Oct 31, 2017

Generating a self-signed certificate using OpenSSL

To generate a self-signed SSL certificate using the OpenSSL, complete the following steps:
  1. Write down the Common Name (CN) for your SSL Certificate. The CN is the fully qualified name for the system that uses the certificate. If you are using Dynamic DNS, your CN should have a wild-card, for example: *.i88.ca. Otherwise, use the hostname or IP address set in your Gateway Cluster (for example. or it.i88.ca).
  2. Run the following OpenSSL command to generate your private key and public certificate. Answer the questions and enter the Common Name when prompted.
    openssl req -newkey rsa:2048 -nodes -keyout key.pem -x509 -days 365 -out certificate.pem

  3. Review the created certificate:
    openssl x509 -text -noout -in certificate.pem

  4. Combine your key and certificate in a PKCS#12 (P12) bundle:
     openssl pkcs12 -inkey key.pem -in certificate.pem -export -out certificate.p12

  5. Validate your P2 file.
    openssl pkcs12 -in certificate.p12 -noout -info

Post a Comment

Featured Post

Modern tar recognizes the file format

One command works with any supported compression method. tar xf archive.tar.xz tar xf archive.tar.gz tar xf archive.tar etc. ...