This is a quick step-by-step guide on how to create a SUB CA to NetIQ Certificate Server (eDirectory) with external certificate authority using only OpenSSL commands. This is much more straightforward process than done with iManager and allows more flexibility.

What we need to do:

  • Create a new private key
  • Make a certificate signing request
  • Get signed certificate along with the chain from CA
  • Create pfx from all of the above
  • Delete NetIQ Certificate Server CA object
  • Import pfx into a new CA in NetIQ Certificate Server using iManager
  • Create default certificates

First we need to create the private key with command

openssl genrsa -aes256 -out /path/to/mysubca.key 8192

Give a sufficient pass phrase when prompted.

Then we proceed to making the csr with openssl:

openssl req -sha256 -new -key /path/to/mysubca.key -out /path/to/mysubca.csr

Then answer the questions:

Enter pass phrase for /path/to/mysubca.key: <your pass phrase here>
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
Country Name (2 letter code) [FI]:
State or Province Name (full name) []:
Locality Name (eg, city) []:Lappeenranta
Organization Name (eg, company) []:My Org   
Organizational Unit Name (eg, section) []:IT
Common Name (eg, your name or your server's hostname) []:myhost.domain
Email Address []:helpdesk@domain

Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:
An optional company name []:

Send the csr file /path/to/mysubca.csr to the CA authority to be signed and request also the CA certificate to be included in the chain of our SUB CA.

Now we can create the pfx file that will be used to import our SUB CA to eDirectory. Use command:

openssl pkcs12 -export -out /path/to/mysubca.pfx -inkey /path/to/mysubca.key -in /path/to/mysubca.crt -certfile ca_cert.crt

The ca_cert.crt is the CA certificate you received from the issuer.

Use iManager, go to “Roles and Tasks”, select “eDirectory maintenance” and “Delete Object”. Browse to the CA object and press OK.

In iManager go to “Roles and Tasks”, “NetIQ Certificate Server”, “Configure Certificate Authority”. Now that CA is deleted you should be presented with CA configuration wizard.

  • Select “Import” and click “Next”
  • Select PKCS12, click “Browse”, locate /path/to/mysubca.pfx and give the pass phrase
  • Click OK, Next, Next and Finish

Using iManager select “Roles and Tasks”, “NetIQ Certificate Server”, “Create Default Certificates”, select the first server and force the generation of new default certificates. Repeat for each server.

All comments and corrections are welcome.

  • tips_and_howtos/edir_ca_openssl.txt
  • Last modified: 2021/10/24 13:51
  • by