Hello !

We create a certificate request in the Internet Explorer via the
ActiveX-control (certenr3.dll, as discribed in
http://www.ultranet.com/~fhirsch/Papers/cook/ssl_msclient_certs.html)
and
transmit the certificate request to the server where it is stored as a
CSR-file (11.csr).

The following commands generate and sign the certificate from the
request.
The resulting certificate will be stored in a CRT-file (11.crt).

The resulting DER-file (11.der) cannot imported as a personal
certificate
in the Internet Explorer. Does anyone know why?

Best regards,

Stefan Westner


------------------------------------------------------------


openssl x509 -extfile /OpenSSL/certs/client/config.cnf
             -req -in /NewCert/11.csr
             -out /OpenSSL/certs/NewCert/11.crt
             -CA /OpenSSL/certs/ca/ca.crt
             -CAkey /OpenSSL/certs/ca/ca.key
             -CAcreateserial
             -days 365

openssl x509 -in /OpenSSL/certs/NewCert/11.crt
             -outform DER
             -out /NewCert/11.der


------------------------------------------------------------

# OpenSSL config file

HOME    = .
RANDFILE   = P:/OpenSSL/certs/system/.rnd
extensions   = 509v3
prompt    = no

[ ca ]
default_ca   = CA_default

[ CA_default ]
database   = P:/OpenSSL/certs/temp/index.txt
new_certs_dir   = P:/OpenSSL/certs/temp

certificate   = P:/OpenSSL/certs/ca/ca.crt
serial    = P:/OpenSSL/certs/ca/.srl
private_key   = P:/OpenSSL/certs/ca/ca.key
RANDFILE   = P:/OpenSSL/certs/system/.rnd

default_days   = 365
default_crl_days  = 30
default_md   = md5

policy    = policy_any

[ policy_any ]
countryName   = supplied
stateOrProvinceName  = optional
organizationName  = optional
organizationalUnitName  = optional
commonName   = supplied
emailAddress   = optional

[ v3_ca ]
basicConstraints  = CA:false
subjectKeyIdentifier  = hash
authorityKeyIdentifier  = keyid:always,issuer:always

[ 509v3 ]
basicConstraints  = critical,CA:false

#subjectKeyIdentifier  = hash
#authorityKeyIdentifier  = keyid:always,issuer:always

keyUsage   = keyEncipherment, dataEncipherment, keyAgreement,
digitalSignature

#Extended Key Usage  = TLS Web Client Authentication

subjectAltName   = email:copy
issuerAltName   = issuer:copy

#nsBaseUrl   = https://www.company.de/
#nsRevocationUrl   = scripts/CertServer.dll?action=certrevocation&SN=
#nsCaRevocationUrl  = scripts/CertServer.dll?action=certcarevocation&SN=

#nsRenewalUrl   = scripts/CertServer.dll?action=certrenewal&SN=
#nsCaPolicyUrl   = ca/guidelines/index.html
nsComment   = "Client-Certificate"
nsCertType   = client, email
#nsSslServerName  =

------------------------------------------------------------


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to