Hello,
We have a network with all hard-wired, domain-joined computers. Users connect to the MiCollab web server with their browsers. With MAS 2.1, I was able to generate a CSR in the web configuration interface, use that to get a certificate from our internal CA, and then upload the certificate. All the domain computers automatically trust certificates issued by our internal CA, so this worked well for us.
We upgraded to MiCollab 8.0 a few months ago. The certificate stayed in place. Now it's time to renew, but I can't. I generated the CSR, got the certificate from my CA, and then tried uploading the Certificate (under Security, Web Server in the menu). MiCollab says I have to include an Intermediate certificate. We don't have one. We have a very simple PKI; it's a Windows enterprise root CA that we use to sign certificates directly. It's secure enough, and we use it for convenience to avoid errors without having to pay for certificates. So, I tried uploading the root CA certificate as the Intermediate, but it says "An invalid intermediate web server certificate file was provided on the certificate installation form."
I don't see anywhere to upload a trusted root CA, or any other options. I'm stuck.
People have said in other threads that you have to use a known third-party CA if you don't use self-signed. Is that correct? Does MiCollab insist on trusting the CA that I choose to have my client computers trust? If so, that would be a bad design decision, because it's irrelevant, and prevents me from using a free certificate from my own PKI. If not, does anyone have a suggestion how to get around this? I don't want to dig into MSL if I don't have to. I suppose I could use self-signed and push it to all the workstations as trusted via Group Policies, but that's not an elegant solution.
Thank you.