| 
       To see the encoded contents, exit the
       configuration utility and view the CSR file. 
       
        $ TYPE OPENSSL_ROOT:[CSR]SERVER.CSR 
       What you see is exacly what is required by
       the certificate authority. You may be required to send the file
       itself or just the contents of the file to your CA (according to the
       CA's instructions). 
       For example: 
       
        -----BEGIN CERTIFICATE REQUEST-----
 
        MIIB/TCCAWYCAQAwgbwxCzAJBgNVBAYTAlVTMRYwFAYDVQQIEw1OZXcgSGFtcHNo
 aXJlMQ8wDQYDVQQHEwZOYXNodWExHjAcBgNVBAoTFUNvbXBhcSBDb21wdXRlciBD
        
 b3JwLjEcMBoGA1UECxMTT3BlblZNUyBFbmdpbmVlcmluZzEaMBgGA1UEAxMRRkxJ
        
 UDMuWktPLkRFQy5DT00xKjAoBgkqhkiG9w0BCQEWG3dlYm1hc3RlckBGTElQMy5a
        
 S08uREVDLkNPTTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA0/y8RxuE/COy
        
 nVpeK00GgvbgFWxX1o89ULQTMVUSwmAzhdzbi3DZL5s85YRGdPVgYW2rWs1t2SQg
        
 jMSlFTxta/CwW6Vwwn9GmdaJwkqGFxnpw2LmugexLfj+4t97AZyIR2O7gJxCINS5
        
 CWg3tcn1ZUmqswjkrG8WehUN+2C6IBcCAwEAAaAAMA0GCSqGSIb3DQEBBAUAA4GB
        
 ABzgiiojPAcojLXGI2OFxJ5apORAHHHAyc0YCuhFXS1Rs2BIXHmM5xQuxk8yitc4
        
 yViQfHhGDzpDmOwMKkK7t09UjQh9humKEUlAnS4VYLL4VlgenwLybcLLB0Q3aiQN
        
 UjQw9RrXNWWZYVDenvrOwtbK9dFefb4PlZIAS2/Z4jLP
 -----END CERTIFICATE REQUEST----- 
       If sending the contents, copy and paste
       everything and send to the CA using secure email or the appropriate
       enrollment form. What the CA returns to you will be a digitally
       signed certificate. 
       For example: 
       
        -----BEGIN CERTIFICATE-----
 MIICeDCCAiICEEdpjxOzmJPyh5TiG8BRA70wDQYJKoZIhvcNAQEEBQAwgakxFjAU
 BgNVBAoTDVZlcmlTaWduLCBJbmMxRzBFBgNVBAsTPnd3dy52ZXJpc2lnbi5jb20v
 cmVwb3NpdG9yeS9UZXN0Q1BTIEluY29ycC4gQnkgUmVmLiBMaWFiLiBMVEQuMUYw
 RAYDVQQLEz1Gb3IgVmVyaVNpZ24gYXV0aG9yaXplZCB0ZXN0aW5nIG9ubHkuIE5v
 IGFzc3VyYW5jZXMgKEMpVlMxOTk3MB4XDTAwMDcwNzAwMDAwMFoXDTAwMDcyMTIz
 NTk1OVowgZAxCzAJBgNVBAYTAlVTMRYwFAYDVQQIEw1OZXcgSGFtcHNoaXJlMQ8w
 DQYDVQQHFAZOYXNodWExHjAcBgNVBAoUFUNvbXBhcSBDb21wdXRlciBDb3JwLjEc
 MBoGA1UECxQTT3BlblZNUyBFbmdpbmVlcmluZzEaMBgGA1UEAxQRRkxJUDMuWktP
 LkRFQy5DT00wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANP8vEcbhPwjsp1a
 XitNBoL24BVsV9aPPVC0EzFVEsJgM4Xc24tw2S+bPOWERnT1YGFtq1rNbdkkIIzE
 pRU8bWvwsFulcMJ/RpnWicJKhhcZ6cNi5roHsS34/uLfewGciEdju4CcQiDUuQlo
 N7XJ9WVJqrMI5KxvFnoVDftguiAXAgMBAAEwDQYJKoZIhvcNAQEEBQADQQAySLLe
 U7nMLJ+QkRld6iqKjU2VotphPvgWMGsJ+TKqUI4MXaAv0zQxtBni1N8s0LXVNCuJ
 lEzBYjSbgbgEhJJA
 -----END CERTIFICATE----- 
       The CA-signed certificate contains the following: 
       
        -Your organization's common
         name (www.<yourserver>)-Additional identifying
        information (IP and physical address)
 -Your public key
  -Expiration date of the
        public key
 -Name of the CA that issued
        the ID
 -A unique serial
        number. Every certificate issued by a CA has a serial
        number that is unique to the certificates issued by that CA.
 -CA's digital signature
  
       Installing
        certificatesA signed certificate needs to be
       installed, along with the key you generated when creating the
       request, by saving or copying the respective files to their correct directories and
        restarting the server. For the
       certificate file, this is either APACHE$COMMON:[CONF.SSL_CRT]
        or APACHE$SPECIFIC:[CONF.SSL_CRT]
        .
        For the key file, this is either APACHE$COMMON:[CONF.SSL_KEY]
        or APACHE$SPECIFIC:[CONF.SSL_KEY].
 
For example: 
	         See
        also
	          $ COPY
	          APACHE$SPECIFIC:[OPENSSL.CRT]SERVER.CRT APACHE$SPECIFIC:[CONF.SSL_CRT] 
	          $ COPY
	          APACHE$SPECIFIC:[OPENSSL.KEY]SERVER.KEY APACHE$SPECIFIC:[CONF.SSL_KEY] 
       Installing a server certificate 
         
       Create a self-signed certificate
       Creating a self-signed certificate is an
       essential first step after installing CSWS
       with SSL. The server will not start without the presence of a
       properly signed and installed certificate. This procedure is performed for you automatically by the CSWS installation process when you run APACHE$CONFIG.COM and choose to enable
       mod_ssl  . Therefore, this command is only required if the
         certificate file requires changing or replacing because it has expired. 
       Do the following: 
       1. Enter the required information for the
       self-signed certificate: 
       
        -Encrypt Private Key? Using
         an encrypted private key forces the Pass Phrase dialog to appear at
        startup time. 
        -Encryption Bits? 1024
         bits is the largest recommended size. 
        
         Explanation:
         Encryption strength is often described in terms of the size of the
         keys used to perform the encryption: in general, longer keys provide
         stronger encryption. Key length is measured in bits. Private key
         sizes larger than 1024 bits are incompatible with some versions of
         Netscape Navigator and Microsoft Internet Explorer. 
        -Certificate Key File? Use
         OpenVMS syntax
         (usually, [OPENSSL_ROOT:[KEY]SERVER.KEY])-Certificate File? Use
         OpenVMS syntax
         (usually,
 [OPENSSL_ROOT:[CRT]SERVER.CRT]) 
        -Country Name? The
         remaining questions determine your server's Distinguished
         Name  
        -State or Province Name?-City Name?
 -Organization Name?
 -Organization Unit Name?
 
        -Common Name?
        This
        must be the same as your server's DNS host name (or virtual host
        name, if name-based virtual hosting is used). 
          
        
         Explanation:
         Browsers compare the common name in the server certificate with the
         host name of the server they are connecting to. These must match. 
           
        -Email Address?-Display the Certificate?
 
        Important: 
        All
         fields must be completed to create a valid self-signed certificate. 
        The inception time of
        a certificate is based on UTC (Coordinated Universal Time). Check
        with your system administrator that your computer's UTC is set
        correctly if you want to use the self-signed certificate right away.  Setting
         Correct Time Zone Information on Your System 
        
        
         | 
            |  
       
        The self-signed certificate is generated after
        responding to the last question.
 
       2. View the details of the self-signed
       certificate (if you chose to display the certificate): 
       
        
         -Version SSL
          3.0 protocol
          -Serial number 
         Certificates
          issued by a CA have a serial number that is unique to the
         certificates issued by that CA.
 -Signature Algorithm
  -Issuer
  -Validity (inception and
         expiration dates)
 
         -Public key information 
          
        
         
       Create a certificate authority
       Creating a certificate authority (CA)
       means you can issue certificates using your own private key. The
       corresponding CA public key is itself contained within a certificate,
       called a CA Certificate. You must distribute this certificate to
       clients for them to access your server. A browser must contain this
       CA Certificate in its "trusted root library" in order to
       "trust" certificates signed by the CA's private key. 
       Do the following: 
       1. Enter the required information to
       create a certificate authority: 
       
        -PEM Pass Phrase?  -Confirm PEM Pass Phrase?
 
        -Encryption Bits? 1024
         bits is the largest recommended size. 
        
         Explanation:
         Encryption strength is often described in terms of the size of the
         keys used to perform the encryption: in general, longer keys provide
         stronger encryption. Key length is measured in bits. Private key
         sizes larger than 1024 bits are incompatible with some versions of
         Netscape Navigator and Microsoft Internet Explorer. 
        -Default Days? The
         default number of days until expiration for certificates issued by
        the CA. 
		        
		         Usage note:
		         A large number, such as 1825 (5 years), is usually appropriate so that certificates signed with this key do not
		         expire too soon. 
        -Certificate Key File? Use
         OpenVMS syntax
         (usually, OPENSSL_ROOT:[KEY]SERVER_CA.KEY)-Certificate File? Use
         OpenVMS syntax
         (usually,
 OPENSSL_ROOT:[CRT]SERVER_CA.CRT) 
        -Country Name? The
         remaining questions determine your server's Distinguished
         Name  
        
         Usage
          note: A certificate authority may define a policy
         specifying which distinguished names are optional and which are
         required. It may also place requirements upon the field contents, as
         may users of certificates. As an example, a Netscape browser requires
         that the common name for a certificate representing a server has a
         name that matches a wildcard pattern for the domain name of that
         server, such as *.xyz.com. Source:
         mod_ssl Documentation 
        -State or Province Name? 
        -City Name?-Organization Name?
 -Organization Unit Name?
 
        -Common Name?
        This can be any text string that you wish to use to identify the authority. It may be
generic, such as "CA Authority", or more specific, such as
"<NodeName>CA". 
        -Email Address? 
        -Display the Certificate? 
        Important:
        All fields must be completed to create a valid CA certificate. 
        
        
         | 
            |  
       
        The certificate request is generated after
        responding to the last question. 
       2. View the details of the certificate
       authority (if you chose to display the certificate): 
       
        
         -Version SSL
          3.0 protocol
          -Serial number 
         Certificates
          issued by a CA have a serial number that is unique to the
         certificates issued by that CA.
 -Signature Algorithm
  -Issuer Your
         distinguished name
  -Validity (inception and
         expiration dates)
 -Public key information
  
        
        
       Sign a certificate request
       Signing someone else's certificate request
       is the function of a certificate authority. When you send a
       signed certificate back, it can be used to start the server with the pass phrase they have. Embedded in the
       certificate is your public key. It must match the public key you
       distribute to clients using this server. 
       1. Enter the required information to sign
       a certificate by specifying the following: 
       
        -Certificate File specification
        Use OpenVMS syntax
         (usually, OPENSSL_ROOT:[CRT]SERVER.CA.CRT)-Certificate Key File
        specification Use OpenVMS syntax
         (usually,
 OPENSSL_ROOT:[KEY]SERVER_CA.KEY)-Certificate Request File? Use
         OpenVMS syntax
         (usually,
 OPENSSL_ROOT:[CSR]SERVER.CSR)-Signed Request File specification Use
         OpenVMS syntax
         (usually,
 OPENSSL_ROOT:[CRT]SIGNED.CRT)-Default Days 
        The
         default number of days until the
         signed certificate expires.
 -PEM Pass Phrase
  This
         is a verification field only. You must use
        the same pass phrase you used to create the certificate authority
        (Option 5). 
        Important: 
        The
         inception time of a certificate is based on UTC (Coordinated
        Universal Time). Check with your system administrator that your
        computer's UTC is set correctly.  Setting
         Correct Time Zone Information on Your System |