Skip to Main Content
HCL Domino Ideas Portal

Welcome to the #dominoforever Product Ideas Forum! The place where you can submit product ideas and enhancement request. We encourage you to participate by voting on, commenting on, and creating new ideas. All new ideas will be evaluated by HCL Product Management & Engineering teams, and the next steps will be communicated. While not all submitted ideas will be executed upon, community feedback will play a key role in influencing which ideas are and when they will be implemented.

For more information and upcoming events around #dominoforever, please visit our Destination Domino Page

Status Already Exists
Workspace Domino
Categories Security
Created by Guest
Created on May 4, 2023

Certmgr: certificate per internet site not per server

If you use multiple internet site documents per one server with different certificates for each one you cannot use certmgr and certstore db. TLS Credentials should be configred per virtual server/Internet Site/Web Site not per entire Domino server.

  • Attach files
  • Guest
    Reply
    |
    May 4, 2023

    Actually CertMgr and the TLS Cache are designed to work with any certificate combination. The new cache can lookup keys by kyr file name as a tag (not a physical file name) and the DNS (SAN) names.

    The new TLS cache supports wildcard certificate lookups and also RSA and ECDSA keys in parallel.

    In most cases it is best to add the primary SAN name into the kyrfile name field for the lookup.

    You should have one default internet site for each server or map at least one internet site to each of the IPs used by the server. Recommended would be the default internet site.

    All other DNS names are handled via Server Name Indication (SNI). During the TLS/SSL handshake with SNI the DNS name is looked up in the TLS Cache already.



    Side notes:

    • the cipher list are coming from the first internet site (it is a best practice to lower the number of ciphers and keep them aligned between the internet sites anyhow)

    • for ECDSA there are two fixed ciphers currently

    • The old KYR Cache and the new TLS Cache work in parallel. the new TLS Cache is asked first.

    • You should remove old kyr files after you migrated them into certstore.nsf

    • cerstore is the only supported way for client cert certficate authentication