openssl genrsa -out rootCA.key 4096openssl req -new -x509 -days 1826 -key rootCA.key -out rootCA.crtopenssl genrsa -out server.key 2048[req]
req_extensions = v3_req
x509_extensions = v3_req
distinguished_name = req_distinguished_name
prompt = no
[req_distinguished_name]
C = Country
ST = State
L = City
O = Org. name
OU = Org. unit name
CN = server-name
[v3_req]
basicConstraints = CA:FALSE
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
subjectAltName = @alt_names
[alt_names]
DNS.1 = server-name
DNS.2 = alternative-server-name
DNS.3 = subdomain.server-name
openssl req -new -key server.key -config openssl.cnf -out server.csropenssl x509 -req -days 3650 -in server.csr -CA rootCA.crt -CAkey rootCA.key -set_serial 123 -extensions v3_req -extfile openssl.cnf -out server.crtUse incremental number as a -set_serial value
- Keychain Access App
- Import ca.crt
- Double click on imported item > Trust > Always Trust
- Preferences > Privacy & Security > View Certificates
- Certificate Manager > Authorities > Import ca.crt
- Trust Settings > This certificate can identify websites
- Use Dropbox link to add certificate to system
- Settings > General > About > Certificate Trust Settings
- Enable full trust for imported root certificate