Endian banner

Certificates

The Certificates page allows the management of the certificates that are needed by the various OpenVPN server instances running on the Endian UTM Appliance and is composed of four tabs: Certificates, Certificate Authority, Revoked Certificates, and Certificate Revocation List.

Certificates

Here it is possible to manage all the certificates stored on the Endian UTM Appliance. The table, initially empty, shows all certificates along with the following details, one per each column:

  • Name. The name assigned to the certificate.
  • Subject. the collection of information that identify the certificate. itself. See the options below.
  • CA. The Certificate Authority that
  • Expiration Date. The final date of validity of the certificate.
  • Actions. What can be done with the certificate:
    • info - to show all its details.
    • download - to download it in PEM format.
    • downenc - to download it in PKCS12 format.
    • delenc - to delete the private key associated to it.
    • delete - to delete it.
    • nolink - to revoke the certificate.

At the bottom of the table, on the left-hand side there is a navigation widget, that allows to navigate among the various pages composing the table, if there are many certificates, whereas on the right-hand side there is a reload widget, used to refresh the list of certificates.

Above the list, a link can be clicked to Add new certificate. Upon clicking, the page will be replaced by a form that allows to provide all data necessary to the generation of a new certificate. Three alternatives are available to store a new certificate on the Endian UTM Appliance, selectable from this drop-down menu: Generate a new certificate, Upload a certificate, and Upload a Certificate signing request.

Generate a new certificate

The first alternative allows to create a new certificate directly on the Endian UTM Appliance, by providing the following information. The capital letters in parentheses show the field of the certificate that will be filled by the value supplied and form the Subject of the certificate.

Note

A Root Certificate Authority is needed to create certificates, so create the Root CA before creating certificates.

Common name
The common name (CN) of the certificate’s owner, i.e., the name with which the owner will be identified.
Email address
The e-mail address of the certificate’s owner.
Subject Alternative Name

The alternative name for the subject, which allows a single certificate to be associated to multiple domains or resources. The available options are:

  • DNS. The DNS entry of the site
  • IP. The IP address of the site
  • email. An email address.

The actual value for each option must be written in the textbox on the right.

Changed in version 5.0: This option was called Subject alt name

Organizational unit name
The Organisation Unit (OU) to which the owner belongs to, i.e., the company, enterprise, or institution department identified with the certificate.
Organization name
The organisation (O) to which the owner belongs to.
City
The city (L) in which the organisation is located.
State or province
The state or province (ST) in which the organisation is located.
Country
The Country (C) in which the organisation is located, chosen from those in the selection menu. By typing one or more letters, matching countries are searched for and displayed.
Certificate type
The type of the certificate, chosen between Client and Server from the drop-down menu.
Validity (days)
The number of days before the certificate expires.
PKCS12 file password
The password for the certificate, if needed.
PKCS12 file password Confirmation)
Type once more the certificate’s password for confirmation.
Certificate digest algorithm

Choose from the drop-down menu the algorithm to be used to generate the certificate.

New in version 5.0.

Certificate key size

Choose from the drop-down menu the size of the key (in bits) used to generate the certificate.

New in version 5.0.

Upload a certificate

The next alternative is to upload an existing certificate from the local workstation to the Endian UTM Appliance.

Certificate (PKCS12/PEM)
By clicking on the Browse button or on the textfield, a file chooser will open, in which to supply the path to the certificate to be uploaded.
PKCS12 file password
The password for the certificate, if needed.

Upload a certificate signing request

The third alternative is to upload a CSR from the local workstation to the Endian UTM Appliance, i.e., an encrypted text file containing all necessary information to generate a new certificate, recognised by the server.

Certificate Signing Request (CSR)
By clicking on the Browse button or on the textfield, a file chooser will open, in which to supply the path to the CSR to be uploaded.
Validity (days)
How many days the certificate is valid.

Certificate Authority

This page allows to manage the CA, which are necessary for the correct working of an OpenVPN encrypted connection. There are two ways to add a CA: Either by clicking on the Generate new root/host certificates link above the table of already existent certificates to generate a new certificate, or by uploading it using the buttons below the table.

The table, once populated, shows the same information as in the Certificates tab, with the only difference in the Actions available, which are:

  • info - to show all CA details.
  • download - to download it in PEM format.
  • delete - to delete the certificate.

Instead of generating a new certificate authority, it is possible to upload an existent one.

Certificate (PEM)
By clicking on the Browse button or on the textfield, a file chooser will open, in which to supply the path to the certificate to be uploaded. Once chosen, a click on the Upload CA certificate will complete the upload process.

Generate new root/host certificates

This procedure can be applied only once and will generate two certificates: A root certificate authority and a host certificate; the latter will appear in the Certificates tab. When clicking on the link, a form will replace the list, in which to supply the following data, that will be used in the new root and host certificates.

Note

The only way to generate a new root certificate is to delete the existing one from the command line.

System fully qualified domain name or IP address
The name of the system, that will be used as the certificate’s Common Name.
Email address
The e-mail address of the system’s owner or responsible.
Organizational unit name
The Organisation Unit (OU) to which the system belongs to.
Organization name
The organisation (O) to which the system belongs to.
City
The city (L) in which the organisation is located.
State or province
The state or province (ST) in which the organisation is located.
Country
The Country (C) in which the organisation is located, chosen from those in the selection menu. By typing one or more letters, matching countries are searched for and displayed.
Subject alt name (subjectAltName=email:*,URI:*,DNS:*,RID:*)
An alternate name for the subject, i.e., the certificate.
Validity (days)
The number of days before the certificate expires.
Certificate digest algorithm

Choose from the drop-down menu the algorithm to be used to generate the certificate.

New in version 5.0.

Certificate key size

Choose from the drop-down menu the size of the key (in bits) used to generate the certificate.

New in version 5.0.

Revoked Certificates

The certificates that have been revoked are listed in the table, that show the serial number and the subject of the certificate.

Download the Certificate Revocation List
A click on this link will allow to download the on a local workstation the Certificate Revocation List.

Certificate Revocation List

In this page can be managed all the Certificate Revocation lists that have been uploaded.

The table shows all the Certificate Revocation Lists and for each item in the table are show the name of the certificate, the issuer, and the issued date. Available actions are:

  • info - display the certificate details
  • download - download the certificate on the local workstation.

Table Of Contents

Previous topic

Authentication

Next topic

The Hotspot Menu

Documentation archive

Version 3.2
Version 3.0
Version 2.5
Version 2.4
Version 2.3
Version 2.2
Version 2.1

Other products

Endian Hotspot 5.0
Endian 4i Edge 5.0