Changes between Version 1 and Version 2 of CAL Certificate Authority


Ignore:
Timestamp:
11/30/05 05:45:03 (20 years ago)
Author:
Daniel Kahn gillmor
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • CAL Certificate Authority

    v1 v2  
     1[[PageOutline]]
    12= CAL Certificate Authority =
     3
    24The Columbia Astrophysics Laboratory is going to run its own certificate authority.
    35
     
    57
    68If you want to smoothly use secure connections to servers on the CAL network, download that file and import it into your browser.
     9
     10The certificate authority is also used at the moment to sign certificates for individual users.  If you would like a certificate for yourself to use within CAL, follow these instructions:
     11
     12== creating a personal certificate ==
     13
     14=== prerequisites ===
     15
     16This assumes you are running a reasonable operating system which has [http://www.openssl.org/ openssl] installed.  This probably does not include [http://www.microsoft.com/ Windows]. 
     17=== download the setup script ===
     18
     19The setup script is attached to this wiki page as CALpkcs12.  it is a bash script, and should be made executable with `chmod u+x`
     20
     21=== generating a private key and certificate request ===
     22
     23Run the following command and provide reasonable answers to the questions it asks you:
     24
     25{{{
     26[dkg@squeak test]$ chmod u+x CALpkcs12
     27[dkg@squeak test]$ ./CALpkcs12 newkey
     28Choose your preferred user name: [dkg] dkg
     29Enter your current e-mail address: [dkg@localdomain] dkg@example.org
     30Choose a passphrase:
     31Confirm the passphrase:
     32Generating a 2048 bit RSA private key
     33...................................+++
     34.........................................+++
     35writing new private key to '.CAL-key.pem'
     36-----
     37trying to mail new certificate request to the CAL network admin <omitted here>
     38Success!  You may want to also mail the CAL network admin
     39<omitted here> a brief followup e-mail about your new account
     40registration.
     41[dkg@squeak test]$
     42}}}
     43
     44So far, you've created a key and a certificate request.  The system administrator still needs to provide you with a full-fledged certificate.  Don't lose the files in this directory!
     45
     46=== creating the PKCS12 from the generated certificate ===
     47
     48After receiving and verifying your certificate request, the system administrator will send you a file called `CAL-cert.pem`.  Save it in the same directory as your other certificates, and you can now run the following command:
     49
     50{{{
     51[dkg@squeak test]$ CALpkcs12 newcert
     52Where is the downloaded certificate? [CAL-cert.pem]
     53Enter your passphrase:
     54Created pkcs12 certificate bundle in file CAL-cert.p12.  You
     55can now import this bundle into your favorite web browser.
     56[dkg@squeak test]$
     57}}}
     58
     59== using the certificate in different clients ==
     60
     61You'll probably want to use this certificate in different clients.  For example, you will find it useful in your web browser.
     62
     63=== configuring Mozilla ===
     64Under Mozilla, choose "Edit|Preferences", then select "Privacy and Security" in the left-hand pane, and choose "Certificates" from the sub-menu.
     65
     66Click "Manage Certificates", ensure that the "Your Certificates" tab is active, and choose "import".  Point Mozilla at `cal-cert.p12`, and give it the password you gave in the "Export Password" step above.  Mozilla should now know how to identify you to the server.
     67
     68=== configuring Firefox ===
     69Under firefox, choose "Edit", "Preferences", then under "Advanced", expand the "Certificates" section.  Click "Manage Certificates".  Ensure that the "Your Certificates" tab is active, and choose "import".   Point Firefox at `cal-cert.p12`, and give it the password you gave in the "Export Password" step above.  Firefox should now know how to identify you to the server.