No problem in order for server services to use this key, its password is stored (in the system keychain, actually) in a retrievable form. The private key file will be encrypted with a randomly-generated password. Make sure you get both the certificate (filename ending ".cert.pem") and matching private key (".key.pem") you might also need the cert chain (".chain.pem"), which includes your certificate and the supporting certificates that vouch for its authenticity. The certificate and associated private key are also stored (as you said) in /etc/certificates. It will ask for your admin name & password to get access to the keychain, then ask for a new password to encrypt the exported file with. In the export dialog, make sure the file format is set to "Personal Information Exchange (.p12)" to export both the private key and (public) certificate. Select the relevant certificate on the right side of the window, then from the File menu choose "Export Items. Run the Keychain Access utility on the server, select "System" from the Keychains list, then "My Certificates" from the Category list under that. It looks like OP's problem has been solved, but for the record it's actually fairly easy to get the keys from OS X Server, as long as you have admin access to the server.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |