Avaya Knowledge - AES - How To Create A Certificate Authority CA From SMGR For AES and Test With TSAPI and DMCC SDKs PDF
Avaya Knowledge - AES - How To Create A Certificate Authority CA From SMGR For AES and Test With TSAPI and DMCC SDKs PDF
Avaya Knowledge - AES - How To Create A Certificate Authority CA From SMGR For AES and Test With TSAPI and DMCC SDKs PDF
om SMGR for AES and test with TSAPI and DMCC SDKs
Details
Avaya has discontinued the use of self-signed certificates; therefore a fresh installation of AES 7.x no longer provides the certificate authority for clients to connect to
AES.
This article details and walks though the steps provided in PSN004561u (attached) using System Manager 7.0 as the CA and demonstrate testing with a TSAPI client
using a secure TLINK and the DMCC7.0 dot NET framework SDK dashboard. Possible Alarm certificates expiration.
How to create a Certificate Authority (CA) from.
***REPLACING AES CERTIFICATE CAN RESULT IN 3RD PARTY APPLICATION FAILURE IF A SECURE CONNECTION IS USED - FOR EXAMPLE THE AVAYA
CONTACT RECORDER (ACR) WILL NEED THE NEW AES CA CERTIFICATE EXPORTED TO THE ACR KEYSTORE AS IT USES A SECURE TSAPI
CONNECTION - IF NOT ALL CALL RECORDING WILL FAIL - ENSURE ALL APPLICATIONS CONNECTING TO THE AES DOCUMENTATION IS REVIEWED
AND OR CONTACT PRODUCT SUPPORT (AVAYA DOES NOT HAVE INSTRUCTIONS FOR UPDATING 3RD PARTY APPLICATIONS WITH NEW CERTIFICATES
CONTACT THE PRODUCT MANUFACTURER)***
Problem Clarification
AES 7.X and higher does not deploy with the default Avaya self-signed certificate authority as previous versions have done. It is the responsibility of the
Business Partner or customer to perform this task. Regarding the attached PSN, there is more than one way to generate a new CA certificate; this article
demonstrates this using System Manager 7.0 for trust management.
***NOTE: This method has also been tested with SMGR 6.3.20. The method is the same but some of the screens and fields may slightly differ. Also the
SMGR 6.3.x provided a SHA1 CA certificate.***
If the default AES 7.x or higher certificate expires Avaya proprietary application such as Elite Multi Channel (EMC), ACR, CRM Connector, and any other application
requiring a secure TSAPI or DMCC connection will fail to establish a connection resulting in loss of CTI functionality.
An AES certificate shall expire and no impact is experienced by the CTI applications using a secure TSAPI/DMCC connection until such time as the connection is
broken at which time client applications will fail to login with a failed SSL error such as:"SECURITY:FYI:SecurePeerAcceptor::accept():TSAPI Service: accept()
failed for client 127.0.0.1 and driver service AVAYA#SWITCH1#CSTA-S#AESA"
This article is helpful to generate new certificates using System Manager. see the following article for more details on updating EMC with the new CA certificates:
https://kb.avaya.com/kb/index?page=content&id=SOLN284527&actp=SEARCH&actp=search&viewlocale=en_US&searchid=1501520623118 (https://kb.avaya.com/kb/index?
page=content&id=SOLN284527&actp=SEARCH&actp=search&viewlocale=en_US&searchid=1501520623118)
Cause
Avaya no longer provides a default self-signed CA for AES, leaving the customer responsible to implement them.
AES 6.3.3 and lower default certificate will be expired Jan 6 2018.
Solution
For testing purposes, the following test software will be used to demonstrate functionality to simulate a third party application connections:
- Avaya Aura AE Services TSAPI Client MS Windows 7.0: https://support.avaya.com/downloads/download-details.action?
contentId=C20158211650417170_0&productId=P0358&releaseId=7.0.x (https://support.avaya.com/downloads/download-details.action?contentId=C20158211650417170_0&productId=P0358&releaseId=7.0.x)
- Avaya Aura AE Services IP Communications DMCC dot Net SDK 7.0: https://support.avaya.com/downloads/download-details.action?
contentId=C20158211557548970_5&productId=P0358 (https://support.avaya.com/downloads/download-details.action?contentId=C20158211557548970_5&productId=P0358)
Note: for a list of all available SDKs, see the AES 7.0 Release Notes: https://downloads.avaya.com/css/P8/documents/101014420 (https://downloads.avaya.com/css/P8/documents/101014420)
Make sure all TLS versions are enabled on AES to avoid compatibility issues with other components.
Refer to PSN004561u https://downloads.avaya.com/css/P8/documents/101014585 (https://downloads.avaya.com/css/P8/documents/101014585) The steps below reference the section: "System
Manager Trust Management." a very rare case that System manager 7.0 is still using the demo cert that only provide SHA1 Root CA,
Please use any System Manager Release 7.0.X to run following step. the CN is default in Demo CA, a new self signed SMGR ROOT CA is using System manager
CA for CN.
1. Log into System Manager and navigate to "Security (under Services) > Certificates > Authority > Add End Entity (under RA functions).
https://support.avaya.com/ext/index?page=content&id=SOLN284619&pmv=print&impressions=false 1/15
10/5/2020 Avaya Knowledge - AES: How to create a Certificate Authority CA from SMGR for AES and test with TSAPI and DMCC SDKs
https://support.avaya.com/ext/index?page=content&id=SOLN284619&pmv=print&impressions=false 2/15
10/5/2020 Avaya Knowledge - AES: How to create a Certificate Authority CA from SMGR for AES and test with TSAPI and DMCC SDKs
Note: For step 4b enter the Fully Qualified Domain Name (FQDN) of the AES server. This information can be found on the AES OAM web pages under
Networking > Network Configure. Note, the example below is from a lab server.
https://support.avaya.com/ext/index?page=content&id=SOLN284619&pmv=print&impressions=false 3/15
10/5/2020 Avaya Knowledge - AES: How to create a Certificate Authority CA from SMGR for AES and test with TSAPI and DMCC SDKs
Sample completed "Add Entity" form:
1. Using the SMGR web console, navigate to "Security (under Services) > Certificates >Authority".
2. In the left hand navigation pane near the bottom of the screen, click on "Public Web"
https://support.avaya.com/ext/index?page=content&id=SOLN284619&pmv=print&impressions=false 4/15
10/5/2020 Avaya Knowledge - AES: How to create a Certificate Authority CA from SMGR for AES and test with TSAPI and DMCC SDKs
3a. Enter the user name and password of the "End Entity" and click "OK"
3b,c and d.
https://support.avaya.com/ext/index?page=content&id=SOLN284619&pmv=print&impressions=false 5/15
10/5/2020 Avaya Knowledge - AES: How to create a Certificate Authority CA from SMGR for AES and test with TSAPI and DMCC SDKs
Once "Enroll" is clicked, the new certificate store is downloaded with a ".p12" extension.
Downloading the SMGR CA certificate that signed the AE Services server certificate
1. Using the SMGR web console navigate to the "Public Web" page (as described in the above step) and click on "Fetch CA certificates"
2. Click on "Download PEM chain" on the line starting with "CA certificate chain"
3. Save the CA certificate to a known location
https://support.avaya.com/ext/index?page=content&id=SOLN284619&pmv=print&impressions=false 6/15
10/5/2020 Avaya Knowledge - AES: How to create a Certificate Authority CA from SMGR for AES and test with TSAPI and DMCC SDKs
Import the new AE Services server certificate into the AE Services server
1. Using the AE Services Management Console navigate to "Security > Certificate Management > Server Certificates"
2. Click on the Import button and upload the new AE Services server certificate you created above (this will be the .p12 file). Select an alias (server)
from the drop down menu
3. Click the "Apply" button.
https://support.avaya.com/ext/index?page=content&id=SOLN284619&pmv=print&impressions=false 7/15
10/5/2020 Avaya Knowledge - AES: How to create a Certificate Authority CA from SMGR for AES and test with TSAPI and DMCC SDKs
Follow the directions from the screenshot above to restart the AE Server services.
This completes the steps outlined in the PSN. The next section provides testing with the TSAPI and DMCC client
applications. For installation and usage instructions please see the relevant attached guides.
Testing a secure TSAPI connection to the AES with the newly installed SMGR CA certificate
The following setup steps will need to be performed:
1. Download and install the TSAPI client from the link noted at the beginning of the article
2. Export the System Manager CA from the AES and save it locally
3. Edit the TSLIB.ini file to reference the new certificate and the AES credentials for the test application to connect to.
4. Make a test call with the TSAPI application
https://support.avaya.com/ext/index?page=content&id=SOLN284619&pmv=print&impressions=false 8/15
10/5/2020 Avaya Knowledge - AES: How to create a Certificate Authority CA from SMGR for AES and test with TSAPI and DMCC SDKs
Step 1
For TSAPI client installation instructions, please see Chapter 3 of Application Enablement Services TSAPI and CVLAN Client and SDK Installation Guide:
https://downloads.avaya.com/css/P8/documents/101014061 (https://downloads.avaya.com/css/P8/documents/101014061)
Step 2
To export the System Manager CA from the AES perform the following:
1. From the AES webpages navigate to Security > Certificate Management > CA Trusted Certificates
2. Select the certificate with the "Issued To" field of System Manager CA
3. Click "Export"
4. Highlight all of the text in the text box under "Certificate PEM" and copy this to a Notepad/text editor file and save it as something that is easily associated with
its purpose
https://support.avaya.com/ext/index?page=content&id=SOLN284619&pmv=print&impressions=false 9/15
10/5/2020 Avaya Knowledge - AES: How to create a Certificate Authority CA from SMGR for AES and test with TSAPI and DMCC SDKs
user. https://downloads.avaya.com/css/P8/documents/101014048 (https://downloads.avaya.com/css/P8/documents/101014048)
Step 2: Launching and testing the secure connection with the TSAPI Test application
1. Click Start > All Programs > Avaya AE Services > TSAPI Test.
1. When the TSAPI Test application starts it will show the available TLINKs. To test the secure connection, select the TLINK that contains "CSTA-S" (S for
secure) in the TLINK name.
Note: In this example, these stations do not exist and we would expect an "invalid CSTA device identifier 12" error.
4. Open the TSpy application to view the TSAPI logging information for the test call. Click Start > All Programs > Avaya AE Services/TSAPI Client/TSAPI
Spy. Ensure that Tracing is enabled
https://support.avaya.com/ext/index?page=content&id=SOLN284619&pmv=print&impressions=false 10/15
10/5/2020 Avaya Knowledge - AES: How to create a Certificate Authority CA from SMGR for AES and test with TSAPI and DMCC SDKs
Although there was an "Invalid Device Identifier" message, the test worked. From the TSAPI Spy, the log shows the following:
https://support.avaya.com/ext/index?page=content&id=SOLN284619&pmv=print&impressions=false 11/15
10/5/2020 Avaya Knowledge - AES: How to create a Certificate Authority CA from SMGR for AES and test with TSAPI and DMCC SDKs
37117880: data
37117880: {
37117880: 80 01 01 01 03 01 01 04 01 01
37117880: }
37117880: }
Testing a secure DMCC connection to the AES with the newly installed SMGR CA certificate
The following setup steps will need to be performed:
1. Download and install the DMCC client SDK from the link noted at the beginning of the article
2. Import the exported certificate from AES into the Windows keystore
https://support.avaya.com/ext/index?page=content&id=SOLN284619&pmv=print&impressions=false 12/15
10/5/2020 Avaya Knowledge - AES: How to create a Certificate Authority CA from SMGR for AES and test with TSAPI and DMCC SDKs
Note: By default, AES has port 4722 enabled for secure DMCC connections. Please reference the AES Administration Guide linked earlier in this article for further
information.
2. Select "Next"
3. Select "Place all certificates in the following store" and choose "Browse"
https://support.avaya.com/ext/index?page=content&id=SOLN284619&pmv=print&impressions=false 13/15
10/5/2020 Avaya Knowledge - AES: How to create a Certificate Authority CA from SMGR for AES and test with TSAPI and DMCC SDKs
5. Click Next
6. Click Finish
7. Click OK on the "Import Successful" message
8. Click OK
Note: Starting a successful DMCC session indicates that the certificate is working
https://support.avaya.com/ext/index?page=content&id=SOLN284619&pmv=print&impressions=false 14/15
10/5/2020 Avaya Knowledge - AES: How to create a Certificate Authority CA from SMGR for AES and test with TSAPI and DMCC SDKs
-Also can refer to the document of Administering Avaya Aura @ System Manager.
SOLN284619
Attachment File
PSN004561u.pdf
289K • < 1 minute @ 56k, < 1 minute @ broadband
Avaya -- Proprietary. Use pursuant to the terms of your signed agreement or Avaya policy
About Avaya Contacts Careers Site Map Terms of Use Privacy Statement
© 2020 Avaya Inc.
https://support.avaya.com/ext/index?page=content&id=SOLN284619&pmv=print&impressions=false 15/15