Password Manager

%3CLINGO-SUB%20id%3D%22lingo-sub-1207016%22%20slang%3D%22en-US%22%3EPassword%20Manager%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1207016%22%20slang%3D%22en-US%22%3E%3CP%20class%3D%22%22%3EI%20have%20installed%20the%20new%20Edge%20(Version%2079.0.309.71%20(Official%20build)%20(64-bit))%20and%20am%20having%20trouble%20with%20the%20password%20manager%20and%20self-signed%20certs.%3C%2FP%3E%3CP%20class%3D%22%22%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBackground%3A%3C%2FP%3E%3CP%20class%3D%22%22%3EI%20am%20a%20network%20admin%20for%20a%20large%20college%20and%20need%20to%20access%20a%20large%20number%20of%20internal%20web-based%20management%20portals.%20Because%20we%20are%20a%20public%20education%20institution%20we%20don't%20have%20tens%20of%20thousands%20of%20%24%20for%20the%20hundreds%20of%20individual%20certificates%20so%20we%20bought%20a%20single%20wildcard%20certificate%20(*.mycollege.edu).%20This%20has%20worked%20for%20most%20of%20our%20internal%20servers%2C%20the%20exception%20being%20Cisco%20Unified%20Communication%20Servers%20that%20do%20not%20allow%20wildcard%20certificates.%20For%20those%20servers%20we%20simply%20generate%20self-signed%20certificates%20and%20then%20import%20those%20into%20the%20trusted%20root%20on%20all%20college%20owned%20pc's.%20That%20worked%20just%20fine%20in%20IE%2C%20legacy%20Edge%2C%20Firefox%20and%20Chrome.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIssue%3A%3C%2FP%3E%3CP%3EBut%20the%20password%20manager%20in%20the%20new%20Edge%20refuses%20to%20save%20or%20use%20previously%20saved%20usernames%20and%20passwords%20on%20these%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3Eweb%20portals%20that%20have%20self-signed%20certs%3C%2FSPAN%3E.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EClarifications%3A%3C%2FP%3E%3CP%3EThese%20servers%20are%20our%20own%20servers%20installed%20on%20our%20own%20hardware%20and%20reside%20on%20our%20own%20private%20management%20network.%20We%20know%20for%20a%20fact%20they%20are%20safe.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20self-signed%20certs%20are%20up%20to%20date%20and%20valid.%20When%20you%20click%20on%20%22Site%20Information%22%20in%20the%20address%20bar%20and%20then%20open%20the%20certificate%2C%20the%20cert%20has%20all%20valid%20information%20and%20the%20certificate%20status%20is%20OK%20but%20Edge%20still%20lists%20the%20cert%20as%20invalid%20in%20the%20address%20bar.%20Edge%20is%20wrong%2C%20the%20certs%20are%20valid%20just%20self-signed.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20realize%20that%20Cisco%20could%20fix%20this%20by%20allowing%20wildcard%20certs%20for%20their%20UCM%20web%20portals%20but%20I%20can%20still%20access%20them%20by%20allowing%20the%20security%20exception.%20Once%20I%20allow%20a%20security%20exception%20the%20password%20manager%20should%20work%20(IMHO).%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1207153%22%20slang%3D%22en-US%22%3ERe%3A%20Password%20Manager%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1207153%22%20slang%3D%22en-US%22%3EHi%2C%3CBR%20%2F%3Einstall%20the%20latest%20version%2C%20it's%20version%2080.0.361.62%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fedge%2Fbusiness%2Fdownload%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fedge%2Fbusiness%2Fdownload%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1207226%22%20slang%3D%22en-US%22%3ERe%3A%20Password%20Manager%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1207226%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F310193%22%20target%3D%22_blank%22%3E%40HotCakeX%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20installed%20that%20version%20but%20the%20issue%20still%20exists.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
New Contributor

I have installed the new Edge (Version 79.0.309.71 (Official build) (64-bit)) and am having trouble with the password manager and self-signed certs.

 

Background:

I am a network admin for a large college and need to access a large number of internal web-based management portals. Because we are a public education institution we don't have tens of thousands of $ for the hundreds of individual certificates so we bought a single wildcard certificate (*.mycollege.edu). This has worked for most of our internal servers, the exception being Cisco Unified Communication Servers that do not allow wildcard certificates. For those servers we simply generate self-signed certificates and then import those into the trusted root on all college owned pc's. That worked just fine in IE, legacy Edge, Firefox and Chrome.

 

Issue:

But the password manager in the new Edge refuses to save or use previously saved usernames and passwords on these web portals that have self-signed certs

 

Clarifications:

These servers are our own servers installed on our own hardware and reside on our own private management network. We know for a fact they are safe.

 

The self-signed certs are up to date and valid. When you click on "Site Information" in the address bar and then open the certificate, the cert has all valid information and the certificate status is OK but Edge still lists the cert as invalid in the address bar. Edge is wrong, the certs are valid just self-signed.

 

I realize that Cisco could fix this by allowing wildcard certs for their UCM web portals but I can still access them by allowing the security exception. Once I allow a security exception the password manager should work (IMHO).

2 Replies
Highlighted
Hi,
install the latest version, it's version 80.0.361.62
https://www.microsoft.com/en-us/edge/business/download


Highlighted

@HotCakeX 

 

I installed that version but the issue still exists.