How The System Uses Pki Certificates; Create A Certificate Signing Request - Polycom Pano Administrator's Manual

Hide thumbs Also See for Pano:
Table of Contents

Advertisement

How the System Uses PKI Certificates

PKI certificates authenticate secure network connections to and from the Pano system. The system uses
standard PKI techniques to configure and manage certificates and certificate signing requests (CSRs).
ANSI X.509 standards regulate the certificate characteristics.
Your system can generate CSRs to send to a certificate authority (CA), a trusted entity that validates and
officially issues, or signs, PKI certificates. Your system uses those certificates for client and server
authentication.
If your system is in an environment without a PKI, you don't need a CA-signed certificate; the system
comes with a self-signed certificate for its TLS connections. When you deploy a PKI, however, self-signed
certificates aren't trusted and you must use CA-signed certificates.
Here are some examples of how you use PKI certificates:
If your environment uses the 802.1X authentication framework for wired connections, create a CSR
and install the resulting CA-signed certificate on your system so it's trusted on the network.
If you want to navigate with a web browser over a secure connection to your system web interface,
create a CSR and install the resulting CA certificate chain on your system to replace its factory-
installed certificate, which is not trusted.
If you want to provision your system using RealPresence Resource Manager in a secure
environment.
Note: Your system must have a Host Name in this situation.

Create a Certificate Signing Request

If you deploy a PKI in your environment, create a CSR to make sure your system is trusted by its network
peers.
Note: Only a single CSR can exist at a time. After a CSR is generated, get it signed and installed on
your system before creating another. For example, if you generate a CSR and generate another
prior to having the first one signed and installed, the system discards the previous CSR.
Procedure
1. In the system web interface, go to Security > Certificates.
2. Select Create Certificate Signing Request (CSR).
3. In the Certificate Details form, complete the following fields:
CSR Information
Hash Algorithm
Polycom, Inc.
Description
Specifies the hash algorithm for the CSR: SHA-256 (recommended) or
SHA-1 (not recommended).
Security
31

Advertisement

Table of Contents
loading

Table of Contents