Make sure that you have the correct format, I believe PKCS12/P12 works best.
Also, make sure that you are on a recent firmware as very old firmware may not support modern certificate methods.
If that doesn't help, please work with your Aruba partner or support to check what is wrong with the certificate that you upload.
------------------------------
Herman Robers
------------------------
If you have urgent issues, always contact your Aruba partner, distributor, or Aruba TAC Support. Check
https://www.arubanetworks.com/support-services/contact-support/ for how to contact Aruba TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or Aruba Networks.
In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
------------------------------
Original Message:
Sent: Oct 09, 2024 12:51 AM
From: Thanh Hai
Subject: How to get Public SSL certificate and import to Aruba IAP-303 for Captive Portal
I tried this method but the Aruba device always denied with error message about the certificate formatted not supported
Original Message:
Sent: Apr 19, 2024 02:29 AM
From: RickyWong168
Subject: How to get Public SSL certificate and import to Aruba IAP-303 for Captive Portal
I tested this method and confirmed work!
Original Message:
Sent: Mar 31, 2020 06:13 AM
From: Ronin101
Subject: How to get Public SSL certificate and import to Aruba IAP-303 for Captive Portal
Hi,
This is what i do with private CA (using openssl), you may get it done using public CA.
1) Generate CSR for FQDN of captive portal. (for example, the url of my captive portal is vc1.panda.internal, this should be resolvable by DNS of client devices)
2) Submit this CSR to CA (public/private)
3) CA will provide you (depending on the encoding format) probably a .crt file and .key file
4) These files can be opened in notepad. You will see begin certificate --- end certificate in .crt file and begin private key, end private key in .key file.
5) Combine both these files. Simply copy .key file content to .crt file like below
-----BEGIN CERTIFICATE-----
MIIDqzCCApOgAwIBAgIJAMmKxQ6aKcBzMA0GCSqGSIb3DQEBCwUAMHUxCzAJBgNV
upub3KvnMEtPMUHPs4GsmyhiL0TOjVcdWc2ScPgYrgcv/1Pcbh7qErQsd/q+iMYK
nNmUIlWCTIT1fQTdgqSq5uXFoNan3mpf06cyPESG1Q==
-----END CERTIFICATE-----
-----BEGIN RSA PRIVATE KEY-----
MIIEpQIBAAKCAQEAvw1jGLQcFOYExHQUUEhovsEwuVEvkcrBbJymvld+y3NhZMp6
OkeJrPtXItZRIt7PLS+a+iwJvlEKAWimmH9U4eSKRZAaK6t+fjrx2OzXMkcb8tDD
JP8KP/mR3bPuoQT8U8jGJUKqEdwa2mrgv4kW775fdAyOCri/vnrEOpk=
-----END RSA PRIVATE KEY-----
6) Go to maintenance window > Certificates. Select captive portal and format should be CER, upload the newly updated file, next you have to enter the password for private key, simply enter any password you like and upload.