the new certificate to CUCM publisher
Enjoy that you didn’t have to do that on every cluster node!
Reminder: If Jabber is connecting to Voicemail you need to go to Unity Connection and create CSR and assign a certificate for each Unity Connection node. Jabber will still prompt for a certificate error if Unity Connection is un-signed.