Does Csr Need to Be Converted Into Pem Format for Uploadding to Certs Directory

    This document describes the process to generate certificates that have to be uploaded with every fresh installation of Secure Console Individual Cloud or to renew the installed Certificate services.

    Requirements

    The information in this document is based on these software and hardware versions:

    • Windows Server 2008
    • CentOS seven/8
    • Secure Panel Virtual Private Deject 3.0.2 (Onwards)
    • OpenSSL one.one.1

    Components Used

    Cisco recommends that you have knowledge of these topics:

    • Windows Server 2008 (Onwards)
    • Secure Console Individual Cloud installation
    • Public Key Infrastructure
    • OpenSSL
    • Linux CLI

    The data in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you lot understand the potential impact of any command.

    With the introduction of Secure Console Individual Cloud 3.Ten, hostnames and certificate/key pairs are required for all of the following services:

    • Administration Portal
    • Hallmark (new in Private Deject 3.X)
    • Secure Console
    • Disposition Server
    • Disposition Server - Extended Protocol
    • Disposition Update Service
    • Firepower Management Center

    In this document is discussed a quick fashion to generate and upload the required certificates. You lot can tweak each of the parameters, including the hashing algorithm, key size, and others, as per your system's policy, and your mechanism of generating these certificates might not friction match with what is detailed here.

    Warning: The procedure mentioned below tin vary as per your CA server configuration. It is expected that the CA server of your choice is already provisioned and the configuration of the same has been completed. The post-obit technote just describes an example of generating the certificates and Cisco TAC is non involved in troubleshooting issues related to document generation and/or CA server issues of whatever kind.

    Generate Certificates on Window Server

    Ensure that the following roles are installed and configured on your Windows Server.

    • Active Directory Document Services
    • Certification Authority
    • Certification Authorisation Spider web Enrollment
    • Online Responder
    • Certificate Enrollment Web Service
    • Certificate Enrollment Policy Web Service
    • Active Directory Domain Services
    • DNS Servers
    • Web Server (IIS)

    Screenshot 2018-12-17 at 10.43.02 AM

    Generate a Certificate Signing Request (CSR)

    Step 1. Navigate to MMC panel, and add together the Certificates snap-in for your figurer account as shown in the image here.

    Screenshot 2019-04-01 at 6.27.15 PM

    Step 2. Drill downwardly Certificates (Local Figurer) > Personal > Certificates.

    Stride iii. Right-click on the empty space and selectAll Tasks > Advanced Operations > Create Custom Request.

    Screenshot 2019-04-01 at 6.27.59 PM

    Step 4. SelectNext at the Enrollment window.

    Screenshot 2019-04-01 at 6.33.28 PM

    Step 5. Select your certificate enrollment policy and selectNext.

    Screenshot 2019-04-01 at 6.34.11 PM

    Footstep half-dozen. Choose the template asWeb Server and selectNext.

    Screenshot 2019-04-01 at 6.35.19 PM

    Footstep vii. If your "Web Server" template has been configured correctly and is available for enrollment, the status Bachelor is displayed. SelectDetails to expand Properties.

    Screenshot 2019-04-01 at 6.37.56 PM

    Pace eight. At a minimum, add the CN and DNS attributes. The rest of the attributes can be added as per your security requirements.

    Screenshot 2019-04-01 at 6.40.12 PM

    Pace ix. Optionally, give a Friendly Name under the General tab.

    Step x. Select on the Individual Central tab and ensure that yous're enabling Make private key exportable under the Key Options section.

    Screenshot 2019-04-01 at 6.42.02 PM

    Step xi. Finally, select on OK. This must lead you to the Document Enrollment dialog from where you lot can selectNext.

    Stride 12. Scan to a location to save the .req file which is submitted to the CA server for signing.

    Submitting the CSR to the CA and generating the document

    Step 1. Navigate to your MS AD Certificate Services Web Page every bit below and selectRequest a Document.

    Screenshot 2019-04-01 at 6.46.21 PM

    Step ii. Select on the advanced certificate request link.

    Screenshot 2019-04-01 at 6.47.02 PM

    Step 3. Select on Submit a certificate request by using a base of operations-64-encoded CMC or PKCS #x file, or submit a renewal request by using a base-64-encoded PKCS #vii file.

    Pace 4. Open the contents of the previously saved .req file (CSR) via Notepad. Copy the contents and paste information technology here. Ensure that the Certificate Template is selected as Web Server

    Screenshot 2019-04-01 at 6.50.36 PM

    Step v. Finally, selectSubmit.

    Footstep 6. At this point, y'all must be able to Download the document, as shown in the prototype.

    081817_0209_HowtoSubmit6

    Exporting the Private Key and converting to PEM format

    Step i. Install the certificate into your Certificate Store by opening the .cer file and selectInstall Certificate.

    Stride two. Navigate to the MMC snap-in that was selected earlier.

    Pace 3. Navigate to the store where the document was installed.

    Step 4. Right-click the correct document, select All Tasks > Export.

    Screenshot 2019-04-01 at 7.16.21 PM

    Footstep v. At the Certificate Export Magician, ostend to export the private key, as shown in the epitome.

    Screenshot 2019-04-01 at 7.17.16 PM

    Footstep 6. Enter a countersign and selectNext to salvage the private fundamental on your deejay.

    Step seven. This saves the private central in .PFX format, however, this needs to be converted to .PEM format to apply this with Secure Endpoint Private Deject.

    Pace 8. Install OpenSSL libraries from here:https://wiki.openssl.org/alphabetize.php/Binaries.

    Step 9. Open a command prompt window and change to the directory where you installed OpenSSL.

    Step 10. Run the post-obit command to extract the individual key and save it to a new file: (If your PFX file is not in the aforementioned path as where the OpenSSL library is stored, you accept to specify the exact path along with the filename)

    openssl pkcs12 -in yourpfxfile.pfx -nocerts -out privatekey.pem -nodes

    Footstep eleven. Now run the following command to also excerpt the public cert and salve it to a new file:

    openssl pkcs12 -in yourpfxfile.pfx -nokeys -out publiccert.pem -nodes

    Generate Certificate on Linux Server (Strict SSL check DISABLED)

    Ensure that the Linux Server that you're trying to generate the required certificates has the OpenSSL 1.1.1 libraries installed. Verifying if this and the process listed below tinvary from the Linux distribution that you're running. This portion has been documented, every bit washed on a CentOS 8.4 Server.

    Generate Self Signed RootCA

    Step 1. Generate the Private Cardinal for Root CA document.

              openssl genrsa -out <YourRootCAName.key> 4096                  

    Pace 2. Generate the CA document.

              openssl req \          
    -subj '/CN=<YourRootCAName>/C=U.s.a./OU=<YourDepartmentName>/O=<YourCompanyName>' \
    -addext "extendedKeyUsage = serverAuth, clientAuth" \
    -outform pem -out <YourRootCAName.pem> \
    -key <YourRootCAName.central> -new -x509 \
    -days "1000"

    Generate a document for each service

    Create the certificate for Authentication, Panel, Disposition, Disposition-Extended, Update server, Firepower Management Center(FMC) service as per the DNS proper name entry. You demand to repeat the below document generate process for each service (Authentication, Console etc.).

    Screenshot 2020-11-17 at 1.38.22 PM

    Generate Private key

              openssl genrsa -out <YourServiceName.key> 4096                  

    Supersede the <YourServiceName.primal> with the new Cardinal filename to be created every bit Auth-Cert.key

    Generate CSR

              openssl req -new \          
    -subj '/CN=<YourServiceName>/C=US/OU=<YourDeptName>/O=<YourCompanyName>' \
    -key <YourServiceName.key> -out <YourServiceName.csr>

    Replace the <YourServiceName.key> with the electric current (or new) certificate Cardinal file such as Auth-Cert.central

    Replace the <YourServiceName.csr> with CSR filename to be created such as Auth-Cert.crt

    Generate Document

              openssl x509 -req \          
    -in <YourServiceName.csr> -CA <YourRootCAName.pem> \
    -CAkey <YourRootCAName.key> -CAcreateserial -out <YourServiceName.crt> \
    -days 1000 -sha256

    Replace the <YourServiceName.csr>with bodily (or new) certificate CSR such every bit Auth-Cert.csr

    Replace the <YourRootCAName.pem> with actual (or new) PEM filename equally RootCAName.pem

    Replace the <YourServiceName.primal> with the current (or new) document KEY file such as Auth-Cert.key

    Supercede the <YourServiceName.crt> with filename to be created such as Auth-Cert.crt

    Generate Document on Linux Server (Strict SSL cheque ENABLED)

    Generate Self Signed RootCA

    Step 1. Generate the Private Fundamental for Root CA certificate.

              openssl genrsa -out <YourRootCAName.primal> 4096                  

    Pace 2. Generate the CA certificate.

              openssl req \          
    -subj '/CN=<YourRootCAName>/C=Us/OU=<YourDepartmentName>/O=<YourCompanyName>' \
    -outform pem -out <YourRootCAName.pem> \
    -primal <YourRootCAName.key> -new -x509 \
    -days "1000"

    Generate a certificate for each service

    Create the certificate for Authentication, Console, Disposition, Disposition-Extended, Update server, Firepower Management Center(FMC) service as per the DNS name entry. You need to repeat the below certificate generate process for each  service (Authentication, Console etc.).

    Screenshot 2020-11-17 at 1.38.46 PM

    Create an Extensions Configuration file and salve it (extensions.cnf)

              [v3_ca]          
    basicConstraints = CA:Imitation
    keyUsage = disquisitional, digitalSignature, keyEncipherment
    extendedKeyUsage = critical, serverAuth, clientAuth

    Generate Private cardinal

              openssl genrsa -out <YourServiceName.key> 4096                  

    Replace the <YourServiceName.key> with a new KEY filename to be created as Auth-Cert.central

    Generate CSR

              openssl req -new \          
    -central <YourServiceName.fundamental> \
    -subj '/CN=<YourServiceName>/C=Usa/OU=<YourDeptName>/O=<YourCompanyName>' \
    -out <YourServiceName.csr>

    Replace the <YourServiceName.primal> with the current (or new) document KEY such as Auth-Cert.primal

    Replace the <YourServiceName.csr> with the current (or new) document CSR such as Auth-Cert.csr

    Generate Certificate

              openssl x509 -req -in <YourServiceName.csr> \          
    -CA <YourRootCAName.pem> -CAkey <YourRootCAName.fundamental> \
    -CAcreateserial -out <YourServiceName.crt> \
    -extensions v3_ca -extfile extensions.cnf \
    -days 365 -sha256

    Replace the <YourServiceName.csr> with current (or new) certificate CSR such as Auth-Cert.csr

    Replace the <YourRootCAName.pem> with current (or new) PEM filename as RootCAName.pem

    Supercede the <YourServiceName.central> with current (or new) certificate KEY file such as Auth-Cert.cardinal

    Replace the <YourServiceName.crt> with filename to be created such as Auth-Cert.crt

    Footstep 1. In one case the certificates are generated from whatsoever of the above methods, upload the corresponding certificate for each of the services. If they have been generated correctly, all the checkmarks are enabled as seen in the prototype here.

    Authentication

    There is currently no verification procedure bachelor for this configuration.

    There is currently no specific troubleshooting information available for this configuration.

    leetherfull43.blogspot.com

    Source: https://www.cisco.com/c/en/us/support/docs/security/amp-virtual-private-cloud-appliance/214326-how-to-generate-and-add-certificates-tha.html

    0 Response to "Does Csr Need to Be Converted Into Pem Format for Uploadding to Certs Directory"

    Post a Comment

    Iklan Atas Artikel

    Iklan Tengah Artikel 1

    Iklan Tengah Artikel 2

    Iklan Bawah Artikel