Use the instructions on this page to use OpenSSL to create your certificate signing request (CSR) and then to install your SSL certificate on your Apache server.
For Ubuntu instructions, see Ubuntu Server with Apache2: Create CSR & Install SSL Certificate (OpenSSL). For other OS/platform instructions, see Create a CSR (Certificate Signing Request).
You can use these instructions to create OpenSSL CSRs and install all types of DigiCert SSL certificates on your Apache server: Standard SSL, EV SSL, Multi-Domain SSL, EV Multi-Domain SSL, and Wildcard SSL.
To create your certificate signing request (CSR), see Apache: Creating Your CSR with OpenSSL.
Para un tutorial en español visite la página Apache Crear CSR.
To install your SSL certificate, see Apache: Installing & Configuring Your SSL Certificate.
Visite nuestras instrucciones en español para Apache Instalar Certificado SSL.
Use the instructions in this section to create your shell commands to generate your Apache CSR with OpenSSL.
How to Generate a CSR for Apache Using OpenSSL
If you prefer to build your shell commands to generate your Apache CSR, follow the instructions below.
Log in to your server via your terminal client (ssh).
Run Command
At the prompt, type the following command:
openssl req -new -newkey rsa:2048 -nodes -keyout server.key -out server.csr
Generate Files
You've now started the process for generating the following two files:
When prompted for the Common Name (domain name), type the fully qualified domain name (FQDN) for the site that you are going to secure.
When prompted, type your organizational information, beginning with your geographic information.
Now, your OpenSSL .csr file is created.
Order Your SSL/TLS Certificate
Open the .csr file you created with a text editor.
Copy the text, including the -----BEGIN NEW CERTIFICATE REQUEST----- and -----END NEW CERTIFICATE REQUEST----- tags, and paste it into the DigiCert order form.
Save Private Key
Save (backup) the generated .key file. You need it later to install your SSL certificate.
Install Certificate
After you've received your SSL certificate from DigiCert, you can install it on your server.
If you still need to create a certificate signing request (CSR) and order your certificate, see Apache: Creating Your CSR with OpenSSL.
After we've validated and issued your SSL certificate, you can install it on your Apache server (where the CSR was generated) and configure the server to use the certificate.
How to Install and Configure Your SSL Certificate on Your Apache Server
Copy the certificate files to your server.
Log in to your DigiCert account and download the intermediate (DigiCertCA.crt) and your primary certificate (your_domain_name.crt) files.
Copy these files, along with the .key file you generated when creating the CSR, to the directory on the server where you keep your certificate and key files.
Find the Apache configuration file (httpd.conf) you need to edit.
The location and name of the configuration file can vary from server to server, especially if you're using a special interface to manage your server configuration.
Apache's main configuration file is typically named httpd.conf or apache2.conf. Possible locations for this file include /etc/httpd/ or /etc/apache2/. For a comprehensive listing of default installation layouts for Apache HTTPD on various operating systems and distributions, see Httpd Wiki - DistrosDefaultLayout.
Often, the SSL certificate configuration is located in a <VirtualHost> block in a different configuration file. The configuration files may be under a directory like /etc/httpd/vhosts.d/, /etc/httpd/sites/, or in a file called httpd-ssl.conf.
One way to locate the SSL Configuration on Linux distributions is to search using grep, as shown in the example below.
Run the following command:
grep -i -r "SSLCertificateFile" /etc/httpd/
Identify the SSL <VirtualHost> block you need to configure.
If your site needs to be accessible through both secure (https) and non-secure (http) connections, you need a virtual host for each type of connection. Make a copy of the existing non-secure virtual host and configure it for SSL as described in step 4.
If your site only needs to be accessed securely, configure the existing virtual host for SSL as described in step 4.
Configure the <VirtualHost> block for the SSL-enabled site
Below is a very simple example of a virtual host configured for SSL. The parts listed in blue are the parts you must add for SSL configuration.
<VirtualHost 192.168.0.1:443>
DocumentRoot /var/www/html2
ServerName www.yourdomain.com
SSLEngine on
SSLCertificateFile /path/to/your_domain_name.crt
SSLCertificateKeyFile /path/to/your_private.key
SSLCertificateChainFile /path/to/DigiCertCA.crt
</VirtualHost>
Make sure to adjust the file names to match your certificate files.
SSLCertificateFile is your DigiCert certificate file (e.g., your_domain_name.crt).
SSLCertificateKeyFile is the .key file generated when you created the CSR (e.g., your_private.key).
SSLCertificateChainFile is the DigiCert intermediate certificate file (e.g., DigiCertCA.crt)
Test your Apache configuration file before restarting.
As a best practice, check your Apache configuration file for any errors before restarting Apache.
Run the following command to test your configuration file (on some systems, it's apache2ctl):
apachectl configtest
Restart Apache.
You can use apachectl commands to stop and start Apache with SSL support.
apachectl stop
apachectl start
Congratulations! You've successfully installed your SSL certificate.
Testing Your SSL/TLS Certificate Installation
Browser Test
For best results, make sure to close your web browser first and then re-launch it.
Visit your site with the secure HTTPS URL (i.e., go to https://www.example.com, not http://www.example.com).
Be sure to test your site with more than just Internet Explorer. IE downloads missing intermediate certificates, whereas other browsers give an error if all the certificates in the certificate chain aren't installed properly.
DigiCert® SSL Installation Diagnostic Tool
If your site's publicly accessible, use our Server Certificate Tester to test your SSL/TLS certificate installation; it detects common installation problems.
Troubleshooting
If your website is publicly accessible, our SSL Certificate Tester tool can help you diagnose common problems.
If you receive a "not trusted" warning, view the certificate details to see if it's the certificate you expect. Check the Subject, Issuer, and Valid To fields.
If it's the certificate you expect, and the SSL certificate is issued by DigiCert, then your SSLCertificateChainFile is not configured correctly.
If you don't see the certificate you expect, then you may have another SSL <VirtualHost> block before the one you recently configured.
Name-based virtual hosts aren't possible with HTTPS unless you use the same certificate for all virtual hosts (e.g., a Wildcard or a Multi-Domain SSL certificate).
This is not an Apache limitation, but an SSL protocol limitation. Apache must send a certificate during the SSL handshake before it receives the HTTP request that contains the Host header. Therefore, Apache always sends the SSLCertificateFile from the first <VirtualHost> block that matches the IP and port of the request.
For help moving your certificates to additional servers or across server platforms, see our OpenSSL export instructions.
If you need to disable SSL version 2 compatibility to meet PCI Compliance requirements, add the following directive to your Apache configuration file:
SSLCipherSuite HIGH:+MEDIUM:!SSLv2:!EXP:!ADH:!aNULL:!eNULL:!NULL
If the directive already exists, you may need to modify it to disable SSL version 2.
For instructions on how to fix common errors and for additional tips, see Troubleshooting Apache SSL Certificate Errors.
Apache Server Configuration
For information about Apache server configurations that can strengthen your SSL environment, see the following resources:
For Instructions on disabling the SSL v3 protocol, see Apache: Disabling the SSL v3 Protocol.
For information about enabling perfect forward secrecy, see Enabling Perfect Forward Secrecy.