Hi Chad,
There is no option to accept invalid certificates for Forms System or Process Repository Profiles. This will not be changing.
However, this information is not correct:
... then we were forced to switch back to using the machine name after opening a support case for a system outage. It was an unknown requirement to use either localhost, IP, or machine name (none of which a public authority will authorize) for your repository server configuration.
That didn't seem right to me as I use aliases for Forms repository profiles all the time. I just sanity checked again in a test environment with both System and Process Repository Profiles on Forms 11 Update 5 (version 11.0.2311.50564), and they work just fine with aliased Laserfiche Server addresses.
Could you please provide the support case number where you heard that? Something was likely either miscommunicated or misconstrued. Support may have wanted to switch the configuration to using the machine name for some troubleshooting simplification purpose to help resolve the outage, but it's certainly not a technical requirement for Forms repository profiles.
Accordingly, your options are:
- Go back to using that "forms.domain.com" alias, for which you have a valid certificate from a public CA.
- First verify there was not some other reason Support had you move away from that config, such as Kerberos issues that required setting specific SPNs, didn't work with aliases, etc.
- Issue a certificate for the machine FQDN from a private certificate authority, such as an AD Certificate Authority, which will have a root certificate trusted by machines on the AD domain. Blake Smith has a great writeup/video on this he's posted somewhere.
- [Least preferred] Create a self-signed certificate for the FQDN of the Laserfiche Server machine, bind it to port 443 (in IIS or through the "netsh" CLI command), and then add that self-signed certificate to the Trusted Root Certificates machine store of the Forms server.
Option 1 or 2 is the right way to do things. Option 3 is acceptable if there is no internal CA, no ability to create one for whatever reason, and the true machine FQDN rather than alias must be used for some reason unrelated to TLS between Forms and Laserfiche Server.
Re:
In a server to server environment we are not much concerned with certificate authorities since modifying the local DNS or Domain DNS requires so much access your already in deep water compared with modifying the DNS on a workstation or laptop. Also in server environments we can use the actual address instead of a domain name.
While "If an attacker is in a position to do X, Y isn't especially relevant because you've already lost" arguments can be valid, I wouldn't consider this a case where it cleanly applies. There are all sorts of DNS and privilege-escalation-to-DNS vulnerabilities that pop up with regularity that do not inherently mean an attacker is in a place to decrypt TLS traffic. If you don't validate the certificates, an attacker with DNS control can easily execute man/adversary-in-the-middle (MITM/AITM) attacks using their own certificate. It's a whole vulnerability class by itself:
More plainly:
Almost any time you're in a situation where there's an incomplete/broken CA / PKI / certificate implementation such that the requirements for both the encryption and authentication/trust parts of TLS aren't met, you should try to complete/fix the CA / PKI / certificate implementation before even contemplating downgrading the security environment by disabling critical aspects of TLS.
I have been involved in numerous different types of customer security audits covering everything from over a dozen different regulatory/compliance policies to cybersecurity insurance requirements, and none of them that have encryption in-transit requirements accept not validating certificates in TLS for good reason.
Not validating certificates falls under #2 Cryptographic Failures in the OWASP Top 10 Web Application Security Risks: A02 Cryptographic Failures - OWASP Top 10:2021 (Laserfiche Server and Forms are both web applications in this context, communicating over HTTP(S)) and falls under CWE-295: Improper Certificate Validation.
We know some older Laserfiche features still have an "Ignore certificate validation" option. Expect these to be removed, hidden, or at minimum un-defaulted as we continually move towards more secure defaults following modern application security standards.
I'm laying out these points on why certificate validation is critically important to provide the information to you and other readers, not debate them.