<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Add SAN and ignore IPv6 to Start-HPEiLOCertificateSigningRequest in Server Management - Remote Server Management</title>
    <link>https://community.hpe.com/t5/server-management-remote-server/add-san-and-ignore-ipv6-to-start-hpeilocertificatesigningrequest/m-p/7026603#M8226</link>
    <description>&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Hello Team, &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;please follow the below steps if its applicable:- &lt;A href="https://community.hpe.com/t5/ProLiant-Servers-ML-DL-SL/Can-t-configure-Gen8-Gen9-IPV6-Ilo-settings/td-p/6752309#.W_avbOLhWM8" target="_blank"&gt;https://community.hpe.com/t5/ProLiant-Servers-ML-DL-SL/Can-t-configure-Gen8-Gen9-IPV6-Ilo-settings/td-p/6752309#.W_avbOLhWM8&lt;/A&gt; &lt;A href="https://community.hpe.com/t5/ProLiant-Servers-ML-DL-SL/how-to-check-ipv6-gw-info-from-ilo4/td-p/6819325#.W_avb-LhWM8" target="_blank"&gt;https://community.hpe.com/t5/ProLiant-Servers-ML-DL-SL/how-to-check-ipv6-gw-info-from-ilo4/td-p/6819325#.W_avb-LhWM8&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 26 Nov 2018 16:29:10 GMT</pubDate>
    <dc:creator>NareshISS</dc:creator>
    <dc:date>2018-11-26T16:29:10Z</dc:date>
    <item>
      <title>Add SAN and ignore IPv6 to Start-HPEiLOCertificateSigningRequest</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/add-san-and-ignore-ipv6-to-start-hpeilocertificatesigningrequest/m-p/7026087#M8218</link>
      <description>&lt;P&gt;&lt;STRONG&gt;1)&lt;/STRONG&gt; Would it be posible to add SAN parameter to the Start-HPEiLOCertificateSigningRequest ? In most Microsoft CA is the "EDITF_ATTRIBUTESUBJECTALTNAME2" disabled because od (1) , thus it would be better to include this in Certificate request itself. From (1) "All certificate subject information (including SAN) should be included in the original certificate request"&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2)&lt;/STRONG&gt; Can there be also an parameter to exclude IPv6 from orginal certificate request.&lt;/P&gt;&lt;P&gt;I am using HPEiLOCmdlets 2.1..0.0 and have iLO4 v2.61 and I am doing request with this line&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Start-HPEiLOCertificateSigningRequest -Connection $connection -City City -CommonName $srvILO -IncludeiLOIP -Country Country -Organization "Organization" -State "State" -OrganizationalUnit IT&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On (2) there is written "Whenever possible, specify a SAN by using certificate extensions instead of request attributes to avoid enabling EDITF_ATTRIBUTESUBJECTALTNAME2."&lt;BR /&gt;How could this be done by uisng HPEiLOCmdlets ?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Reason&lt;/STRONG&gt; for this request is because IE 11 (Edge maybe to?) does not trust iLO if accessed over IP even it is included in Certificate. Seems dns=ipaddress need to be added as SAN so that IE 11 can trust it.&lt;/P&gt;&lt;PRE&gt;DNS Name=esx01-ilo.server.local
IP Address=1XX.XX.XX.XXX
IP Address=fe80:0000:0000:0000:XXXX:XXXX:XXXX:XXXX&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Edit #1:&lt;/STRONG&gt; Also it is an problem that you can acutally not import private key and then the certificate, so there is no way to create request somewhere else which includes all SAN needed.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;(1) &lt;A href="https://blog.keyfactor.com/hidden-dangers-certificate-subject-alternative-names-sans" target="_blank"&gt;https://blog.keyfactor.com/hidden-dangers-certificate-subject-alternative-names-sans&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;* Any custom SAN entries are only supposed to be used on the other Corporate Web Server certificates, but because the EDITF_ATTRIBUTESUBJECTALTNAME2 setting applies to the entire CA, all templates on that CA are affected, and all templates and all resulting certificates are at risk from impersonation attacks.&lt;BR /&gt;&lt;BR /&gt;(2) &lt;A href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ff625722(v%3dws.10" target="_blank"&gt;https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ff625722(v%3dws.10&lt;/A&gt;)&lt;BR /&gt;&lt;BR /&gt;* Security best practices for allowing SANs in certificates&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Nov 2018 13:46:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/add-san-and-ignore-ipv6-to-start-hpeilocertificatesigningrequest/m-p/7026087#M8218</guid>
      <dc:creator>Adis_S</dc:creator>
      <dc:date>2018-11-22T13:46:34Z</dc:date>
    </item>
    <item>
      <title>Re: Add SAN and ignore IPv6 to Start-HPEiLOCertificateSigningRequest</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/add-san-and-ignore-ipv6-to-start-hpeilocertificatesigningrequest/m-p/7026603#M8226</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Hello Team, &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;please follow the below steps if its applicable:- &lt;A href="https://community.hpe.com/t5/ProLiant-Servers-ML-DL-SL/Can-t-configure-Gen8-Gen9-IPV6-Ilo-settings/td-p/6752309#.W_avbOLhWM8" target="_blank"&gt;https://community.hpe.com/t5/ProLiant-Servers-ML-DL-SL/Can-t-configure-Gen8-Gen9-IPV6-Ilo-settings/td-p/6752309#.W_avbOLhWM8&lt;/A&gt; &lt;A href="https://community.hpe.com/t5/ProLiant-Servers-ML-DL-SL/how-to-check-ipv6-gw-info-from-ilo4/td-p/6819325#.W_avb-LhWM8" target="_blank"&gt;https://community.hpe.com/t5/ProLiant-Servers-ML-DL-SL/how-to-check-ipv6-gw-info-from-ilo4/td-p/6819325#.W_avb-LhWM8&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2018 16:29:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/add-san-and-ignore-ipv6-to-start-hpeilocertificatesigningrequest/m-p/7026603#M8226</guid>
      <dc:creator>NareshISS</dc:creator>
      <dc:date>2018-11-26T16:29:10Z</dc:date>
    </item>
    <item>
      <title>Re: Add SAN and ignore IPv6 to Start-HPEiLOCertificateSigningRequest</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/add-san-and-ignore-ipv6-to-start-hpeilocertificatesigningrequest/m-p/7026794#M8231</link>
      <description>&lt;P&gt;&lt;a href="https://community.hpe.com/t5/user/viewprofilepage/user-id/1936877"&gt;@NareshISS&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I am not sure why did you post the Links which does not have anything to do with Certificate Signing Request. Just to post something to have Post count higher, is not very helpful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Nov 2018 13:06:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/add-san-and-ignore-ipv6-to-start-hpeilocertificatesigningrequest/m-p/7026794#M8231</guid>
      <dc:creator>Adis_S</dc:creator>
      <dc:date>2018-11-27T13:06:21Z</dc:date>
    </item>
    <item>
      <title>Re: Add SAN and ignore IPv6 to Start-HPEiLOCertificateSigningRequest</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/add-san-and-ignore-ipv6-to-start-hpeilocertificatesigningrequest/m-p/7026889#M8232</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Currently iLO4/5 does not provide any option to add SAN or ignore IPv6 in either iLO Web GUI or Redfish interfaces.&lt;/P&gt;&lt;P&gt;You need to raise a change request with iLO team.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Gokul&lt;/P&gt;</description>
      <pubDate>Wed, 28 Nov 2018 05:29:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/add-san-and-ignore-ipv6-to-start-hpeilocertificatesigningrequest/m-p/7026889#M8232</guid>
      <dc:creator>GokulKS</dc:creator>
      <dc:date>2018-11-28T05:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: Add SAN and ignore IPv6 to Start-HPEiLOCertificateSigningRequest</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/add-san-and-ignore-ipv6-to-start-hpeilocertificatesigningrequest/m-p/7027663#M8245</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;please logged an HPE case and share the actual images of the issue and AHS report.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Naresh Sharma&lt;/P&gt;</description>
      <pubDate>Wed, 05 Dec 2018 16:40:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/add-san-and-ignore-ipv6-to-start-hpeilocertificatesigningrequest/m-p/7027663#M8245</guid>
      <dc:creator>NareshISS</dc:creator>
      <dc:date>2018-12-05T16:40:08Z</dc:date>
    </item>
    <item>
      <title>Re: Add SAN and ignore IPv6 to Start-HPEiLOCertificateSigningRequest</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/add-san-and-ignore-ipv6-to-start-hpeilocertificatesigningrequest/m-p/7027860#M8249</link>
      <description>&lt;P&gt;HPE see this not as an Issue but as an Enhancement Request.&lt;/P&gt;&lt;P&gt;Sure I did provide HPE Support with all logs and Images of the Issue.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Dec 2018 09:47:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/add-san-and-ignore-ipv6-to-start-hpeilocertificatesigningrequest/m-p/7027860#M8249</guid>
      <dc:creator>Adis_S</dc:creator>
      <dc:date>2018-12-07T09:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: Add SAN and ignore IPv6 to Start-HPEiLOCertificateSigningRequest</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/add-san-and-ignore-ipv6-to-start-hpeilocertificatesigningrequest/m-p/7118021#M8903</link>
      <description>&lt;P&gt;&lt;BR /&gt;I got asked over PM if there was any solution for this. I am afraid not, our Feature Request is still not fullfilled, but it is still open. There could be an workarround for these using Microsoft CA and where the EDITF_ATTRIBUTESUBJECTALTNAME2 is enabled.&lt;/P&gt;&lt;P&gt;Create CSR with iLO5 with all the Fields it currently allows us (i am using csv with Column "iLOHostname" and "iLOIP" :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="javascript"&gt;$connection = Connect-HPEiLO -Credential $credential -IP $ilofqdn.iLOHostname -Timeout 200 -DisableCertificateAuthentication

Start-HPEiLOCertificateSigningRequest -Connection $connection -City &amp;lt;City&amp;gt; -CommonName $ilofqdn.iLOHostname -Country &amp;lt;country&amp;gt; -Organization &amp;lt;organisation&amp;gt; -State &amp;lt;state&amp;gt; -OrganizationalUnit IT -IncludeiLOIP&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;get your CSR (i put pause for 60 sec in my script, to let CSR be created):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="javascript"&gt;$output = Get-HPEiLOCertificateSigningRequest -Connection $connection
$output.CertificateSigningRequest | Out-File "$scriptpath\csr\$ilofqdn.iLOHostname.csr" -Encoding ascii -Force&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;then submit the CSR with additional parameters to Microsoft CA by using this command line tool:&lt;BR /&gt;# you need to define all variable yourself or just type them in request.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="javascript"&gt;$certreq = 'c:\Windows\System32\certreq.exe -submit -config $certificateserver -attrib "SAN:dns=$srvILO&amp;amp;dns=$shorthost&amp;amp;dns=$dnssrvilo&amp;amp;IPAddress=$dnssrvilo" -attrib "CertificateTemplate:$certificatetemplate" "$scriptpath\csr\$ilofqdn.iLOHostname.csr"'&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will get as output an ID which you can provide to your CA Admin to issue it, after that you can grab your certificate&lt;/P&gt;&lt;LI-CODE lang="javascript"&gt;$certretrieve = 'certreq.exe -retrieve -config $certificateserver $_.RequestId "$scriptpath\cert\$shorthost.crt"'&lt;/LI-CODE&gt;&lt;P&gt;Finaly import it to iLO5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="javascript"&gt;$cert1 = Get-Content -Path "$scriptpath\cert\$shorthost.crt" -Raw
# Base64-encoded X.509 certificate
$StatusInfo = Import-HPEiLOCertificate -Connection $connection -Certificate $cert1&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hopes this help someone in future.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 06:53:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/add-san-and-ignore-ipv6-to-start-hpeilocertificatesigningrequest/m-p/7118021#M8903</guid>
      <dc:creator>Adis_S</dc:creator>
      <dc:date>2021-01-21T06:53:17Z</dc:date>
    </item>
  </channel>
</rss>

