Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

SMC 3.x New Installation -- How to create a certificate request?

Doing an installation of SMC 3.0.0.6, and want to use a trusted issuer certificate so that Android phones witll work properly with this... but, no GUI or instructions (anywhere that I can find, KB, docs, etc.) on how to generate a proper CSR request that will leave me with the private key needed to import a cert into the system during setup.  My cert provider had a procedure for Tomcat, and that seemed to halfway work (keytool was there)... but I don't have a .pem file to "feed' the install wizard when it prompts for it.  This should really be documented better.

Anyway, anyone have a clue?

:39695


This thread was automatically locked due to age.
Parents
  • Please run the following steps from the Sophos Mobile Control server as the local or domain administrator.

    Step A - Create a new keystore

    1. You will be using the keytool command to create your new key-CSR pairing. 
      Enter the following at the command prompt: 
    • keytool -genkey -alias server -keyalg RSA -keysize 2048 -keystore yourdomain.jks
    • 'Yourdomain' is the name of the domain you are securing. However, if you are ordering a Wildcard Certificate, do not include * in the beginning of the filename as this is not a valid filename character. 
    • Enter a keystore password (make note of this password for future use)
    • You will be prompted for the DN information. 
    • Please note: when it asks for first and last name, this is not YOUR first and last name, but rather your domain name and extension(i.e., www.yourdomain.com). If you are ordering a Wildcard Certificate this must begin with *. (example: *.digicert.com) 
    • Confirm that the information is correct by entering 'y' or 'yes' when prompted. Next you will be asked for your password to confirm. Make sure to remember the password you choose. 

    Step B - Generate your CSR with your new keystore

    1. Next, use keytool to actually create the Certificate Signing Request. Enter the following: 
    • keytool -certreq -alias server -keyalg RSA -file yourdomain.csr -keystore yourdomain.jks 
    • Again, 'yourdomain' is the name of the domain you are securing. (without the * charachter if you are ordering a Wildcard Certificate).
    • Enter the keystore password.
    • Then the SSL Certificate CSR file is created and ready to be submitted to your web hosting provider.

    Step C - Generating your Private Key file from your new keystore

    1. To generate the RSA private key from your keystore file, run the following at the command prompt:
    • keytool -v -importkeystore -srckeystore yourdomain.jks -srcalias server -destkeystore yourdomain.p12 -deststoretype PKCS12
        • "Yourdomain" is the domain name you specified in Step A.
      • Enter a private key password (make note of this password for future use)
      • Enter the keystore password set in Step A.
      • [Storing yourdomain.p12] message appears if successful.
    1. Next you will need to open the P12 file in order to copy the RSA private key information to your .key file.  From the command prompt, run the following command:
    • openssl pkcs12 -in yourdomain.p12 -nocerts -nodes
    • "Yourdomain" is the domain name you specified in step 1 (step c) above.
    • Enter the private key password you set in step 1 (step c) above.
    • This will display your RSA Private Key information:
    • Next you will need to copy the RSA Private Key information (see highlighted example above) and paste it into a text file.
    • You will need to name this file yourdomain.key.
    • "Yourdomain" is the domain name you specified in Step A
    :40207
Reply
  • Please run the following steps from the Sophos Mobile Control server as the local or domain administrator.

    Step A - Create a new keystore

    1. You will be using the keytool command to create your new key-CSR pairing. 
      Enter the following at the command prompt: 
    • keytool -genkey -alias server -keyalg RSA -keysize 2048 -keystore yourdomain.jks
    • 'Yourdomain' is the name of the domain you are securing. However, if you are ordering a Wildcard Certificate, do not include * in the beginning of the filename as this is not a valid filename character. 
    • Enter a keystore password (make note of this password for future use)
    • You will be prompted for the DN information. 
    • Please note: when it asks for first and last name, this is not YOUR first and last name, but rather your domain name and extension(i.e., www.yourdomain.com). If you are ordering a Wildcard Certificate this must begin with *. (example: *.digicert.com) 
    • Confirm that the information is correct by entering 'y' or 'yes' when prompted. Next you will be asked for your password to confirm. Make sure to remember the password you choose. 

    Step B - Generate your CSR with your new keystore

    1. Next, use keytool to actually create the Certificate Signing Request. Enter the following: 
    • keytool -certreq -alias server -keyalg RSA -file yourdomain.csr -keystore yourdomain.jks 
    • Again, 'yourdomain' is the name of the domain you are securing. (without the * charachter if you are ordering a Wildcard Certificate).
    • Enter the keystore password.
    • Then the SSL Certificate CSR file is created and ready to be submitted to your web hosting provider.

    Step C - Generating your Private Key file from your new keystore

    1. To generate the RSA private key from your keystore file, run the following at the command prompt:
    • keytool -v -importkeystore -srckeystore yourdomain.jks -srcalias server -destkeystore yourdomain.p12 -deststoretype PKCS12
        • "Yourdomain" is the domain name you specified in Step A.
      • Enter a private key password (make note of this password for future use)
      • Enter the keystore password set in Step A.
      • [Storing yourdomain.p12] message appears if successful.
    1. Next you will need to open the P12 file in order to copy the RSA private key information to your .key file.  From the command prompt, run the following command:
    • openssl pkcs12 -in yourdomain.p12 -nocerts -nodes
    • "Yourdomain" is the domain name you specified in step 1 (step c) above.
    • Enter the private key password you set in step 1 (step c) above.
    • This will display your RSA Private Key information:
    • Next you will need to copy the RSA Private Key information (see highlighted example above) and paste it into a text file.
    • You will need to name this file yourdomain.key.
    • "Yourdomain" is the domain name you specified in Step A
    :40207
Children
No Data
Share Feedback
×

Submitted a Tech Support Case lately from the Support Portal?