Welcome to the #dominoforever Product Ideas Forum! The place where you can submit product ideas and enhancement request. We encourage you to participate by voting on, commenting on, and creating new ideas. All new ideas will be evaluated by HCL Product Management & Engineering teams, and the next steps will be communicated. While not all submitted ideas will be executed upon, community feedback will play a key role in influencing which ideas are and when they will be implemented.
For more information and upcoming events around #dominoforever, please visit our Destination Domino Page
Domino 12.0 introduced CertMgr as linked already below.
CertMgr comes with the certstore.nsf -- A domain wide database to securely manage all your server certificates and trusted roots.
CertMgr, certstore.nsf and the new TLS cache are designed from ground up using standard key and certificate formats.
The mostly common and easiest to use standard is PEM, which is used as the standard format for all keys and certificates in certstore.nsf. But the import functionality also supports PKCS12 (aka P12 -- which Microsoft calls PFX by the way).
Ciphers are currently configured in the server document or by internet site. Domino comes with it's own security stack and is a cross platform application, which cannot use the "platform configured ciphers".
Domino updates the weak cipher list in every dot release. Weaks ciphers are disabled by default if you keep your Domino servers updated.
What should be improved is the management if cipher management for internet sites. There should be a more global way to configure ciphers server or even domain wide. Managing them per internet site isn't really transparent.
Domino 12+ fully supports ECDSA in addition to RSA keys. Switching to ECDSA keys (which all modern applications support), override the cipher settings and use the following two ciphers:
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xC02B)
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xC02C)
https://help.hcltechsw.com/domino/12.0.2/admin/wn_ECDSA_cryptography.html
ECDSA keys are also better performing would solve your cipher management and there is no cipher management needed once you switch to ECDSA.
I followed the link. I couldn't find information on
take .pfx file you get from your certificate people.
Put it on the server, right mouse click and install
Go to server doc (or other doc). Hit the drop down list to see all certificates in the Cert Store.
Select it from the list.
Restart HTTP.
This is what we essentially do for IIS, why does it have to be so hard for Domino? This assumes of course that the ROOT cert is already in Windows' Cert Manager.
Did you take a look at https://help.hcltechsw.com/domino/12.0.2/admin/secu_le_using_certificate_manager.html ?