Template:Generating certificates and keys: Difference between revisions

From Teltonika Networks Wiki
No edit summary
Line 17: Line 17:
     <tr>
     <tr>
         <td>CA certificate</td>
         <td>CA certificate</td>
         <td style="text-align: center;">→
         <td style="text-align: center;">→</td>
         <td style="text-align: right;"><i>C:\Program Files\OpenVPN\easy-rsa\pki</i></td>
         <td style="text-align: right;"><i>C:\Program Files\OpenVPN\easy-rsa\pki</i></td>
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Diffie-Hellman parameters</td>
         <td>Diffie-Hellman parameters</td>
         <td style="text-align: center;">→
         <td style="text-align: center;">→</td>
         <td style="text-align: right;"><i>C:\Program Files\OpenVPN\easy-rsa\pki</i></td>
         <td style="text-align: right;"><i>C:\Program Files\OpenVPN\easy-rsa\pki</i></td>
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Client and Server keys</td>
         <td>Client and Server keys</td>
         <td style="text-align: center;">→
         <td style="text-align: center;">→</td>
         <td style="text-align: right;"><i>C:\Program Files\OpenVPN\easy-rsa\pki\private</i></td>
         <td style="text-align: right;"><i>C:\Program Files\OpenVPN\easy-rsa\pki\private</i></td>
     </tr>
     </tr>
     <tr>
     <tr>
         <td>Client and Server certificates</td>
         <td>Client and Server certificates</td>
         <td style="text-align: center;">→
         <td style="text-align: center;">→</td>
         <td style="text-align: right;"><i>C:\Program Files\OpenVPN\easy-rsa\pki\issued</i></td>
         <td style="text-align: right;"><i>C:\Program Files\OpenVPN\easy-rsa\pki\issued</i></td>
     </tr>
     </tr>
</table>
</table>

Revision as of 08:35, 30 November 2020

Step 3: generating certificates and keys

  • Now we can start generating the certificates and keys. Begin with the certificate authority (CA) - the root certificate file that will be used to sign other certificates and keys:
    ./easyrsa build-ca nopass
  • Next, build the server certificate and key:
    ./easyrsa build-server-full server nopass
  • Next, build certificates and keys for the clients:
    ./easyrsa build-client-full Client1 nopass
    Note: replace Client1 with this client's Common Name (CN). Omit "nopass" and you will be prompted to choose the client's password.

  • Lastly, generate Diffie Hellman parameters:
    ./easyrsa gen-dh

The generated and signed files should appear in the following directories (by default):

File(s) Location
CA certificate C:\Program Files\OpenVPN\easy-rsa\pki
Diffie-Hellman parameters C:\Program Files\OpenVPN\easy-rsa\pki
Client and Server keys C:\Program Files\OpenVPN\easy-rsa\pki\private
Client and Server certificates C:\Program Files\OpenVPN\easy-rsa\pki\issued