Apple 10.6 Server User Manual


 
When certicates and keys are imported via Certicate Manager, they are put in the
/etc/certicates/ directory. The directory contains four PEM formatted les for every
identity:
The certicate Â
The public key Â
The trust chain Â
The concatenated version of the certicate plus the trust chain (for use with some Â
services)
The certicate and trust chain are owned by the root user and the wheel group, with
permissions set to 644. The public key and concatenation le are owned by the root
user and the certusers group, with permissions set to 640.
Each le has the following naming convention:
<common name>.<SHA1 hash of the certicate>.<cert | chain | concat | key>.pem
For example, the certicate for a web server at example.com might look like this:
www.example.com.C42504D03B3D70F551A3C982CFA315595831A2E3.cert.pem
Readying Certicates
Before you can use SSL in Mac OS X Server’s services, you must create or import
certicates. You can create self-signed certicates, create certicates and then generate
a Certicate Signing Request (CSR) to send to a CA, or import certicates previously
created with OpenSSL.
If you have previously generated certicates for SSL, you can import them for use by
Mac OS X Server services. The OpenSSL keys and certicates must be in PEM format.
Select a CA to sign your certicate request. If you don’t have a CA to sign your request,
consider becoming your own CA and then import your CA certicates into the root
trust database of your managed machines.
When you set up Mac OS X Server, the Server Assistant creates a self-signed certicate
based on information you provided when it’s rst installed. It can be used for any
service that supports SSL. When your clients choose to trust the certicate, SSL
connections can be used without user interaction from that point on.
This initial self-signed certicate is used by Server Admin and Server Preferences to
encrypt administrative functions.
64 Chapter 4 Enhancing Security