Page tree

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

This article describes how to change the digital certificate used by your 4PSA DNS Manager 3 (or later version) HTTP server.

Requirements

Before you start, make sure that the following requirements are met:

  • You have a 4PSA DNS Manager version higher than 3.0.0 (e.g. 4.0.0)
  • You have access and basic knowledge for using a SSH client (e.g. Putty)

Change the Server's SSL Certificate

STEP 1: Generate private key and request certificate.

Log in as root using a SSH client, create a certificate request, and send it to your CA authority:

openssl req -nodes -newkey rsa:2048 -keyout /root/new.key -out /root/certrequest.csr

This command will generate a 2048-bit key file. Then it will ask basic information about the entity being certified. The Private Key file generated with above command will not have a secret pass-phrase.

When you will receive the message:

"Please enter the following 'extra' attributes to be sent with your certificate request
A challenge password []:"

DO NOT SUBMIT ANY PASSWORD, just press enter.

STEP 2: Save and keep your new key because you will need it later. 

Send the certrequest.csr to to your CA authority and they will send back to you a new certificate. After you receive the certificate, copy it on your server in your root directory. Let us assume that the certificate name is newcert.crt.

STEP 3: Make a backup copy of the existing certificate. 

Create a backup copy of the existing httpd.pem. If something goes wrong you can restore the certificate from backup:

cp /etc/dnsmanager/certs/http.pem /etc/dnsmanager/certs/http.pem-bck

Install the New Certificate

The new http.pem file contains the the primary certificate received from the CA Authority. If a intermediate certificate should be installed then it should be concatenated into the same file as the primary certificate.

The new.key file contains the private key generated earlier.

STEP 1: Copy the key to the proper location and rename the key: 

cp /root/new.key  /etc/dnsmanager/certs/http.pem

STEP 2: Copy the certificate received from your CA authority into http.pem file:

cat /root/newcert.crt >> /etc/dnsmanager/certs/http.pem

If an intermediate SSL certificate should be installed you have to make sure that is concatenated into the same file as the primary certificate.

cat /root/intermediate_cert.crt >> /etc/dnsmanager/certs/http.pem

STEP 3: Change the permission and the ownership of the http.pem file like this:

chmod 640 /etc/dnsmanager/certs/http.pem
chown httpsa: /etc/dnsmanager/certs/http.pem

Test Installation of New Certificate

Restart DNS Manager HTTP service using:

/etc/init.d/dnsmanager restart

#trackbackRdf ($trackbackUtils.getContentIdentifier($page) $page.title $trackbackUtils.getPingUrl($page))
  • No labels

Except where otherwise noted, content in this space is licensed under a Creative Commons Attribution 4.0 International.