0007: Creating and Applying SSL Certificate to Apache HTTPD
This commit is contained in:
parent
94a5fa196f
commit
1dc0f14d2e
1 changed files with 75 additions and 113 deletions
188
0007.html
188
0007.html
|
@ -33,9 +33,13 @@
|
|||
$(document).on('click','input.copy-text',function(){
|
||||
theButton = $(this);
|
||||
$('input.copy-text').attr('src','images/clipboard.png');
|
||||
$('span.copy-animation').removeClass('copy-animation');
|
||||
$('span.copy-animation,span.copy-animation-ps').removeClass('copy-animation copy-animation-ps');
|
||||
try {
|
||||
$('#'+ theButton.attr('rel')).addClass('copy-animation');
|
||||
if($('#'+ theButton.attr('rel')).parent('div').hasClass('PS')){
|
||||
$('#'+ theButton.attr('rel')).addClass('copy-animation-ps');
|
||||
} else {
|
||||
$('#'+ theButton.attr('rel')).addClass('copy-animation');
|
||||
}
|
||||
navigator.clipboard.writeText(theButton.data('clipboard-text').replace(/<[^>]*>?/gm, ''));
|
||||
theButton.attr('src','images/clipboard_active.png');
|
||||
} catch(err) {
|
||||
|
@ -57,8 +61,8 @@
|
|||
});
|
||||
|
||||
if(window.self !== window.top){
|
||||
window.parent.$('iframe.stepsFrame').height((this['scrollingElement']['scrollHeight']+20) +'px');
|
||||
}
|
||||
window.parent.$('iframe.stepsFrame').height((this['scrollingElement']['scrollHeight']+20) +'px');
|
||||
}
|
||||
});
|
||||
</script>
|
||||
<link href="css/steps.css" rel="stylesheet" type="text/css" />
|
||||
|
@ -71,122 +75,80 @@
|
|||
</div>
|
||||
<div></div>
|
||||
<div id="content">
|
||||
<h2>
|
||||
Create Your SSL Certificate</h2>
|
||||
<h2>Create Your SSL Certificate</h2>
|
||||
|
||||
<ol>
|
||||
<li>
|
||||
Launch XCA</li>
|
||||
<li>
|
||||
Open the PKI database if it is not already (File > Open DataBase), enter password</li>
|
||||
<li>
|
||||
Click on the Certificates tab, right click on your Intermediate CA certificate</li>
|
||||
<li>
|
||||
Select New</li>
|
||||
<li>
|
||||
On the Source tab, make sure Use this Certificate for signing is selected</li>
|
||||
<li>
|
||||
Verify your Intermediate CA certificate is selected from the drop down</li>
|
||||
<li>
|
||||
Click the Subject tab</li>
|
||||
<li>
|
||||
Complete the Distinguished Name section
|
||||
<p>
|
||||
internalName: WebDev SSL<br />
|
||||
countryName: US<br />
|
||||
stateOrProvinceName: Virginia<br />
|
||||
localityName: Northern<br />
|
||||
organizationName: i12bretro<br />
|
||||
organizationUnitName: i12bretro Certificate Authority<br />
|
||||
commonName: webdev.i12bretro.local</p>
|
||||
<li>Launch XCA</li>
|
||||
<li>Open the PKI database if it is not already (File > Open DataBase), enter password</li>
|
||||
<li>Click on the Certificates tab, right click on your Intermediate CA certificate</li>
|
||||
<li>Select New</li>
|
||||
<li>On the Source tab, make sure Use this Certificate for signing is selected</li>
|
||||
<li>Verify your Intermediate CA certificate is selected from the drop down</li>
|
||||
<li>Click the Subject tab</li>
|
||||
<li>Complete the Distinguished Name section
|
||||
<p>internalName: WebDev SSL<br />
|
||||
countryName: US<br />
|
||||
stateOrProvinceName: Virginia<br />
|
||||
localityName: Northern<br />
|
||||
organizationName: i12bretro<br />
|
||||
organizationUnitName: i12bretro Certificate Authority<br />
|
||||
commonName: webdev.i12bretro.local</p>
|
||||
</li>
|
||||
<li>
|
||||
Click the Generate a New Key button</li>
|
||||
<li>
|
||||
Enter a name and set the key size to at least 2048</li>
|
||||
<li>
|
||||
Click Create</li>
|
||||
<li>
|
||||
Click on the Extensions tab</li>
|
||||
<li>
|
||||
Select End Entity from the type list</li>
|
||||
<li>
|
||||
Click Edit next to Subject Alternative Name</li>
|
||||
<li>
|
||||
Add any DNS or IP addresses that the certificate will identify</li>
|
||||
<li>
|
||||
Update the validity dates to fit your needs</li>
|
||||
<li>
|
||||
Click the Key Usage tab</li>
|
||||
<li>
|
||||
Under Key Usage select Digital Signature, Key Enchiperment</li>
|
||||
<li>
|
||||
Under Extended Key Usage select Web Server and Web Client Authentication</li>
|
||||
<li>
|
||||
Click the Netscape tab</li>
|
||||
<li>
|
||||
Select SSL Server</li>
|
||||
<li>
|
||||
Click OK to create the certificate</li>
|
||||
<li>Click the Generate a New Key button</li>
|
||||
<li>Enter a name and set the key size to at least 2048</li>
|
||||
<li>Click Create</li>
|
||||
<li>Click on the Extensions tab</li>
|
||||
<li>Select End Entity from the type list</li>
|
||||
<li>Click Edit next to Subject Alternative Name</li>
|
||||
<li>Add any DNS or IP addresses that the certificate will identify</li>
|
||||
<li>Update the validity dates to fit your needs</li>
|
||||
<li>Click the Key Usage tab</li>
|
||||
<li>Under Key Usage select Digital Signature, Key Enchiperment</li>
|
||||
<li>Under Extended Key Usage select Web Server and Web Client Authentication</li>
|
||||
<li>Click the Netscape tab</li>
|
||||
<li>Select SSL Server</li>
|
||||
<li>Click OK to create the certificate</li>
|
||||
</ol>
|
||||
<h2>
|
||||
Exporting Required Files</h2>
|
||||
|
||||
<h2>Exporting Required Files</h2>
|
||||
|
||||
<ol>
|
||||
<li>
|
||||
In XCA, click on the Certificates tab</li>
|
||||
<li>
|
||||
Right click the Intermediate CA certificate > Export > File</li>
|
||||
<li>
|
||||
Set the file name with a .crt extension and verify the export format is PEM chain (*.pem)</li>
|
||||
<li>
|
||||
Click OK</li>
|
||||
<li>
|
||||
Right click the SSL certificate > Export > File</li>
|
||||
<li>
|
||||
Set the file name with a .crt extension and verify the export format is PEM (*.crt)</li>
|
||||
<li>
|
||||
Click OK</li>
|
||||
<li>
|
||||
Click the Private Keys tab</li>
|
||||
<li>
|
||||
Right click the private key generated for the SSL certificate > Export > File</li>
|
||||
<li>
|
||||
Set the file name with a .key extension and verify the export format is PEM private (*.pem)</li>
|
||||
<li>
|
||||
Click OK</li>
|
||||
<li>In XCA, click on the Certificates tab</li>
|
||||
<li>Right click the Intermediate CA certificate > Export > File</li>
|
||||
<li>Set the file name with a .crt extension and verify the export format is PEM chain (*.pem)</li>
|
||||
<li>Click OK</li>
|
||||
<li>Right click the SSL certificate > Export > File</li>
|
||||
<li>Set the file name with a .crt extension and verify the export format is PEM (*.crt)</li>
|
||||
<li>Click OK</li>
|
||||
<li>Click the Private Keys tab</li>
|
||||
<li>Right click the private key generated for the SSL certificate > Export > File</li>
|
||||
<li>Set the file name with a .key extension and verify the export format is PEM private (*.pem)</li>
|
||||
<li>Click OK</li>
|
||||
</ol>
|
||||
<h2>
|
||||
Setting Up Apache For SSL</h2>
|
||||
|
||||
<h2>Setting Up Apache For SSL</h2>
|
||||
|
||||
<ol>
|
||||
<li>
|
||||
Navigate to <apacheinstalldir>/conf</apacheinstalldir></li>
|
||||
<li>
|
||||
Create a certs directory if it does not exist</li>
|
||||
<li>
|
||||
Copy the exported SSL certificate, private key and certificate chain files to <apacheinstalldir>/conf/certs</apacheinstalldir></li>
|
||||
<li>
|
||||
Edit <apacheinstalldir>/conf/httpd.conf</apacheinstalldir></li>
|
||||
<li>
|
||||
At the bottom of the file add a VirtualHost block<br />
|
||||
<p>
|
||||
Listen 443<br />
|
||||
<virtualhost :443=""><br />
|
||||
SSLEngine on<br />
|
||||
SSLProtocol -All +TLSv1.2 +TLSv1.3<br />
|
||||
SSLCipherSuite HIGH:!aNULL:!MD5<br />
|
||||
SSLCertificateFile <apacheinstalldir>/conf/certs/<ssl cert="">.crt<br />
|
||||
SSLCertificateKeyFile <apacheinstalldir>/conf/certs/<private key="">.key<br />
|
||||
SSLCertificateChainFile <apacheinstalldir>/conf/certs/<cert chain="">.crt</cert></apacheinstalldir></private></apacheinstalldir></ssl></apacheinstalldir></virtualhost></p>
|
||||
<li>Navigate to <apacheinstalldir>/conf</apacheinstalldir></li>
|
||||
<li>Create a certs directory if it does not exist</li>
|
||||
<li>Copy the exported SSL certificate, private key and certificate chain files to <apacheinstalldir>/conf/certs</apacheinstalldir></li>
|
||||
<li>Edit <apacheinstalldir>/conf/httpd.conf</apacheinstalldir></li>
|
||||
<li>At the bottom of the file add a VirtualHost block
|
||||
<p>Listen 443<br />
|
||||
<virtualhost :443><br />
|
||||
SSLEngine on<br />
|
||||
SSLProtocol -All +TLSv1.2 +TLSv1.3<br />
|
||||
SSLCipherSuite HIGH:!aNULL:!MD5<br />
|
||||
SSLCertificateFile /conf/certs/%ssl.crt file%<br />
|
||||
SSLCertificateKeyFile /conf/certs/%ssl.key file%<br />
|
||||
SSLCertificateChainFile /conf/certs/%ssl-chain.crt file%<br />
|
||||
</virtualhost></p>
|
||||
</li>
|
||||
<li>
|
||||
Restart the Apache Service</li>
|
||||
<li>
|
||||
Open a web browser</li>
|
||||
<li>
|
||||
Navigate to https://<dnsorip>> from your certificate</dnsorip></li>
|
||||
<li>
|
||||
Click the lock and select view certificate</li>
|
||||
<li>
|
||||
Validate the certificate and certificate chain being presented by Apache HTTPD</li>
|
||||
<li>Restart the Apache Service</li>
|
||||
<li>Open a web browser</li>
|
||||
<li>Navigate to https://DNSorIP from your certificate</li>
|
||||
<li>Click the lock and select view certificate</li>
|
||||
<li>Validate the certificate and certificate chain being presented by Apache HTTPD</li>
|
||||
</ol>
|
||||
</div>
|
||||
</div>
|
||||
|
|
Loading…
Add table
Reference in a new issue