Difference between revisions of "Using Your Own SSL Certificate"
[unchecked revision] | [unchecked revision] |
Ltalaschus (talk | contribs) |
Ltalaschus (talk | contribs) |
||
Line 110: | Line 110: | ||
* Copy certificate, private key and the certificates of the certificate chain into the OpenSSL directory. | * Copy certificate, private key and the certificates of the certificate chain into the OpenSSL directory. | ||
* Open an elevated command prompt and navigate to the OpenSSL directory. | * Open an elevated command prompt and navigate to the OpenSSL directory. | ||
− | * Create the PFX container by executing the following command: | + | * Create the PFX container by executing the following command, adjust the file names of necessary: |
openssl pkcs12 -export -out certificate.pfx -inkey privateKey.key -in certificate.crt -certfile CACert.crt | openssl pkcs12 -export -out certificate.pfx -inkey privateKey.key -in certificate.crt -certfile CACert.crt | ||
* Import the content of the PFX container into the computer's personal certificate store by executing the following command: | * Import the content of the PFX container into the computer's personal certificate store by executing the following command: |
Revision as of 15:25, 22 February 2016
Background
During the installation of MailStore Server, an SSL certificate is generated which all MailStore Server components use when an encrypted connection is to be established. Since the certificate is issued to the server name MailStoreServer and does not come from a reliable certification authority (CA), it is not trusted by the client side.
Because of this, the following warning message is displayed when calling up MailStore Web Access via HTTPS (SSL):
Besides the option to use a certificate from a trusted CA, one could create a self signed certificate and deploy it to the clients by using group policies. This procedure is described in the article Deploying a Self-signed SSL Certificate.
To configure MailStore Server for the use of your own certificate, please proceed as follows:
Creating a Certificate Signing Request (CSR)
Multiple tools like OpenSSL, certreq and the MMC snap-in Certificates are available to create a certificate signing request (CSR). The following steps describe how to generate such a certificate signing request with certreq and how to import the resulting certificate into the windows certificate store. certreq is shipped with most windows versions.
- Log on to the MailStore Server computer.
- Prepare a text file request.inf with the following content:
;----------------- request.inf ----------------- [Version] Signature="$Windows NT$" [NewRequest] ; replace Subject attributes in the line below with real values Subject = "CN=mailstoreserver.example.com, OU=Department, O=Organisation, L=Locality, S=State, C=Country" KeySpec = 1 KeyLength = 2048 Exportable = TRUE FriendlyName = mailstoreserver.example.com MachineKeySet = TRUE SMIME = False PrivateKeyArchive = FALSE UserProtected = FALSE UseExistingKeySet = FALSE ProviderName = "Microsoft RSA SChannel Cryptographic Provider" ProviderType = 12 RequestType = PKCS10 KeyUsage = 0xa0 [EnhancedKeyUsageExtension] OID = 1.3.6.1.5.5.7.3.1 ; this is for Server Authentication
- Adjust the Subject and FriendlyName values according to your needs.
- Save the file.
- Open an elevated command prompt and navigate to the directory where the request.inf is stored.
- Create the CSR by executing the following command:
certreq -new request.inf request.csr
Optional: Subject Alternative Names (SAN)
If the certificate should be valid for multiple host names, so called Subject Alternative Named (SAN) must be included in the CSR. Add the Extensions section as shown below to the the end of the request.inf file and adjust the host names to your needs or add additional ones by appending additional _continue_ lines. Then save the file and create the request as explained previously.
[Extensions] 2.5.29.17 = "{text}" _continue_ = "DNS=mailstoreserver.example.com&" _continue_ = "DNS=mailstoreserver&"
Important notice: When SANs are defined, the CN in the Subject field will be ignored by clients. Therefore all valid host names have to be added to the SAN extension.
Validating the Certificate Signing Request
To verify that the CSR is correct, execute the following command to display it in a human readable format:
certutil -dump request.csr
Submitting the Certificate Signing Request
Submit the CSR to your preferred CA. Usually you upload the CSR file to a website of the CA. The CA might ask for the server platform during the submission process. Selecting IIS 7 or None of the listed should be sufficient. After successful approval of the CSR, you will get the signed certificate in return.
Please note: Nowadays the certificate mostly is signed by intermediate CAs. It is required that the certificate of the intermediate CA is imported into the certificate store sign the require the installation of intermediate CA certificates. Detailed information about the installation process of intermediate CA certificates is typically included in the electronic delivery of your certificate.
Alternative 1: Importing the Certificate using MMC
- Log on to the server as administrator.
- Click on Start | Execute.
- Execute the command mmc.
- Select File | Add/Remove Snap-In | Add | Certificate.
- Select Local Computer Account and then Local Computer.
- Click on Finish and close any open dialog windows.
- In the management console, select My Certificates | Certificates.
- Right-click on the folder Certificates and select All Tasks | Import.
- Follow the instructions in the wizard and select the file containing the certificate and the private key, if applicable.
- On the page Certificate Store select the container My Certificates and finish the wizard.
- The certificate is now shown in the container My Certificates.
- To verify this and to make sure that the private key for the certificate is available, open the certificate with a double-click.
Alternative 2: Importing the Certificate using certreq
- Open an elevated command prompt and navigate to the directory where the certificate file is stored.
- Execute the following command to import the certificate into the computer's personal certificate store:
certreq -accept certificate.cer
- Use MMC's certificate snap-in or certlm.msc (Windows Server 2012 or newer only) to verify that the certificate has been imported properly in the computer's Personal certificate store and that a matching private key can be found.
Using the Certificate with MailStore Server
- Open the MailStore Server Service Configuration.
- Select IP Addresses and Ports.
- In the section you want to change to certificate for, click on the button next to the Server Certificate field and select Select from Certificate Store...
- Choose the new certificate from the certificate store.
- Confirm your entries and restart the MailStore Server service.
Appendix: Creating a PFX Container with OpenSSL
When the CSR was created with OpenSSL, the private key is never stored in the Windows certificate store. To use certificates that have been created with OpenSSL in MailStore, it is therefore required to merge the private key, certificate and optionally the CA's certificate chain into a PFX container. This container can then be imported into Window's certificate store.
- Copy certificate, private key and the certificates of the certificate chain into the OpenSSL directory.
- Open an elevated command prompt and navigate to the OpenSSL directory.
- Create the PFX container by executing the following command, adjust the file names of necessary:
openssl pkcs12 -export -out certificate.pfx -inkey privateKey.key -in certificate.crt -certfile CACert.crt
- Import the content of the PFX container into the computer's personal certificate store by executing the following command:
certutil -importpfx certificate.pfx