Forum Discussion
Adding Microsoft internal CA as a trusted signer.
The server SSL profile doesn't generally care about, or rather is configured by default to not be concerned with establishing trust with the internal application. You can usually apply the built-in serverssl profile, and as long as there are no unusual SSL requirements on the server, then the server SSL profile will ignore validation and trust issues.
In any case, the BIG-IP can import certificates in either p12 or PEM/base64 format, so it should be relatively easy to export the CA's public certificate, import it to the BIG-IP, and then apply it to the server SSL profile.
Do you have a special requirement to build this server side trust?
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com