Procedure
1. Create an OpenSSL configuration file.
For example:
[ req ]
req_extensions = v3_req
distinguished_name = req_distinguished_name
[req_distinguished_name]
[ v3_req ]
basicConstraints = CA:FALSE
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
subjectAltName = @alt_names
[alt_names]
DNS.1 = dnsserver10927.company.com
DNS.2 = dnsserver10938.company.com
DNS.3 = dnsserver10955.company.com
The
alt_names
section defines the Subject Alternative Names list and must contain
FQDNs of all nodes in the cluster.
2. Run the following command:
openssl req -out <CSR_request_file>.csr -newkey rsa:2048 -nodes –keyout
<CSR_key_file>.key -config <configuration_file>
In this command:
•
<CSR_request_file>.csr
specifies a CSR file name.
•
<CSR_key_file>.key
specifies a file containing a private key that is used to add the
signed certificate to the system.
•
<configuration_file>
specifies the OpenSSL configuration file that was created in
the previous step.
For example:
openssl req -out createCSR.csr -newkey rsa:2048 -nodes –keyout keyCSR.key -config
configCSR.config
Signing identity certificates for Avaya Aura
®
Web Gateway
using third-party CA certificates
About this task
You can use the following procedure to sign identity certificates for Avaya Aura
®
Web Gateway
using third-party CA certificates.
Note:
In the following procedure, the third-party CA certificate can be a public CA or an internal
private CA.
Certificate configuration using the configuration utility
October 2018
Deploying the Avaya Aura
®
Web Gateway
152