Jump to:navigation, search
Wiki





































Export or request and import third-party certificates from Windows

Last adaptation to the version: 12.1

New:
  • Updated to Redesign of the webinterface
Last updated: 
notempty
This article refers to a Beta version

Description

The following describes how a third-party certificate (x509) can be imported into a Securepoint UTM to use it for the reverse proxy, for example.
To import the certificates, they must be available either in PEM format or in PKCS12 format and Base64 encoded.


Export certificate

  1. On the computer where the certificate was installed, the Microsoft Management Console (MMC) must be started.
  2. In the console, add the certificate snap-in.
    Followed by clicking the My User Account in the prompt to specify the account to manage.
  3. .
  4. With a double click in the MMC console on Certificates - Current user, then on Own certificates and finally on Certificates, then the certificates can be accessed.
  5. .
notempty
The Private Key must be present.
The own certificate in the MMC console
  1. In the right pane, right-click on the certificate to be exported in the pop-up menu under All Tasks and then Export to start the Certificate Export Wizard.
  2. .
  3. Once the certificate export wizard has been started, you must first click on Next.
  4. On the following page "Export private key" can be continued with "Yes, export private key"
  5. .
  • The Private Key is required so that the encrypted messages can be read on the computer where the key is imported.
  • Export Private Key
    1. On the page Export File Format accept the default settings and then click on Next.
    2. On the following page Password the password for the private key must be entered.
    3. On the Export File page, enter the path and name of the exported certificate file and then click Next.
    4. The file name has the extension pfx, this must then be converted so that the certificate can be imported on the firewall.
    5. Lastly, click on Finish to export the certificate.
    notempty
    The exported certificate file is saved with the specified name and extension .pfx.
    Path for the export file

    Create CSR for third-party certificate

    To request a certificate from a public certification authority (CA) a Certificate Signing Request is needed.
    This can be created with OpenSSL.
    1. First, a private certificate is needed: openssl genrsa -out ttt-point.key 2048
      This file also contains the private certificate, which must never be shared with others!
    2. The CSR can be created from this certificate: openssl req -new -key ttt-point.key -out ttt-point.csr
    3. Then various details are requested, which will be stated in the certificate.
    4. The completed CSR can then be submitted to the CA.
    Create CSR
    It is also possible to handle the entire operation with one command using the -subj parameter:openssl req -new \
    -newkey rsa:2048 -nodes -keyout ttt-point.key \
    -out ttt-point.csr \
    -subj "/C=DE/ST=Niedersachsen/L=/O=TTT-Point AG/OU=Support/CN=*.ttt-point.de"
    Create CSR with one single commandline

    Import

    Certificates and CAs can be imported on the UTM in the Authentication Certificates menu in the CA tab with the Import CA button or in the Certificates tab with the Import Certificate button.

  • Da die Zertifikate nicht auf der UTM erstellt wurden, wird eine Meldung (UNABLE TO GET CERTIFICATE CRL) angezeigt. Diese ist in unproblematisch.
    Solange der Status grün ist, kann das Zertifikat wie jedes andere genutzt werden.

  • Special notes

    Sequence of the certificate chain

    The following order should be considered during import:

    1. CA
    2. Intermediate certificate 1 (if available)
    3. Intermediate certificate 2 (if available)
    4. Web server certificates

    Convert certificate

    If a third-party certificate is not in the PEM or PKCS12 format, it must be converted.



    Import format

    Certificates and CAs to be imported into a UTM must be in the format .pem or .p12 (pkcs12).

    Certificates can be converted with the tool openssl - available for all common platforms (part of Linux, call via console) - and the following commands:

    Certificate Command
    X509 to PEM openssl x509 -in certificatename.cer -outform PEM -out certificatename.pem
    DER to PEM openssl x509 -inform der -in certificate.cer -out certificate.pem
    P7B to PEM openssl pkcs7 -print_certs -in certificate.p7b -out certificate.pem


    Error message during import

    During import, the error message "The certificate format is not supported..." may appear.
    Password protected certificates in pkcs12 format (.p12 , .pfx , .pkcs12) in conjunction with older ciphers can trigger this error.
    Import is usually possible if in the tab General the option Support legacy cryptographic algorithms On is enabled.

    notempty
    Requires a This will interrupt all connections (incl. VPN connections) to the UTM!


    Options for importing certificates:

    • Convert certificate to *.pem

    Certificates can be converted with the tool openssl - available for all common platforms (part of Linux, call via console) - and the following commands:
    openssl pkcs12 -in Zertifikat.pfx -out Zertifikat.pem -nodes
    Alternatively with the help of an online service

    • CLI commands to allow certificate import with obsolete ciphers in the UTM
      extc global set variable GLOB_ENABLE_SSL_LEGACY value 1

    appmgmt config application "securepoint_firewall"
    appmgmt config application "fwserver"
    system reboot

    notempty
    Requires a This will interrupt all connections (incl. VPN connections) to the UTM!
    cli> extc global get variable GLOB_ENABLE_SSL_LEGACY 
    variable              |value
    ----------------------+-----
    GLOB_ENABLE_SSL_LEGACY|0  
    
    cli> extc global set variable GLOB_ENABLE_SSL_LEGACY value 1
    OK
    
    cli> extc global get variable GLOB_ENABLE_SSL_LEGACY
    variable              |value
    ----------------------+-----
    GLOB_ENABLE_SSL_LEGACY|1
    
    cli> appmgmt config application "securepoint_firewall"
    cli> appmgmt config application "fwserver"
    

    Issuer

    If the message "no issuer found" occurs, the previous certificate is initially missing from the certificate chain.

    The issuer of a certificate can be found out with the command: openssl x509 -in file.pem -text

    Under the item "Issuer:" you can now view the issuer located at the issuer for download'.