Troubleshoot SSL certificate problems certificate-problems
Learn how to troubleshoot SSL certificate problems by identifying common causes so you can maintain secure connections.
Invalid certificate invalid-certificate
This error occurs because the customer used an encrypted private key and provided the key in DER format.
Private key needs to be PKCS 8 format pkcs-8
This error occurs because the customer used an encrypted private key and provided the key in DER format.
Correct certificate order certificate-order
The most common reason for a certificate deployment to fail is that the intermediate or chain certificates are not in the correct order.
Intermediate certificate files must end with the root certificate or the certificate most proximate to the root. They must be in descending order from the main/server
certificate to the root.
You can determine the order of your intermediate files using the following command.
code language-shell |
---|
|
You can verify that the private key and main/server
certificate match using the following commands.
code language-shell |
---|
|
code language-shell |
---|
|
note note |
---|
NOTE |
The output of these two commands must be exactly the same. If you cannot locate a matching private key for your main/server certificate, you are required to re-key the certificate by generating a new CSR and/or requesting an updated certificate from your SSL vendor. |
Remove client certificates client-certificates
When adding a certificate, if you receive an error similar to the following:
code language-text |
---|
|
You likely included the client certificate in the certificate chain. Make sure that the chain does not include the client certificate and try again.
Certificate policy policy
If you see the following error, check the policy of your certificate.
code language-text |
---|
|
Embedded OID values normally identify certificate policies. Outputting a certificate to text and searching for the OID reveals the certificate’s policy.
You can output your certificate detail as text using the following example as a guide.
code language-text |
---|
|
The OID pattern in the text defines the policy type of the certificate.
table 0-row-3 1-row-3 2-row-3 3-row-3 | ||
---|---|---|
Pattern | Policy | Acceptable in Cloud Manager |
2.23.140.1.1 |
EV | Yes |
2.23.140.1.2.2 |
OV | Yes |
2.23.140.1.2.1 |
DV | No |
By grep
ping for the OID patterns in the output certificate text, you can confirm your certificate policy.
code language-shell |
---|
|
Certificate validity validity
Cloud Manager expects the SSL certificate to be valid for at least 90 days from the current date. Check the validity of the certificate chain.
Wrong SAN certificate is applied to my domain wrong-san-cert
Let’s say that you want to link dev.yoursite.com
and stage.yoursite.com
to your non-production environment and prod.yoursite.com
to your production environment.
In order to configure the CDN for these domains, you need a certificate installed for each, so you install one certificate that covers *.yoursite.com
for your non-production domains and another that also covers *.yoursite.com
for your production domains.
This configuration is valid. However, when you update one of the certificates, because both certificates cover the same SAN entry, the CDN will install the most recent certificate upon all the applicable domains, which could appear unexpected.
Although this may be unexpected this is not an error and is the standard behavior of the underlying CDN. If you have two or more SAN certificates that cover the same SAN domain entry, if that domain is covered by one certificate and the other one is updated, the latter will now be installed for the domain.