Solved

How do I create a Self Signed Certificate - SBS 2011?

Posted on 2012-12-20
4
5,767 Views
Last Modified: 2013-01-02
My wireless will not connect anymore. It runs off of a radius server. The reason I believe it's the certificate, is because a lot of my other certificates expired today.

Problem is I have no idea how to create a Self Signed Certificate. I did it in the past LONG ago on server 2003. I don't remember very well, and I really have no idea where to go at on SBS 2011.


Please help! Our wireless is down until I can get it going.
0
Comment
Question by:Pancake_Effect
  • 2
4 Comments
 
LVL 1

Expert Comment

by:MattyS82
Comment Utility
is the certificate role assigned to you new server ? You would have to add the role.

Once the role has been installed you should be able to request a new cert through mmc certifcate services snap in.
0
 
LVL 4

Author Comment

by:Pancake_Effect
Comment Utility
I added the role, I also created that add-in "based off googling things I was able to get part of the way" but how do we request a new one? And once I request it, what do I do from there? Sadly I kind of need a step by step process
0
 
LVL 18

Accepted Solution

by:
Akinsd earned 500 total points
Comment Utility
The certificate role is entirely a different thing.

Self signed certificates are created in IIS just as you would on a workstation using Internet options in Internet Explorer

Check the following link out.
www.sslshopper.com/article-how-to-create-a-self-signed-certificate-in-iis-7.html.

All the best
Akinsd
0
 
LVL 4

Author Closing Comment

by:Pancake_Effect
Comment Utility
Amazing! Really easy with that guide, thanks.
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now