ERR_CERT_COMMON_NAME_INVALID
when you browse to the IBM RPA Control Center or other related URLs
Some browsers prompt the ERR_CERT_COMMON_NAME_INVALID
error when you browse to IBM RPA Control Center or other related URLs that bind the certificate without a subject alternative name (SAN). Generate the self-signed certificates
with SANs for each URL that you use for IBM RPA.
Before you begin
- You need Windows PowerShell to run the procedures.
- Chrome 58+ no longer matches the Common Name (CN) in certificates, which might cause this error.
Procedure
Follow the procedures to solve issues that are related to certificate on your browser:
- Create a self-signed certificate
- Export the certificate file
- Set up the generated certificate
- Optional: Set up Mozilla Firefox to trust the certificates
Create a self-signed certificate
Use the following command to generate a self-signed certificate by using PowerShell:
New-SelfSignedCertificate -DnsName "<LOCALHOST>", "<HOSTNAME>","<DNS_NAME>" -CertStoreLocation "<CERTIFICATE_STORE_LOCATION>" -FriendlyName "<FRIENDLY_NAME>"
Where:
<LOCALHOST>
The localhost URL name.
<HOSTNAME>
The hostname, for example, ibmrpamachine
.
<DNS_NAME>
The DNS name, for example, my.ibmrpa.com
.
<CERTIFICATE_STORE_LOCATION>
The certificate location, for example, cert:\LocalMachine\My
.
<FRIENDLY_NAME>
The friendly name for the certificate, for example, IBM RPA Certificate
.
Export the certificate file
Use the following command to export the certificate by using PowerShell:
$certificate = Get-ChildItem -Path <CERTIFICATE_STORE_LOCATION>\<CERTIFICATE>
Export-Certificate -Cert $certificate -FilePath <STORE_CERTIFICATE_LOCATION>
Where:
<CERTIFICATE_STORE_LOCATION>
The certificate location, for example, cert:\LocalMachine\My
.
<CERTIFICATE>
The certificate generated, for example, AACEF61D5FF2ECCABD435BB08CCAABBC3EE14AF
.
<STORE_CERTIFICATE_LOCATION>
The location to store the certificate exported.
Set up the generated certificate
- Install the certificate to Trusted Root Certificate Authorities certificate store.
- Add or edit the Site Bindings on the IIS for IBM RPA services.
- Install the certificate in the Internet Information Services (IIS) Manager.
- Clear the browser data.
- Restart the browser and IBM RPA services.
Optional: Set up Mozilla Firefox to trust the certificates
The following procedure shows how to set up Mozilla to trust the certificates under Trusted Root Certificate Authorities.
- Open the Mozilla Firefox and enter
about:config
. - Enter
security.enterprise_roots.enabled
in the search bar. - Click the Toggle icon to set it to True.