0739.html 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108
  1. <!DOCTYPE html>
  2. <html lang="en" xmlns="http://www.w3.org/1999/xhtml">
  3. <head>
  4. <title>Creating and Applying SSL Certificates for Cockpit Web Interface</title>
  5. <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  6. <meta charset="UTF-8">
  7. <meta name="keywords" content="Browser Based,Home Lab,Home Lab Ideas,Self-Hosted,Web Based Tools,Web Based,Cockpit,Certificates,Certificate Authority,Certificate,CA,Browser Based Tools,HTTPS,Linux,Public Key Infrastructure,PKI,Private Key Infrastructure,Self-Signed PKI,Self-Signed HTTPS,Self-Signed SSL,Server Administration,Self-hosted,System Administration,Web Tools,XCA,X Certificate Key Manager,Self-Signed Certificates,SSL,SSL Certificates,How To,Tutorial,i12bretro">
  8. <meta name="author" content="i12bretro">
  9. <meta name="description" content="Creating and Applying SSL Certificates for Cockpit Web Interface">
  10. <meta name="viewport" content="width=device-width, initial-scale=1.0">
  11. <meta name="revised" content="10/24/2022 11:12:33 AM" />
  12. <link rel="icon" type="image/x-icon" href="includes/favicon.ico">
  13. <script type="text/javascript" src="https://code.jquery.com/jquery-3.5.1.min.js"></script>
  14. <script type="text/javascript" src="includes/js/steps.js"></script>
  15. <link href="css/steps.css" rel="stylesheet" type="text/css" />
  16. </head>
  17. <body>
  18. <div id="gridContainer">
  19. <div class="topMargin"></div>
  20. <div id="listName" class="topMargin">
  21. <h1>Creating and Applying SSL Certificates for Cockpit Web Interface</h1>
  22. </div>
  23. <div></div>
  24. <div id="content">
  25. <h2>What is Cockpit?</h2>
  26. <blockquote><em>Cockpit is an interactive server admin interface. It is easy to use and very lightweight. Cockpit interacts directly with the operating system from a real Linux session in a browser. -<a href="https://github.com/cockpit-project/cockpit" target="_blank">https://github.com/cockpit-project/cockpit</a></em></blockquote>
  27. <h2>Prerequisites</h2>
  28. <ul>
  29. <li class="noCheckbox">A XCA PKI database <a href="https://youtu.be/ezzj3x207lQ" target="_blank">https://youtu.be/ezzj3x207lQ</a></li>
  30. </ul>
  31. <h2>Create Your SSL Certificate</h2>
  32. <ol>
  33. <li>Launch XCA</li>
  34. <li>Open the PKI database if it is not already (File &gt; Open DataBase), enter password</li>
  35. <li>Click on the Certificates tab, right click on your Intermediate CA certificate</li>
  36. <li>Select New</li>
  37. <li>On the Source tab, make sure Use this Certificate for signing is selected</li>
  38. <li>Verify your Intermediate CA certificate is selected from the drop down</li>
  39. <li>Click the Subject tab</li>
  40. <li>Complete the Distinguished Name section
  41. <p>internalName: debian.i12bretro.local<br />
  42. countryName: US<br />
  43. stateOrProvinceName: Virginia<br />
  44. localityName: Northern<br />
  45. organizationName: i12bretro<br />
  46. organizationUnitName: i12bretro Certificate Authority<br />
  47. commonName: debian.i12bretro.local</p>
  48. </li>
  49. <li>Click the Generate a New Key button</li>
  50. <li>Enter a name and set the key size to at least 2048</li>
  51. <li>Click Create</li>
  52. <li>Click on the Extensions tab</li>
  53. <li>Select End Entity from the type list</li>
  54. <li>Click Edit next to Subject Alternative Name</li>
  55. <li>Add any DNS or IP addresses that the certificate will identify</li>
  56. <li>Update the validity dates to fit your needs</li>
  57. <li>Click the Key Usage tab</li>
  58. <li>Under Key Usage select Digital Signature, Key Encipherment</li>
  59. <li>Under Extended Key Usage select Web Server and Web Client Authentication</li>
  60. <li>Click the Netscape tab</li>
  61. <li>Select SSL Server</li>
  62. <li>Click OK to create the certificate</li>
  63. </ol>
  64. <h2>Exporting Required Files</h2>
  65. <ol>
  66. <li>In XCA, click on the Certificates tab</li>
  67. <li>Right click the SSL certificate &gt; Export &gt; File</li>
  68. <li>Set the file name with a .crt extension and verify the export format is PEM (*.crt)</li>
  69. <li>Click OK</li>
  70. <li>Click the Private Keys tab</li>
  71. <li>Right click the private key generated for the SSL certificate &gt; Export &gt; File</li>
  72. <li>Set the file name with a .key extension and verify the export format is PKCS #8 (*.pk8)</li>
  73. <li>Click OK</li>
  74. </ol>
  75. <h2>Applying the Certificates to Cockpit</h2>
  76. <p>Per the Cockpit documentation, Cockpit will &quot;<em>use the last file with a .cert or .crt extension in alphabetical order</em>&quot; and the private key &quot;<em>must be contained in a separate file with the same name as the certificate, but with a .key suffix</em>&quot;</p>
  77. <ol>
  78. <li>Download WinSCP <a href="https://winscp.net/eng/downloads.php" target="_blank">Download</a></li>
  79. <li>Extract WinSCP and run the executable</li>
  80. <li>Connect to the Cockpit host IP address via WinSCP</li>
  81. <li>Copy the exported .crt and .key files to the target host home/$USER/Documents directory</li>
  82. <li>Connect to the target host via SSH or console and run the following commands
  83. <div class="codeBlock"># copy the .crt file<br />
  84. sudo cp ~/Documents/*.crt /etc/cockpit/ws-certs.d/<br />
  85. # copy the .key file<br />
  86. sudo cp ~/Documents/*.key /etc/cockpit/ws-certs.d/<br />
  87. # restart cockpit service<br />
  88. sudo systemctl restart cockpit</div>
  89. </li>
  90. <li>Open a web browser and navigate to the Cockpit web UI https://DNS:9090</li>
  91. <li>The Cockpit web UI should be utilizing the new SSL certificate</li>
  92. </ol>
  93. <p>Source: <a href="https://cockpit-project.org/guide/latest/https" target="_blank">https://cockpit-project.org/guide/latest/https</a></p> </div>
  94. </div>
  95. </body>
  96. </html>