Enabling HTTPS Connectivity for Nodes
vPlus Server (when using own certificate)
openssl req -x509 -newkey rsa:4096 -keyout vplus.key -out vplus.crt -days 365Generating a 4096 bit RSA private key ...............................................................................++ .............................................................................................................................................................................................................................................................................................................................................++ writing new private key to 'vplus.key' Enter PEM pass phrase: Verifying - Enter PEM pass phrase: ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [XX]:PL State or Province Name (full name) []: Locality Name (eg, city) [Default City]:Warsaw Organization Name (eg, company) [Default Company Ltd]: your Company Organizational Unit Name (eg, section) []: Common Name (eg, your name or your server's hostname) []:vplus.local Email Address []:openssl pkcs12 -export -in vplus.crt -inkey vplus.key -out vplus.p12 -name vplusEnter pass phrase for vplus.key: Enter Export Password: Verifying - Enter Export Password:keytool -importkeystore -destkeystore /opt/vprotect/keystore.jks -srckeystore vplus.p12 -srcstoretype PKCS12 -alias vplus #Enter destination keystore password: #Re-enter new password: #Enter source keystore password:chown vprotect:vprotect /opt/vprotect/keystore.jkseu.vplus.vprotect.ssl.certname=[certificate alias] javax.net.ssl.keyStore=/opt/vprotect/keystore.jks javax.net.ssl.keyStorePassword=[keystorepassword]systemctl stop vprotect-server systemctl start vprotect-server
vPlus Node (any SSL certificate)
Notes on using your own certificate with CSR and your own CA
Last updated