[ ca ]
default_ca = CA_default
[ CA_default ]
dir = C:\\CA\\root
certs = C:\\CA\\root\\certs
crl_dir = C:\\CA\\root\\crl
database = C:\\CA\\root\\index.txt
new_certs_dir = C:\\CA\\root\\newcerts
serial = C:\\CA\\root\\serial
crlnumber = C:\\CA\\root\\crlnumber
crl = C:\\CA\\root\\crl.pem
certificate = C:\\CA\\root\\certs\\ca.cert.pem
private_key = C:\\CA\\root\\private\\ca.key.pem
name_opt = ca_default
cert_opt = ca_default
crl_extensions = crl_ext
default_days = 365
default_crl_days = 30
default_md = sha256
preserve = no
policy = policy_match
[ policy_match ]
countryName = match
stateOrProvinceName = optional
organizationName = optional
organizationalUnitName = optional
commonName = supplied
emailAddress = optional
[ policy_anything ]
countryName = optional
stateOrProvinceName = optional
localityName = optional
organizationName = optional
organizationalUnitName = optional
commonName = supplied
emailAddress = optional
[ req ]
default_bits = 2048
distinguished_name = req_distinguished_name
x509_extensions = v3_ca
string_mask = utf8only
default_md = sha256
[ req_distinguished_name ]
countryName = Country Name (2 letter code)
countryName_default = US
countryName_min = 2
countryName_max = 2
stateOrProvinceName = State or Province Name (full name)
stateOrProvinceName_default = California
localityName = Locality Name (eg, city)
localityName_default = Los Angeles
0.organizationName = Organization Name (eg, company)
0.organizationName_default = Ace Internet Inc.
organizationalUnitName = Organizational Unit Name (eg, section)
organizationalUnitName_default = http://ace.example.com/
commonName = Common Name (e.g. server FQDN or YOUR name)
commonName_default = Ace Internet Root CA
commonName_max = 64
emailAddress = Email Address
emailAddress_default = ace@example.com
emailAddress_max = 64
[ server_cert ]
basicConstraints = CA:FALSE
nsCertType = server
nsComment = "OpenSSL Generated Server Certificate"
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid,issuer:always
keyUsage = critical, digitalSignature, keyEncipherment
extendedKeyUsage = serverAuth
[ v3_ca ]
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid:always,issuer
basicConstraints = critical,CA:true
keyUsage = critical, digitalSignature, cRLSign, keyCertSign
[ v3_intermediate_ca ]
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid:always,issuer
basicConstraints = critical,CA:true, pathlen:0
keyUsage = critical, digitalSignature, cRLSign, keyCertSign
[ crl_ext ]
authorityKeyIdentifier = keyid:always
秘密鍵とルートCA証明書の作成
C:\CA\root に移動したままCAの秘密鍵と証明書を作成します
CA秘密鍵作成
openssl genrsa -out root/private/ca_key.pem 2048
CA証明書の作成
openssl req -x509 -key root/private/ca_key.pem -out ca_cert.pem -days 3650
Country Name (2 letter code) [AU]:JP
State or Province Name (full name) [Some-State]:Tokyo-to
Locality Name (eg, city) []:Minato-ku
Organization Name (eg, company) [Internet Widgits Pty Ltd]:Some Test Company
Organizational Unit Name (eg, section) []:Web Service Dept.
Common Name (e.g. server FQDN or YOUR name) []:127.0.0.1:3000
Email Address []:(入力せずEnter)
PCにCAルート証明書をインストール
作成されたca_cert.pemをコピーしてca.cerにリネームする
ca.cerをダブルクリック
↓
証明書のインストール
↓
現在のユーザ
↓
証明書をすべて次のストアに配置する
↓
参照
↓
信頼されたルート証明書期間
↓
完了
BIG-IPでCSRを発行する
Subject Alternative Nameには必ずアクセスする際に使うURLを入れましょう。マネジメントGUIにアクセスする人は大体IPでアクセスすると思うので、IP:「マネジメントポートのIP」を入れるようにしましょう。ここがないと「安全な接続ではありません」は消えません。
コメント