Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Code Block
[ req ]
prompt = no
distinguished_name = server_distinguished_name
req_extensions = v3_req
default_md = sha256

[ server_distinguished_name ]
commonName = *.swarm.example.com
stateOrProvinceName = Texas
countryName = US
emailAddress = admin@example.com
organizationName = Example Inc.
organizationalUnitNamelocalityName = ITAustin

[ v3_req ]
basicConstraints = CA:FALSE
keyUsage = nonRepudiationcritical, digitalSignature, keyEncipherment
extendedKeyUsage=critical,serverAuth,clientAuth
subjectAltName = @alt_names

[ alt_names ]
DNS.0 = .1=swarm.example.com
DNS.2=*.swarm.example.com

Generate the self-signed CA private key

Code Block
openssl genrsa  -out YOUR_DOMAINselfsignCA.key 30724096

Generate certificate signing requestthe self-signed CA root certificate

Code Block
openssl req -new -x509 -days 365 -key selfsignCA.key -out selfsignCA.crt -batch

Time to create wildcard custom domain certificate (YOUR_DOMAIN.crt) and sign it with your self-signed CA root

Code Block
openssl genrsa -out YOUR_DOMAIN.key 4096

Generate certificate signing request for your domain

Code Block
openssl req -new -nodes -outkey YOUR_DOMAIN.csrkey -config openssl.conf -sha256 -newkey rsa:3072

...

out YOUR_DOMAIN.csr

Generate the final domain certificate

Code Block
openssl x509 -req -sha256 -days 364 -in YOUR_DOMAIN.csr -CA selfsignCA.crt -signkeyCAkey YOUR_DOMAINselfsignCA.key -CAcreateserial -out YOUR_DOMAIN.crt -extensions v3_reqdays 365 -sha256 -extfile openssl.conf

...

 -extensions v3_req

Generate the certificate pem file.

Code Block
cat YOUR_DOMAIN.crt

...

 YOUR_DOMAIN.key

...

 > YOUR_DOMAIN.pem

...

Place the pem file where you configured it in haproxy.cfg example here put it in /etc/pki/tls/certs

...

The host <contentgatewayIP>:8091 needs to be used in the login page to connect for Swarm UI in the configuration example above.

Info

Copy your YOUR_DOMAINselfsignCA.crt file to /etc/pki/ca-trust/source/anchors and run update-ca-trust to test the new certificate from a CentOS 7.x client. curl may then used to test the certificate validation once the command completes.

...