In your OpenSSL distribution, you should have gotten a script called
either CA.pl or CA.sh.  They automate the steps necessary to create a
CA and to sign certificates with that CA.  (It should be noted that it
is NOT intended to do everything an actual CA needs to do, it is quite
possibly the most minimal CA software in existence.)

I should point out that you really do not want to use the same
'world.png' file to seed the random number generator.  If security is
a financial concern, you should have your clients themselves generate
the keys, and submit the CSRs.  The way to do this depends on the
browser, unfortunately, and it might be that it's not something that
you can support.  Alternatively, you can try using /dev/random or
/dev/urandom (semantics being that one blocks when the estimated
amount of entropy is low, the other continues generating low-entropy
pseudorandom numbers even in that case and never blocks) if your
platform supports them.

-Kyle H

On Mon, Jul 14, 2008 at 11:45 PM, rameshj <[EMAIL PROTECTED]> wrote:
>
> Hi,
>
> I am new to Open SSL. I need to configure my application server with client
> authentication(user based certificate authentication). To achieve this, I
> have configured my tomcat server.xml with clientAuth="true". Currently I
> have created a client certificate and added it into both in my application
> as well as browser.
> I have used the following commands to create certificates,
>
>     *openssl genrsa -rand world.png -out ./output/ClientKey.key 1024
>    * openssl req -new -key ./output/ClientKey.key -out
> ./output/ClientCsr.csr -config openssl.cnf
>    * openssl x509 -req -days 999999 -in ./output/ClientCsr.csr -signkey
> ./output/ClientKey.key  -out ./output/ClientCer.cer [ I have imported the
> generated ClientCer.cer into my application server trustore ].
>    * openssl pkcs12 -export -clcerts -in ./output/ClientCer.cer -inkey
> ./output/ClientKey.key -out ./output/rameshj.p12 -name "rameshj" [ I have
> imported the generated rameshj.p12 into my browser ].
>
>
> It is working perfectly. But here I require to import all the user specific
> (common name) in the server as well as browsers. In other words, if my
> application supports 1000 users, then I need to import all the 1000
> certificates to my server application trustore file. Due to scalability
> point of view, here I am planning to import just only one root certificate
> into my server application and 1000 users certificates will be imported into
> 1000 different user m/c browsers. But I don't know how to generate root
> certificate and other 1000 user certificates using openssl command. Can you
> please help me to generate root certificate as well as user certificate ?
> Thanks in advance for your help.
>
> Regards,
> Ramesh
> --
> View this message in context: 
> http://www.nabble.com/Help-on-creating-root-certificate.-tp18458611p18458611.html
> Sent from the OpenSSL - User mailing list archive at Nabble.com.
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to