The SSL Visibility Appliance verifies the validity of server certificate chains before resigning them. This validation process can be used in policy to resign invalid certificates with a CA that clients do not trust, which allows the appliance to decrypt the session but preserve the certificate status.
In order to validate a server certificate chain, the SSL Visibility Appliance must be able to completely rebuild the chain from the server certificate to the root CA. To rebuild the chain, the appliance must be able to access all certificates in the chain as follows:
The endpoint server certificate will always be on the wire.
Any intermediate CAs must either be sent by the server on the wire along with the server certificate, or must be found in the external CA store.
The root CA must be in the SSL Visibility Appliance external CA store.
There may be cases where an intermediate or root CA is not found in the SSL Visibility Appliance
External Certificate Authorities list, which causes "Invalid Issuer certificate status" to be present.
This is a result of the external CA list not being updated automatically. At the moment it is only updated periodically and manually. In the interim, if the CA is from a well known CA and is trusted by major browsers, it can be added to the external CA list by importing the PEM file to the
Imported Document ID: 000024014
Subscribing will provide email updates when this Article is updated. Login is required.
Thanks for your feedback. Let us know if you have additional comments below. (requires login)
Subscribed to the Article.
Unable to subscribe
Thanks for your additional feedback !!!
Enterprise Support Virtual Agent
Rate Me :
Tell us more:
Welcome! My name is Sami, the Enterprise Support Virtual Agent answering technical support questions.