Generate a Certificate Signing Request (CSR) -
Cisco ACS 3.2
To generate a CSR, you will need to create a key pair for your server. These two items are a digital certificate key pair and cannot be separated. If you lose your public/private key file or your password and generate a new one, your SSL Certificate will no longer match. You will have to request a new SSL Certificate.
We recommend that you contact the ACS vendor for additional information.
Step 1: Generate a Key Pair and Certificate Signing Request
Note: The recommended key bit size is 2048-bit. All certificates that will expire after December 31, 2013 must have a 2048 bit key size
- In the navigation bar, click System Configuration.
- Click ACS Certificate Setup.
- Click Generate Certificate Signing Request. CiscoSecure ACS displays the Generate new request table on the Generate Certificate Signing Request page. Fill out all of the requested fields.
- In the Certificate subject box, type the values required by the CA you will submit the CSR to. Cisco Secure ACS requires that one of the values be CN, such as CN=acs01primary. You can specify multiple values. To do so, separate the values with commas. For example:
CN=www.verisign.com, O=VeriSign, C=US, S=California, L=Mountain View.
Certificate Authorities require, Common Name, Organization, Country, State, & Locality (City). An Organization Unit (OU) is optional.
This command will prompt for the following X.509 attributes of the certificate:
Country Name (C): Use the two-letter code without punctuation for country, for example: US or CA.
State or Province (S): Spell out the state completely; do not abbreviate the state or province name, for example: California
Locality or City (L): The Locality field is the city or town name, for example: Berkeley.
Organization (O): If your company or department has an &, @, or any other symbol using the shift key in its name, you must spell out the symbol or omit it to enroll. Example: XY & Z Corporation would be XYZ Corportation or XY and Z Corportation.
Organizational Unit (OU): This field is optional; but can be used to help identify certificates registered to an organization. The Organizational Unit (OU) field is the name of the department or organization unit making the request.
Common Name (CN): The Common Name is the Host + Domain Name. It looks like "www.company.com" or "company.com".
SSL certificates can only be used on Web servers using the Common Name specified during enrollment. For example, a certificate for the domain "domain.com" will receive a warning if accessing a site named "www.domain.com" or "secure.domain.com", because "www.domain.com" and "secure.domain.com" are different from "domain.com".
Please do not enter your email address, challenge password or an optional company name when generating the CSR.
- In the Private key file box, type the full directory path and name of the file in which the private key is saved, for example, c:\privateKeyFile.pem.
- In the Private key password box, type the private key password that you have would like to use. Your Certificate Authority does not have access to this password and cannot recover it.
- In the Retype private key password box, retype the private key password.
- In the Key length list, choose 2048 bits.
Note: For Extended Validation certificates the key bit length must be 2048.
- From the Digest to sign with list, select SHA1.
- Click Submit. CiscoSecure ACS displays a CSR in the display area, on the right, under a banner that reads: Now your certificate signing request is ready. You can copy and paste it into any certification authority enrollment tool. You have just created a key pair and a CSR.
- To copy and paste the information into the enrollment form, open the file in a text editor that does not add extra characters (Notepad or Vi are recommended).
- Go to Enrollment. When enrolling for the SSL Certificate you will be asked to choose a server vendor, choose Apache. This will allow a certificate that is compatible with the Cisco ACS.
SSL Certificate Support
- SSL Certificate Support
- SSL Certificate FAQ
- EV SSL Overview
- EV SSL Requirements
- How To Create A CSR
- MS Exchange Server 2007 CSR
- MS Exchange Server 2010 CSR
- MS Exchange Server 2013 CSR
- MS SBS Server 2008 CSR
- MS Windows 2003 - IIS 6 CSR
- MS Windows 2008 - IIS 7 CSR
- MS Windows 2012 - IIS 8 CSR
- Outlook Web Access CSR
- Apache SSL CSR
- Cisco ACS 3.2 CSR
- IBM Websphere MQ CSR
- IBM HTTP Server CSR
- Lotus Domino 7.0 CSR
- Lotus Domino 8.0 CSR
- Covalent Apache ERS 2.4 CSR
- Covalent Apache ERS 3.0 CSR
- F5 BIG-IP CSR
- F5 Firepass CSR
- Mirapoint Message Server CSR
- Nortel SSL Accelerator CSR
- Oracle Wallet Manager CSR
- BEA WebLogic 6.0 CSR
- BEA WebLogic 8.1 CSR
- BEA WebLogic 10.1 CSR
- Barracuda Networks CSR
- SonicWALL SSL CSR
- cPanel WHM CSR
- Paralells Plesk Panel CSR