12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576 |
- <!DOCTYPE html>
- <html lang="en" xmlns="http://www.w3.org/1999/xhtml">
- <head>
- <title>Adding Self-Signed PKI to Windows Trusted Certificate Store</title>
- <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
- <meta charset="UTF-8">
- <meta name="keywords" content="PKI,Public Key Infrastructure,XCA,SSL,Web Server,OpenVPN,Certificates,Certificate Authority,Self-Signed,Tutorial">
- <meta name="author" content="i12bretro">
- <meta name="description" content="Adding Self-Signed PKI to Windows Trusted Certificate Store">
- <meta name="viewport" content="width=device-width, initial-scale=1.0">
- <link rel="icon" type="image/x-icon" href="includes/favicon.ico">
- <script type="text/javascript" src="https://code.jquery.com/jquery-3.5.1.min.js"></script>
- <script type="text/javascript" src="includes/js/steps.js"></script>
- <link href="css/steps.css" rel="stylesheet" type="text/css" />
- </head>
- <body>
- <div id="gridContainer">
- <div class="topMargin"></div>
- <div id="listName" class="topMargin">
- <h1>Adding Self-Signed PKI to Windows Trusted Certificate Store</h1>
- </div>
- <div></div>
- <div id="content">
- <p>This is part two of a series of creating your own self-signed PKI and some ways to utilize the PKI to setup SSL for your web server or create your own OpenVPN server.</p>
- <p>Disclaimer: I am not a security expert. This is just the easiest way I have found to create and utilize SSL for my homelab services.</p>
- <h2>Exporting Certificates from XCA</h2>
- <ol>
- <li>Launch XCA</li>
- <li>Open the PKI database if it is not already (File > Open DataBase), enter password</li>
- <li>Click on the Certificates tab</li>
- <li>Right click the Intermediate CA certificate > Export > File</li>
- <li>Set the file name with a .crt extension and verify the export format is PEM (*.crt)</li>
- <li>Click OK</li>
- <li>Right click the Root CA certificate > Export > File</li>
- <li>Set the file name with a .crt extension and verify the export format is PEM (*.crt)</li>
- <li>Click OK</li>
- </ol>
- <h2>Importing Certificates Into Windows Certificate Store</h2>
- <ol>
- <li>Right click the Start Button > Run</li>
- <li>Type mmc.exe, press enter</li>
- <li>Click File > Add/Remove Snap-in...</li>
- <li>Click Certificates</li>
- <li>Click Add</li>
- <li>Select Computer account</li>
- <li>Click Next</li>
- <li>Select Local computer</li>
- <li>Click Finish</li>
- <li>Click OK</li>
- <li>Expand Certificates > Trusted Root Certification Authorities</li>
- <li>Right click the second level Certificates > All Tasks > Import....</li>
- <li>Click Next</li>
- <li>Click Browse > Select the exported Root CA .crt file > Click Next</li>
- <li>Verify Include all extended properties is checked</li>
- <li>Click Next</li>
- <li>Click Next</li>
- <li>Click Finish</li>
- <li>Expand Certificates > Intermediate Certification Authorities</li>
- <li>Right click the second level Certificates > All Tasks > Import....</li>
- <li>Click Next</li>
- <li>Click Browse > Select the exported Intermediate CA .crt file > Click Next</li>
- <li>Verify Include all extended properties is checked</li>
- <li>Click Next</li>
- <li>Click Next</li>
- <li>Click Finish</li>
- </ol>
- </div>
- </div>
- </body>
- </html>
-
|