Polycom (RMX) 1500 User Manual

Page of 1183
RealPresence Collaboration Server (RMX) 1500/1800/2000/4000 Administrator’s Guide 
Polycom®, Inc. 
933
Certificate Template Requirements
The specific security certificate requirements for Collaboration Servers used in Maximum Security 
Environments
 are: 
● Support of 2048-bit encryption keys.
● Support of Extended Key Usage (EKU) for both:
Client Authentication 
Server Authentication
The certificate template used by your CA server may need modification to meet the Collaboration Server 
requirements.
Certificate Requirements
Secure Mode
Table 5-126 on page 5-10 summarizes certificate requirements depending on the Skip certificate validation 
for user logging session
 field. 
Ultra Secure Mode
In Ultra Secure Mode, each Polycom device must have security certificates for the entire 
Chain Of Trust.
The Collaboration Server must have:
● The public certificate of each server in the CA Chain or hierarchy that issued its certificate.
For example: RootCA 
 IntermediateCA  SubCA
The public certificates of the chain that issued the administrator’s identity certificate. For example: 
UserRootCA 
  UserIntermediateCA  UserSubCA
For more information seethe Ultra Secure Mode chapter, 
  and 
Configure Certificate Management
Within a PKI environment, certificate revocation policies are used to ensure that certificates are valid. 
Certificates can expire or be revoked for various reasons (RFC 5280).
The Collaboration Server enforces these certificate revocation policies through Certificate Revocation Lists 
(CRLs). CRLs are required for each CA Chain in use by the Collaboration Server. These CRL files must be 
kept current. For more information see the Ultra Secure Mode chapter, 
  and 
Switching to Secure Mode
The following operations are required to switch the Collaboration Server to Secure Mode:
● Purchase and Install the SSL/TLS certificate
● Modify the Management Network settings
● Create/Modify the relevant System Flags