OpenSSL Step By Step Tutorial | How to Generate Keys, Certificates & CSR Using OpenSSL

Поделиться
HTML-код
  • Опубликовано: 20 июл 2020
  • OpenSSL step by step tutorial explaining how to generate key pair, how to export public key using openssl commands, how to create CSR using openSSL and how to generate self signed certificate using Open SSL command line tool.
    To dowload openSSL visit: www.openssl.org/
    To learn how to use Java Key Tool to generate self signed certificates: • How to Generate Key St...
    To learn how to use Portecle to generate self signed certificates: • Generate Self Signed C...
    To learn difference between one-way and two-way SSL: • How One Way and Two Wa...

Комментарии • 167

  • @TheL337trance
    @TheL337trance 2 года назад +5

    I needed someone to explain it like this for so long. Thank you man.

  • @BirdFinder100
    @BirdFinder100 3 года назад +7

    Excellent demonstration sir. Thank you for making this clear to me.

  • @lorenzomagni9200
    @lorenzomagni9200 3 года назад +4

    wow everything worked so flawlessly, you're a hero

  • @sachinmarawar7617
    @sachinmarawar7617 Год назад

    Very well demonstrated key-pair generation, extracting public key, CSR and self-signed certificate. Great work!

  • @shanrk2972
    @shanrk2972 2 года назад +1

    Short video, simple to understand. WOW!!! Thank you

  • @azontoboynate
    @azontoboynate Год назад +2

    Lot's of CSR videos but this one was perfect! Thank you!

  • @michaelareay1037
    @michaelareay1037 3 года назад +11

    Good job done. Very clearly explained and everything was right to the point and it held my attention. Everyone should do their training videos like this.

  • @jurijus01
    @jurijus01 3 года назад +1

    Thanks a lot!!! Exactly what I was looking for

  • @dancewitharun
    @dancewitharun 3 года назад +1

    Clear explanation to the point. Thanks buddy. Keep uploading more videos like this.

  • @mwitschi69
    @mwitschi69 3 года назад +1

    Just created my first key, ever. Now going to implement this....

  • @bobbiecorner
    @bobbiecorner 2 года назад

    Great video ... I was confused before watching this, now I understand much better. Thanks.

  • @raufmedappil
    @raufmedappil 3 года назад +3

    Thanks a lot bro..I was looking for a simple but explanatory tutorial on how certificates work..this video helped me to understand a lot

  • @andresfd89
    @andresfd89 2 года назад

    Thank you very much, very clear and to the point!

  • @AlianeAbdelouahab
    @AlianeAbdelouahab 2 года назад

    this is just perfect, simple, effective !

  • @6962943
    @6962943 3 года назад

    wow thank you explained so clearly

  • @brajeshpatel2810
    @brajeshpatel2810 3 года назад

    superb knowledge ... my friend .. keep sharing it..

  • @thanmayanaik2002
    @thanmayanaik2002 2 года назад +1

    Thanks a lot for the precise, and informative video.

  • @raghuZanne
    @raghuZanne 2 года назад

    Awesome explanation. Thank you!

  • @mta5948
    @mta5948 3 года назад

    good video, very nicely explained. thanks

  • @selvendranbtech
    @selvendranbtech 3 года назад +2

    Good explanation in detail. I have one query in terms of renewal. To renew the existing CA signed certificate, is it correct to give old CSR (CSR generated to get CA signed initially). Is there any validity for key pair and CSR generated?

  • @gildonghong563
    @gildonghong563 3 года назад

    Thank you bro!!
    you are save my life!!

  • @ImranKhanVlogs8010
    @ImranKhanVlogs8010 2 года назад +1

    Awesome. This is what I needed this morning.

  • @jamely15
    @jamely15 3 года назад

    Nice explanation ! Thank you !

  • @AlHoussem
    @AlHoussem 3 года назад +1

    Great Tutorial, Thanks

  • @KeremPARLAKGUMUS-uc4xb
    @KeremPARLAKGUMUS-uc4xb 3 года назад

    thank you very much, it was very useful

  • @enriquecaballero15
    @enriquecaballero15 3 года назад +1

    great tutorial, thank you!

  • @mazbahurrahman6787
    @mazbahurrahman6787 3 года назад

    Worked for me, best video on openssl

  • @electrotsmishar
    @electrotsmishar 3 года назад +1

    very helpful. thank you

  • @ravikalkote1729
    @ravikalkote1729 2 года назад

    Great video.. all commands worked for me...thanks...one query how to add critical extensions using your commands?

  • @yv9296
    @yv9296 3 года назад +2

    excellent video. thank you.

  • @morningmotivation4745
    @morningmotivation4745 10 месяцев назад

    It cleared all my doubts..nicely explained..thanks for the amazing video..!

  • @LaeeqKhan01
    @LaeeqKhan01 2 года назад

    Very nice job.
    Please add info on how to create "non-self-signed certificates". Meaning certificate verifying some other public key. Thanks

  • @asuteles201
    @asuteles201 3 года назад +4

    Hi sir,
    I want to configure certificate based authentication, it requirement
    1.CA,
    2.User Certificate,
    3.server certificate.
    What should I do, whether is same with you do?

  • @gianlucavenditti4109
    @gianlucavenditti4109 2 года назад

    Good job! Thank you!

  • @engrkn
    @engrkn 3 года назад +1

    Good job mate :) PK/ISB at last someone from PK

  • @vivekprajapati7911
    @vivekprajapati7911 4 года назад +1

    really great way of teaching thanks.

  • @ad1450
    @ad1450 2 года назад

    Thanks a lot .Love from India

  • @ruchigarg7788
    @ruchigarg7788 3 года назад +1

    Thanks, Its really helpful.

  • @shwetasugurmath5390
    @shwetasugurmath5390 2 года назад

    If I want to create SSL certificates on cluster having 4-5 nodes, can we have same crt copied to all hosts?

  • @demontagemontage
    @demontagemontage 3 года назад +1

    how to creat command "CLS" clear screen in this toolkit , or same equivalent???????????????????????

  • @mark-theeverydayimagineer6163
    @mark-theeverydayimagineer6163 3 года назад +1

    Great presentation - thanks

  • @ganeshraj5328
    @ganeshraj5328 2 года назад

    Thankyou. Video was very clear

  • @fanig1458
    @fanig1458 3 года назад

    How should I verify that same csr for the crt that was created

  • @madhamsettypreetham1261
    @madhamsettypreetham1261 2 года назад

    Thanks for the clear explanation

  • @gadhoodhle
    @gadhoodhle 2 года назад

    Very useful - clear and consise. Thanks for sharing.

  • @rfrancoi
    @rfrancoi 8 месяцев назад +1

    Excellent video Sir. Thank you; it is greatly appreciated.

  • @SupraRyu
    @SupraRyu 2 года назад +1

    Great job!

  • @maksimsvystun799
    @maksimsvystun799 Год назад

    Thanks! You helped a lot

  • @noorullashaik1784
    @noorullashaik1784 2 года назад

    Good job clearly explained

  • @sharadregoti7742
    @sharadregoti7742 3 года назад

    Can you also make a video on certificate chaining / Intermediate CAS

  • @SureshBabu-of5jh
    @SureshBabu-of5jh 3 года назад

    In this case can we generate public keys and match with public keys being used by differenrt companies?

  • @travelwalk539
    @travelwalk539 3 года назад +1

    Good explanation , keep it up

  • @amj7573
    @amj7573 2 года назад

    Very nice video. Thank you very much. How to create certificate with encryption and does the server also should have a certificate with encrypted key? And also can we use Portecle to generate certificates with encrypted key for linux?

  • @edalee5935
    @edalee5935 3 года назад +1

    It's very helpful~!

  • @EndlessTech
    @EndlessTech Год назад

    Very informative 😊👏

  • @ajaiyapandey5058
    @ajaiyapandey5058 Год назад

    Thanks for the great tutorials. How I securely push these key (private & cer) in jks file ?

  • @santhoshnagamalla4302
    @santhoshnagamalla4302 Год назад

    Awesome explanation bro !!!

  • @jiten6mar
    @jiten6mar Год назад

    Nice video in detail. I have one question in terms of renewal. To renew the existing CA signed certificate, is it correct to give old CSR (CSR generated to get CA signed initially). Is there any validity for key pair and CSR generated?

  • @dennisgarber
    @dennisgarber 3 года назад +1

    Great video, but you now have weird files on your computer. What do you do with these weird files. Do I ftp to my server, control panel, do I need to go to ican or other ssl org to upload them?

  • @icanada4
    @icanada4 Год назад

    Thank you!

  • @georgebenjamin6632
    @georgebenjamin6632 2 года назад

    Well done for this nice video

  • @Jennn
    @Jennn 2 года назад

    Thank you So Much Sir

  • @HistoryChannel80
    @HistoryChannel80 2 года назад

    Thank you very much. Was thinking I will never get it with this csr.

  • @JDavidFIG
    @JDavidFIG 3 года назад

    Good job friend!!

  • @dovelrob
    @dovelrob 4 года назад +1

    thanks for your help bro

  • @vikashahirwar8388
    @vikashahirwar8388 3 года назад

    What is the command to connect for godaddy signed ssl

  • @jakobyaro6428
    @jakobyaro6428 9 месяцев назад

    thanks bro, you are the best

  • @My_Name_Is_Prashant
    @My_Name_Is_Prashant 2 года назад

    wow..
    It helped me a lot

  • @yasiryousuf2344
    @yasiryousuf2344 3 года назад

    Sir how to create https complete chain certificate ?

  • @amirkian1181
    @amirkian1181 Год назад

    Can you tell me how we can extract the private key from the key pair, as well as the public key?

  • @cheers1963
    @cheers1963 Год назад

    Thank you sir

  • @rupeshgawas4905
    @rupeshgawas4905 Год назад

    thank you bhai

  • @ceeeskayaar2281
    @ceeeskayaar2281 2 года назад

    info given in this video was insufficient to running localhost with https using openssl certificate. It ended with net::cert_common_name_invalid error in chrome on windows and also with hhtps strickedout in url with no green lock in browser address bar. I appreciate further help to fix the error...

  • @sudhanshutiwari7916
    @sudhanshutiwari7916 2 года назад

    how can we stop the stdin for step 3 like country name etc, and provide through argparser ?

  • @ashoka5046
    @ashoka5046 3 года назад

    Thank you

  • @unemployedcse3514
    @unemployedcse3514 Год назад

    Awesome 😍

  • @Mocka-yf4ez
    @Mocka-yf4ez 2 года назад +1

    awsome!!!!!!

  • @RatedA4Aliens
    @RatedA4Aliens 3 года назад

    why not use pgpg tools?

  • @boitahaki
    @boitahaki 3 года назад

    how do i install it?

  • @jibrankhan499
    @jibrankhan499 2 года назад +1

    Job saving info for me.

  • @itigloostudio957
    @itigloostudio957 2 года назад

    Thanks.

  • @namanbajpai6107
    @namanbajpai6107 2 года назад

    Thanks ..

  • @bharathikommu9016
    @bharathikommu9016 Год назад

    Hisir.
    How do one vedio on how to create csr repo

  • @Nyemaster
    @Nyemaster 3 года назад +1

    Thanks - I had all this confused. You helped a lot. Now how do I get this into Windows 10?

    • @TutorialsPediaVideos
      @TutorialsPediaVideos  3 года назад

      Thanks Dave for your feedback. You can download windows version of openssl and use it in your machine. I myself created this tutorial in Windows 10.

    • @mubasherchaudhary5223
      @mubasherchaudhary5223 3 года назад

      I also had a problem with installing it on windows but then I found this tutorial helpful
      ruclips.net/video/YNKUpNpM0Q0/видео.html&ab_channel=TechDeepDiveTechDeepDive

  • @lkinsmusic
    @lkinsmusic 2 года назад

    Hello when i use command for create csr file. This file is not shown when type dir command
    it is not created. Why this issue happened ?

  • @sampande45
    @sampande45 Год назад

    How to solve the invalid digest for sha1 error while creating csr

  • @venigallashanmukha320
    @venigallashanmukha320 2 года назад

    how can i remove or rekove the same certificate ??

  • @Karuna-y5o
    @Karuna-y5o 2 года назад

    Command to create self signed certificate with csr and private key is not working shows x509: Use -help for summary. any idea?

  • @kishoreyadav9317
    @kishoreyadav9317 3 года назад +2

    I am getting Can't open -testauto.key for reading, No such file or directory error any idea ?? followed the same steps

  • @ankursingh7505
    @ankursingh7505 Год назад +1

    Great Video, Very clearly explained about CA, CSR.
    I have a question:
    When we are opening the //https connection using self signed CA certificate getting some warnings on //https web page. May I know the reason?
    Kindly, respond.
    Thanks

    • @TutorialsPediaVideos
      @TutorialsPediaVideos  Год назад

      Dear Ankur,
      Thanks for the kind feedback.
      In case of a self-signed certificate, we get SSL warning because chain of trust is not identified by the browser. Browser trusts only CA signed certificates (unless you explicitly add your certificate in the trust store).
      I will recommend you to watch my other video where I explained SSL chain of trust in much detail.

  • @AQEELAbdulmajeed-dh1ti
    @AQEELAbdulmajeed-dh1ti 3 года назад +1

    I Like it.

  • @happyverma91
    @happyverma91 2 года назад

    Can I deploy certificate on godaddy domain?

  • @bhaveshdwivedi3549
    @bhaveshdwivedi3549 Год назад

    CAn you create an video about self signing code signing certificate

  • @maheshkumarnaik754
    @maheshkumarnaik754 Год назад

    how to put it in P2S azure

  • @gokulg2756
    @gokulg2756 3 года назад

    Cant opn ssl for reading no such file or directory!?

    • @User-nq9ee
      @User-nq9ee 3 года назад

      The only thing that worked for me in this situation was the self-created openssl.cnf file.
      Here are the basics needed for this exercise (edit as needed):
      #
      # OpenSSL configuration file.
      #
      # Establish working directory.
      #C:\Users\User\Desktop\test
      dir = .
      [ ca ]
      default_ca = CA_default
      [ CA_default ]
      serial = $dir/serial
      database = $dir/certindex.txt
      new_certs_dir = $dir/certs
      certificate = $dir/cacert.pem
      private_key = $dir/private/cakey.pem
      default_days = 365
      default_md = md5
      preserve = no
      email_in_dn = no
      nameopt = default_ca
      certopt = default_ca
      policy = policy_match
      [ policy_match ]
      countryName = match
      stateOrProvinceName = match
      organizationName = match
      organizationalUnitName = optional
      commonName = supplied
      emailAddress = optional
      [ req ]
      default_bits = 1024 # Size of keys
      default_keyfile = key.pem # name of generated keys
      default_md = md5 # message digest algorithm
      string_mask = nombstr # permitted characters
      distinguished_name = req_distinguished_name
      req_extensions = v3_req
      [ req_distinguished_name ]
      # Variable name Prompt string
      #------------------------- ----------------------------------
      0.organizationName = Organization Name (company)
      organizationalUnitName = Organizational Unit Name (department, division)
      emailAddress = Email Address
      emailAddress_max = 40
      localityName = Locality Name (city, district)
      stateOrProvinceName = State or Province Name (full name)
      countryName = Country Name (2 letter code)
      countryName_min = 2
      countryName_max = 2
      commonName = Common Name (hostname, IP, or your name)
      commonName_max = 64
      # Default values for the above, for consistency and less typing.
      # Variable name Value
      #------------------------ ------------------------------
      0.organizationName_default = My Company
      localityName_default = My Town
      stateOrProvinceName_default = State or Providence
      countryName_default = US
      [ v3_ca ]
      basicConstraints = CA:TRUE
      subjectKeyIdentifier = hash
      authorityKeyIdentifier = keyid:always,issuer:always
      [ v3_req ]
      basicConstraints = CA:FALSE
      subjectKeyIdentifier = hash
      # copy till here
      now save this file and run the command as
      openssl req -new -key tutorialspedia.key -out tutorialspedia.csr -config openssl.cnf
      hope this will work for you :)

  • @okey1317
    @okey1317 Год назад

    6:00 Why did you pass the initial key file? .. shouldnt we pass the public key file?

  • @saikrishnamerugu6118
    @saikrishnamerugu6118 6 месяцев назад

    executing openssl command to generate key pair using "openssl genrsa -out keyfile.key 2048" but facing an error "genrsa: Can't open "keyfile.key" for writing, Permission denied". Could you guide me hot to fix this

  • @SherinSunny-rj3py
    @SherinSunny-rj3py 3 года назад

    i am getting an error saying warning can't open config file: C:/OpenSSL/openssl.cnf please do help

  • @jai7853
    @jai7853 3 года назад

    Hello,
    I created a ssl certificate but i dont want to put a specific CN name, rather just a * wildcard because in the server side hostname will keep changing periodically so i dont want to generate certificate everytime. Whatever the hostname it be the client can connect . Is there a way around ??

    • @TutorialsPediaVideos
      @TutorialsPediaVideos  3 года назад +1

      Dear Jai,
      You can use *.host.com and this way your certificate will be valid for that domain and any subdomains but having only * without even a mention of a host at all doesn't make sense for any real production environment.

    • @jai7853
      @jai7853 3 года назад

      @@TutorialsPediaVideos thank you for your quick response. Appreciate it.

    • @jai7853
      @jai7853 3 года назад

      Hello Again,
      I dont know if you have time for this but i have a situation and trying to find a solution for it since some days but no positive result yet. I will be very grateful if any insights can be provided by you.
      I have a server with serverCertificates and a client with its own certificate. I am potraying as a CA. I am working with RPi. When i set CN in the serverCertificate as 'raspberrypi' and in the client hostname as 'raspberrypi' for sending https.request, I get desired result all looks perfect. Problem is instead of CN i want to use 'subjectAltName' in my certificate so that i can also nominate an IP as my [alt_names]. I created the certificate with alt_names getting help from some website but when i send client request to the server from a remote machine connected to the same network i get an error stating hostname is invalid. Below is the error :
      Error [ERR_TLS_CERT_ALTNAME_INVALID]: Hostname/IP does not match certificate's altnames: IP: 10.10.10.10 is not in the cert's list:
      at Object.checkServerIdentity (tls.js:287:12)
      at TLSSocket.onConnectSecure (_tls_wrap.js:1511:27)
      at TLSSocket.emit (events.js:315:20)
      at TLSSocket._finishInit (_tls_wrap.js:936:8)
      at TLSWrap.ssl.onhandshakedone (_tls_wrap.js:710:12) {
      reason: "IP: 10.10.10.10 is not in the cert's list: ",
      host: '10.10.10.10',
      If you want the config i used for creating certificate i can also share that. Just let me know.
      Any help from you ??

  • @carolinazubieta1349
    @carolinazubieta1349 Год назад

    super