<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Increase Public Key size to RSA4096 in certificate signing request in HPE OneView</title>
    <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7012870#M3212</link>
    <description>&lt;P&gt;Unfortunately no.&amp;nbsp; HPE OneView must generate the CSR today.&amp;nbsp; We do not have a method to import both the private and publicly signed key to the appliance.&lt;/P&gt;</description>
    <pubDate>Tue, 24 Jul 2018 16:38:49 GMT</pubDate>
    <dc:creator>ChrisLynch</dc:creator>
    <dc:date>2018-07-24T16:38:49Z</dc:date>
    <item>
      <title>Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7010768#M3171</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I am trying to import CA signed certs for my OneView 4.00.9 appliances.&amp;nbsp; My CA admin was able to add the correct template with the following:&lt;/SPAN&gt;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier" size="2"&gt;X509v3 Key Usage:&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier" size="2"&gt;Digital Signature, NonRepudiation, Key Encipherment&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier" size="2"&gt;X509v3 Extended Key Usage:&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier" size="2"&gt;TLS Web ServerAuthentication, TLS Web Client Authentication&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN&gt;However, when submitting the request it complained about the Public Key size.&amp;nbsp; Apparently our policy is to use RSA 4096 bits.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Question is how do you increase the Public Key size in the request to 4096?&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any help is greatly appreciated.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jul 2018 16:28:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7010768#M3171</guid>
      <dc:creator>Lenny_Juarbe</dc:creator>
      <dc:date>2018-07-09T16:28:17Z</dc:date>
    </item>
    <item>
      <title>Re: Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7012766#M3209</link>
      <description>&lt;P&gt;Unfortunately, it is not possible to create a CSR with 4096 key length today.&amp;nbsp; With HPE OneView 4.10 and the appliance put into CNSA Mode (which can break communication with legacy and older systems that cannot support the stronger encryption and cyphers), the CSR would generate a 3072 bit length key.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jul 2018 18:34:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7012766#M3209</guid>
      <dc:creator>ChrisLynch</dc:creator>
      <dc:date>2018-07-23T18:34:37Z</dc:date>
    </item>
    <item>
      <title>Re: Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7012810#M3210</link>
      <description>&lt;P&gt;Thank you Chris for the reply.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just so I understand you correctly,&amp;nbsp;with&amp;nbsp;&lt;SPAN&gt;CNSA Mode the strongest encryption the appliance will generate is 3072 bits.&amp;nbsp; Is it then possible to generate a csr using openssl with the key size set to 4096 and import the cert?&amp;nbsp; In other words, does OneView accept/support certs with a 4096 bit Public key size generated by a csr outside of the appliance's own mechanism?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jul 2018 06:17:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7012810#M3210</guid>
      <dc:creator>Lenny_Juarbe</dc:creator>
      <dc:date>2018-07-24T06:17:02Z</dc:date>
    </item>
    <item>
      <title>Re: Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7012870#M3212</link>
      <description>&lt;P&gt;Unfortunately no.&amp;nbsp; HPE OneView must generate the CSR today.&amp;nbsp; We do not have a method to import both the private and publicly signed key to the appliance.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jul 2018 16:38:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7012870#M3212</guid>
      <dc:creator>ChrisLynch</dc:creator>
      <dc:date>2018-07-24T16:38:49Z</dc:date>
    </item>
    <item>
      <title>Re: Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7088509#M5234</link>
      <description>&lt;P&gt;Are there any changes until today.&lt;/P&gt;&lt;P&gt;I saw the option over the GUI to use 3072bit but our company policiy only allows key kength of at least 4096&lt;/P&gt;&lt;P&gt;Is there a way to create manually and import Certificates using 4096bits now?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2020 16:48:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7088509#M5234</guid>
      <dc:creator>Thomas24</dc:creator>
      <dc:date>2020-05-19T16:48:54Z</dc:date>
    </item>
    <item>
      <title>Re: Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7100208#M5553</link>
      <description>&lt;P&gt;Plus 1 on this... We are in pretty much the same boat.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has this been 'fixed' yet (OneView 5.3) - The docs would suggest it hasn't...&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 15:45:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7100208#M5553</guid>
      <dc:creator>TravellingKiwi</dc:creator>
      <dc:date>2020-09-03T15:45:29Z</dc:date>
    </item>
    <item>
      <title>Re: Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7100209#M5554</link>
      <description>&lt;P&gt;Not in HPE OneView 5.3 or 5.4 (next week).&amp;nbsp; It is in the backlog though.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 15:50:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7100209#M5554</guid>
      <dc:creator>DanCernese</dc:creator>
      <dc:date>2020-09-03T15:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7148277#M6495</link>
      <description>&lt;P&gt;I have version&amp;nbsp;&lt;SPAN&gt;6.20.00-0443754 and still the same problem. 2048 bit for default or 3072 bits for&amp;nbsp;CNSA compatible certificates. Is there an option to create a 4096 bit key/request now?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Regards, Daniel&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 11:22:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7148277#M6495</guid>
      <dc:creator>Daniel_Ufer</dc:creator>
      <dc:date>2021-09-07T11:22:02Z</dc:date>
    </item>
    <item>
      <title>Re: Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7148442#M6499</link>
      <description>&lt;P&gt;We have not had many customers request 4k cert key length, only to reduce it to 2k.&amp;nbsp; Is this a hard requirement for your organization?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 19:56:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7148442#M6499</guid>
      <dc:creator>ChrisLynch</dc:creator>
      <dc:date>2021-09-08T19:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7171276#M7389</link>
      <description>&lt;P&gt;&lt;a href="https://community.hpe.com/t5/user/viewprofilepage/user-id/1458"&gt;@ChrisLynch&lt;/a&gt;&amp;nbsp;.&lt;/P&gt;
&lt;P&gt;Hi Chris,&lt;/P&gt;
&lt;P&gt;I'm infratructure engineer from Germany. My company will allow certificate templates with least RSA public keys 3072/4096bit after October 2022 depends to Federal Office for Information Security (BSI)&amp;nbsp; &lt;FONT size="4"&gt;&lt;EM&gt;"BSI TR-02102-1: "Cryptographic Mechanisms: Recommendations and Key Lengths" Version: 2022-1&amp;nbsp;"&lt;/EM&gt; &lt;/FONT&gt;by January 2022.&amp;nbsp; BSI recommened to use RSA keys hihger then 3000bit. I guess more german companies with HPE related hardware will get in this rsa key issue.&lt;/P&gt;
&lt;P&gt;I'm running HPE Oneview 6.6 due still existing blade enclosures and BL460C Gen9.&lt;/P&gt;
&lt;P&gt;So my question is is there a possibility to get CSR with 4096bit, also ILO 4+5 certificates which support 4096bit rsa public key?&lt;/P&gt;
&lt;P&gt;Many Thanks Jens&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Aug 2022 11:55:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7171276#M7389</guid>
      <dc:creator>JT77_CB</dc:creator>
      <dc:date>2022-08-01T11:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7171499#M7410</link>
      <description>&lt;P&gt;We are working on a feature that will allow you to import the private and signed key via the REST API.&amp;nbsp; That means you can generate the CSR outside of OneView, submit to your issuing CA, then import both in PCKS#12 format.&amp;nbsp; I don't have an ETA that I can share publically.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Aug 2022 17:42:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7171499#M7410</guid>
      <dc:creator>ChrisLynch</dc:creator>
      <dc:date>2022-08-01T17:42:40Z</dc:date>
    </item>
    <item>
      <title>Re: Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7171598#M7414</link>
      <description>&lt;P&gt;&lt;a href="https://community.hpe.com/t5/user/viewprofilepage/user-id/1458"&gt;@ChrisLynch&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for response Chris.&lt;/P&gt;
&lt;P&gt;Can I assume that also the ILO FW will contains the CSR request generate function with 4096bit?&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2022 09:09:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7171598#M7414</guid>
      <dc:creator>JT77_CB</dc:creator>
      <dc:date>2022-08-05T09:09:25Z</dc:date>
    </item>
    <item>
      <title>Re: Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7185222#M8035</link>
      <description>&lt;P&gt;&lt;a href="https://community.hpe.com/t5/user/viewprofilepage/user-id/2063328"&gt;@JT77_CB&lt;/a&gt;&amp;nbsp;&amp;nbsp;I've stumbled across your post trying to find a solution for creating an iLO 5 certificate with a RSA key size greater than 2048 bits.&lt;/P&gt;&lt;P&gt;As far as I can workout through research and testing with an iLO 5 running firmware version 2.78 (latest as of today) there is NO support for iLO certificates with an RSA key size greater than 2048 bits.&lt;/P&gt;&lt;P&gt;CSR generation via the iLO GUI or PowerShell does not ask for keysize input - it's fixed at 2048 bits.&lt;/P&gt;&lt;P&gt;The iLO GUI offers an "&lt;SPAN class=""&gt;Import an SSL Certificate &amp;amp; Private Key" option, but when I manually created a CSR using OpenSSL with a RSA key size of 4096 bits, the import failed with the error "S&lt;EM&gt;SL certificate could not be imported since the input key is not supported with the configured iLO security state. Verify the input key is either 384-bit ECDSA key in CNSA security state or 2048-bit RSA key in other security states.&lt;/EM&gt;"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;HPE is not alone in this respect. Over the past 10 years, I have found most server/storage vendors remain way behind the times when it comes to any certificate related operations within their products.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;It simply has never been given it the importance it should have had from day #1 and that will never change now, as most &lt;EM&gt;sheeple&lt;/EM&gt; are dumb &amp;amp; happy enough to live with self-generated/self-signed certs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;[rant] Nothing will change until vendors are forced (shamed?) to stop relying on self-signed certs in their products and users are forced to use a 'real' CA to provide signed certificates as a mandatory part of the initial service bring up process. [/rant]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;M&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 11:55:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7185222#M8035</guid>
      <dc:creator>mc1903-2</dc:creator>
      <dc:date>2023-03-27T11:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7187898#M8133</link>
      <description>&lt;P&gt;Knahh another server hardware vendor also from the States can handle RSA4096 Keys, company name have 4 letters ,begins with D and ends with L &lt;LI-EMOJI id="lia_winking-face" title=":winking_face:"&gt;&lt;/LI-EMOJI&gt;&lt;/P&gt;&lt;P&gt;But better a RSA2048 key certificate imported then selfsigned rubbish;)&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2023 06:04:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7187898#M8133</guid>
      <dc:creator>JT77_CB</dc:creator>
      <dc:date>2023-05-11T06:04:11Z</dc:date>
    </item>
    <item>
      <title>Re: Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7228431#M9566</link>
      <description>&lt;P&gt;Hello, any news on this ?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even Superm**** allow 4096 keys.&amp;nbsp;&lt;LI-EMOJI id="lia_pouting-face" title=":pouting_face:"&gt;&lt;/LI-EMOJI&gt; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2024 09:19:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7228431#M9566</guid>
      <dc:creator>Jef_Paris</dc:creator>
      <dc:date>2024-10-31T09:19:33Z</dc:date>
    </item>
    <item>
      <title>Re: Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7255424#M10419</link>
      <description>&lt;P&gt;we tried to use the workaround but ILO does not support more than 3k certs. is there any planing to fixit. as 2k certs is not sufficent.&lt;/P&gt;&lt;P&gt;any updates or planing? Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 05 Sep 2025 13:35:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7255424#M10419</guid>
      <dc:creator>NikoP</dc:creator>
      <dc:date>2025-09-05T13:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: Increase Public Key size to RSA4096 in certificate signing request</title>
      <link>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7255696#M10433</link>
      <description>&lt;P&gt;iLO6 has been supporting ECDSA p384 in higer security modes and recently iLO6 v1.70 made it available in the Production mode as well.&lt;BR /&gt;&lt;A href="https://support.hpe.com/connect/s/softwaredetails?language=en_US&amp;amp;collectionId=MTX-994a0b6ce04a44b9&amp;amp;tab=Enhancements" target="_blank"&gt;https://support.hpe.com/connect/s/softwaredetails?language=en_US&amp;amp;collectionId=MTX-994a0b6ce04a44b9&amp;amp;tab=Enhancements&lt;/A&gt;&lt;/P&gt;&lt;P&gt;iLO7 v1.17.00 also made ECDSA p384 available in the Secure Standard Mode and updated its default key to be RSA4K-bit key.&amp;nbsp;&lt;BR /&gt;&lt;A href="https://support.hpe.com/connect/s/softwaredetails?language=en_US&amp;amp;collectionId=MTX-50cf5a2572824156&amp;amp;tab=Enhancements" target="_blank"&gt;https://support.hpe.com/connect/s/softwaredetails?language=en_US&amp;amp;collectionId=MTX-50cf5a2572824156&amp;amp;tab=Enhancements&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Sep 2025 15:09:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/hpe-oneview/increase-public-key-size-to-rsa4096-in-certificate-signing/m-p/7255696#M10433</guid>
      <dc:creator>Koichiro</dc:creator>
      <dc:date>2025-09-11T15:09:28Z</dc:date>
    </item>
  </channel>
</rss>

