filmov
tv
Create self signed certificates with Subject Alternative Names
Показать описание
This video explains how to create a self signed certificate with Subject Alternative Names (SAN).
A certificate with Subject Alternative Names is a single certificate supporting multiple Common Names (CN), for example:
This means this single certificate can be used in multiple URLs:
Chrome browsers will issue a warning if your SSL certificate does not specify Subject Alternative Names.
This video assumes that you have installed OpenSSL.
To check if your system has OpenSSL installed, type: openssl version -a
The procedure to create self signed certificates with Subject Alternative names is also documented at:
Warning: Never use self signed certificates in production environments.
It is okay to use it in development or testing environments.
1. Create a 2048 bit Certificate Authority (CA) private key:
2. Create a self signed CA certificate:
3. Create a 2048 bit Certificate Authority (CA) certificate:
Country Name (2 letter code) [AU]:NL
State or Province Name (full name) [Some-State]:Noord-Holland
Locality Name (eg, city) []:Zaandam
Download and modify the server configuration file according to your situation.
[dn]
C=NL
ST=Zaandam
L=Noord-Holland
O=End Point
OU=Research and development
5. Create a server Certificate Signing Request (CSR) and server private key.
Modify the server extension file according to your situation.
Add Subject Alternative Names:
[alt_names]
This common name must be mentioned as one of the Subject Alternative Names.
7. Create the server certificate:
Each issued certificate must contain a unique serial number assigned by the CA.
It must be unique for each certificate given by a given CA.
OpenSSL keeps the used serial numbers on a file.
Always keep the private keys secure:
Recap
We have created our own Certificate Authority (root certificate).
But this CA is not trusted by our system.
Next our CA has created a certificate with SAN.
Trusted CA’s such as Comodo and GoDaddy are trusted because their root certificates are already imported in our system.
In YouTube video “Geth supporting SSL using reverse proxy server” I will be using this self signed certificate to setup a reverse proxy server accessible by:
Check out all my other Ethereum related tutorial videos:
Subscribe to my YouTube channel:
The presentation used in this video tutorial can be found at:
#mobilefish #howto #ethereum
A certificate with Subject Alternative Names is a single certificate supporting multiple Common Names (CN), for example:
This means this single certificate can be used in multiple URLs:
Chrome browsers will issue a warning if your SSL certificate does not specify Subject Alternative Names.
This video assumes that you have installed OpenSSL.
To check if your system has OpenSSL installed, type: openssl version -a
The procedure to create self signed certificates with Subject Alternative names is also documented at:
Warning: Never use self signed certificates in production environments.
It is okay to use it in development or testing environments.
1. Create a 2048 bit Certificate Authority (CA) private key:
2. Create a self signed CA certificate:
3. Create a 2048 bit Certificate Authority (CA) certificate:
Country Name (2 letter code) [AU]:NL
State or Province Name (full name) [Some-State]:Noord-Holland
Locality Name (eg, city) []:Zaandam
Download and modify the server configuration file according to your situation.
[dn]
C=NL
ST=Zaandam
L=Noord-Holland
O=End Point
OU=Research and development
5. Create a server Certificate Signing Request (CSR) and server private key.
Modify the server extension file according to your situation.
Add Subject Alternative Names:
[alt_names]
This common name must be mentioned as one of the Subject Alternative Names.
7. Create the server certificate:
Each issued certificate must contain a unique serial number assigned by the CA.
It must be unique for each certificate given by a given CA.
OpenSSL keeps the used serial numbers on a file.
Always keep the private keys secure:
Recap
We have created our own Certificate Authority (root certificate).
But this CA is not trusted by our system.
Next our CA has created a certificate with SAN.
Trusted CA’s such as Comodo and GoDaddy are trusted because their root certificates are already imported in our system.
In YouTube video “Geth supporting SSL using reverse proxy server” I will be using this self signed certificate to setup a reverse proxy server accessible by:
Check out all my other Ethereum related tutorial videos:
Subscribe to my YouTube channel:
The presentation used in this video tutorial can be found at:
#mobilefish #howto #ethereum
Комментарии