Appendix B: Sample Certificate
Microsoft Office Communications Server 2007 and Microsoft Office Communications Server 2007 R2 will reach end of support on January 9, 2018. To stay supported, you will need to upgrade. For more information, see Resources to help you upgrade your Office 2007 servers and clients.
The CSR (certificate signing request) generated by the Communications Certificate Wizard that you use to request your certificate varies, depending on the CA you choose. In general it contains the information shown in the following figures. For a list of public certificate authorities that provide certificates that meet specific requirements for Unified Communications certificates and have partnered with Microsoft to ensure they work with the Office Communications Server Certificate Wizard, see the Microsoft Web site at https://r.office.microsoft.com/r/rlidOCS?clid=1033&p1=SupportedCAs.
Sample Certificate Requests
Certificate request for a Single Access Edge Server (Exportable=FALSE)
[Version]
Signature= "$Windows NT$"
[NewRequest]
Subject= "CN=server1.contoso.come;OU=LCS;O=Contoso;L=Redmond;S=Washington;C=US"
KeySpec = 1
KeyLength = 1024
Exportable = FALSE
MachineKeySet = TRUE
SMIME = FALSE
PrivateKeyArchive = FALSE
UserProtected = FALSE
UseExistingKeySet = FALSE
ProviderName = "Microsoft RSA Schannel Cryptographic Provider"
ProviderType = 12
RequestType = PKCS10
KeyUsage = 0xa0
[EnhancedKeyUsageExtension]
OID=1.3.6.1.5.5.7.3.1
Certificate request for an array of Access Edge Servers (Exportable=TRUE)
[Version]
Signature= "$Windows NT$"
[NewRequest]
Subject= "CN=server1.contoso.com;OU=LCS;O=Contoso;L=Redmond;S=Washington;C=US"
KeySpec = 1
KeyLength = 1024
Exportable = TRUE
MachineKeySet = TRUE
SMIME = FALSE
PrivateKeyArchive = FALSE
UserProtected = FALSE
UseExistingKeySet = FALSE
ProviderName = "Microsoft RSA Schannel Cryptographic Provider"
ProviderType = 12
RequestType = PKCS10
KeyUsage = 0xa0
[EnhancedKeyUsageExtension]
OID=1.3.6.1.5.5.7.3.1
Note
The subject line in the PolicyFileIn.Inf file must contain the following information:
Subject="CN=FQDN of your Access Edge Server or Array ;OU=ProjectName;O=CompanyName;L=City;S=fullNameofState;C=two-letter country/region abbreviation
Most public CAs require strict compliance with the above information.
Examples:
CN=AP1.fabrikam.com;OU=LCS;O=Fabrikam;L=Eugene;S=Oregon;C=US
CN=AParry.marketing.proseware.com ;OU=LCS;O=Proseware;L=Portland;S=Maine;C=US
Table 41 Fields in PolicyFileIn.inf
Field | Notes |
---|---|
Signature=$Windows NT$" |
|
Subject="CN=FQDN;OU=Organizational unit;O=Company ;L=city S=state;C=country/region |
CN: The fully qualified domain name of your Access Edge Server or Access Edge Server array (the server or array on which you are installing the certificate) OU: Some division or department O: Company name L :City S: Full state or province name (no abbreviations are accepted) C: Two-letter country/region code |
KeySpec=1 |
Indicates both encryption and signing (standard TLS requirement) |
KeyLength = 1024 |
Must be a power of 2 between 1024 and 4096, inclusive |
Exportable = FALSE (single Access Edge Server) Exportable=TRUE (array of Access Edge Servers) |
FALSE for a single Access Edge Server TRUE for an array of Access Edge Servers |
MachineKeySet = TRUE |
Specifies that the certificate will be put into the local computer store |
SMIME = FALSE |
|
PrivateKeyArchive = FALSE |
|
UserProtected = FALSE |
This field must be set to FALSE; otherwise, RTCSRV will not be able to use it |
UseExistingKeySet = FALSE |
This field must be set to FALSE to generate a new private key |
ProviderName = "Microsoft RSA Schannel Cryptographic Provider" |
SCHANNEL (Windows TLS provider) requirement |
ProviderType = 12 |
SCHANNEL (Windows TLS provider) requirement |
RequestType = PKCS10 |
Can be PKCS10 or PKCS7. Almost all CAs accept PKCS10, so you should leave the request type as PKCS10 |
KeyUsage = 0xa0 |
Similar to KeySpec field. This value indicates that this certificate can be used for both encryption and signing |
OID=1.3.6.1.5.5.7.3.1 |
Enhanced key usage for server authorization |