Here are basically the steps covered. If you have followed the above sections, this section can be skipped, though detailed is another (similar) method:
# openssl genrsa -des3 -out server.key 1024 Generating RSA private key, 1024 bit long modulus .........++++++ ...................++++++ e is 65537 (0x10001) Enter pass phrase for server.key: Verifying - Enter pass phrase for server.key: # openssl req -new -key server.key -out server.csr Enter pass phrase for server.key: You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]:US State or Province Name (full name) [Some-State]:Illinois Locality Name (eg, city) []:Chicago Organization Name (eg, company) [Internet Widgits Pty Ltd]:SomeCompany Organizational Unit Name (eg, section) []:IT Dept. Common Name (eg, YOUR name) []:www.servername.com Email Address []:admin@servername.com Please enter the following 'extra' attributes to be sent with your certificate request A challenge password []: An optional company name []:
One should send the resulting server.csr file to the CA, and they will send back a server.crt file.
To self sign the certificate:
# openssl x509 -req -days 360 -in server.csr -signkey server.key -out server.crt Signature ok subject=/C=US/ST=Illinois/L=Chicago/O=SomeCompany/OU=IT Dept./CN=www.servername.com/emailAddress=admin@servername.com Getting Private key Enter pass phrase for server.key:
As with the above section, the files server.csr and server.key will be needed for Apache.