This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: CallManager 5.x: Delete and Regenerate a Certificate Document ID: 99815 Introduction Prerequisites Requirements Components Used Conventions Server Certificate Types Cisco Unified Communications Operating System Administration Delete and Regenerate a Certificate Troubleshoot Error: There is a problem with this website's security certificate NetPro Discussion Forums - Featured Conversations Related Information Introduction This document describes how to delete and regenerate different types of server certificates in Cisco Unified Communication Manager 5.x (CallManager). Certificates secure client and server identities. After root certificates are installed, certificates are added to the root trust stores in order to secure connections between users and hosts, which includes devices and application users. Prerequisites Requirements Cisco recommends that you have knowledge of Cisco Unified Communication Manager 5.x. Components Used The information in this document is based on Cisco Unified Communication Manager 5.x. The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command. Conventions Refer to Cisco Technical Tips Conventions for more information on document conventions. Server Certificate Types Cisco uses these self-signed (own) certificate types in Cisco Unified CallManager servers: HTTPS certificate (tomcat_cert)This self-signed root certificate is generated during the Cisco Unified CallManager installation for the HTTPS server....
View Full Document
This note was uploaded on 08/08/2011 for the course CISCO 1232 taught by Professor Jack during the Spring '11 term at American International.
- Spring '11