Sign a Certificate
Once you generate?a Certificate Signing Request (CSR), you can sign it with a private key.
gateway90
Once you generate?a Certificate Signing Request (CSR), you can sign it with a private key.
To sign a CSR using a private key
:
- In the Policy Manager, select [Tasks] >Manage Private Keysfrom the Main Menu. The Manage Private Keys dialog appears.
- Select the private key to be used for the signing. Eligible keys are indicated by the
icon.
It is possible to use a key that is not flagged as being eligible for signing, but be aware that certain software systems may reject certificates signed by that key. - Click [Sign Cert]. You are prompted to select the Certificate Signing Request to open. If you chose an ineligible key, you must acknowledge the consequences.
- Locate the .pem file that contains the CSR that you are accepting. This creates a new signing certificate using the private key that was selected in step 2.
- The properties for the newly created signing certificate are displayed. Modify any settings as necessary.SettingDescriptionSubject DNThe subject DN of the certificate signing request.Expiry AgeThe number of days before the certificate expires. By default, this is730days. You can change the default usingpkix.csr.defaultExpiryAgecluster property.Hash AlgorithmChoose the Hash Algorithm to use:Automatic, SHA-1,SHA-256,SHA-384,SHA-512.The default "<Automatic>" setting selects the algorithm as follows:
- If the system property,com.l7tech.security.cert.alwaysSignWithSha1is defined, or if the issuer public key is a short key, then SHA-1 is used.
- Otherwise, it uses SHA-384.
Public KeyDisplays details about the public key in brief. Clickto view the full public key details.
- Click [OK] to close and save the certificate properties. You are prompted to save the resulting certificate chain. Note that the destination file also uses the .pem extension, since the file is PEM-encoded.
- Enter a name for the signed certificate chain and then click [Save].
A new certificate chain is created. You can see this chain in the Private Key Properties.
The new certificate chain belongs to the client and is
not
kept by the CA API Gateway
. You can make the Gateway trust the newly signed certificate by doing one of the following:- To trust the certificate as a client certificate, import it as an Internal or LDAP user's client certificate. For information on importing it for an internal user, see Creating an Internal User.
- To trust the certificate for some other purpose, import it using the Manage Certificates task.