Install certificates for communication with the Mobile Server
To use an HTTPS protocol for establishing a secure connection between the mobile server and clients and services, you must apply a valid certificate on the server. The certificate confirms that the certificate holder is authorized to establish secure connections.
In XProtect VMS, encryption is enabled or disabled per Mobile Server. You enable or disable encryption either during installation of the XProtect VMS product or by using the Server Configurator. When you enable encryption on a Mobile Server, you then use encrypted communication with all clients, services, and integrations that retrieve data streams.
When you configure encryption for a server group, it must either be enabled with a certificate belonging to the same CA certificate or, if the encryption is disabled, then it must be disabled on all computers in the server group.
Certificates issued by CA (Certificate Authority) have a chain of certificates and on the root of that chain is the CA root certificate. When a device or browser sees this certificate, it compares its root certificate with pre-installed ones on the OS (Android, iOS, Windows, etc.). If the root certificate is listed in the pre-installed certificates list, then the OS ensures the user that the connection to the server is secure enough. These certificates are issued for a domain name and are not free of charge.
Add a CA certificate to the server
Add the CA certificate to the Mobile Server by doing the following.
Specific parameters depend on the CA. Refer to the documentation of your CA before proceeding.
-
On the computer that hosts the Mobile Server, open the Microsoft Management Console.
- In the Microsoft Management Console, from the File menu select Add/Remove Snap-in….
-
Select the Certificates snap-in and click Add.
Click OK.
-
Expand the Certificates object. Right-click on the Personal folder and select All Tasks > Advanced Operations > Create Custom Request....
-
Click Next in the Certificate Enrollment wizard and select Proceed without enrollment policy.
Click Next.
-
Select the (No template) CNG Key template and the CMC request format, and click Next.
The request format depends on the CA. If the wrong format is chosen, the CA will issue an error when the certificate signing request (CSR) is submitted. Check with the CA to make sure you choose properly.
-
Expand to view the Details of the custom request, and click Properties.
-
On the General tab, fill in the Friendly name and Description fields with the domain name registered with the CA.
-
On the Subject tab, enter the parameters as required by the specific CA.
For example, the subject name Type and Value are different for each CA. One example is the following required information:
-
Common Name:
-
Organization:
-
Organizational Unit:
-
City/Locality:
-
State/Province:
-
Country/Region:
-
-
Some CAs don't require extensions. However, if required, go to the Extensions tab and expand the Key usage menu. Add the required options from the list of Available options to the Selected options list.
-
On the Private Key tab, expand the Key options menu.
Set the key size to 2048 and select the option to make the private key exportable.
The key size variable is determined by the CA, therefore a higher size key may be required. Other options, such as a specific Hash Algorithm (sha256), may also be required. Adjust all of the options required before proceeding to the next step.
-
Unless the CA requires a signature, the next step is to click OK.
-
When all of the certificate properties have been defined, click Next on the Certificate Enrollment wizard.
-
Select a location to save the certificate request and a format. Browse to that location and specify a name for the .req file. The default format is base 64, however some CAs require the binary format.
-
Click Finish.
A .req file is generated, which you must use to request a signed certificate.
Upload the .req file to receive a signed certificate in return
Every CA has a different process for uploading .req files in order to receive a signed certificate in return. Refer to the documentation of your CA for information on retrieving a signed certificate.
When working with the Mobile Server it is recommended to use a third-party CA. In most third-party CA situations, it is required to download a .ZIP file, and extract the contents to the computer that hosts the Mobile Server.
There are several file types that could be included in the extracted .ZIP file contents.
.CER or .CRT files can be installed using a similar process. Right-click the file and choose Install Certificate from the shortcut menu.
The following steps use a .CER file from an internal CA.
Your CA will need the contents of the .req file. You will be asked to copy the entire text of the .req file, including the begin and end lines, and paste the text into a field made available at a portal managed by the CA.
-
Browse to the location of the .req file and open it in Notepad, and paste the text into a field made available at a portal managed by your CA.
-
When you receive the certificate from your CA, browse to the downloads folder (or wherever you choose to store the folder on the computer), right-click the certificate and select Install Certificate.
-
Accept the security warning if it appears.
Select to install the certificate for the local machine and click Next.
-
Choose a storage location, and browse to the Personal certificate store, and click Next.
-
Finish the Install Certificate wizard.
Enable encryption on the Mobile Server
Once the certificate is installed on thecomputer that hosts the Mobile Server, do the following.
-
On a computer with a Mobile Server installed, open the Server Configurator from:
- The Windows Start menu
or
- The Mobile Server Manager by right-clicking the Mobile Server Manager icon on the computer task bar
-
In the Server Configurator, under Mobile streaming media certificate, turn on Еncryption.
-
Click Select certificate to open a list with unique subject names of certificates that have a private key and that are installed on the local computer in the Windows Certificate Store.
- Select a certificate to encrypt the communication of XProtect Mobile client and XProtect Web Client with the Mobile Server.
- Click Apply.
Select Details to view Windows Certificate Store information about the selected certificate.
The Mobile Server service user has been given access to the private key. It is required that this certificate be trusted on all clients.
When you apply certificates, the Mobile Server service restarts.
For more information, you may want to see:
Whitepaper on certificates with the Mobile Server.
Milestone XProtect Knowledgebase Document that outlines the following process using GoDaddy CA.