How To Deploy the Imprivata Appliance Certificate(s) to IGEL Devices
IGEL supports the Imprivata appliance certificates in the Base64 encoded X.509 .crt
or .cer
format.
By default, Imprivata appliances use a self-signed certificate (.crt
format) generated by the Imprivata root CA that is built into the appliance.
Customers can change the appliance certificate to one that is signed by a trusted root CA for either their network (e.g. Active Directory Domain Enterprise Root CA) or a publicly trusted CA like DigiCert. If this is the situation, you will need to export the root CA / subordinate CA / appliance certificate chain in Base64 X.509 .crt
or .cer
format and deploy the chain to all the devices via the UMS.
Using the Imprivata Root CA Certificate
To confirm a customer is using the self-signed certificate, log into the Imprivata Appliance Console and go to the tab Security.
(example appliance URL: https://fqdn-of-appliance:81)The following message will be shown:
"The SSL certificate for this appliance has been self signed by the certification authority (CA) on this appliance. Download the certificate of this CA.”Click Download the certificate.
The root certificate will be automatically downloaded as a file called
ssoCA.crt
.
The Imprivata root CA certificate is the only one you need to deploy to the IGEL devices from the UMS Console as it will verify the trusted connection to the different appliances in the environment.
Using a Third-Party Root CA (e.g. Microsoft AD or Public CA)
In this situation, you will not be able to download the root CA from the Imprivata Appliance Console.
You will have to export the chain via a browser supported by the Imprivata Appliance Console (MS Edge or Chrome).
Export the certificate chain in .crt
format (Base64 X.509).
Deploying the Appliance Certificates
For how to deploy certificates via the UMS, see IGEL OS > IGEL OS Articles > Certificates 1 > Deploying Trusted Root Certificates in IGEL OS
When uploading the Imprivata root CA certificate or third-party certificate(s) to UMS, you can choose either of two options for file classification:
Common certificate (all-purpose) - this is the preferred choice
SSL certificate
Examples of Imprivata Certificate for UMS Java or Web Console:
With either option, once the certificate is deployed to the device, it will automatically install in the /wfs/ca-certs
directory which is where the IGEL Agent for Imprivata looks for the certificates. If needed, you can verify the certificate by opening a terminal window and running the following command; the exact command depends on the name of the certificate file:
cd /wfs/ca-certs; openssl verify ssoCA.crt
or
cd /wfs/ca-certs; openssl verify ssoCA.cer