-
Open the \< OPENSSLDIR>\openssl.cnf file in a text editor and edit the [CA_default] section. Make the following changes
|
›_ Console |
|
|
NOTE: You can change dir to the directory of your choice, but make sure to use correct path in the subsequent steps. Here, We have created directory C:\localCA and new_certs_dir= $dir\newcerts |
-
Create the text files C:\localCA\index.txt and C:\localCA\serial.txt
-
Create a directory C:\localCA\newcerts
-
Open the C:\localCA\serial.txt file and write 01 at the top and click Enter. Save the file
-
Create a key pair using pkcs11tool2
For RSA
|
›_ Console |
|
This generates RSA 2048 CA private keys on the HSM
For ECDSA
|
›_ Console |
|
Once key generation is complete, then add CKA_ID for both public and private ECDSA keys using
PKCS11# CryptoServer Administration tool.
-
Verify the key gets generated onto the HSM using following command
|
›_ Console |
|
For RSA
Figure 42: CA RSA Key list
For ECDSA:
Figure 43: CA ECDSA Key list
-
Create a CA certificate based on the generated key that is used for signing other certificates
|
›_ Console |
|
Figure 44: CA certificate generation output
Where CAKey is the object label for the CA private key on the Utimaco HSM created in Step 5 and OPENSSLWINSLOT is the token label. Provide Cryptouser PIN when prompted.