-
Notifications
You must be signed in to change notification settings - Fork 148
Issuing Admin Certificate with NSS
Endi S. Dewata edited this page Oct 28, 2020
·
2 revisions
This page describes the process to sign the admin CSR and issue the certificate using NSS.
This page assumes an NSS database has been created as follows:
$ echo Secret.123 > password.txt $ openssl rand -out noise.bin 2048 $ mkdir nssdb $ certutil -N -d nssdb -f password.txt
It also assumes a CA signing certificate is present in the NSS database.
Sign the CSR with the CA signing certificate with the following commands:
$ CA_SKID=...
$ OCSP=...
$ echo -e "y\n\ny\ny\n${CA_SKID}\n\n\n\n2\n7\n${OCSP}\n\n\n\n" | \
certutil -C \
-d nssdb \
-f password.txt \
-m $RANDOM \
-a \
-i admin.csr \
-o admin.crt \
-c "ca_signing" \
-3 \
--extAIA \
--keyUsage critical,dataEncipherment,keyEncipherment,digitalSignature,nonRepudiation \
--extKeyUsage clientAuth,emailProtection
It will generate the admin certificate in admin.crt.
|
Tip
|
To find a page in the Wiki, enter the keywords in search field, press Enter, then click Wikis. |