Securing Shares |
OS Version | File |
---|---|
32-bit Windows |
|
64-bit Windows |
|
Go to Start menu > All Programs > Accessories > Command Prompt and create a new working directory:
> mkdir c:\ssl > cd c:\ssl
Enter the following commands in your Command Prompt window:
OS Version | Commands |
---|---|
32-bit Windows |
> copy "c:\Program Files\Aspera\Enterprise Server\etc\openssl.cnf" "c:\ssl\"
> cd c:\ssl
|
64-bit Windows |
> copy "c:\Program Files (x86)\Aspera\Enterprise Server\etc\openssl.cnf" "c:\ssl\"
> cd c:\ssl
|
Run the following command (where key_name.key is the name of the unique key that you are creating and csr_name.csr is the name of your CSR):
> openssl req -config "c:\ssl\openssl.cnf" -new -nodes -newkey rsa:2048 -keyout key_name.key -out csr_name.csr
> mkdir c:\ssl
> copy "C:Program Files (x86)\Aspera\Enterprise Server\etc\openssl.cnf" "c:\ssl"
Generating a 1024 bit RSA private key ....................++++++ ................++++++ writing new private key to 'my_key_name.key' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [US]:Your_2_letter_ISO_country_code State or Province Name (full name) [Some-State]:Your_State_Province_or_County Locality Name (eg, city) []:Your_City Organization Name (eg, company) [Internet Widgits Pty Ltd]:Your_Company Organizational Unit Name (eg, section) []:Your_Department Common Name (i.e., your server's hostname) []:secure.yourwebsite.com Email Address []:johndoe@yourwebsite.com
... Enter the following 'extra' attributes to be sent with your certificate request A challenge password []: An optional company name []:
After finalizing the attributes, the private key and CSR will be saved to your root directory.
You now need to send your unsigned CSR to a Certifying Authority (CA). Once the CSR has been signed, you have a real Certificate. Follow the key provider's instructions to generate and submit both your private key and the Certificate Signing Request (CSR) to acquire the certificate.
At this point, you may need to generate a self-signed certificate because:
# cd C:\Shares\nginx\conf
# move cert.pem cert.pem.orig
# move cert.key cert.key.orig
> type your_domain_name.crt DigiCertCA.crt >> cert.pem