Acquia Copilot is a conversational AI connected into our product documentation and knowledge base. Ask Copilot about product features, technical details, troubleshooting and how to get started with Acquia products.
The following result (or something similar to it) will be displayed. Enter the values that are appropriate to your site, system, and location.
You are about to be asked to enter information that will be
incorporated into your certificate request.
What you are about to enter is what is called a Distinguished Name or a
DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:US
State or Province Name (full name) [Some-State]:Oregon
Locality Name (eg, city) []:Portland
Organization Name (eg, company) [Internet Widgits Pty Ltd]: My Name (Root CA)
Organizational Unit Name (eg, section) []:
Common Name (e.g. server FQDN or YOUR name) []:www.mysite.com
Email Address []:[email protected]
The root certificate is created in the same directory, with the name ca.cert.pem; its key is created with the name ca.key.pem.
Create the site certificate
Next, use the following procedure to create the site certificate.
Create the private key with the following command:
You will be presented with similar text as when you created the root certificate. Use the same values as you did for the root certificate except for theOrganization Name*. For the Organization Name, use a different value, such as MyName(SiteCA).
The following questions will also be displayed:
Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:
An optional company name []:
Note
Skip A challenge password by pressing the Enter key.
Enter a command similar to this example this to sign the CSR with the root key and output in PEM format with the .pem extension:
The site certificate CSR is created in the same directory, with the name site-csr.csr; the site certificate key is created with the name site-crt.pem, and its key is created with the name site-key.pem.
Note
You must use SHA-256 or higher hashing algorithm, and set the bit length of the RSA key to 2048 bits or higher.
If your application requires IPv6, select Install legacy SSL certificate while installing the certificate, and review Legacy/ELB certificates for information about configuring your DNS settings.
If your application doesn’t require IPv6, use the Standard installation method outlined in Standard certificates.
Next step
A code change is required to route traffic to https to leverage your new SSL certificate. For more information, see Redirecting all HTTP traffic to HTTPS.
Creating a self-signed SSL certificate
You may want to create a self-signed SSL certificate for a Cloud Platform application in one of the following cases:
You want to test your application with SSL before purchasing the final certificate
You want to test a new subdomain on an application with a SSL certificate that doesn’t cover the new subdomain
The following result (or something similar to it) will be displayed. Enter the values that are appropriate to your site, system, and location.
You are about to be asked to enter information that will be
incorporated into your certificate request.
What you are about to enter is what is called a Distinguished Name or a
DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:US
State or Province Name (full name) [Some-State]:Oregon
Locality Name (eg, city) []:Portland
Organization Name (eg, company) [Internet Widgits Pty Ltd]: My Name (Root CA)
Organizational Unit Name (eg, section) []:
Common Name (e.g. server FQDN or YOUR name) []:www.mysite.com
Email Address []:[email protected]
The root certificate is created in the same directory, with the name ca.cert.pem; its key is created with the name ca.key.pem.
Create the site certificate
Next, use the following procedure to create the site certificate.
Create the private key with the following command:
You will be presented with similar text as when you created the root certificate. Use the same values as you did for the root certificate except for theOrganization Name*. For the Organization Name, use a different value, such as MyName(SiteCA).
The following questions will also be displayed:
Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:
An optional company name []:
Note
Skip A challenge password by pressing the Enter key.
Enter a command similar to this example this to sign the CSR with the root key and output in PEM format with the .pem extension:
The site certificate CSR is created in the same directory, with the name site-csr.csr; the site certificate key is created with the name site-crt.pem, and its key is created with the name site-key.pem.
Note
You must use SHA-256 or higher hashing algorithm, and set the bit length of the RSA key to 2048 bits or higher.
If your application requires IPv6, select Install legacy SSL certificate while installing the certificate, and review Legacy/ELB certificates for information about configuring your DNS settings.
If your application doesn’t require IPv6, use the Standard installation method outlined in Standard certificates.
Next step
A code change is required to route traffic to https to leverage your new SSL certificate. For more information, see Redirecting all HTTP traffic to HTTPS.
Did not find what you were looking for?
If this content did not answer your questions, try searching or contacting our support team for further assistance.
Did not find what you were looking for?
If this content did not answer your questions, try searching or contacting our support team for further assistance.