PDF(138.3 KB) View with Adobe Reader on a variety of devices
ePub(169.1 KB) View in various apps on iPhone, iPad, Android, Sony Reader, or Windows Phone
Mobi (Kindle)(253.5 KB) View on Kindle device or Kindle app on multiple devices
Updated:August 1, 2016
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes the feature that improves user experience and allows certificate deletion cluster wide.
Cisco recommends that you have knowledge of Cisco Unified Communication Manager (CUCM) vesion 11.0 and above.
This document is not restricted to specific software and hardware versions.
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.
There are certain certificates on CUCM and IM&P which are replicated transparently (without the Admin’s knowledge). This means that if a certificate is uploaded by the Admin on one server, it is pushed to the other servers within the cluster. This is done to support the Extension Mobility Cross Cluster (EMCC) feature.
Previously, in a huge cluster if there was a requirement to delete an unrequired certificate, the admin needed to login into each of the servers and delete the certificate manually. Additionally, if this is not done within a stipulated window, the deleted certificate might reappear because of the CertSync service that runs every 30 minutes, which ensures that the file system and certificate tables are in sync. To avoid this issue, customers today disable the CertSync service on all the nodes followed by certificate deletion on all the nodes. This makes the user experience very bad.
With the new feature enhancement such instances will not occur.
This feature ehancement to the certificate management provides you the ability to automatically delete a certificate from all the nodes in the cluster.
When a certificate is deleted from one node in the cluster, it will get deleted from all other nodes in the cluster.
On Cisco Call Manager, navigate to Cisco Unified OS Administration > Under Security > Certificate Management
Select the certificate which needs to be deleted. You will see this:
Once you click OK, these steps will take place:
1. The certificate will be deleted locally on the server.
2. If the certificate is deleted successfully, then the platform Event will be triggered. This platform event will be sent to all the servers in the cluster (CUCM and IM&P). The information present in the platform event is the unit type (CallManager, Tomcat or Phone-SAST) along with the name of the certificate (for example, RootCA.pem). The platform event gives us the ability to trigger the delete event cluster wide.
The Certificate delete operation is only applicable for these certificates:
CUCM IM& Presence
There is currently no verification procedure available for this configuration.
This section provides information you can use to troubleshoot your configuration.
If the certificates on the other nodes in the cluster are not deleted, collect these logs from RTMT, to troubleshoot this issue .
1. Event Viewer-Application Log
2. Event Viewer-System Log
3. IPT Platform CertMgr Logs
Jul 6 03:12:05 CM11 user 6 ilog_impl: Received request for platform-event (--no-wait platform-event-clusterwide-certificate-delete HOSTNAME=CM11Sub UNIT=tomcat-trust Type=certs-trust NAME=testcert.pem).
This log indicates that an event has been received by the other nodes in the cluster to delete the certificate testcert, when the certificate is deleted on one node.
From the certMgmt Logs for the delete operation:
This log shows that cert Mgmt has received the request for the deletion of the certificate certificate.pem in tomcat_trust: