1-888-77-Kerio
Home » Categories » Kerio Connect » Server configuration » SSL certificates
Icon Printer Icon Email      Icon Twitter Icon Digg Icon Stumbleupon Icon de.icio.us Icon FaceBook

Configuring SSL certificates in Kerio Connect

Overview

To secure Kerio Connect by SSL/TLS encryption, you need a SSL certificate. SSL certificates authenticate an identity on a server.

Kerio Connect creates the first self-signed certificate during the installation. Upon the first login, users must confirm to go to a page which is not trustworthy. To avoid this, generate a new certificate request in Kerio Connect and send it to a certification authority for authentication.

You can have one or more certificates for each domain configured in Kerio Connect.

If you want to use an existing SSL certificate from another service, export the existing SSL certificate and the public key in the PEM format and import them to Kerio Connect.

Manage certificates in the Configuration → SSL Certificates section .

Image

To make the communication as secure as possible, you can:

Supported certificates

Kerio Connect supports certificates in the following formats:

  • Certificate (public key) — X.509 Base64 in text format (PEM). The file has suffix .crt.

  • Private key — the file is in RSA format and it has suffix .key with 4KB max.

Multiple certificates

New in Kerio Connect 9.0.2!

Since Kerio Connect 9.0.2, you can import certificates for different domains to Kerio Connect. Kerio Connect then selects and uses the appropriate certificate.

If multiple certificates exist for a single domain, Kerio Connect selects a certificate according to the following order:

  1. Trusted certificate for the domain hostname.

  2. Self-signed certificate for the domain hostname.

  3. Valid certificate for the domain hostname.

  4. Expired certificate for the domain hostname.

  5. Trusted wildcard certificate.

  6. Self-signed wildcard certificate.

  7. Valid wildcard certificate.

  8. Expired wildcard certificate.

  9. Default server certificate.

If a certificate expires and you have already imported a new valid certificate to Kerio Connect for the same domain, delete the old certificate or restart the server to use the new valid certificate.

Creating certificates

Creating self-signed certificates

To create a self-signed certificate, follow these steps:

  1. Go to section Configuration → SSL Certificates.

  2. Click on New → New Certificate.

  3. Fill in the information.

  4. Click OK.

To enable the server to use this certificate, select the certificate and click on the Set as Default button (Set as Active in older versions).

Creating certificates signed by certification authority

To use a certificate signed by a trustworthy certification authority, you must first generate a certificate request, send it to a certification authority and import a signed certificate upon receiving it.

  1. Open section Configuration → SSL Certificates and click on New → New Certificate Request.

  2. Fill in the information and save.

  3. Select the certificate and click on the Export → Export Request button.

  4. Save the certificate to your disk and send it to a certification authority.

Once you obtain your certificate signed by a certification authority:, and click on Import → Import Signed Certificate from CA.

  1. Go to section Configuration → SSL Certificates.

  2. Click on Import → Import Signed Certificate from CA.

  3. To enable the server to use this certificate, select the certificate and click on the Set as Active button.

Intermediate certificates

Kerio Connect allows authentication by intermediate certificates. To make authentication by these certificates work, follow these steps to add the certificates to Kerio Connect:

  1. In a text editor, open the server certificate and the intermediate certificate.

  2. Copy the intermediate certificate below the server certificate into the server certificate file (*.crt) and save.

    The file may look like this:

    -----BEGIN CERTIFICATE-----
    MIIDOjCCAqOgAwIBAgIDPmR/MA0GCSqGSIb3DQEBBAUAMFMxCzAJBgNVBAYTAl
    MSUwIwYDVQQKExxUaGF3dGUgQ29uc3VsdGluZyAoUHR5KSBMdGQuMR0wGwYDVQ
         ..... this is a server SSL certificate ...
    ukrkDt4cgQxE6JSEprDiP+nShuh9uk4aUCKMg/g3VgEMulkROzFl6zinDg5grz
    QspOQTEYoqrc3H4Bwt8=
    -----END CERTIFICATE-----
    -----BEGIN CERTIFICATE-----
    MIIDMzCCApygAwIBAgIEMAAAATANBgkqhkiG9w0BAQUFADCBxDELMAkGA1UEBh
    WkExFTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTESMBAGA1UEBxMJQ2FwZSBUb3duMR
         ..... this is an intermediate SSL certificate which
               signed the server certificate...
    5BjLqgQRk82bFi1uoG9bNm+E6o3tiUEDywrgrVX60CjbW1+y0CdMaq7dlpszRB
    t14EmBxKYw==
    -----END CERTIFICATE-----
    
  3. In the administration interface, go to section Configuration → SSL Certificates.

  4. Import the modified server certificate by clicking on Import → Import New Certificate.

  5. Save the settings.

If you have multiple intermediate certificates, add them one by one to the server certificate file.


comments powered by Disqus