-
Notifications
You must be signed in to change notification settings - Fork 58
/
0006.html
82 lines (74 loc) · 3.95 KB
/
0006.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
<!DOCTYPE html>
<html lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Adding Self-Signed PKI to Windows Trusted Certificate Store</title>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta charset="UTF-8">
<meta name="keywords" content="How To Add Self-signed Certificates To Windows,Windows Trust Self-Signed Certificates,Windows Trusted Certificates,PKI,Public Key Infrastructure,XCA,SSL,Self-Signed Certificate,Self-Signed HTTPS,Self-Signed SSL,How To Create Self-Signed Certificates,Certificates,X Certificate And Key Management,HTTPS,X Certificate Key Manager,Self-Signed PKI,SSL Certificates,Certificate Authority,Self-Signed,Microsoft Windows,Windows,How To,Tutorial,i12bretro">
<meta name="author" content="i12bretro">
<meta name="description" content="Adding Self-Signed PKI to Windows Trusted Certificate Store">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="revised" content="10/24/2022 08:43:38 AM" />
<link rel="icon" type="image/x-icon" href="includes/favicon.ico">
<script type="text/javascript" src="https://code.jquery.com/jquery-3.5.1.min.js"></script>
<script type="text/javascript" src="includes/js/steps.js"></script>
<link href="css/steps.css" rel="stylesheet" type="text/css" />
</head>
<body>
<div id="gridContainer">
<div class="topMargin"></div>
<div id="listName" class="topMargin">
<h1>Adding Self-Signed PKI to Windows Trusted Certificate Store</h1>
</div>
<div></div>
<div id="content">
<p>This is part two of a series of creating your own self-signed PKI and some ways to utilize the PKI to setup SSL for your web server or create your own OpenVPN server.</p>
<p>Disclaimer: I am not a security expert. This is just the easiest way I have found to create and utilize SSL for my homelab services.</p>
<h2>Prerequisites</h2>
<ul>
<li class="noCheckbox">A XCA PKI database <a href="https://youtu.be/ezzj3x207lQ" target="_blank">https://youtu.be/ezzj3x207lQ</a></li>
</ul>
<h2>Exporting Certificates from XCA</h2>
<ol>
<li>Launch XCA</li>
<li>Open the PKI database if it is not already (File > Open DataBase), enter password</li>
<li>Click on the Certificates tab</li>
<li>Right click the Intermediate CA certificate > Export > File</li>
<li>Set the file name with a .crt extension and verify the export format is PEM (*.crt)</li>
<li>Click OK</li>
<li>Right click the Root CA certificate > Export > File</li>
<li>Set the file name with a .crt extension and verify the export format is PEM (*.crt)</li>
<li>Click OK</li>
</ol>
<h2>Importing Certificates Into Windows Certificate Store</h2>
<ol>
<li>Right click the Start Button > Run</li>
<li>Type mmc.exe, press enter</li>
<li>Click File > Add/Remove Snap-in...</li>
<li>Click Certificates</li>
<li>Click Add</li>
<li>Select Computer account</li>
<li>Click Next</li>
<li>Select Local computer</li>
<li>Click Finish</li>
<li>Click OK</li>
<li>Expand Certificates > Trusted Root Certification Authorities</li>
<li>Right click the second level Certificates > All Tasks > Import....</li>
<li>Click Next</li>
<li>Click Browse > Select the exported Root CA .crt file > Click Next</li>
<li>Verify Include all extended properties is checked</li>
<li>Click Next</li>
<li>Click Next</li>
<li>Click Finish</li>
<li>Expand Certificates > Intermediate Certification Authorities</li>
<li>Right click the second level Certificates > All Tasks > Import....</li>
<li>Click Next</li>
<li>Click Browse > Select the exported Intermediate CA .crt file > Click Next</li>
<li>Verify Include all extended properties is checked</li>
<li>Click Next</li>
<li>Click Next</li>
<li>Click Finish</li>
</ol> </div>
</div>
</body>
</html>