Create your private certificate authority (CA)
AUGUST 29, 2008 BY ADMIN·3 COMMENTS
Creating a private CA can be useful if you have a lot of services encrypting data for internal use but don’t need the domain to be verified by a public CA like Verisign, Thawte etc. By importing the CA to all computers that will use these services users won’t get the a popup in IE and Firefox saying that the certificate is invalid.
1. Create a CA certificate
Create a private key for your CA:
openssl genrsa -des3 -out ca.key 4096
You will need to enter passphrase, this password will be used everytime you sign a certificate with this CA
Make sure unauthorized users don’t get access to your private key:
chmod 700 ca.key
Create the certificate, this will be shown as the top level certificate when you have signed other certificates so choose expiration day and the certificate contents carefully. All signed certificates will expirate if the top level certificate expires so you may want to choose a few years here
Enter pass phrase for ca.key:
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
Country Name (2 letter code) [AU]:US
State or Province Name (full name) [Some-State]:
Locality Name (eg, city) :
Organization Name (eg, company) [Internet Widgits Pty Ltd]:Debian Tutorials
Organizational Unit Name (eg, section) :
Common Name (eg, YOUR name) :Debian Tutorials CA
Email Address :
Common name will be shown when users are displaying details about the certificate