The Cisco Video Communication Server (VCS) uses client certificates for the authentication and authorization process. This feature is extremely useful for some environments, because it allows an added layer of security and can be used for single sign on purposes. However, if incorrectly configured, it can lock administrators out of the VCS web interface.
The steps in this document are used to disable Client certificate-based security on the Cisco VCS.
If Client certificate-based security is enabled on a VCS, and is incorrectly configured, users might not be able to access the VCS web interface. Attempts to access the web interface are met with a Transport Layer Security (TLS) handshake failure.
This is the configuration change that triggers the issue:
Complete these steps in order to disable Client certificate-based security and return the system to a state where administrators are able to access the web interface of the VCS:
echo "SSLVerifyClient none" > /tandberg/persistent/etc/opt/apache2/ssl.d/removecba.conf
tshell
xcommand restart
rm /tandberg/persistent/etc/opt/apache2/ssl.d/removecba.conf
Congratulations! Your VCS now runs with Client cerificate-based security disabled.
Revision | Publish Date | Comments |
---|---|---|
1.0 |
09-Aug-2013 |
Initial Release |