create-cert | Super simple self signed certificates | TLS library
kandi X-RAY | create-cert Summary
kandi X-RAY | create-cert Summary
Super simple self signed certificates
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of create-cert
create-cert Key Features
create-cert Examples and Code Snippets
Community Discussions
Trending Discussions on create-cert
QUESTION
I tried a lot and now putting it here .. so I have an app service in which API Identity server and UI(Blazor) is hosted in different folders inside the same app service now i generated the rsa signing cert from [https://damienbod.com/2020/02/10/create-certificates-for-identityserver4-signing-using-net-core/](this blog post) now everything works fine on development even when i set hosted identity server as provider and localhost(UI and Web API) even then its working but when i try to access the hosted API its throwing error (in log) and i am getting 401
please any helps would be appreciated
also
my identity server startup looks like this
...ANSWER
Answered 2021-Mar-17 at 08:51You can not use the signing certificate as a HTTPS web certificate. The signing cert is only used when IdentityServer signs the JWT tokens.
You need to get a real certificate from a trusted provider (like Lets Encrypt) and install it separately as a TLS/HTTPS certificate.
Signing certs and TLS/HTTPS certificates are separate things that both needs to be configured properly.
QUESTION
For the past week I am trying to connect a Winlogbeat(Which is on my host machine) To an elasticsearch Cluster that I set up on an Ubuntu VM using dockers.
Following this tutorial. (In the tutorial they don't explain how to connect a Beat)
My problem is with the SSL configuration (Of the Winlogbeat) I just can't get it right for some reason.
This is the error I get on the windows machine after running the setup command (.\winlogbeat.exe setup -e) -
...ANSWER
Answered 2021-Feb-27 at 12:14So it took me some time, but I've figured out what was the problem with my certificate. I didn't add it to the trusted root store on my windows machine.
In the end I've created a Winlogbeat crt and key using the elasticsearch-certutil tool by adding a Winlogbeat instance to the instances.yml file and copied the winlogbeat.crt, winlogbeat.key and ca.crt to my windows machine.
Note - You can find all of them under /var/lib/docker/volumes/es_certs/_data/
On the windows machine I configured the Winlogbeat the normal way and in the end I've added the ca.crt to the trusted root store using this tutorial.
QUESTION
Basically, I want to add a self-signed certificate (including complete chain with own CA and intermediate) to my Angular environment. The environment is reachable via pcname.fritz.box. That's the idea.
Now I created my own CA and intermediate certificates and the server/client certificates. Afterwards, I added the ca-chain-bundle.cert.pem
to my Windows 10
root CAs.
Then I added the server.cert.pem
and server.key.pem
to my angular.json
and started with ng serve --host pcsname.fritz.box --ssl
.
If I open the URL https://pcname.fritz.box:4200/
with Firefox I get in the developer console MOZILLA_PKIX_ERROR_SELF_SIGNED_CERT
and in Chrome/Edge I get NET::ERR_CERT_AUTHORITY_INVALID
.
What I'm missing? I don't want to add it as an exception. Instead it should appear as valid certificate locally.
...ANSWER
Answered 2021-Feb-24 at 15:04There were several issues:
- I used the wrong key combination with the server certificate. Therefore the browser displayed me
CN=localhost
instead ofCN=pcname.fritz.box
. - Firefox needs to change some setting to accept certificates from the Windows certificate store.
- Chrome needs a certificate with a SAN!
- Don't know if necessary, but I added all certificates (root CA, intermediate and server) to my Windows root CA store.
QUESTION
I am trying to sign a UWP app, either debug or release, for the purpose of testing on some other devices. My certificate appears not to be valid.
Here are my steps:
- I right click on my UWP project, choose "publish", then "create app packages".
- In the popup, I choose "sideloading".
- Then I get a step asking whether I'd like to sign the package.
- I want to choose "yes". I have a certificate where the
subject
matches thepublisher
in my manifest. But, just below, it shows a message "this certificate is not trusted on this PC".
If I continue, VS will create a folder containing some installation files. If I click on "...x64.msixbundle", it shows a dialog that says "update ...?", with a note "untrusted app" and a message below "this app package is not signed with a trusted certificate..." (Alternatively, I can run the Install.ps1 script in the powershell, having the same results.) I cannot go further. And, this is on same PC that I'm doing my development.
I've attempted to follow the instructions on Create a certificate for package signing, and some of the adjacent pages. They infer that using the VS wizard should simply work.
P.S. I have never signed a Windows app before. Maybe I should be doing it in a completely different manner ?
...ANSWER
Answered 2021-Feb-08 at 14:06The certificate where the subject matches the publisher needs to be trusted.
So what to do:
a) The certificate is self signed (The issuer is the same as the subject)
- Run
certlm.msc
(for machine wide trust) orcertmgr.msc
for current user trust. - Import the certificate to the
Trusted Root Certificate Authorities
b) The certificate is NOT self signed (The issuer is NOT the same as the subject)
You should not need to do anything if you bought a real code signing certificate as you pay for exactly the trust we are establishing...
- Get the root/issuer certificate
- *have a .cer?
- double click the cer file
- click the
Certificate Path
tab. - double click the first certificate in the tree - if there is only one ask where you got the certificate from!
- On the newly opened window click the
Details
tab - Click the
Copy to file
button to save the root certificate.
- have a *.pfx import it
- Run
certmgr.msc
- Right click on
Personal
and selectAdvanced Tasks | Import
to import the pfx file. - Identify the imported certificate(s) and export the root certificate (see have a *.cer)
- Run
- *have a .cer?
- Run
certlm.msc
(for machine wide trust) orcertmgr.msc
for current user trust. - Import the root certificate to the
Trusted Root Certificate Authorities
For package signing there are additional requirements on the certificate:
The certificate that you use to sign the app package must meet these criteria:
- The subject name of the certificate must match the Publisher attribute that is contained in the Identity element of the AppxManifest.xml file that is stored within the package. The publisher name is part of the identity of a packaged Windows app, so you have to make the subject name of the certificate match the publisher name of the app. This allows the identity of signed packages to be checked against the digital signature. For info about signing errors that can arise from signing an app package using SignTool, see the Remarks section of How to create an app package signing certificate.
- The certificate must be valid for code signing. This means that both of these items must be true:
- The Extended Key Usage (EKU) field of the certificate must either be unset or contain the EKU value for code signing (1.3.6.1.5.5.7.3.3).
- The Key Usage (KU) field of the certificate must either be unset or contain the usage bit for digital signature (0x80).
- The certificate contains a private key.
- The certificate is valid. It is active, hasn't expired, and hasn't been revoked.
Source: https://docs.microsoft.com/en-us/windows/win32/appxpkg/how-to-sign-a-package-using-signtool
QUESTION
I'm trying to replicate https://www.elastic.co/guide/en/elasticsearch/reference/7.x/configuring-tls-docker.html
The example shows how to turn on ssl for ES cluster with docker. it's running the instances in one machine
I am running docker container on multiple hosts and having trouble sharing the volume for certificate
relevant parts are
// create certification files and save in certs
volume
// create-certs.yml
ANSWER
Answered 2020-Aug-10 at 16:07The volumes are indeed local(one local volume on each node that has a container mounting that volume).
One option is to create a NFS that is reachable by all your nodes and declare the volume with type: nfs
. This way, each node will still create a local volume, but all the local volumes will read/write to the same location:
QUESTION
Heres my if else Ansible logic ..
...ANSWER
Answered 2017-Feb-04 at 10:54What you have there should work and is one way of doing it.
Alternatively, you could use a Jinja query to reduce it to 2 tasks, such that:
QUESTION
I am trying to set up a pipeline, which would:
- Deploy a KeyVault "my-keyvault" by using AzureResourceManagerTemplateDeployment@3 task
- Run a Powershell script (listed below) to create a self-signed certificate in the keyvault
- Finally deploy an SF cluster "my-cluster" by using AzureResourceManagerTemplateDeployment@3 task and providing the above certificate both for node-to-node and client-to-node communication (later I plan to introduce 2 different certificates).
My PowerShell script for generating self-signed certificates works well when called for the 1st time:
...ANSWER
Answered 2020-May-15 at 14:32The following pipeline tasks have solved the problem for me -
- First I delete the self-signed certificate from KeyVault (it is ok to fail)
- Then I purge the self-signed certificate from KeyVault (it is ok to fail)
- Finally I import the self-signed certificate again
And note that the purge command uses the deletedcertificates
id.
QUESTION
I've been at this for past 2 days and I'm getting weird errors from the store.
I'm trying to upload an update to my application "CoManga" via the store and it's not working out.
I'm working on Xamarin.Forms (UWP) and before making the appxbundle, I made sure and "associated my app with CoManga" from my developer account. All the information over there matches and should work fine without any issues.
Then I made a release of my UWP app, got the bundle and I tried to upload it to UWP. It said that the Publisher info is different, so it couldn't upload. This is weird because I tried signing the bundle with my developer account itself.
Now, I tried building and signing the app bundle from app center. I got the appxbundle and that I tried to upload. But, since today it's giving me weird error :
The package comic_dl.UWP_2.1.15.0_ARM_x86_x64.appxbundle is taking a long time to process. If this isn’t completed soon, try refreshing the page, or remove the package and then upload it again. If you continue to see this issue, contact support.
This package I tried to build from my system manually : https://drive.google.com/open?id=1VVvF6IB70R2DKNUgBJcqw-HryL1LIwgo
This is what I got from App center : https://drive.google.com/open?id=1o0sGKU2AKVgrcTelIoRFz7QCe8Do0WJ3
This is the Store ID : 9N81F8B5WW93
Can someone guide me what I might be doing wrong/missing something.
Thanks
EDIT Update : So, I followed the suggestion and contacted Microsoft's Team for help on this issue. After 3 months of multiple contacts, I was able to get someone to reply back and follow the case. Even they tried things on their end and I tried by deleting all the certificate files I had in my current project and tried to manually build the manifest file and then it worked. I'm not entirely sure what worked out in the end. But, you can try these things if you run into this issue. 1.) Clean your project.
2.) Delete .vs
directory.
3.) Look for any certificate files in your project. Back them up somewhere else and then delete them from the project (Don't exclude from project, just delete them entirely). Clean and rebuild your solution.
4.) Check if the application is already installed on your system (When you debug, VS will install your UWP app on your machine to run it). If it's installed, uninstall it completely.
5.) Make a backup of your manifest file and try to create a new manifest file.
These are the links I received from Microsoft Help:
PFN and package publisher name must match values here: https://partner.microsoft.com/en-us/dashboard/products/{YourAppID}
/identity
Update manually: https://docs.microsoft.com/en-us/uwp/schemas/appxpackage/how-to-create-a-package-manifest-manually
Update in VS: https://docs.microsoft.com/en-us/uwp/schemas/appxpackage/uapmanifestschema/generate-package-manifest
If these values were pulled from test certificate, partner needs to update their test cert: https://docs.microsoft.com/en-us/windows/msix/package/create-certificate-package-signing
...ANSWER
Answered 2019-Sep-10 at 13:19I think this problem is not caused by anything code related, but rather it is a problem on the Store side. I would suggest contacting the Store support, they should be able to investigate if there is something wrong with your app package or the problem is on their side.
For support go to the official website, click the Contact Us tab and fill out the form accordingly.
The team should be able to advise even for the first error with different publisher info. If your app was always associated with the same account, there is no reason it should give you such an error message.
QUESTION
I need to generate a proof of possession, signing a verification code with my private key.
I did not find a question related to this, here in Stack Overflow, and I am not finding some reference on Internet. I am following this tutorial, but I want to use OpenSSL.
My verification code is related to a X509 certificate, like this:
...ANSWER
Answered 2019-May-21 at 13:21I got the answer with the Azure support team.
I already had my root key and X509 cert, generated with the following command:
QUESTION
I am trying to access secrets in my Azure Key Vault from VMs running in my Azure Batch node pool.
However, I keep running into the exception:
Exception Message: Tried 1 certificate(s). Access token could not be acquired.
Exception for cert #1 with thumbprint MY-THUMBPRINT: Keyset does not exist
So far I have been following the instructions outlined here: https://docs.microsoft.com/en-us/azure/key-vault/service-to-service-authentication
The article outlines the scenario of Azure Batch, and indicates I should use a Service Principal. I would like to ensure no secrets or keys are in version control, so I am using the first method of a certificate in a local keystore to sign into Azure AD.
Running all of the below locally as an executable works fine, but fails when run on an Azure Batch pool node.
My steps so far to do the above are:
Create a service principal and associated certificate in keyvault:
az ad sp create-for-rbac --name myserviceprincipal --create-cert --cert mycertname --keyvault mykeyvaultname
. Keep the service principal app id and tenant id for use in the AzureServicesAuthConnectionString.Create key vault access policy for the created service principal (done in the azure portal UI).
Download the created certificate in PFX/PEM format (done in the Azure Portal UI).
Ensuring a PFX password on the certificate (I am doing this as uploading the cert to azure batch in step 6 requires an associated password): https://coombes.nz/blog/azure-keyvault-export-certificate/
ANSWER
Answered 2019-Sep-29 at 19:59In addition to the above, I have followed the instructions from Sam Cogan article here: https://samcogan.com/secure-credential-access-with-azure-batch-and-keyvault/
However I receive the same issue as the original question. My error and associated repro steps for the Sam Cogan article are:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install create-cert
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page