SSL Configuration
This page provides a step by step guide to getting PKI authentication working correctly for Unix hosts so as to be able to sign deliveries from cURL.
First make sure you have a copy of your organisation’s CA certificate.
Check that the CA certificate works by running the following command:
If the response starts with the line:
then you do not have the correct CA certificate.
If the response contains the line
then one-way SSL authentication using the CA certificate is successful.
The VBScript file to check windows certificates is check-certs.vbs (TODO link).
Final Testing
Once one-way authentication has been tested, two-way authentication should be configured:
The server certificate and private key should be concatenated to create a PEM file:
Finally, test for 2-way authentication:
If the response contains the line
then two-way SSL authentication is successful.
Final Tidy Up
The files ca.crt and hostname.pem are the only files required for two-way authentication and should be stored permanently on the server; all other remaining files may be deleted or backed up if required.
Certificate Expiry
PKI certificates expire after 2 years. To check the expiry date of a certificate, run the following command:
This will give a response looking similar to: