<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article ERR_CERT_COMMON_NAME_INVALID when using 3rd party certificate in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/ERR-CERT-COMMON-NAME-INVALID-when-using-3rd-party-certificate/ta-p/1715606</link>
    <description>&lt;P&gt;Qlik Sense Enterprise for Windows will by default use a self-signed certificate to allow for the use of HTTPS when accessing the Management Console (QMC) or the Hub.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;QlikView will always use HTTP by default, but a 3rd party certificate can be installed to enable HTTPS. See&amp;nbsp;&lt;SPAN class="lia-message-read"&gt;&lt;A href="https://community.qlik.com/t5/Qlik-Support-Updates-Blog/QlikView-AccessPoint-and-QMC-with-HTTPS-and-a-custom-SSL/ba-p/1609779" target="_blank" rel="noopener"&gt;QlikView AccessPoint and QMC with HTTPS and a custom SSL certificate.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In Qlik Sense, this self-signed certificate will lead to&amp;nbsp;&lt;/SPAN&gt;browsers showing "&lt;STRONG&gt;Not Secure&lt;/STRONG&gt;" as in this screenshot:&lt;BR /&gt;&lt;BR /&gt;&lt;IMG src="https://qlik.my.salesforce.com/servlet/servlet.ImageServer?id=015D0000006AInd&amp;amp;oid=00D20000000IGPX&amp;amp;lastMod=1539600094000" border="0" alt="User-added image" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;After implementing a 3rd party or private CA certificate, the QMC and Hub will begin to show the connection as "&lt;STRONG&gt;Secure&lt;/STRONG&gt;":&lt;BR /&gt;&lt;BR /&gt;&lt;IMG src="https://qlik.my.salesforce.com/servlet/servlet.ImageServer?id=015D0000006AIni&amp;amp;oid=00D20000000IGPX&amp;amp;lastMod=1539600150000" border="0" alt="User-added image" /&gt;&lt;BR /&gt;&lt;BR /&gt;If the client implements the new certificate and still receives the error&amp;nbsp;&lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;ERR_CERT_COMMON_NAME_INVALID&lt;/STRONG&gt;&lt;/FONT&gt;, it is possible that the expected domain in the certificate and the domain listed in the URL do not match.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;IMG src="https://qlik.my.salesforce.com/servlet/servlet.ImageServer?id=015D0000006AIns&amp;amp;oid=00D20000000IGPX&amp;amp;lastMod=1539600198000" border="0" alt="User-added image" /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Qlik Sense Enterprise all versions&lt;/LI&gt;
&lt;LI&gt;QlikView all versions&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Resolution:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&lt;STRONG&gt;Unsupported TLS version or ciphers?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Verify that the Windows Server hosting QlikView does not have obsolete TLS versions installed which the browser does not support.&lt;/P&gt;
&lt;H4&gt;&lt;BR /&gt;&lt;STRONG&gt;Does the URL match the certificate?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Check that the URL being used and ensure that it matches the Fully Qualified Domain Name (FQDN) issued to the certificate.&lt;BR /&gt;&lt;BR /&gt;For example, if a certificate is issued to &lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;qliksense.company.com&lt;/STRONG&gt;&lt;/FONT&gt;, users can still access the QMC / Hub using the server name only (&lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;qliksense&lt;/STRONG&gt;&lt;/FONT&gt;) but the web browser will produce a warning about a mismatch between &lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;qliksense/hub/&lt;/STRONG&gt; &lt;/FONT&gt;and &lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;qliksense.company.com/hub/&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;In Qlik Sense, if you are concerned about whether a certificate is correctly bound, then inspect the &lt;FONT face="courier new,courier"&gt;Security_Proxy log in C:\ProgramData\Qlik\Sense\Log\Proxy\Trace&lt;/FONT&gt;. An example of a success binding of a certificate to the Proxy will look like:&lt;/P&gt;
&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;Domain\qs_admin&amp;nbsp;&amp;nbsp; &amp;nbsp;Set certificate 'CN=&lt;STRONG&gt;*.company.com&lt;/STRONG&gt;, OU=PremiumSSL Wildcard, O=ACME, STREET="88 Broadway, Bldg 14", L=New York, S=ON, PostalCode=90213, C=CA' (D09777777738C5A799999994F9555AFF588888)&lt;/FONT&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Does the Subject Alternative Name match?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Another important cause of this error is: the URL used in the browser does not match "Subject Alternative Name" in the certificate.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;IMG src="https://qlik.my.salesforce.com/servlet/servlet.ImageServer?id=015D0000006AIo2&amp;amp;oid=00D20000000IGPX&amp;amp;lastMod=1539600255000" border="0" alt="User-added image" /&gt;&lt;/P&gt;
&lt;P&gt;In most browsers, when verifying the website's identity, &lt;FONT face="courier new,courier"&gt;SubjectAlternativeName(SAN)&lt;/FONT&gt; is used first. If absent, then it falls back to Subject (or known as "Common Name" which is typically the same as "Issue to").&lt;BR /&gt;Since Google Chrome v58, &lt;A href="https://www.chromestatus.com/feature/4981025180483584" target="_blank" rel="noopener"&gt;this falling back behavior is dropped&lt;/A&gt;. So if an SAN does not match URL, or SAN does not exist at all,&amp;nbsp;&lt;FONT face="courier new,courier"&gt;ERR_CERT_COMMON_NAME_INVALID&lt;/FONT&gt; error will happen.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Recommendation:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;Use the FQDN which align with the certificate&lt;/LI&gt;
&lt;LI&gt;Acquire a new certificate to include the appropriate SAN to match the URL which users will use to access Qlik Sense&lt;/LI&gt;
&lt;LI&gt;Have TLS versions/ciphers up to date. See&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Knowledge-Base/SSL-amp-TLS-Support-in-QlikView-How-to-configure-QlikView-and/ta-p/1714057" target="_self"&gt;SSL &amp;amp; TLS Support in QlikView - How to configure QlikView and TLS &lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Cause:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The FQDN does not align with the certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Related Content:&lt;/H3&gt;
&lt;P&gt;&lt;A href="https://community.qlik.com/t5/Qlik-Support-Updates-Blog/Qlik-Sense-Hub-and-QMC-with-a-custom-SSL-certificate/ba-p/1608077" target="_blank" rel="noopener"&gt;Qlik Sense Hub and QMC with custom SSL certificate&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://community.qlik.com/t5/Qlik-Support-Knowledge-Base/How-to-Change-the-certificate-used-by-the-Qlik-Sense-Proxy-to-a/ta-p/1712773" target="_blank" rel="noopener"&gt;How to: Change the certificate used by the Qlik Sense Proxy to a custom third party certificate&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.qlik.com/t5/Qlik-Support-Knowledge-Base/Qlik-Sense-Compatibility-information-for-third-party-SSL/ta-p/1715975" target="_blank" rel="noopener"&gt;Qlik Sense: Compatibility information for third-party SSL certificates to use with HUB/QMC&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.qlik.com/t5/Qlik-Support-Knowledge-Base/Requirements-for-configuring-Qlik-Sense-with-SSL/ta-p/1715916" target="_blank" rel="noopener"&gt;Requirements for configuring Qlik Sense with SSL&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.qlik.com/t5/Qlik-Support-Knowledge-Base/Couldn-t-find-a-valid-ssl-certificate-with-thumbprint-and-the/ta-p/1715455" target="_blank" rel="noopener"&gt;Qlik Sense: Couldn't find a valid ssl certificate with thumbprint in Proxy logs, the third party certificate is not used correctly&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 16 Apr 2021 11:36:48 GMT</pubDate>
    <dc:creator>Anonymous</dc:creator>
    <dc:date>2021-04-16T11:36:48Z</dc:date>
    <item>
      <title>ERR_CERT_COMMON_NAME_INVALID when using 3rd party certificate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/ERR-CERT-COMMON-NAME-INVALID-when-using-3rd-party-certificate/ta-p/1715606</link>
      <description>&lt;P&gt;Qlik Sense Enterprise for Windows will by default use a self-signed certificate to allow for the use of HTTPS when accessing the Management Console (QMC) or the Hub.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;QlikView will always use HTTP by default, but a 3rd party certificate can be installed to enable HTTPS. See&amp;nbsp;&lt;SPAN class="lia-message-read"&gt;&lt;A href="https://community.qlik.com/t5/Qlik-Support-Updates-Blog/QlikView-AccessPoint-and-QMC-with-HTTPS-and-a-custom-SSL/ba-p/1609779" target="_blank" rel="noopener"&gt;QlikView AccessPoint and QMC with HTTPS and a custom SSL certificate.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In Qlik Sense, this self-signed certificate will lead to&amp;nbsp;&lt;/SPAN&gt;browsers showing "&lt;STRONG&gt;Not Secure&lt;/STRONG&gt;" as in this screenshot:&lt;BR /&gt;&lt;BR /&gt;&lt;IMG src="https://qlik.my.salesforce.com/servlet/servlet.ImageServer?id=015D0000006AInd&amp;amp;oid=00D20000000IGPX&amp;amp;lastMod=1539600094000" border="0" alt="User-added image" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;After implementing a 3rd party or private CA certificate, the QMC and Hub will begin to show the connection as "&lt;STRONG&gt;Secure&lt;/STRONG&gt;":&lt;BR /&gt;&lt;BR /&gt;&lt;IMG src="https://qlik.my.salesforce.com/servlet/servlet.ImageServer?id=015D0000006AIni&amp;amp;oid=00D20000000IGPX&amp;amp;lastMod=1539600150000" border="0" alt="User-added image" /&gt;&lt;BR /&gt;&lt;BR /&gt;If the client implements the new certificate and still receives the error&amp;nbsp;&lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;ERR_CERT_COMMON_NAME_INVALID&lt;/STRONG&gt;&lt;/FONT&gt;, it is possible that the expected domain in the certificate and the domain listed in the URL do not match.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;IMG src="https://qlik.my.salesforce.com/servlet/servlet.ImageServer?id=015D0000006AIns&amp;amp;oid=00D20000000IGPX&amp;amp;lastMod=1539600198000" border="0" alt="User-added image" /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Qlik Sense Enterprise all versions&lt;/LI&gt;
&lt;LI&gt;QlikView all versions&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Resolution:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;&lt;STRONG&gt;Unsupported TLS version or ciphers?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Verify that the Windows Server hosting QlikView does not have obsolete TLS versions installed which the browser does not support.&lt;/P&gt;
&lt;H4&gt;&lt;BR /&gt;&lt;STRONG&gt;Does the URL match the certificate?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Check that the URL being used and ensure that it matches the Fully Qualified Domain Name (FQDN) issued to the certificate.&lt;BR /&gt;&lt;BR /&gt;For example, if a certificate is issued to &lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;qliksense.company.com&lt;/STRONG&gt;&lt;/FONT&gt;, users can still access the QMC / Hub using the server name only (&lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;qliksense&lt;/STRONG&gt;&lt;/FONT&gt;) but the web browser will produce a warning about a mismatch between &lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;qliksense/hub/&lt;/STRONG&gt; &lt;/FONT&gt;and &lt;FONT face="courier new,courier"&gt;&lt;STRONG&gt;qliksense.company.com/hub/&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;In Qlik Sense, if you are concerned about whether a certificate is correctly bound, then inspect the &lt;FONT face="courier new,courier"&gt;Security_Proxy log in C:\ProgramData\Qlik\Sense\Log\Proxy\Trace&lt;/FONT&gt;. An example of a success binding of a certificate to the Proxy will look like:&lt;/P&gt;
&lt;DIV&gt;&lt;FONT face="courier new,courier"&gt;Domain\qs_admin&amp;nbsp;&amp;nbsp; &amp;nbsp;Set certificate 'CN=&lt;STRONG&gt;*.company.com&lt;/STRONG&gt;, OU=PremiumSSL Wildcard, O=ACME, STREET="88 Broadway, Bldg 14", L=New York, S=ON, PostalCode=90213, C=CA' (D09777777738C5A799999994F9555AFF588888)&lt;/FONT&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Does the Subject Alternative Name match?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Another important cause of this error is: the URL used in the browser does not match "Subject Alternative Name" in the certificate.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;IMG src="https://qlik.my.salesforce.com/servlet/servlet.ImageServer?id=015D0000006AIo2&amp;amp;oid=00D20000000IGPX&amp;amp;lastMod=1539600255000" border="0" alt="User-added image" /&gt;&lt;/P&gt;
&lt;P&gt;In most browsers, when verifying the website's identity, &lt;FONT face="courier new,courier"&gt;SubjectAlternativeName(SAN)&lt;/FONT&gt; is used first. If absent, then it falls back to Subject (or known as "Common Name" which is typically the same as "Issue to").&lt;BR /&gt;Since Google Chrome v58, &lt;A href="https://www.chromestatus.com/feature/4981025180483584" target="_blank" rel="noopener"&gt;this falling back behavior is dropped&lt;/A&gt;. So if an SAN does not match URL, or SAN does not exist at all,&amp;nbsp;&lt;FONT face="courier new,courier"&gt;ERR_CERT_COMMON_NAME_INVALID&lt;/FONT&gt; error will happen.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Recommendation:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;Use the FQDN which align with the certificate&lt;/LI&gt;
&lt;LI&gt;Acquire a new certificate to include the appropriate SAN to match the URL which users will use to access Qlik Sense&lt;/LI&gt;
&lt;LI&gt;Have TLS versions/ciphers up to date. See&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Knowledge-Base/SSL-amp-TLS-Support-in-QlikView-How-to-configure-QlikView-and/ta-p/1714057" target="_self"&gt;SSL &amp;amp; TLS Support in QlikView - How to configure QlikView and TLS &lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Cause:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The FQDN does not align with the certificate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Related Content:&lt;/H3&gt;
&lt;P&gt;&lt;A href="https://community.qlik.com/t5/Qlik-Support-Updates-Blog/Qlik-Sense-Hub-and-QMC-with-a-custom-SSL-certificate/ba-p/1608077" target="_blank" rel="noopener"&gt;Qlik Sense Hub and QMC with custom SSL certificate&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://community.qlik.com/t5/Qlik-Support-Knowledge-Base/How-to-Change-the-certificate-used-by-the-Qlik-Sense-Proxy-to-a/ta-p/1712773" target="_blank" rel="noopener"&gt;How to: Change the certificate used by the Qlik Sense Proxy to a custom third party certificate&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.qlik.com/t5/Qlik-Support-Knowledge-Base/Qlik-Sense-Compatibility-information-for-third-party-SSL/ta-p/1715975" target="_blank" rel="noopener"&gt;Qlik Sense: Compatibility information for third-party SSL certificates to use with HUB/QMC&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.qlik.com/t5/Qlik-Support-Knowledge-Base/Requirements-for-configuring-Qlik-Sense-with-SSL/ta-p/1715916" target="_blank" rel="noopener"&gt;Requirements for configuring Qlik Sense with SSL&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.qlik.com/t5/Qlik-Support-Knowledge-Base/Couldn-t-find-a-valid-ssl-certificate-with-thumbprint-and-the/ta-p/1715455" target="_blank" rel="noopener"&gt;Qlik Sense: Couldn't find a valid ssl certificate with thumbprint in Proxy logs, the third party certificate is not used correctly&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 11:36:48 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/ERR-CERT-COMMON-NAME-INVALID-when-using-3rd-party-certificate/ta-p/1715606</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2021-04-16T11:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: ERR_CERT_COMMON_NAME_INVALID when using 3rd party certificate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/ERR-CERT-COMMON-NAME-INVALID-when-using-3rd-party-certificate/tac-p/1731183#M437</link>
      <description>&lt;P&gt;How would you resolve this same error in QlikView environment?&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jul 2020 21:06:57 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/ERR-CERT-COMMON-NAME-INVALID-when-using-3rd-party-certificate/tac-p/1731183#M437</guid>
      <dc:creator>BrunPierre</dc:creator>
      <dc:date>2020-07-27T21:06:57Z</dc:date>
    </item>
    <item>
      <title>Re: ERR_CERT_COMMON_NAME_INVALID when using 3rd party certificate</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/ERR-CERT-COMMON-NAME-INVALID-when-using-3rd-party-certificate/tac-p/1732014#M466</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/16737"&gt;@BrunPierre&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The error is universal and by itself not connected to Qlik Sense.&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;Check that the URL being used and ensure that it matches the Fully Qualified Domain Name (FQDN) issued to the certificate." applies regardless of what product (Qlik Sense, QlikView, or any other product using a certificate not even related to Qlik) is being used.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I will rewrite the article to reflect this.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2020 10:31:34 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/ERR-CERT-COMMON-NAME-INVALID-when-using-3rd-party-certificate/tac-p/1732014#M466</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2020-07-30T10:31:34Z</dc:date>
    </item>
  </channel>
</rss>

