Local Network Access (LNA) Web Server Certificate support
Devices with CollabOS version 1.13 or above can now use the Web Certificate for Local Network Access. This feature allows customers to replace the original Logitech self-signed LNA Webserver certificate with their own certificate and private key.
Prerequisite
A CollabOS device running version 1.13.0 or higher
Certificate requirements:
A PKCS#8 RSA private key without password protection
Both DER and PEM formats are acceptable for the certificate and key
Local Network Access is necessary to upload the certificate
Step 1: Network Configuration
It is recommended to make sure that the CollabOS device is on a fixed IP address. Using LNA, go to Connectivity -> Network Connection, and expand the TCP/IP details, confirm that the Configuration is βStaticβ (This can also be configured via your dhcp server, using a reservation or static lease)
Next make sure that the hostname is configured for the device. Go to About -> Device Info -> Hostname. Fill in the hostname for the device.
Using the Hostname and the IP Address of the CollabOS device, set up DNS on your local DNS server.
Step 2: Create the LNA Certificate
A certificate with a private key is needed for this step. At this point a certificate can be obtained from a public Certificate Authority but a self signed certificate will work as long as your browser has access to the Certificate Authority (CA) and the CA key is installed as a Trusted CA on the computer you are running the browser from.Β A self signed certificate is the recommended approach as this is not a publicly accessible CollabOS device and will be on a local IP address. You can use either a host certificate, that is used for only one CollabOS device, or you can use a wildcard certificate. A wild card certificate would be suggested if setting up a large number of CollabOS devices.Β
Option 1:
One approach for this is using the OpenSSL tool. For creating a self signed certificate using OpenSSL tool in Download from Link, The CA cert and key files will also be needed in the same directory as the certificates that are created.
Generate a private key for the CollabOS device.
openssl genrsa -out VC-MTR1-Key.pem 4096
Generate a certificate request using your local CA private key.
openssl req -new -sha256 -subj "/CN=vc-mtr1" -key VC-MTR1-Key.pem -out VC-MTR1-Request.csr
Create an extfile.cnf file that will have the host name and IP address of the CollabOS device.
Create the Certificate
openssl x509 -req -sha256 -days 365 -in VC-MTR1-Request.csr -CA CA-Cert.pem -CAkey CA-key.pem -out VC-MTR1-Cert.pem -extfile extfile.cnf -CAcreateserial
Enter the password for the CA key file:
The certificate and the key file will be in the working directory and ready to be uploaded to the CollabOS device.Β
Option 2:
Another approach is using a Windows Certificate Authority, creating a template and issuing the certificate from the template. You will sign the certificate and import it so you can export it. The OpenSSL tool will still be used to isolate the private key.Β
On the Windows Server Certificate Authority, open the Certificate Templates MMC.
Run: mmc
Click File > Add/Remove Snap-in
Double Click βCertificate Templatesβ snap-in and click βOKβ
Right-click on the Web Template> Duplicate
On the βGeneralβ tab fill in a Template Display Name βCollabOS LNA Certificateβ and check the βValidity Periodβ, I have selected 5 years
On the Request Handling Tab, check "Allow private key to be exported", then click "OK".
Open the Certificate Authority management tool:
Run: mmc
Click "File", then "Add/Remove Snap-in"
Double-click "Certificate Authority" snap-in
Click "OK"
Select "Local Computer"
Click "Finish"
Click "OK"
Expand your server, right-click on the "Certificate Templates" folder, click "New", then "Certificate Template to Issue".
Select βCollabOS LNA Certificateβ and click βOKβ
Open the Internet Information Services (IIS) Manager to generate a Certificate Signing Request (CSR)
Run: βinetmgrβ
Click on your server
Double click on βServer Certificatesβ in the middle pane
Click on βCreate Certificate Requestβ on the right pane
Enter the required organizational and server information in the Distinguished Name Properties dialog box, click Next
Choose a Cryptographic service provider (CSP) and bit length, here we selected 4096
Click βNextβΒ
Name the request file (e.g., "CollabOS_Wildcard.txt") and save it to a secure location
Submit the CSR to Microsoft Active Directory Certificate Services:
Navigate your web browser toΒ βhttp://<servername>/certsrvβ
Navigate to "http://<servername>/certsrv" in your web browser
Click "Request a certificate"
Click "Advanced certificate request"
In the "Base-64-encoded" box, paste the entire contents of "CollabOS_Wildcard.txt", including the "BEGIN NEW CERTIFICATE REQUEST" and "END NEW CERTIFICATE REQUEST" lines
Set "Certificate Template" to "CollabOS LNA Certificate"
In "Additional Attributes", add any desired SAN attributes (e.g., "san:dns=dns.name"
Click βSubmitβ
Click on βDownload certificateβ
Save to a secure place.
Install the Certificate on the local machine
Double click on the certificate that you saved
Click on βInstall Certificateβ
Click on βLocal Machineβ
Click βNextβ
Click βPlace all certificates in the following storeβ
Click βBrowseβ
Select βPersonalβ and click βOKβ
Click βNextβ and click βFinishβ
Export the Certificate
Run: mmc
Click βFileβ, then βAdd/Remove Snap-inβ
Double Click βCertificatesβ snap-in
Select βComputer accountβ
Click βNextβ
Select βLocal computerβ
Click βFinishβ
Click βOKβ
Click on βCertificates (Local Computer)β
Expand βPersonalβ
Click on βCertificatesβ
Right click on your certificate, click on βAll Tasksβ and click βExportβ
In the Export Wizard, click βNextβ, select βNoβ, click βNextβ, select βDERβ, click βNextβ
Give it a file name, and save to a secure location, click βNextβ, click βFinishβ
Now export the certificate again by right clicking on your certificate, click on βAll Tasksβ and click βExportβ
In the Export Wizard, click βNextβ, select βYesβ, click βNextβ, select βPersonal Information Exchangeβ, click βNextβ
Set a password, select the encryption, click "Next"
Give it a file name, and save to a secure location, click βNextβ, click βFinishβ
10. Β Extract your private key from the pfx file using the OpenSSL tool
For extracting a self signed certificate using OpenSSL tool in Download from Link
open SSL command to get private keyΒ from .pfx certificate
Open a command prompt, navigate to the location of the pfx file
Run the following command:
openssl pkcs12 -in yourfile.pfx -nocerts -out priv-key.pem -nodes
It will ask for the password you used to export the pfx file
The .pem file will be in the same directoryΒ you are working in
Option 3:
Another approach is using a Windows Certificate Authority, without creating a template and just creating the key from your certificate mmc. You will sign the certificate and import it so you can export it. The OpenSSL tool will still be used to isolate the private key.Β
Open the βCertificateβ mmc
Run: mmc
Click βFileβ, then βAdd/Remove Snap-inβ
Double Click βCertificatesβ snap-in
Select βMy User accountβ
Click βFinishβ
Click βOKβ
Click on βCertificates (Current User)β
Right click on βPersonalβ, select βAll Tasksβ, select βAdvanced Operationsβ, click on βCreate Custom Requestβ
Click βNextβ , select βProceed without enrollment policyβ, click βNextβ
Confirm βRequest format:β is βPKCS #10β, click βNextβ
Expand βDetailsβ drop down, click on βPropertiesβ
Fill out the Friendly name: host.domain.com (or *.domain.com)
Click on the βSubjectβ tab.
Click on βTypeβ dropdown and select βCommon nameβ, and fill out as the βValue:β to domain.com, click βAddβ
Fill out the other βTypesβ for Organization, Country and State as a minimum
Under βAlternative nameβ select βTypeβ βDNSβ with a βValueβ of βhost.domain.comβ (or *.domain.com) and click βAddβ
Click on the βExtensionsβ tab, expand the βKey usageβ section
Click on βDigital signatureβ and click βAddβ
Click on βKey enciphermentβ and click βAddβ
Expand the βExtended Key Usageβ section
Click on βServer Authenticationβ and click βAddβ
Click on the βPrivate Keyβ tab
Expand the βKey optionsβ section and change the key length to β4096β and check βMake private key exportableβ
Click βOKβ
Click βNextβ
Give it a file name, and save to a secure location, select βBinaryβ click βNextβ, click βFinishβ
Open the Microsoft Active Directory Certificate Services
Navigate your web browser toΒ βhttp://<servername>/certsrvβ
Click on βRequest a certificateβ
Click on βadvanced certificate requestβ
In the βBase-64-encodedβ box paste the complete contents of the file you saved βCollabOS_Wildcard.txtβ be sure to include everything from the header β-----BEGIN NEW CERTIFICATE REQUESTβ--β through the footer β-----END NEW CERTIFICATE REQUESTβ--β
Change the βCertificate Templateβ to βCollabOS LNA Certificateβ
In the βAdditional Attributesβ box type any desired SAN attributes, such as βsan:dns=dns.nameβ
Click βSubmitβ
Click on βDownload certificateβ
Save to a secure place.
3. Β Install the Certificate on the local machine
Double click on the certificate that you saved
Click on βInstall Certificateβ
Click on βLocal Machineβ
Click βNextβ
Click βPlace all certificates in the following storeβ
Click βBrowseβ
Select βPersonalβ and click βOKβ
Click βNextβ and click βFinishβ
4. Β Export the Certificate
Run: mmc
Click βFileβ, then βAdd/Remove Snap-inβ
Double Click βCertificatesβ snap-in
Select βComputer accountβ
Click βNextβ
Select βLocal computerβ
Click βFinishβ
Click βOKβ
Click on βCertificates (Local Computer)β
Expand βPersonalβ
Click on βCertificatesβ
Right click on your certificate, click on βAll Tasksβ and click βExportβ
In the Export Wizard, click βNextβ, select βNoβ, click βNextβ, select βDERβ, click βNextβ
Give it a file name, and save to a secure location, click βNextβ, click βFinishβ
Now export the certificate again by right clicking on your certificate, click on βAll Tasksβ and click βExportβ
In the Export Wizard, click βNextβ, select βYesβ, click βNextβ, select βPersonal Information Exchangeβ, click βNextβ
Check the password field and give it a password, Select the Encryption, click βNextβ
Give it a file name, and save to a secure location, click βNextβ, click βFinishβ
5. Β Extract your private key from the pfx file using the OpenSSL tool
For extracting a self signed certificate using OpenSSL tool in Download from Link
open SSL command to get private keyΒ from .pfx certificate
Open a command prompt, navigate to the location of the pfx file
Run the following command:
openssl pkcs12 -in yourfile.pfx -nocerts -out priv-key.pem -nodes
It will ask for the password you used to export the pfx file
The .pem file will be in the same directoryΒ you are working in
Step 3: Uploading the Certificate
In the Local Network Access setup interface, selectΒ System Settings -> More Settings -> LNA Web Server Certificate
Click upload and select the certificate file and Private Key that you created in the previous section, then click Upload.
The file will be uploaded and then the device will reboot automatically after saving the changes.
You will need to restart the web browser to see the valid certificate.
Note: Uploading an incorrect file can disrupt Local Network Access functionality. To restore Access, you must perform a factory reset on the CollabOS device.