CSR Generation Instructions – Cisco ACS 4.2
Generate a Key Pair and Certificate Signing Request
1) In the navigation bar, click System Configuration.
2) Click ACS Certificate Setup.
3) Click Generate Certificate Signing Request. Cisco Secure ACS displays the Generate new request table on the Generate Certificate Signing Request page. Fill out all of the requested fields.
4) In the Certificate subject box, type the values required by the CA you will submit the CSR to. Cisco Secure ACS requires that one of the values be CN, such as CN=example.com. You can specify multiple values. To do so, separate the values with commas. For example: CN=www.example.com, O=COMODO, C=US, S=New Jersey, L=Jersey City. COMODO requires, Common Name, Organization, Country, State, & Locality (City). An Organization Unit (OU) is optional.
This command will prompt for the following X.509 attributes of the certificate:
Country Name (C):
Use the two-letter code without punctuation for country, for example: US or CA.
State or Province (S):
Spell out the state completely; do not abbreviate the state or province name, for example: California
Locality or City (L):
The Locality field is the city or town name, for example: Berkeley.
If your company or department has an &, @, or any other symbol using the shift key in its name, you must spell out the symbol or omit it to enroll. Example: XYZ Corporation
Organizational Unit (OU):
This field is optional; but can be used to help identify certificates registered to an organization. The Organizational Unit (OU) field is the name of the department or organization unit making the request.
Common Name (CN):
The Common Name is the Host + Domain Name. It looks like “www.example.com” or “example.com”.
Note: When prompted for your “first- and lastname”, enter the desired Common Name.
SSL Certificates can only be used on Web servers using the Common Name specified during enrollment. For example, a certificate for the domain “example.com” will receive a warning if accessing a site named “www.example.com” or “secure.example.com”, because “www.example.com” and “secure.example.com” are different from “example.com”.
Certificates can only be used on Web servers using the Common Name specified during enrollment. For example, a certificate for the domain “domain.com” will receive a warning if accessing a site named “www.example.com” or “secure.example.com”, because “www.example.com” and “secure.example.com” are different from “example.com”.
Please do not enter your email address, challenge password or an optional company name when generating the CSR.
5) In the Private key file box, type the full directory path and name of the file in which the private key is saved, for example, c:privateKeyFile.pem.
6) In the Private key password box, type the private key password that you have would like to use. Networking4all does not have access to this password and cannot recover it.
7) In the Retype private key password box, retype the private key password.
8) In the Key length list, choose 2048 bits.
9) From the Digest to sign with list, select SHA1.
10) Click Submit. Cisco Secure ACS displays a CSR in the display area, on the right, under a banner that reads: Now your certificate signing request is ready. You can copy and paste it into any certification authority enrollment tool. You have just created a key pair and a CSR.
11) To copy and paste the information into the enrollment form, open the file in a text editor that does not add extra characters (Notepad or Wordpad, etc.).
12) Go to Enrollment. When enrolling for the SSL Certificate you will be asked to choose a server vendor, choose Apache. This will allow a certificate that is compatible with the Cisco ACS.