Skip to content
DataMiner Dojo

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Search in posts
Search in pages
Log in
Menu
  • Updates & Insights
  • Questions
  • Learning
    • E-learning Courses
    • Tutorials
    • Open Classroom Training
    • Certification
      • DataMiner Fundamentals
      • DataMiner Configurator
      • DataMiner Automation
      • Scripts & Connectors Developer: HTTP Basics
      • Scripts & Connectors Developer: SNMP Basics
      • Visual Overview – Level 1
      • Verify a certificate
    • YouTube Videos
    • Solutions & Use Cases
      • Solutions
      • Use Case Library
    • Agility
      • Learn more about Agile
        • Agile Webspace
        • Everything Agile
          • The Agile Manifesto
          • Best Practices
          • Retro Recipes
        • Methodologies
          • The Scrum Framework
          • Kanban
          • Extreme Programming
        • Roles
          • The Product Owner
          • The Agile Coach
          • The Quality & UX Coach (QX)
      • Book your Agile Fundamentals training
      • Book you Kanban workshop
    • >> Go to DataMiner Docs
  • DevOps
    • About the DevOps Program
    • Sign up for the DevOps Program
    • DataMiner DevOps Support
    • Feature Suggestions
  • Downloads
  • Swag Shop
  • PARTNERS
    • Business Partners
    • Technology Partners
  • Contact
    • Sales, Training & Certification
    • DataMiner Support
    • Global Feedback Survey
  • >> Go to dataminer.services

Best practice for CN/SAN configuration of HTTPS certificates in a DataMiner Failover Pair

55 views17 hours agoFailover HTTPS SSL certificate
2
Joerg Stumpf [DevOps Advocate]217 21 hours ago 0 Comments

Hi dojo

I am configuring HTTPS on a DataMiner system running in a Failover pair (two Windows servers with a virtual/cluster IP). According to the documentation, wildcard certificates cannot be used, and each Agent must use a certificate that matches the hostname of the physical server — not the shared hostname or the virtual IP.

What is still unclear to me is the best practice for the CN/SAN configuration in this scenario:

  • Each DMA has its own hostname and IP (e.g. server1.domain.com → 10.1.1.1, server2.domain.com → 10.1.1.2)
  • There is also a virtual/shared IP (e.g. 10.1.1.3) that clients use to connect, since they should not need to know which node is currently active

My questions:

  1. What should be used as CN for each DMA’s certificate?
    (I assume the physical hostname, e.g. server1.domain.com, but I’d like confirmation.)
  2. What should be included in the SAN list?
    • Physical hostname?
    • Physical IP?
    • A common client-facing DNS alias (e.g. dataminer.domain.com)?
    • Should the virtual/shared IP ever be included in SAN, or is it strictly unsupported?
  3. Is there an official recommendation or proven pattern that ensures:
    • A client can always connect through a common entry point
    • HTTPS works without certificate errors after a failover
    • Both Agents remain compliant with DataMiner’s certificate requirements?

I want to make sure that the certificate setup fully aligns with DataMiner Failover architecture and avoids any unexpected behavior during switchover.

Thanks in advance for any guidance or examples!

Jeremiah Allen [SLC] [DevOps Advocate] Answered question 17 hours ago

1 Answer

  • Active
  • Voted
  • Newest
  • Oldest
1
Jeremiah Allen [SLC] [DevOps Advocate]991 Posted 17 hours ago 0 Comments

The recommended setup will require 2 certificates, 1 for each DMA in the pair. Each cert should contain SANs for server IP, server hostname, VIP, virtual hostname. DNS entries tying each hostname to its IP will need to exist.

Example certificates:

  • CN = dma-main.example.com
    • san:dns = dma-main.example.com
    • san:dns = dma-virtual.example.com
    • san:ip = 10.10.0.10
    • san:ip = 10.10.0.12
  • CN = dma-failover.example.com
    • san:dns = dma-failover.example.com
    • san:dns = dma-virtual.example.com
    • san:ip = 10.10.0.11
    • san:ip = 10.10.0.12

DNS Entries:

  • dma-main.example.com    10.10.0.10
  • dma-failover.example.com 10.10.0.11
  • dma-virtual.example.com  10.10.0.12

You would then configure the IIS binding on each DMA using its respective certificate. And configure the HTTPS tag in MaintenanceSettings.xml to point toward the server hostname (not virtual).

Clients connecting using the virtual hostname will always be routed to the online DMA. Also clients can still connect using the server hostname if necessary.

See Setting up HTTPS on a DMA

Jeremiah Allen [SLC] [DevOps Advocate] Edited answer 17 hours ago
Please login to be able to comment or post an answer.

My DevOps rank

DevOps Members get more insights on their profile page.

My user earnings

0 Dojo credits

Spend your credits in our swag shop.

0 Reputation points

Boost your reputation, climb the leaderboard.

Promo banner DataMiner DevOps Professiona Program
DataMiner Integration Studio (DIS)
Empower Katas
Privacy Policy • Terms & Conditions • Contact

© 2026 Skyline Communications. All rights reserved.

DOJO Q&A widget

Can't find what you need?

? Explore the Q&A DataMiner Docs

[ Placeholder content for popup link ] WordPress Download Manager - Best Download Management Plugin