Solved

How to use an existing SSL Certificate

Posted on 2010-11-13
8
274 Views
Last Modified: 2012-05-10
My web server physically died...I have a new one in place. I have the old hard drive and just recently renewed my Certificate. I have the site alive - but need to re-implement that Certificate.
0
Comment
Question by:ri95
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 3
8 Comments
 
LVL 10

Expert Comment

by:George Khairallah
ID: 34128534
In this case, if your old hard drive can't actually be booted into the OS, I think your easiest solution would be to regenerate a new CSR on your new server.
Before you submit it though, you would have to go to your cert authority, and revoke the old certificate. (you may be able to do this online, or you may have to contact them).

Once the old certificate is revoked, then you can submit the new CSR and process just like a new certificate.

Hope this helps.
0
 

Author Comment

by:ri95
ID: 34128541
The hard drive won't boot because of the change in hardware...but it is live and I also have copies of the Certificate
0
 
LVL 10

Accepted Solution

by:
George Khairallah earned 500 total points
ID: 34128566
oh ok, well if you have a .pfx backup of your certificate, you can restore the cert on your new server.
(the .crt file alone will not be enough, as you need to have the associated private key in addition to the certificate).
This article has the steps to backup the cert (if you can still boot up that hard drive temporarily :
http://www.entrust.net/knowledge-base/technote.cfm?tn=8174 

Also, a requirement for this, is that your new server is named exactly as your old one, otherwise, the certificate will throw an error saying that the name of the cert doesn't match the host it's connecting to.
0
Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

 

Author Comment

by:ri95
ID: 34128598
Server has exact name
I have original certificate,
I do not think I have an actual generated backup
0
 

Author Comment

by:ri95
ID: 34128881
got it done thanks...used an application called stunnel. Everything go to go now!
0
 

Author Closing Comment

by:ri95
ID: 34128886
the answers were not wrong...just not right on what i wanted to do. While they would have worked...stunnel took care of it. I was able to simply use what i had on the old drive and place it on the new one without revoking, or going through all the orignal steps again. My three year certificate is in place! Thanks!
0
 
LVL 10

Expert Comment

by:George Khairallah
ID: 34128926
Glad it worked out for you, and thanks for awarding the points even in the basis of effort :)

Best!
0
 

Author Comment

by:ri95
ID: 34129134
Effort counts so much...one works better if they know someone else is helping.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A quick step-by-step overview of installing and configuring Carbonite Server Backup.
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question