Performing SSL Interception using a Microsoft PKI infrastructure in an explicit proxy environment.
Edge SWG: 7.3.x, 7.4.x
Sample machines hostnames that are resolved by DNS:
Windows Server CA: dc.yourdomain.local | Edge SWG: proxysg.yourdomain.local (192.168.1.156) | Terminal PC is under same Active Directory
Select Configuration > SSL > Keyrings. Create a new keyring (Add Keyring) for the Edge SWG ex. proxysg.yourdomain.local or test . Select Show Keypair based on your security policy. Click OK and Apply to save your changes.
Edit the keyring created above.
Click Create under Certificate Signing Request at the bottom.
Fill appropriate information into the request. The Common Name can be set to reflect what users should see if viewing certificate details(e.g. Bluecoat SSL interception) Click OK, then Close, then Apply.
NOTE: Common name should reflect the hostname or FQDN of the Edge SWG (documentation) ex. proxysg.yourdomain.local
Complete the form, paying close attention to the Common Name field. This should be a hostname or FQDN that resolves to the Edge SWG appliance from outside of your protected network. This is the first step in ensuring that Internet-based browsers can trust the certificate the appliance presents.
NOTE: SOME ENVIRONMENTS NEEDS ADDITIONAL ATTRIBUTES FOR THE CSR, WHICH CAN BE ONLY CREATED VIA CLI (versions without SGAC)
If there's no SubjectAltName attribute in the certificate the site will still be shown as insecure with ROOTCA installed. It is advised to create a CSR with SAN over the CLI rather than GUI.
Procedure is almost the same. Keyring can be created from the GUI or CLI:
Proxy> enable
Proxy# config t
Proxy (config)# ssl
Proxy (config-ssl)# create keyring no-show <keyring-name> 2048
Then CSR can be made using this keyring
Proxy (config-ssl)# create signing-request <keyring-name>
Country code []: US
State or province []:
Locality or city []:
Organization name []:
Organization unit []:
Common name []: proxysg.yourdomain.local
Email address []:
Challenge []:
Company name []:
Digest type (sha1, sha224, sha256, sha384 or sha512) [sha256]: sha256
Subject alternative name []: IP:xx.xx.xx.xx,DNS:proxysg.yourdomain.local,DNS:proxysg1
Key usage []:
Extended key usage []:
Basic constraints []:
* REQUIRED
(SAN) SubjectAltName attributes > check the formating , worht to add the DNS and IP of Edge SWG
Then you can see the CSR from the CLI
Proxy (config-ssl)# view signing-request <keyring-name>
Which will be also propagated after a while into the GUI view as well.
Edit the created Keyring. At the bottom will now be a certificate signing request (CSR). Copy this text to the clipboard. Click Close.
Ex.
-----BEGIN CERTIFICATE REQUEST-----
[...]
LBlY3B15/Vv3qtjsGSsmn9oWvkrEbL1c/f29LBcB0F6XqpnavUrIlLt79inLHZFx
3QRKTPDs2JLJYfzJaBY7m6oRYVZ1NleFcK1oMyFVGLCVkw4=
-----END CERTIFICATE REQUEST-----
Save this text in a file and give it a name such as proxysg.csr. Click Close.
Complete the following steps using Internet Explorer:
In Internet Explorer, open the URL of the Microsoft Certificate Authority server. Generally, the default URL is http://server/certsrv (in our ex. dc.yourdomain.local/certsrv)
Click Request a certificate.
Click advanced certificate request.
Select Submit a certificate request by using a base-64-encoded CMC or PKCS #10 file, or submit a renewal request using a base-64-encoded PKCS #7 file.
(Optional) You may be prompted to install "Microsoft Certificate Enrollment Control ActiveX". Click Accept and continue.
In the Saved Request field, copy the CSR created above on the ProxySG. Select Subordinate Certificate Authority for the Certificate Template. Click Submit.
Depending on the configuration of the CA, you may be issued a certificate immediately, or it may need to be approved by an admin. Once approved, select Base 64 encoded and Download certificate.
Save the certificate for the proxy
Ex.
-----BEGIN CERTIFICATE-----
[...]
-----END CERTIFICATE-----
Click Home in the top right corner of the page to get back to Home of Certificate Authority Server
Click Download a CA certificate, certificate chain, or CRL (your domain ROOT_CA)
Select the appropriate CA Certificate from the list at the top, select Base 64 as the encoding method and click Download CA certificate.
Complete the following steps on the Edge SWG:
In the Admin Console on the Edge SWG, select Configuration > SSL > Keyrings. Select the keyring created above and click Edit.
Click Import, under Certificate.
Paste in the base 64 certificate text generated Web Server certificate from CSR earlier and click Close and then Apply to save your changes.
Next, it will be necessary to add the organization Root CA and the Edge SWG generated certificate from CSR to the list of CA certificates on the Edge SWG. In the Admin Console, go to the CA Certificates tab.(Select Configuration > SSL > CA Certificates)
Click Import. Name the generated certificate from keyring and paste in the base 64 version of the Edge SWG's subordinate CA certificate and click OK and then Apply.
NOTE: You can be notified that CA already exists, then you can skip.
Click import. Create name the organization Root CA Certificate and paste in the Base 64 version downloaded above and click OK.
Next we will add the Root CA, intermediate CA (if applicable), and proxy certificate as a browser trusted CA. Select CA Certificate Lists tab at the top.
Select browser-trusted and click Edit.
Select the newly added Root CA, intermediate CA (if applicable), and proxy certificate on the left and click Add to move it to the right column. Click OK and then Apply.
Note: If the proxy is configured to have a different CCL than the default one of "<All CA Certificates>" (found under WebUI > Configuration > Proxy Settings > SSL Proxy), also add the certificate signed by the PKI for the proxy to the selected CCL. This ensures that the proxy will provide the new certificate, along with the emulated certificates to the clients.
Configure the Edge SWG appliance to perform SSL interception. Confirm that the HTTP service on the Edge SWG appliance is properly configured
In the Edge SWG Admin Console, navigate to Configuration > Services > Proxy Services > Proxy Services tab
In this example, the Edge SWG appliance is set to use the default Explicit HTTP service. It is also configured to intercept HTTP traffic on ports 80 and 8080, with the Detect Protocol enabled (this must be enabled for SSL interception to work).
Configure policy rules and layers in the Visual Policy Manager (VPM)
Navigate to Visual Policy Manager in the right-top navigation
In the following example, the VPM policy only contains two layers:
The SSL Interception Layer contains one rule, which is set to SSL intercept "Any" Source and Destination.
If not existent please create a SSL-Intercept layer, and add new rule
Check the certificate in a browser
You can now run a test using a computer that is a member of the domain of which the Microsoft Certificate Server is also a member.
To do this, check the certificate that ProxySG is providing to the browser. The Common Name (CN) should match what you used when creating the CSR.
If the Certificate shows untrusted on your PC/browser it means that you need to install the organization Root CA, not added certificate to Browser/Trusted directory on Edge SWG or Edge SWG certificate (optional) on the client PC. Make sure the URL cert is trusted in browser or there will be an issue presented with certification signed by your root Certificate Authority (ex. NET::ERR_CERT_COMMON_NAME_INVALID)
IMPORTANT: Make sure that the authoritative certs are also put in the store “Trusted Root Certification” Authorities on the machine and the browser trust your CA
KB articles: