There are two acceptable types of SSL certificates: certificates signed by a Certificate Authority (CA) and self-signed certificates. Prior to generating the certificate, decide which is best for your environment. For more information on OpenSSL, go to: http://www.openssl.org Creating a Private Key Follow these steps to create a private key: 1. Log in as root. 2. Be sure the openssl program is accessible via the environment path. The openssl program is located in the following directory: /usr/local/openssl096g/bin 3. Enter the following command: openssl genrsa -out server.key -rand file1:file2:...:fileN 1024 where file1 through fileN are files containing random data, such as a large log, or other dynamic files (e.g., /var/adm/messages.0). The number of files to be used containing random data is optional, but at least one must be specified. 4. A private key is created and written to the file server.key. 5. Based on the type of certificate to be generated, refer to the appropriate instructions: * Generating a CA-signed Certificate * Generating a Self-signed Certificate Generating a CA-Signed Certificate Follow these steps to generate a Certificate Signing Request (CSR) and obtain a CA-signed certificate: 1. Log in as root. 2. Be sure the openssl program is accessible via the environment path. The openssl program is located in the following directory: /usr/local/openssl096g/bin 3. Enter the following command: openssl req -new -key server.key -out server.csr 4. The following message and series of attributes appear. Be sure to remember all attribute values specified. Using configuration from /usr/local/openssl096g/ssl/openssl.cnf You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank. For some fields there will be a default value. If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]: State or Province Name (full name) [Some-State]: Locality Name (eg, city) []: Organization Name (eg, company) [Internet Widgits \ Pty Ltd]: Organizational Unit Name (eg, section) []: Common Name (eg, YOUR name) []: Email Address []: Please enter the following 'extra' attributes to be sent with your certificate request A challenge password []: An optional company name []: The certificate is generated and stored in the file server.crt. 5. Encrypt the key to prevent the key from being compromised. Note: This step is optional. Encrypting the key enhances key security. Once the key is encrypted, any program that needs to access the key will require a user-provided pass phrase. For secure mode operations, this pass phrase is required each time the server starts. To encrypt the key, run the following command and type a pass phrase when prompted: openssl rsa -des3 -in server.key -out server.key.crypt read RSA key writing RSA key Enter PEM pass phrase: Verifying password - Enter PEM pass phrase: 6. Enter the following command: mv server.key.crypt server.key 7. Submit the CSR to the chosen CA. The CA will provide instructions on how to submit the CSR. Once the CSR is processed, the CA will return a signed certificate. 8. Store the CA-signed certificate in the file server.crt. 9. Relocate the files by entering the following commands: mkdir TNHOME/etc/httpd/conf/ssl.crt mkdir TNHOME/etc/httpd/conf/ssl.key chown root server.crt server.key chmod 444 server.crt chmod 400 server.key mv server.crt TNHOME/etc/httpd/conf/ssl.crt mv server.key TNHOME/etc/httpd/conf/ssl.key 10. Restart the HTTP server by entering the following: cd /TNHOME/usr/sbin ./tnfwshut ./tnfwstart 11. Enter the pass phrase (if the key is encrypted). 12. Go to section 2.2 Configuring SSL Support for Secure Framework Sessions of the TAS Administration Manual to complete SSL configuration. Generating a Self-Signed Certificate Follow these steps to generate a self-signed certificate: 1. Log in as root. 2. Be sure the openssl program is accessible via the environment path. The openssl program is located in the following directory: /usr/local/openssl096g/bin 3. Enter the following command: openssl req -x509 -new -key server.key -out server.crt 4. The following message and series of attributes appear. Be sure to remember all attribute values specified. You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank. For some fields there will be a default value. If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]: State or Province Name (full name) [Some-State]: Locality Name (eg, city) []: Organization Name (eg, company) [Internet Widgits \ Pty Ltd]: Organizational Unit Name (eg, section) []: Common Name (eg, YOUR name) []: Email Address []: The certificate is generated and stored in the file server.crt. 5. Encrypt the key to prevent the key from being compromised. Note: This step is optional. Encrypting the key enhances key security. Once the key is encrypted, any program that needs to access the key will require a user-provided pass phrase. For secure mode operations, this pass phrase is required each time the server starts. To encrypt the key, run the following command and type a pass phrase when prompted: openssl rsa -des3 -in server.key -out server.key.crypt read RSA key writing RSA key Enter PEM pass phrase: Verifying password - Enter PEM pass phrase: 6. Enter the following command: mv server.key.crypt server.key 7. Relocate the files by entering the following commands: mkdir TNHOME/etc/httpd/conf/ssl.crt mkdir TNHOME/etc/httpd/conf/ssl.key chown root server.crt server.key chmod 444 server.crt chmod 400 server.key mv server.crt TNHOME/etc/httpd/conf/ssl.crt mv server.key TNHOME/etc/httpd/conf/ssl.key 8. Restart the HTTP server by entering the following: cd /TNHOME/usr/sbin ./tnfwshut ./tnfwstart 9. Enter the pass phrase (if the key is encrypted). 10. Go to section 2.2 Configuring SSL Support for Secure Framework Sessions of the TAS Administration Manual to complete SSL configuration.