Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents
typeflat

Skip ahead to the Submit the certificate request section for an existing certificate request.

Define the certificate subject and subject alternative names

...

  1. Sign in to a computer then start an administrative PowerShell

...

  1. session 

  2. Modify then run the following

...

  1. commands to set the subject

...

  1. and template of the certificate as well as any optional DNS or IP

...

  1. Address subject alternate

...

  1. name values:  

    Code Block

...

  1. languagepowershell
    $Subject = 

...

  1. "<subject for the certificate>"
    

...

  1. $SubjectAlternateNames = @("<certificate SAN #1>","<certificate SAN #2>",...)
    

...

  1. $CertificateIPAddresses = @("<certificate IP address #1>","<certificate IP address #2>",...)

Create the certificate request

...

Log into a server joined to the Austin Active Directory as a user with permissions to request a certificate from the desired template

...

Start an administrative PowerShell session

...

  1. Run the following commands to define the newline string

    Code Block
    languagepowershell

...

  1. $NewLine 

...

In the same administrative PowerShell prompt, run the following to create the certificate policy file

...

  1. = [System.Environment]::NewLine
  2. Run the following commands to create the temporary files: 

    Code Block
    languagepowershell
    $CertificateTemplateFile = New-TemporaryFile
    $CertificateRequestFile = New-TemporaryFile
  3. Run the following commands to define the certificate template:

    Code Block
    languagepowershell
    $CertificateTemplate = @'
    [Version]
    Signature=

...

  1. "

...

  1. $Windows 

...

  1. NT$"
      
    [NewRequest]
    Subject=

...

  1. "CN=

...

  1. %Subject%"
    Exportable=TRUE
    MachineKeySet=TRUE
    KeyLength=2048
    KeySpec=AT_KEYEXCHANGE
      
    [Extensions]
    2.5.29.17=

...

  1. "{text}

...

  1. "
    _continue_=

...

  1. "DNS=

...

  1. %Subject%&

...

  1. "
    

...

  1. '@
  2. Run the following commands to update the subject in the certificate template: 

    Code Block
    languagepowershell
    $CertificateTemplate = $CertificateTemplate.Replace('%Subject%', $Subject)
  3. Run the following commands to add any optional DNS subject alternate names to the certificate

...

  1. template

    Code Block
    languagepowershell
    ForEach (

...

  1. $SubjectAlternateName in 

...

  1. $SubjectAlternateNames) {

...

  1.  $CertificateTemplate = '{0}{1}_continue_=

...

  1. "DNS=

...

  1. {2}&

...

  1. "' -f $CertificateTemplate, $NewLine, $SubjectAlternateName }
  2. Run the following commands to add any optional IP Address subject alternate names to the certificate

...

  1. template

    Code Block
    languagepowershell
    ForEach (

...

  1. $CertificateIPAddress in 

...

  1. $CertificateIPAddresses) {

...

  1.  $CertificateTemplate = '{0}{1}_continue_=

...

  1. "IPAddress=

...

  1. {2}&

...

In the same administrative PowerShell prompt, run the following to create the request:

Code Block
$cert_file_req = ((Get-Location).Path + "\" + $cert_file  + ".req")
certreq -new $cert_file_inf $cert_file_req

Submit the certificate request

  1. If submitting a pre-created certificate request, complete the following instructions:
    1. Log into a server joined to the Austin Active Directory as on a system with permissions to request a certificate from the desired template
    2. Start an administrative PowerShell session and set the $cert_file_req object to the full path of the certificate request file
  2. In the same administrative PowerShell session, run one of the following to set the certificate template:

    • For VMware SSL certificates, run the following: 

      Code Block
      $cert_template = "VMwareSSL6.5"
    • For long-duration server certificates, run the following: 

      Code Block
      $cert_template = "Server-10Year"
  3. In the same administrative PowerShell session, run the following to define where the signed certificate file will be created using the certificate request file

    Code Block
    $cert_file_cer = (Get-Item $cert_file_req).DirectoryName + "\" + (Get-Item $cert_file_req).BaseName + ".cer"
  4. In the same administrative PowerShell session, run the following to submit the request to an Austin certificate authority:

    Code Block
    certreq -submit -attrib ("CertificateTemplate:" + $cert_template) $cert_file_req $cert_file_cer

Accept the certificate request

...

  1. Log into the system that created the original certificate request
  2. Start an administrative PowerShell session and set the $cert_file_cer object to the full path of the signed certificate file that will be accepted

In the same administrative PowerShell prompt, run the following to accept the response: 

...

  1. "' -f $CertificateTemplate, $NewLine, $CertificateIPAddress }
  2. Run the following commands to trim the certificate template:

    Code Block
    languagepowershell
    $CertificateTemplate = $CertificateTemplate -replace '&"\s*$', '"'
  3. Run the following commands to write the certificate template file:

    Code Block
    languagepowershell
    $Content | Out-File -FilePath $CertificateTemplateFile -Force
  4. Run the following commands to review the certificate template file: 

    Code Block
    languagepowershell
    Get-Content -Path $CertificateTemplateFile
  5. Run the following commands to create the certificate request file:

    Code Block
    languagepowershell
    certreq -new -f $CertificateTemplateFile $CertificateRequestFile
  6. Run the following commands to review the certificate request file: 

    Code Block
    languagepowershell
    Get-Content -Path $CertificateRequestFile
  7. Run the following commands to retrieve the certificate request file name: 

    Code Block
    languagepowershell
    Get-Item -Path $CertificateRequestFile

Submit the certificate request to a certificate authority

References