Ask a Question

Alert ID : INFO1950

Last Modified : 05/03/2018

Managed PKI for SSL - Certificate Signing Request (CSR) Generation Instructions for Covalent Apache ERS v 3.0 and above

Description

This document provides instructions for generating a CSR for Covalent Apache ERS v. 3.0 and above. If you are unable to use these instructions for your server, Symantec recommends that you contact Covalent.
 
NOTE: To generate a CSR, a key pair must be created for the server. These two items are a digital certificate key pair and cannot be separated. If the public/private key file or password is lost or changed before the SSL certificate is installed, the SSL certificate will need to be re-issued. The private key, CSR, and certificate must all match in order for the installation to be successful.

Step 1: Generate Private Key

         NOTE: All certificates that will expire after December 2013 must have a 2048 bit key size

  1. Use the utility “openssl” to generate the key and CSR. This utility comes with the OpenSSL package.
  2. You usually install it under /usr/local/ssl/bin. If it is installed elsewhere, adjust the directory used in these instructions. 
  3. Change directory to your SSL Key directory: cd /usr/local/ssl/private
  4. Generate a Private key using the following command: 
     
    openssl genrsa -des3 2048 > privatekeyfilename.key

  5. When prompted for a pass phrase: enter a secure password and remember it, as this pass phrase is what protects the private key.
    Both the private key and the certificate are required to enable SSL.
    NOTE: To bypass the pass phrase requirement, omit the -des3 option when generating the private key. If the private key is left
    unprotected, Symantec recommends access to the server be restricted so that only authorized server administrators can
    access or read the private key file.
     

Step 2: Generate a CSR:

  1. Change directory to your SSL Certificate directory: cd /usr/local/ssl/crt
  2. Generate a CSR using the following command:  
     
    openssl req -new -key ../private/ privatekeyfilename.key > csrfilename.csr

  3. This step will create the X.509 attributes of the certificate:
  • Country Name (C): Enter the two-character abbreviation of country in which organization resides (e.g. US).
  • State or Province (S): Enter the full name of your state or province.
    Note: Make sure the State or Province is not abbreviated (e.g. California).
  • Locality or City (L): Usually the city of your organization's main office, or a main office for your organization.
  • Organization (O): The full legal name of your company.
  • Organizational Unit (OU): Use this field to differentiate between divisions within an organization.
  • Common Name (CN): The fully-qualified domain name to which your certificate will be issued.
    Please do not enter an email address, challenge password or an optional company name when generating the CSR.
  1. A public/private key pair has now been created. The private key (www.symantec.com.key) is stored locally on the server machine and is used for decryption.
  2. The public portion, in the form of a Certificate Signing Request (certrequest.csr), will be for certificate enrollment. 
  3. To copy and paste the information into the enrollment form, open the file in a text editor such as Notepad or Vi and save it as a .txt file.
    Do not use Microsoft Word as it may insert extra hidden characters that will alter the contents of the CSR.
  4. Verify your CSR
  5. Once the CSR has been created, proceed to Enrolment.
     

Once the certificate has been issued, follow the steps from this link to install the certificate on your server: INFO1949