1. Create a certificate request via the Internet Services Manager under 'Directory Security->Secure Communication->Server Certificate'. This is found under the property tab for the webserver you want to secure. Follow the wizard to create a certificate request and fill up all required details. At the end of the wizard, it will generate a certreq.txt file. Move this to your favorite linux box (e.g Debian) or run openssl under cygwin. 2. We now have to generate a private key using OpenSSL openssl genrsa -des3 -out cakey.pem 2048 The process will prompt you to supply a PEM pass phrase to help secure the key. 3. Now we have to create a CA certificate for our bogus CA openssl req -new -x509 -key cakey.pem -out cacert.pem -days 1825 4. Create the following directories in your home directory demoCA demoCA/private demoCA/newcerts Also create in demoCA a empty text file called 'index.txt' and a text file called 'serial' with the numbers '01' 5. Move your private key cakey.pem to the demoCA/private directory and cacert.pem to demoCA/ 6. Sign our previously created IIS certificate request openssl ca -in certreq.txt -out iis.cer 7. Open iis.cer in your favorite text editor (eg vi) and remove all the text before the line '-- Begin Certificate --'. IIS is not able to handle the text above that line and may get confused! 8. Move iis.cer back to your Windows machine and complete the certificate request in IIS by importing the iis.cer file. All done! -- Best regards, Derek Chew En-Hock sdchew@ieee.org
How to use OpenSSL to act as a CA to sign an IIS certificate request for SSL use
6
May