<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://wiki.define-technology.com/mediawiki-1.35.0/index.php?action=history&amp;feed=atom&amp;title=Linux%3A_Using_the_Define-Technology.com_CA</id>
	<title>Linux: Using the Define-Technology.com CA - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://wiki.define-technology.com/mediawiki-1.35.0/index.php?action=history&amp;feed=atom&amp;title=Linux%3A_Using_the_Define-Technology.com_CA"/>
	<link rel="alternate" type="text/html" href="http://wiki.define-technology.com/mediawiki-1.35.0/index.php?title=Linux:_Using_the_Define-Technology.com_CA&amp;action=history"/>
	<updated>2026-05-04T21:20:04Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.0</generator>
	<entry>
		<id>http://wiki.define-technology.com/mediawiki-1.35.0/index.php?title=Linux:_Using_the_Define-Technology.com_CA&amp;diff=32640&amp;oldid=prev</id>
		<title>Antony: first draft</title>
		<link rel="alternate" type="text/html" href="http://wiki.define-technology.com/mediawiki-1.35.0/index.php?title=Linux:_Using_the_Define-Technology.com_CA&amp;diff=32640&amp;oldid=prev"/>
		<updated>2021-11-09T18:33:25Z</updated>

		<summary type="html">&lt;p&gt;first draft&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;This needs formatting&lt;br /&gt;
&lt;br /&gt;
ssh into the demo server deploy node as root&lt;br /&gt;
&lt;br /&gt;
cd dt-certs&lt;br /&gt;
&lt;br /&gt;
in this folder there are lots of certs and the key files which are the CA the most important ones are &lt;br /&gt;
&lt;br /&gt;
define-technology.com_CA.key - PRIVATE KEY DO NOT EXPOSE&lt;br /&gt;
ca_passphrase - PRIVATE KEY passphrase DO NOT EXPOSE&lt;br /&gt;
define-technology.com_CA.pem - public cert this is on our website to allow us to curl it to make adding it to customer machines trivial&lt;br /&gt;
&lt;br /&gt;
step one make a private key for your new https cert (&lt;br /&gt;
this should be done on the machine you are wanting to install the cert on, in this instance this is actually the demo server deploy node so I&amp;#039;m following my own rules for once)&lt;br /&gt;
&lt;br /&gt;
the filename is the hostname here but it DOES NOT MATTER it could be banana&lt;br /&gt;
&lt;br /&gt;
openssl genrsa -out deploy.mgmt.dt.internal.key 4096&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
you now have a keyfile with no passphrase (you can add one if you like but if you do you will probably end up embedding it in plaintext ins a config file at some point... and not everything supports it so if you want this RTFM)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
step 2 make a Certificate Signing Request file&lt;br /&gt;
&lt;br /&gt;
In this step we take the private key created in the previous step and set the subject of the key in which the CommonName (CN) should be the primary hostname of the server in this case I am using deploy.mgmt.dt.internal&lt;br /&gt;
&lt;br /&gt;
openssl req -new -key deploy.mgmt.dt.internal.key -out deploy.mgmt.dt.internal.csr -subj &amp;quot;/C=UK/ST=London/O=Define Technology/CN=deploy.mgmt.dt.internal&amp;quot;&lt;br /&gt;
&lt;br /&gt;
deploy.mgmt.dt.internal.key is the keyfile from step one &lt;br /&gt;
deploy.mgmt.dt.internal.csr is the csr file we are creating&lt;br /&gt;
&amp;quot;/C=UK/ST=London/O=Define Technology/CN=deploy.mgmt.dt.internal&amp;quot; is the subject C= country, ST=State O=Organistaion, CN= CommonName if you wanted to customise it for a customer feel free. /C=US,ST=WA,O=PNNL,CN=deploy.hanford-legacy.internal&amp;quot; is valid too&lt;br /&gt;
&lt;br /&gt;
Step 3&lt;br /&gt;
&lt;br /&gt;
email the csr file to yourself, upluad it via ftp or share it on your website it&amp;#039;s got no private data in it  we just need to get it to the node with the CA key&lt;br /&gt;
&lt;br /&gt;
here it is in the right place already and this is where we add any extra hostname as subjectaltnames. It is best to include the one you want as some webapps like zabbix expect it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
openssl x509 -req -in deploy.mgmt.dt.internal.csr -CA define-technology.com_CA.pem -CAkey define-technology.com_CA.key -passin file:ca_passphrase -CAcreateserial -out deploy.mgmt.dt.internal.crt -days 365 -sha256  -extfile &amp;lt;(printf &amp;#039;subjectAltName=DNS:cephmgr.mgmt.dt.internal,DNS:localhost,IP:10.10.13.1,IP:10.10.12.13,IP:10.10.12.14,IP:10.10.13.13,IP:10.10.13.14&amp;#039;)&lt;br /&gt;
Signature ok&lt;br /&gt;
subject=C = UK, ST = London, O = Define Technology, CN = deploy.mgmt.dt.internal&lt;br /&gt;
Getting CA Private Key&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
add explanation here later&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This makes the .crt file, this is useless without the key which is still on the customers system so you can send it via pastebin for a laugh&lt;br /&gt;
&lt;br /&gt;
here it&amp;#039;s on my system I want to add it to ceph-mgr so I do this:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
cephadm shell --mount /root/dt-certs -- ceph dashboard set-ssl-certificate -i /mnt/dt-certs/deploy.mgmt.dt.internal.crt&lt;br /&gt;
cephadm shell --mount /root/dt-certs -- ceph dashboard set-ssl-certificate-key -i /mnt/dt-certs/deploy.mgmt.dt.internal.key&lt;br /&gt;
&lt;br /&gt;
to put the cert an key in the right place in the container&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
and then &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
cephadm shell --mount /root/dt-certs -- ceph mgr module disable dashboard  &lt;br /&gt;
cephadm shell --mount /root/dt-certs -- ceph mgr module enable dashboard&lt;/div&gt;</summary>
		<author><name>Antony</name></author>
	</entry>
</feed>