SSL Certificate - Signature Verification Failed Vulnerability" on all NCM AS and RA servers, though certificate is valid
Steps to determine whether Smarts NCM is using the default certificate or third-party certificate for SSL.
Environment
NCM 10.1.x / 24.3.x
Resolution
Remediation is to install a server certificate signed by a trusted third-party Certificate Authority.
The Network Configuration Manager provides the ability to install the Network Configuration Manager root CA certificate on client machines, which is required for accessing the API over an SSL connection.
Refer Certificates section in NCM installation guide for steps to install root CA certificate.
The Network Configuration Manager root CA certificate is located on the Application or Combination server at [Product Directory]/conf/CA/voyenceca.crt.
To determine which certificate file is being used in the environment, do the following:
Run the following commands to print the voyenceca.crt certificate file:
Find the Certificate Name (CN). If MASTERKEY is the CN, the environment is using the default Smarts NCM certificate. Any other value for CN indicates the environment is using a third party certificate.
Additional Information
Alternate command to check certificate installed in your environment.
Run below command from $VOYENCE_HOME/java/bin directory
./keytool -v -list -keystore <keystore_file_name>
You can fetch keystore filename and path from $VOYENCE_HOME/ncmcore/conf/server.xml along with keystore password.