ORIGINAL project page: https://github.com/redredgroovy/easy-ca
OpenSSL wrapper scripts for managing basic CA functions
A suite of bash scripts for automating very basic OpenSSL Certificate Authority operations:
- Creating Root CAs
- Creating Intermediate Signing CAs
- Creating Server certificates (with optional subjectAltNames)
- Creating Client certificates
- Revoking certificates and maintaining CRLs
The create-root-ca script will initialize a new Root CA directory structure. This script can be run directly from the source repo or from within an existing Easy CA installation. The CA is self-contained within the specified directory tree. It is portable and can be stored on removable media for security.
create-root-ca -d $ROOT_CA_DIR
create-root-ca will prompt for the basic DN configuration to use as defaults for this CA. Optionally, you can edit defaults.conf to set this information in advance. The new CA is now ready for use. The CA key, certificate, and CRL are available for review:
$ROOT_CA_DIR/ca/ca.crt
$ROOT_CA_DIR/private/ca.key
$ROOT_CA_DIR/crl/ca.crl
Running create-signing-ca from within a Root CA installation will initialize a new Intermediate CA directory structure, indepedent and separate from the Root CA. A Root CA may issue multiple Intermediate CAs.
$ROOT_CA_DIR/bin/create-signing-ca -d $SIGNING_CA_DIR
create-signing-ca will prompt for basic DN configuration, using the Root CA configuration as defaults. The Intermediate Signing CA is now ready for use. The CA key, certificate, chain file, and CRL are available for review:
$SIGNING_CA_DIR/ca/ca.crt
$SIGNING_CA_DIR/ca/chain.pem
$SIGNING_CA_DIR/private/ca.key
$SIGNING_CA_DIR/crl/ca.crl
Running create-server from within any CA installation will issue a new server (serverAuth) certificate:
$CA_DIR/bin/create-server -s fqdn.domain.com
Optionally, you can specify one (or more) subjectAltNames to accompany the new certificate:
$CA_DIR/bin/create-server -s fqdn.domain.com -a alt1.domain.com -a alt2.domain.com
create-server will prompt for basic DN configuration, using the CA configuration as defaults. After the script is completed, the server certificate, key, and CSR are available for review:
$CA_DIR/certs/fqdn-domain-com.server.crt
$CA_DIR/private/fqdn-domain-com.server.key
$CA_DIR/csr/fqdn-domain-com.server.csr
Running create-client from within any CA installation will issue a new client (clientAuth) certificate:
$CA_DIR/bin/create-client -c [email protected]
create-client will prompt for basic DN configuration, using the CA configuration as defaults. After the script is completed, the client certificate, key, and CSR are available for review:
$CA_DIR/certs/user-domain-com.client.crt
$CA_DIR/private/user-domain-com.client.key
$CA_DIR/csr/user-domain-com.client.csr
Running revoke-cert from within a CA installation allows you to revoke a certificate issued by that CA and update the CRL:
$CA_DIR/bin/revoke-cert -c $CA_DIR/certs/fqdn-domain-com.server.crt
revoke-cert will prompt for the revocation reason. After the script is completed, the server CRL is updated and available for review:
$CA_DIR/crl/ca.crl
These scripts are very simple, and make some hard-coded assumptions about behavior and configuration:
- Root and Intermediate CAs have a 7300-day lifetime
- Root and Intermediate CAs have 8192-bit RSA keys
- Root and Intermediate CA keys are always encrypted
- Only one level of Intermediate CA is supported
- Client and Server certificates have a 3650-day lifetime
- Client and Server certificates have 4096-bit RSA keys
- Client and Server keys are never encrypted
- There is no wrapper for renewing certificates