This is part two of a series of creating your own self-signed PKI and some ways to utilize the PKI to setup SSL for your web server or create your own OpenVPN server.
Disclaimer: I am not a security expert. This is just the easiest way I have found to create and utilize SSL for my homelab services.
Prerequisites
- A XCA PKI database https://youtu.be/ezzj3x207lQ
Exporting Certificates from XCA
- Launch XCA
- Open the PKI database if it is not already (File > Open DataBase), enter password
- Click on the Certificates tab
- Right click the Intermediate CA certificate > Export > File
- Set the file name with a .crt extension and verify the export format is PEM (*.crt)
- Click OK
- Right click the Root CA certificate > Export > File
- Set the file name with a .crt extension and verify the export format is PEM (*.crt)
- Click OK
Importing Certificates Into Windows Certificate Store
- Right click the Start Button > Run
- Type mmc.exe, press enter
- Click File > Add/Remove Snap-in...
- Click Certificates
- Click Add
- Select Computer account
- Click Next
- Select Local computer
- Click Finish
- Click OK
- Expand Certificates > Trusted Root Certification Authorities
- Right click the second level Certificates > All Tasks > Import....
- Click Next
- Click Browse > Select the exported Root CA .crt file > Click Next
- Verify Include all extended properties is checked
- Click Next
- Click Next
- Click Finish
- Expand Certificates > Intermediate Certification Authorities
- Right click the second level Certificates > All Tasks > Import....
- Click Next
- Click Browse > Select the exported Intermediate CA .crt file > Click Next
- Verify Include all extended properties is checked
- Click Next
- Click Next
- Click Finish