Certificate Error Windows Mobile 6.5
SQL Server 2014 Express resources Windows Server 2012 resources Programs MSDN subscriptions Overview Benefits Administrators Students Microsoft Imagine Microsoft Student Partners ISV Startups TechRewards Events Community Magazine Forums Blogs Channel 9 Documentation APIs and reference Dev centers Retired content Samples We’re sorry. The content you requested has been removed. You’ll be auto redirected in 1 second. Ask a question Quick access Forums home Browse forums users FAQ Search related threads Remove From My Forums Answered by: SSL Certificate issue on Windows Mobile 6.5 Smart Device Development > Windows Mobile Development Question 0 Sign in to vote We have a set of Motorola MC55s (running Windows Mobile 6.5) that are getting the following error when trying to connect to a web page (on Windows Server 2008r2) with via HTTPS ( this is using IE on the mobile device connected through a windows desktop via USB cradle). The certificate works fine on a desktop browser. Clicking Yes, will get you to the page, but getting SSL to work on the mobile devices without warnings is a requirement. The warning clearly seems to indicate that the certificate needs to be installed. I used Windows Mobile SSLChainSaver.exe to get the certs onto a local workstation, copied them to the MC55 and clicked on each one to install them. The certificates seem to get installed OK, and they show up in the certificate store (one in the root tab, two in the Intermediate tab). I "viewed" them to make sure they match what I see when I examine the certificate chain in a Desktop Browser. I've also used IE on the desktop to "manually" export the certificates and copy them over to the device. Still, no matter what I do, I cannot get the certificate to work on pocket IE without the above warning. (Even though the warning message seems to indicate that it isn't the problem)... I've also verified (many times) that the date & time are set correctly and have made sure that the URL used matches what was issued on the certificate. I've done all of this on multiple devices(all MC55s)and from multiple PC
MX Player Adaway ViPER4Android Audio FX Official XDA App All Apps & Games XDA Assist ANALYSIS Editorials & Opinion Analysis Mediatek Officially Unveils the 10 nm Helio X30 and 16 nm Helio P25Android Gaming Graphics at a Standstill: What Is Holding Us Back, and the Path ForwardBetrayal of Hype: Playing Fast and Loose with Release Dates Breeds Consumer MistrustHow Allo and Duo Want to Complicate Messaging by Fracturing the MarketAllo’s Shortcomings Seriously Limit Adoption and Potential in a Competitive Market Opinion The OnePlus 3 and Axon 7 Show Affordable Phones Don’t https://social.msdn.microsoft.com/Forums/en-US/5d25f48d-7513-4e1e-9c3c-3b195fc14e2a/ssl-certificate-issue-on-windows-mobile-65?forum=windowsmobiledev Have to Come at the Cost of Software UpdatesAndroid Gaming Graphics at a Standstill: What Is Holding Us Back, and the Path ForwardBetrayal of Hype: Playing Fast and Loose with Release Dates Breeds Consumer MistrustHow Allo and Duo Want to Complicate Messaging by Fracturing the MarketAllo’s Shortcomings Seriously Limit Adoption and Potential in a Competitive Market Developments MechDome is a Developer Tool that Automatically http://forum.xda-developers.com/showthread.php?t=720782 Converts Android Apps into iOS and OSX AppsMore than a Meme: Google uses TheVerge.com to Benchmark Nexus DevicesMoto Z Receives Official TWRP SupportMozilla is Removing Firefox OS code from the Gecko EngineSuperSU Privacy Policy Updated Under CCMT Discuss The OnePlus 3 and Axon 7 Show Affordable Phones Don’t Have to Come at the Cost of Software UpdatesWhat Features Do You Want on Google Apps on Android?Compilation: OnePlus September Software Edition AMAHow Important are Water/Dust Resistance and General Phone Durability to You?What Are Your Thoughts on Google Allo? Xda news EU Plans to Fine Google for Anti-Competitive Android PracticesThe OnePlus 3 and Axon 7 Show Affordable Phones Don’t Have to Come at the Cost of Software UpdatesA New Place To Talk Anonymously About Controversial TopicsMechDome is a Developer Tool that Automatically Converts Android Apps into iOS and OSX AppsGoogle Reportedly Wants OEMs to Integrate Google Home in Products LOGIN Jump back in Remember Me? Forgot your password? REGISTER Takes just a sec! search plus search plus Forums Honor 8BLU R1 HDSamsung Galaxy Note 7OnePlus 3ZTE Axon 7 Analysis EU Plans to Fine Google for Anti-Competitive Android PracticesThe OnePlus 3 and Axon 7 Sho
March 4, 2014 FAQ's 4 1018 Welcome peeps, today we're getting a little bit technical but on an issue that is potentially on every Windows http://blog.ruggedandmobile.com/how-tos/faqs/what-to-do-when-your-windows-mobile-root-certificate-expires/ Mobile device, so quite topical! As you know, mobile devices are pretty http://www.confusedamused.com/notebook/installing-windows-mobile-60-root-certificates much useless these days unless they're connecting and sending or receiving all kinds of updates throughout their working day. In the field this is done over 3G or Wifi but largely unsecured networks where SSL and encryption is certainly required. Root certificates are the standard secure certificate error SSL certificates that are used by all kinds of apps to enable this functionality without having to install your own costly certificates and Windows Mobile devices have many root certificates installed by many providers. On 28/01/2014 Global Signs certificates expired and we found on every Windows mobile 6.1 and 6.5 device that we checked today, this was the same certificate error windows so essentially if your app uses this companies root certificate, then you need to update it. Here's how! 1. First download the refreshed certificate here: https://www.globalsign.com/support/Root-R1.cer 2. Copy the file you saved onto the handheld, make sure it has a .cer ending. 3. On the handheld, open it up in file explorer and install it by double tapping it. 4. Now using a registry editor program (We use Remote registry editor via active sync on a pc), navigate to KEY_LOCAL_MACHINECommSecuritySystemCertificatesRootCertificates 5. Delete the folder called 2F173F7DE99667AFA57AF80AA2D1B12FAC830338. This will remove the old expired cert from the cert store and your app will now use the new version you've installed which will allow a connection to function securely and properly. For many this won't be an issue but we have had a few users using apps that have sprung up the dreaded error message. As always get in touch if you need any more help! www.ruggedandmobile.com Share this:Click to share on Google+ (Opens in new window)Click to share on Pinterest (Opens in new window)Click to share on F
and everything worked well with browsers automatically trusting the certificate... and then we picked up a Windows Mobile 6.0 device from Verizon. For whatever reason, Verizon or Microsoft has decided this particular CA was not trustworthy and isn't in the default list, so ActiveSync fails to connect to the Exchange server. Fortunately, we can force the device to trust the certificate. Windows Mobile 6.0 brought a change in how to install certificates. Users cannot install a certificate into the root certificates store on a phone unless the certificate is self-signed. This ensures that only true root certificates exist in the root store. The pain here is that when you try installing a certificate such as the one used to secure Outlook Web Access it gets dumped in the personal store, and ActiveSync won’t connect because it can’t verify the certificate authority associated with the certificate. The solution is to get the certificate authority’s self-signed certificate into the root store. We can do this with the following steps: 1. Open Internet Explorer and navigate to the site securing OWA. Click the lock next to the address bar. ![C 00](http://www.confusedamused.com/wp-content/uploads/2007/10/c-001.png) 2. Click the **View Certificates** link. ![C 01](http://www.confusedamused.com/wp-content/pictures/2007/10/c-01.png) 3. Click the **Certification Path** tab at the top. ![C 02](http://www.confusedamused.com/wp-content/pictures/2007/10/c-02.png) 4. Click the top certificate name first (the root CA) and then click **View Certificate**. ![C 03](http://www.confusedamused.com/wp-content/pictures/2007/10/c-03.png) 5. Click the **Details** tab. ![C 04](http://www.confusedamused.com/wp-content/pictures/2007/10/c-04.png) 6. Click the **Copy to File…** button. ![C 05](http://www.confusedamused.com/wp-content/pictures/2007/10/c-05.png) 7. Click **Next** to start the Certificate Export Wizard. ![C 06](http://www.confusedamused.com/wp-content/pictures/2007/10/c-06.png) 8. Click **Next** to export the certificate as a