Create a certificate
Create a server or client certificate for use with SSL/TLS, and optionally a self-signed certificate for testing.
A server certificate proves the server's identity to clients. A client certificate proves the client's identity to the server, and is used for web services or web applications requiring mutual authentication.
To secure your web server and applications, you must send a Certificate Signing Request to one of the trusted Certificate Authority companies on the Internet that will provide you with a certificate you can trust.
The CSR must be created on the server where the certificate is to be deployed. Use the openssl tool to create the CSR.
The steps in this topic mirror the real-world process of obtaining a certificate from a Certificate Authority (CA). The root CA created in Create a root certificate authority acts as the CA, and the certificate created here is the equivalent of one issued by a trusted CA on the internet.
To create a test certificate signed by a local certificate authority, perform the following steps:
Once you have a certificate, configure it according to its intended use:
| Use | Action |
|---|---|
| Server | Configure in your web server (for example, IIS or Apache). For an example, go to Configuring the Apache web server for HTTPS. |
| Client (web service) | Configure entries in the FGLPROFILE file. For details, go to Set FGLPROFILE entries for the client certificate. |
| Client (web application, HTTPS) | Install the certificate in the browser or OS keystore/keychain. |
For client certificates, you also need to declare the server's CA List:
| Use | Action |
|---|---|
| Client (web service) | Configure entries in the FGLPROFILE file. For details, go to Set FGLPROFILE entries for the CA list. |
| Client (web application, HTTPS) | Install the CA List in the browser or OS keystore/keychain. For an example using a Windows keystore, go to Import a CA into the Windows key store. For details on creating a CA list, go to Create a certificate authority list. |