Organizations that do not have
existing CA infrastructure can obtain a CA private key and certificate through a well-known,
external service, such as
VeriSign™, or execute the following procedure to
generate their own CA private key and certificate.
# openssl req -x509 -days 365 -newkey rsa:1024 -keyout /tmp/root_key.pem –out
/tmp/root_req.pem
Generating a 1024 bit RSA private key
...................++++++
..............++++++
writing new private key to '/tmp/root_key.pem'
Enter PEM pass phrase:Trend
-----
You are about to be asked to enter information that will be incorporated into your
certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [GB]:DE
State or Province Name (full name)
[Berkshire]:Bavaria
Locality Name (eg, city) [Newbury]:Munich
Organization Name (eg, company) [My Company Ltd]: Trend
Micro
Organizational Unit Name (eg, section) []:Global
Training
Common Name (eg, your name or your server's host name) []:EF
Email Address []:email@domain.com
After the completion of this procedure, the /tmp/root_key.pem file contains
the private key encrypted with the “Trend” password. The /tmp/root_key.pem file
contains the self-signed certificate that must be distributed to all clients and servers.
Both are
stored in the PEM-format.
 |
WARNING
The Organization (O) field for the CA and key owners must be the same.
|
After obtaining a CA private key and certificate: