Solved

how to create ssl certifications on linux host

Posted on 2014-04-16
5
472 Views
Last Modified: 2014-04-28
Hello,

I got below request from one of the user,

Please issue a UC Cert for below hosts. Please provide PRIVATE KEY as well.

Hosts:
1)esg-qa
2)esg-uat
3)esg-lt
4)esg-stage

Duration: 3 Years, Algorithm: SHA-2


Can someone please guide me to walkthrough step by step in creating the ssl certs on above host ?
0
Comment
Question by:sudhirgoogle
  • 3
  • 2
5 Comments
 
LVL 1

Author Comment

by:sudhirgoogle
ID: 40005884
what is the difference between SSL Cert for each host - or-  it be one UC cert ?
0
 
LVL 9

Assisted Solution

by:rfportilla
rfportilla earned 500 total points
ID: 40005906
An SSL Cert for each requires a unique IP address for each.  That's why UC certs were created.  You can have one UC Cert with one IP address and multiple domains.  

You have to make sure that all of the browsers that consume these sites will support them (requires TLS 3).

Do you need to create the cert or purchase?  Godaddy sells them.
0
 
LVL 9

Expert Comment

by:rfportilla
ID: 40005913
This is documentation on using them with Apache:

https://wiki.apache.org/httpd/NameBasedSSLVHostsWithSNI
0
 
LVL 1

Author Comment

by:sudhirgoogle
ID: 40007003
Thanks for you comments. I don't have to purchase, i need to create host based certs. instead of IP can i create based on hostnames?
0
 
LVL 9

Accepted Solution

by:
rfportilla earned 500 total points
ID: 40007643
The answer is yes.  Technically, they are all host based. The older certs were based on a mechanism that required ip negotiation before the hostname was passed to the server.  Therefore, the server had to know that only one host could exist for that ip address.  The newer certs address this problem.  They are commonly called SNI certs.

Honestly, if I were to provide the steps for creating an SNI cert, I would just Google it and post the link.   I don't know how to create them off the top of my head.  I will let you Google it and if you have trouble finding directions, let me know.

Hope this helps.
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Suggested Solutions

As a financial services provider, your business is impacted by two of the strictest federal regulations on record: the Sarbanes-Oxley Act and the Gramm-Leach-Bliley Act. Correctly implementing faxing into your organization to provide secure, real-ti…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now