makeporngreatagain.pro
yeahporn.top
hd xxx

Generate and export certificates for Point-to-Site VPN Connection using PowerShell

918

1. Create a self-signed root certificate

Use the New-SelfSignedCertificate cmdlet to create a self-signed root certificate.

  1. From a computer running Windows 10 or Windows Server 2016, open a Windows PowerShell console with elevated privileges. These examples do not work in the Azure Cloud Shell “Try It”. You must run these examples locally.
  2. Use the following example to create the self-signed root certificate. The following example creates a self-signed root certificate named ‘WebMagicRoot’ that is automatically installed in ‘Certificates-Current User\Personal\Certificates’. You can view the certificate by opening certmgr.msc, or Manage User Certificates.
  3. $cert = New-SelfSignedCertificate -Type Custom -KeySpec Signature `
    -Subject "CN=WebMagicRoot" -KeyExportPolicy Exportable `
    -HashAlgorithm sha256 -KeyLength 2048 `
    -CertStoreLocation "Cert:\CurrentUser\My" -KeyUsageProperty Sign -KeyUsage CertSign

Each client computer that connects to a VNet using Point-to-Site must have a client certificate installed. You generate a client certificate from the self-signed root certificate, and then export and install the client certificate. If the client certificate is not installed, authentication fails.

The following steps walk you through generating a client certificate from a self-signed root certificate. You may generate multiple client certificates from the same root certificate. When you generate client certificates using the steps below, the client certificate is automatically installed on the computer that you used to generate the certificate. If you want to install a client certificate on another client computer, you can export the certificate.

The examples use the New-SelfSignedCertificate cmdlet to generate a client certificate that expires in one year.

Example 1

Use this example if you have not closed your PowerShell console after creating the self-signed root certificate. This example continues from the previous section and uses the declared ‘$cert’ variable. If you closed the PowerShell console after creating the self-signed root certificate, or are creating additional client certificates in a new PowerShell console session.

Modify and run the example to generate a client certificate. If you run the following example without modifying it, the result is a client certificate named ‘WebMagicChild’. If you want to name the child certificate something else, modify the CN value. Do not change the TextExtension when running this example. The client certificate that you generate is automatically installed in ‘Certificates – Current User\Personal\Certificates’ on your computer.

New-SelfSignedCertificate -Type Custom -DnsName P2SChildCert -KeySpec Signature `
-Subject "CN=WebMagicChild" -KeyExportPolicy Exportable `
-HashAlgorithm sha256 -KeyLength 2048 `
-CertStoreLocation "Cert:\CurrentUser\My" `
-Signer $cert -TextExtension @("2.5.29.37={text}1.3.6.1.5.5.7.3.2")

Example 2

If you are creating additional client certificates, or are not using the same PowerShell session that you used to create your self-signed root certificate, use the following steps:

  1. Identify the self-signed root certificate that is installed on the computer. This cmdlet returns a list of certificates that are installed on your computer.
    Get-ChildItem -Path “Cert:\CurrentUser\My”
  2. Locate the subject name from the returned list, then copy the thumbprint that is located next to it to a text file. In the following example, there are two certificates. The CN name is the name of the self-signed root certificate from which you want to generate a child certificate. In this case, ‘WebMagicRoot’.Thumbprint Subject
    AED812AD883826FF76B4D1D5A77B3C08EFA79F3F  CN=WebMagicChild
    7181AA8C1B4D34EEDB2F3D3BEC5839F3FE52D655  CN=WebMagicRoot
  3. Declare a variable for the root certificate using the thumbprint from the previous step. Replace THUMBPRINT with the thumbprint of the root certificate from which you want to generate a child certificate.
    $cert = Get-ChildItem -Path "Cert:\CurrentUser\My\THUMBPRINT"

    For example, using the thumbprint for For example, using the thumbprint for WebMagicRoot in the previous step, the variable looks like this

    $cert = Get-ChildItem -Path "Cert:\CurrentUser\My\7181AA8C1B4D34EEDB2F3D3BEC5839F3FE52D655"
  4. Modify and run the example to generate a client certificate. If you run the following example without modifying it, the result is a client certificate named ‘WebMagicChild’. If you want to name the child certificate something else, modify the CN value. Do not change the TextExtension when running this example. The client certificate that you generate is automatically installed in ‘Certificates – Current User\Personal\Certificates’ on your computer.
    New-SelfSignedCertificate -Type Custom -DnsName WebMagicChild-KeySpec Signature `
    
    -Subject "CN=P2SChildCert" -KeyExportPolicy Exportable `
    
    -HashAlgorithm sha256 -KeyLength 2048 `
    
    -CertStoreLocation "Cert:\CurrentUser\My" `
    
    -Signer $cert -TextExtension @("2.5.29.37={text}1.3.6.1.5.5.7.3.2")

3. Export the root certificate public key (.cer)

After creating a self-signed root certificate, export the root certificate public key .cer file (not the private key). You will later upload this file to Azure. The following steps help you export the .cer file for your self-signed root certificate:

  1. To obtain a .cer file from the certificate, open Manage user certificates. Locate the self-signed root certificate, typically in ‘Certificates – Current User\Personal\Certificates’, and right-click. Click All Tasks, and then click Export. This opens the Certificate Export Wizard. If you can’t find the certificate under Current User\Personal\Certificates, you may have accidentally opened “Certificates – Local Computer”, rather than “Certificates – Current User”). If you want to open Certificate Manager in current user scope using PowerShell, you type certmgr in the console window.
  2. In the Wizard, click Next.

  3. Select No, do not export the private key, and then click Next.
  4. On the Export File Format page, select Base-64 encoded X.509 (.CER)., and then click Next.

  5. For File to ExportBrowse to the location to which you want to export the certificate. For File name, name the certificate file. Then, click Next.

  6. Click Finish to export the certificate.
  7. Your certificate is successfully exported.
  8. The exported certificate looks similar to this:
  9. If you open the exported certificate using Notepad, you see something similar to this example. The section in blue contains the information that is uploaded to Azure. If you open your certificate with Notepad and it does not look similar to this, typically this means you did not export it using the Base-64 encoded X.509(.CER) format. Additionally, if you want to use a different text editor, understand that some editors can introduce unintended formatting in the background. This can create problems when uploaded the text from this certificate to Azure.

Export the self-signed root certificate and private key to store it (optional)

You may want to export the self-signed root certificate and store it safely as backup. If need be, you can later install it on another computer and generate more client certificates. To export the self-signed root certificate as a .pfx, select the root certificate and use the same steps as described in Export a Client Certificate.

 

4. Export the client certificate

When you generate a client certificate, it’s automatically installed on the computer that you used to generate it. If you want to install the client certificate on another client computer, you need to export the client certificate that you generated.

  1. To export a client certificate, open Manage user certificates. The client certificates that you generated are, by default, located in ‘Certificates – Current User\Personal\Certificates’. Right-click the client certificate that you want to export, click all tasks, and then click Export to open the Certificate Export Wizard.

  2. In the Certificate Export Wizard, click Next to continue.

  3. Select Yes, export the private key, and then click Next.
  4. On the Export File Format page, leave the defaults selected. Make sure that Include all certificates in the certification path if possible is selected. This setting additionally exports the root certificate information that is required for successful client authentication. Without it, client authentication fails because the client doesn’t have the trusted root certificate. Then, click Next.

  5. On the Security page, you must protect the private key. If you select to use a password, make sure to record or remember the password that you set for this certificate. Then, click Next.

  6. On the File to ExportBrowse to the location to which you want to export the certificate. For File name, name the certificate file. Then, click Next.

  7. Click Finish to export the certificate.

  8. Your certificate is successfully exported
  9. The exported certificate looks similar to this:

Leave A Reply

Your email address will not be published.

baseofporn.com https://www.opoptube.com
Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.