Solved

How do I create a Self Signed Certificate - SBS 2011?

Posted on 2012-12-20
4
6,659 Views
Last Modified: 2013-01-02
My wireless will not connect anymore. It runs off of a radius server. The reason I believe it's the certificate, is because a lot of my other certificates expired today.

Problem is I have no idea how to create a Self Signed Certificate. I did it in the past LONG ago on server 2003. I don't remember very well, and I really have no idea where to go at on SBS 2011.


Please help! Our wireless is down until I can get it going.
0
Comment
Question by:Pancake_Effect
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 1

Expert Comment

by:MattyS82
ID: 38711344
is the certificate role assigned to you new server ? You would have to add the role.

Once the role has been installed you should be able to request a new cert through mmc certifcate services snap in.
0
 
LVL 4

Author Comment

by:Pancake_Effect
ID: 38711353
I added the role, I also created that add-in "based off googling things I was able to get part of the way" but how do we request a new one? And once I request it, what do I do from there? Sadly I kind of need a step by step process
0
 
LVL 18

Accepted Solution

by:
Akinsd earned 500 total points
ID: 38713596
The certificate role is entirely a different thing.

Self signed certificates are created in IIS just as you would on a workstation using Internet options in Internet Explorer

Check the following link out.
www.sslshopper.com/article-how-to-create-a-self-signed-certificate-in-iis-7.html.

All the best
Akinsd
0
 
LVL 4

Author Closing Comment

by:Pancake_Effect
ID: 38738014
Amazing! Really easy with that guide, thanks.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Need WiFi? Often, there are perfectly good networks that don't have WiFi capability - and there's a need to add it.  - Perhaps you have an Ethernet port into a network but no WiFi nearby. - Perhaps you have a powerline extender and no WiFi at the…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question