Obtaining a trusted certificate

Top  Previous  Next

If you decide to use the web interface for performing file transfers, you have the option of securing these transfers using HTTPS. The HTTPS protocol requires an SSL certificate to be used. You can either generate your own self-signed certificate in the Keys modules of MFT Server Manager (See Key management overview), or you can create a certificate signing request (CSR) and have your certificate signed by a third party known as a certificate authority (CA).

 

Note

 

When using your own self-signed certificate, the client web browser may display a warning message letting the user know that the certificate in use is not signed by a known CA. This is not an error but rather a warning to the user that the certificate has not been validated by a trusted authority. If you wish to avoid this message you should create a certificate signing request and have that certificate signed by a trusted certificate authority.

 

 

Generating a private key

 

The first step in obtaining a CA signed certificate is to generate your own server key.  The most important thing to understand when generating your server key is that the Common Name field should match the domain name that clients will use when connecting to your FTPS or HTTPS server.  For example, if your HTTPS or FTPS server will be served under the domain www.mydomain.com  then this is the value you should use in your Common Name field when generating your private key.

 

See also

 

Generating a key

 

Generating a CSR

 

The next step is to create a certificate signing request for your server key.  The CSR will be used by the CA in order to create a signed certificate.  To generate a CSR, highlight the desired server key in the Key Manager and click the Generate CSR button.  A dialog will prompt you for the location in which to store the CSR.

 

Figure 87

 

clip0087

 

 

Submitting CSR to CA

 

The next step is to submit your CSR to the CA for use in generating your signed certificate.  Please consult your CA for instructions on how to accomplish this.  Your CA may ask you in which format you would like the certificate.  If this option is presented to you select the Other, Apache or Java option to receive the certificate in a common format.

 

Importing signed certificate

 

The last step is to import the signed certificate issued to you by your CA.  To import the signed certificate select the server key that was used to generate the CSR and click the Import Certificates button.  You will be prompted for the path of the certificate file issued to you by your CA.

 

Note

 

Some CA issue an intermediate certificate in addition to a signed certificate.  If your certificate came with an intermediate certificate you will need to append the contents of the intermediate to the signed certificate issued to you by your CA.  If your certificate did not come with an intermediate certificate you may skip these steps.

 

1.Open your signed certificate and intermediate certificate files using a text editor e.g. notepad or vi.
2.Copy the full contents of the intermediate certificate and append to the end of signed certificate file.
3.Save signed certificate and continue with process of importing signed certificate.

 

 

 

Figure 78

 

clip0078

 

Certificates file - The file containing signed certificate.

 

File password - The password protecting certificate. Leave blank if none.

 

Alias in file - The certificate alias in file.  Leave blank if none.

 

Verifying signed certificate

 

Upon successfully installing your signed certificate you can verify that it is working by connecting using any HTTPS or FTPS client and viewing the certificate details.  You should notice in the certificate details that the CA is listed as a trusted authority for the certificate.





Home | Company | Products | Solutions | Purchase | Support | Services | Blog

© 2021 Advanced Systems Concepts, Inc.