Changes between Version 7 and Version 8 of CAL Certificate Authority


Ignore:
Timestamp:
11/30/05 14:17:42 (20 years ago)
Author:
Daniel Kahn gillmor
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • CAL Certificate Authority

    v7 v8  
    88If you want to smoothly use secure connections to servers on the CAL network, download that file and import it into your browser.
    99
    10 == creating a personal certificate ==
    11 
    12 The certificate authority is also used at the moment to sign certificates for individual users.  If you would like a certificate for yourself to use within CAL, follow these instructions:
    13 
    14 === prerequisites ===
    15 
    16 This assumes you are running a reasonable operating system which has [http://www.openssl.org/ openssl] installed.  This probably does not include [http://www.microsoft.com/ Windows].
    17 
    18 === download the setup script ===
    19 
    20 The setup script is attached to this wiki page as [attachment:CALpkcs12?format=txt CALpkcs12].  it is a bash script, and should be made executable with `chmod u+x`
    21 
    22 === generating a private key and certificate request ===
    23 
    24 Run the following command and provide reasonable answers to the questions it asks you:
    25 
    26 {{{
    27 [dkg@squeak test]$ chmod u+x CALpkcs12
    28 [dkg@squeak test]$ ./CALpkcs12 newkey
    29 Choose your preferred user name: [dkg] dkg
    30 Enter your current e-mail address: [dkg@localdomain] dkg@example.org
    31 Choose a passphrase:
    32 Confirm the passphrase:
    33 Generating a 2048 bit RSA private key
    34 ...................................+++
    35 .........................................+++
    36 writing new private key to '.CAL-key.pem'
    37 -----
    38 trying to mail new certificate request to the CAL network admin <omitted here>
    39 Success!  You may want to also mail the CAL network admin
    40 <omitted here> a brief followup e-mail about your new account
    41 registration.
    42 [dkg@squeak test]$
    43 }}}
    44 
    45 So far, you've created a key and a certificate request.  The system administrator still needs to provide you with a full-fledged certificate.  Don't lose the files in this directory!
    46 
    47 === creating the PKCS12 from the generated certificate ===
    48 
    49 After receiving and verifying your certificate request, the system administrator will send you a file called `CAL-cert.pem`.  Save it in the same directory as your other certificates, and you can now run the following command:
    50 
    51 {{{
    52 [dkg@squeak test]$ CALpkcs12 newcert
    53 Where is the downloaded certificate? [CAL-cert.pem]
    54 Enter your passphrase:
    55 Created pkcs12 certificate bundle in file CAL-cert.p12.  You
    56 can now import this bundle into your favorite web browser.
    57 [dkg@squeak test]$
    58 }}}
    59 
    60 You can throw away all of these files now, with the exception of `CAL-cert.p12`, which you will use to configure your client software.
    61 
    62 == Using the certificate in different clients ==
    63 
    64 You'll probably want to use this certificate in different clients.  For example, you will find it useful in your web browser.
    65 
    66 === configuring Mozilla ===
    67 Under Mozilla, choose "Edit|Preferences", then select "Privacy and Security" in the left-hand pane, and choose "Certificates" from the sub-menu.
    68 
    69 Click "Manage Certificates", ensure that the "Your Certificates" tab is active, and choose "import".  Point Mozilla at `cal-cert.p12`, and give it the password you gave in the "Export Password" step above.  Mozilla should now know how to identify you to the server.
    70 
    71 === configuring Firefox ===
    72 Under firefox, choose "Edit", "Preferences", then under "Advanced", expand the "Certificates" section.  Click "Manage Certificates".  Ensure that the "Your Certificates" tab is active, and choose "import".   Point Firefox at `cal-cert.p12`, and give it the password you gave in the "Export Password" step above.  Firefox should now know how to identify you to the server.
     10You may also want to consider setting up a [wiki:"Personal Certificate"]