Unified Communications

 View Only
  • 1.  Workplace and Android

    Posted 03-23-2023 07:33 PM

    We have run into an issue on workplace when trying to configure workplace on an Android phone via a URL and manual configuration. Regardless of how we try to configure Workplace on an Android phone, we continue to get a certificate error. Our vendor has determined that it is an intermediate certificate issue with the trust store and when we manually installed the certificate, we are able to get it to work. Below is an explanation of the issue from our vendor.

    Per the vendor – The intermediate certificate is included in your certificate bundle on AADS, but it was missing from the trust store on the Android, unlike iOS where those public certs seem to exist in the iOS trust store already. The only cert those trust stores don't have is the actual public cert you had signed, but the iOS trust store should contain the root & intermediate of the different public internet providers like GoDaddy, GlobalSign, Verisign, etc. apparently the Android was missing this intermediate, so you guys must manually install that in the trust store of the Android like we did on Friday. without the rootCA & intermediate, it won't be able to initially negotiate the certs that the SBC has & AADS tells it to get additionally when using https/443.

    Any help that you might be able to provide would be much appreciated. This is an issue as we can't have every Android user across multiple state agencies install a certificate manually to get Workplace operational.



    ------------------------------
    Timika Franklin
    Customer Service Manager
    State of MS - Dept of Information Technology Services
    Jackson MS
    ------------------------------


  • 2.  RE: Workplace and Android

    Posted 03-23-2023 09:13 PM

    We've seen something like this before, when Setigo was dealing with a root cert that was close to expiring -- they decided to rotate around some intermediate certs 'to make it easy', which worked for some devices, but ended up causing heartache for about a year for Android devices that didn't regularly receive updates.

    The path of least resistance is to get a new SSL cert from one of the major players and don't use the company that generated your cert for a awhile.  This is a 'them' problem that is becoming a 'you' problem.  Certs from Verisign, Namecheap, godaddy, etc. are all well supported and work across all devices.  

    If you don't want to go that route, you can push the intermediate cert to Android devices.  It will involve either an MDM solution on each phone or you walking through each user on the 5 step process (email the cert, have them save it to the device, have them go to the security settings and import it as a trusted cert).  



    ------------------------------
    Nick Kwiatkowski
    Director of Design and Engineering
    Michigan State University
    East Lansing MI
    ------------------------------



  • 3.  RE: Workplace and Android

    Posted 03-30-2023 08:48 AM

    Thank you Nick. 



    ------------------------------
    Timika Franklin
    Customer Service Manager
    State of MS - Dept of Information Technology Services
    Jackson MS
    ------------------------------



  • 4.  RE: Workplace and Android

    Posted 03-24-2023 09:04 AM

    Some thoughts I'm having:

    1. Do you know how many certificates are in the trust list sent from AADS?  Drop certs from the TRUSTCERT list that you don't need, such as the Avaya default ones.  You didn't say how long the list is but there might be a limit in the client.  On the desk phones, the limit is 6 unless you set MAX_TRUSTCERTS value higher in the settings file, and even that tops out at 10.
    2. Is the intermediate cert in its own file (should be) or bundled into another file? 
    3. Double check the certificates coming from AADS are really the right ones – don't just trust the file names.   Download everything in the TRUSTCERTS list, rename then with a CRT extension so Windows will open them.  You don't need to install them.  Just open each to look at the thumb/fingerprint of the signer and make sure that matches the next one up the chain.  Digi, for example, has multiple root CAs and multiple intermediate CAs and they're all named similarly.  My thinking here is while you might have the right file on your PC to manually install on the Android device, what your AADS is handing out might be different (wrong intermediate CA or an expired one).

     

    Good luck,

     

    Sam Osheroff

    Telecom Engineer

    UW-IT Infrastructure

    University of Washington

    sosherof@uw.edu

    Voice & text: 206-221-6362

     






  • 5.  RE: Workplace and Android

    Posted 03-30-2023 08:51 AM

    Thanks Sam.  I have forwarded the info to my engineers.  



    ------------------------------
    Timika Franklin
    Customer Service Manager
    State of MS - Dept of Information Technology Services
    Jackson MS
    ------------------------------