Certificate. on the screen, you will be prompted to enter the required personal information (such as Country, province, city, company, etc.) according to the prompts ).
Ii. Client
1. Generate the client private key (key file );
Openssl genrsa-des3-out client. key 1024 2. Generate the client certificate signature request file (csr file );
Openssl req-new-key client. key-out client. csr
Cd/tmp/create_key/ca
3. Generate the CA certificate file
# The server. csr and client. csr files must have a
certificate request, which is only used for Import
P7bDisplay the certificate chain in a tree(CertificateChain)And a single certificate, excluding the private key.
1. caCertificate
Use OpenSSL Create CA Certificate RSA Key (PEM Format ) :
OpenSSL genrsa-des3-out ca. Key 1024
2.CreateCAThe certificate is valid for one year.
Use OpenSSL Create CA Certificate (PEM Format , Assume that the validity period is one year. ) :
OpenSSL req-New-X509-days 365-key ca. Key-out
components secuser. Cert and secuser. user for the interface. These two components are just an example. You can compile your own interface implementation without using these two components.
Figure 5 isecuser interface component class relationship diagram
Call the icertmanage interface to create a certificate
Use the iuserpassword interface to verify the user name and password
Access global variables through the iglobalcfg Interface
Iusercertmanage
PKCS stands for public-key cryptography standards. It is a series of standards developed by the RSA lab and other security system developers to Promote the Development of public key cryptography. PKCS has published 15 standards. Commonly used:PKCS #7 cryptographic message syntax StandardPKCS #10 certification request StandardPKCS #12 Personal Information Exchange syntax StandardX.509 is a common certificate format. All certificates comply with ITU-T X509 International Standards for Public Key In
Kerberos realm is available.[[email protected] ~]# kinit adminNon-interactive installation
-rSet the name of the Kerberos realm
-pTo set the Directory Manager (dm,directory Server super User) password
-aSet the IDM server administrator password
-U 设置为无人值守安装[Email protected] ~]# ipa-server-Install -R example.com-p dm_password-a admin_password-uInstalling IDM with an external CASubmit Certificate Signing Request (CSR) /root/ipa.csr to an external CA[Email protected] ~]# ipa-
the transmission through the symmetric encryption algorithm, and the server and the client start secure communication.
If you can see that it is still awesome, you can refer to the overview of the SSL/TLS Protocol operating mechanism to learn more about the SSL/TLS process. This article will not introduce it too much.Generate private key and Certificate
Use openssl to generate the private key and certificate:
openssl req -x509 -newkey rsa:2048 -nodes -days 365 -keyout private.pem -out cert.crt
likely looking to cert a Netscaler Gateway we can just has the Netscaler platform itself (via a content Switching vserver) answer specific requests with specific responses in the form of this let ' s Encrypt marker. The same would hold true for any lbvserver or csvserver so we wish to cert, we just need a policy that answers let ' s ENC Rypt with the validation marker.In this example, I'll leverage a conte
will prompt you to enter the required personal information in step-by-steps (for example: country,province , City,company, etc.).Two. Client1. Generate The client private key (key file); OpenSSL genrsa-des3-out client.key 1024x7682. Generate Client certificate signing request file (CSR file);OpenSSL req-new-key client.key-out CLIENT.CSR CD /tmp/create_key/ca three. Generate the CA certificate file#server. CSR and CLIENT.CSR files must be signed by a CA to form a certificate.1. First generate th
/this directory, cert/and private/under each one, and then you can modify the DOVECOT-OPSSL.CNF to set up, you put your information into the good.
[Req]Default_bits = 1024Encrypt_key = yesDistinguished_name = req_dnX509_extensions = Cert_typeprompt = No#以上都不用改, the default is OK
[REQ_DN]# Country (2 letter code)#C =fi Country, two letters, China wrote CN
# State or province name (full name)#ST = Which province do you belong to?
# locality Name (eg
play twice!" ”。 Such a well-known network service provider, also inevitable escape ah! The web site injection loophole is a recent high school intrusion that has been exposed in newspapers and magazines ... In a word, most of the site security situation is worrying!
Here's my personal past experience with you to explore the issue of secure virtual host configuration. The following to establish a site cert.ecjtu.jx.cn as an example, with you to discuss the virtual host configuration issues.
Fi
Attack
Whenever we think of hackers, hackers tend to be such a portrait: A lonely person, sneaking into someone else's server to sabotage or steal other people's secret information. Perhaps he will change our homepage, who will steal the customer's credit card number and password. In addition, hackers will attack customers who visit our site. At the same time, our server has become his accomplice. Microsoft called the attack a "Cross-site script" attack. Most of these attacks occur when the Web
Author: BIBI
Whenever we think of hackers, hackers tend to be such a portrait: A lonely person, sneaking into someone else's server to sabotage or steal other people's secret information. Perhaps he will change our homepage, who will steal the customer's credit card number and password. In addition, hackers will attack customers who visit our site. At the same time, our server has become his accomplice. Microsoft called the attack a "Cross-site script" attack. Most of these attacks occur when th
file and private key generation completed. "
echo "starts signing a server certificate with a CA root certificate signing file ..."## sign server certificate, generate SERVER.CRT file# See http://www.faqs.org/docs/securing/chap24sec195.html# sign.sh START## Sign a SSL certificate Request (CSR)# Copyright (c) 1998-1999 Ralf S. Engelschall, all Rights Reserved.#
Csr=server.csr
Case $CSR in*.CSR) cert= "' Echo $CSR | Sed-e ' s/\.csr/.crt/' ";;*
ca-key.pem-set_serial 01-out client-cert.pem # sign client certificateSignature OKSubject =/C = CN/ST = Shanghai/L = Shanghai/O = CH/CN = mysqlclientGetting CA Private Key# Verify after generationShell> openssl verify-CAfile ca-cert.pem server-cert.pem client-cert.pemServer-cert.pem: OKClient-cert.pem: OK
After the above steps, the following file is generated:
The ca-cert.pem both on the server side and on the client side uses-ssl-ca = ca-cert.pemServer-cert.pem, server-key.pem server end speci
--disable-reconnect. This option is enabled by default. -s, --silent Be more silent. Print results with a tab as separator, each row on new line. -S, --socket=name The socket file to use for connection. --ssl Enable SSL for connection (automatically enabled with other flags).Disable with --skip-ssl. --ssl-ca=name CA file in PEM format (check OpenSSL docs, implies --ssl). --ssl-c
CA directory (check OpenSSL docs, implies -- ssl ).
-- Ssl-cert = name X509 cert in PEM format (implies -- ssl ).
-- Ssl-cipher = name SSL cipher to use (implies -- ssl ).
-- Ssl-key = name X509 key in PEM format (implies -- ssl ).
-- Ssl-verify-server-cert
Verify server's "Common Name" in its cert against
Hostname us
free SSL certificates such as let's encrypt, or create self-signed SSL certificates by yourself. Here I use OpenSSL to create my self-signed SSL certificate.
Create a new directory for the SSL file:
mkdir -p /etc/nginx/cert/
Use openssl to generate a new SSL certificate.
The code is as follows:
openssl req -new -x509 -days 365 -nodes -out /etc/nginx/cert/nextcloud.crt -keyout /etc/nginx/
@localhost identified by ' nextclouduser@ '; flush privileges;
nextcloud_db Database and nextclouduser database user creation complete
Step 4-Generate a self-signed SSL certificate for Nextcloud
In the tutorial, I'll have the client run Nextcloud with an HTTPS connection. You can use a free SSL certificate such as Let's encrypt, or create your own self-signed signed SSL certificate. Here I use OpenSSL to create my own self-signed SSL certificate.
To create a new directory for the SSL file:
Mk
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.