![]() |
Copyright © Cloud Software Group, Inc. All Rights Reserved |
$ openssl genrsa -out asgserver01.key 1024The above command generates a 1024 bit long RSA private key and stores the private key file in the asgserver01.key file.As SSL is a PKI based encryption system, it requires a private key to reside on the server. The generated RSA private key asgserver01.key file is a digital file used to decrypt messages sent to the Apache HTTP server. This file has a public component that will be distributed (via a digital certificate file) to allow clients to encrypt messages before sending them to the server.$ openssl req -new -key asgserver01.key -out asgserver01.csrThis command retrieves the public key from the asgserver01.key key file and prompts the user to gather information to construct a Distinguished Name for your server's identity. Follow the prompts to enter the relevant information which will be incorporated into your certificate request including a Distinguished Name or a DN. Also enter a password that is used to encrypt the CSR.
This section explains the simplified approach of generating the keys and certificates by using the CA.pl (or CA.sh) script that is shipped with OpenSSL tool kit.The CA.pl (or CA.sh) script allows you to create your private Certificate Authority that you can use in turn to generate new private keys and certificates that are signed by your own private Certificate Authority. Use the CA.pl (perl) or CA.sh (shell) script that is shipped with OpenSSL.
3. Enter the following command (with the -newca parameter) to create a CA hierarchy:After you have created a hierarchy for your own Certificate Authority (CA), you can use the same CA.sh script to create the private key and certificate signing request.
3. Enter the following command (with the -newreq parameter) to create a new certificate request (CSR):CA.sh -newreq
4. Verify that the output of this command contains both the private key and the certificate signing request. The private key is written to the file newkey.pem and the certificate request is written to the file newreq.pem.
5. Enter the following command (with the -sign parameter) to have the certificate signing certificate request being signed by the CA:CA.sh -sign
The script expects the certificate request to be in the file newreq.pem. The new certificate is written to the file newcert.pem.
3. Enter the following command (with the -pkcs12 parameter) to create a PKCS#12 file:
ASG Server Demo Certificate is typically displayed in the browser list box. If you do not provide the ASG Server Demo Certificate argument, the name My Certificate is used by default.
![]() |
Copyright © Cloud Software Group, Inc. All Rights Reserved |