栏目分类:
子分类:
返回
名师互学网用户登录
快速导航关闭
当前搜索
当前分类
子分类
实用工具
热门搜索
名师互学网 > IT > 系统运维 > 运维 > Linux

nginx 配置 https的双向认证

Linux 更新时间: 发布时间: IT归档 最新发布 模块sitemap 名妆网 法律咨询 聚返吧 英语巴士网 伯小乐 网商动力

nginx 配置 https的双向认证

注意事项

配置双向认证,这里的common name需要都配置成不同

nginx 配置 https的双向认证 1.准备工作

linux环境安装openssl

2.生成证书步骤 1.新建一个文件夹
   mkdir /root/keys
2.生成CA私钥 ca.key
   openssl genrsa -out ca.key 4096
3.生成ca的数字证书 ca.crt
   openssl req -new -x509 -days 3650 -key ca.key -out ca.crt
   Country Name (2 letter code) [AU]:
   State or Province Name (full name) [Some-State]:
   Locality Name (eg, city) []:
   Organization Name (eg, company) [Internet Widgits Pty Ltd]:
   Organizational Unit Name (eg, section) []:
   Common Name (e.g. server FQDN or YOUR name) []:
   Email Address []:
   填入组织名称等信息
4.生成server端的私钥
   openssl genrsa -out server.key 4096
5.生成 server 端数字证书请求
   openssl req -new -key server.key -out server.csr
   Country Name (2 letter code) [AU]:CN
   State or Province Name (full name) [Some-State]:Shanghai
   Locality Name (eg, city) []:
   Organization Name (eg, company) [Internet Widgits Pty Ltd]:Sidien Test
   Organizational Unit Name (eg, section) []:
   Common Name (e.g. server FQDN or YOUR name) []:192.168.0.162
   Email Address []:

   Please enter the following 'extra' attributes
   to be sent with your certificate request
   A challenge password []:
   An optional company name []:
  输入相关信息和密码
6.用 CA 私钥签发 server 的数字证书
  openssl  x509 -req -in server.csr  -CA  ca.crt  -CAkey  ca.key  -CAcreateserial -out  server.crt  -days  3650
7. 生成客户端私钥
  openssl  genrsa  -out  client.key  4096
8. 生成客户端数字请求证书
  openssl req -new -key client.key -out client.csr
   Country Name (2 letter code) [AU]:
   State or Province Name (full name) [Some-State]:
   Locality Name (eg, city) []:
   Organization Name (eg, company) [Internet Widgits Pty Ltd]:
   Organizational Unit Name (eg, section) []:
   Common Name (e.g. server FQDN or YOUR name) []:
   Email Address []:

   Please enter the following 'extra' attributes
   to be sent with your certificate request
   A challenge password []:
   An optional company name []:
  输入相关信息和密码
9.用CA私钥签发数字证书:client.crt
  openssl  x509 -req -in server.csr  -CA  ca.crt  -CAkey  ca.key  -CAcreateserial -out  client.crt  -days  3650
10.生成windows安装证书程序
 openssl pkcs12 -export -inkey client.key -in client.crt -out client.pfx
 将client.pfx拷贝到作为客户端的机器上,安装证书,输入生成时的密码
11.配置nginx
 ssl_certificate  /etc/pki/ca_linvo/server/server.crt;     #server公钥路径
 ssl_certificate_key  /etc/pki/ca_linvo/server/server.key;   #server私钥路径
 ssl_client_certificate   /etc/pki/ca_linvo/root/ca.crt;   #根级证书公钥路径,用于验证各个二级client
 ssl_verify_client on;   开启双向认证
认证成功
curl --cert ./client.crt --key ./client.key https://url -k -v 

转载请注明:文章转载自 www.mshxw.com
本文地址:https://www.mshxw.com/it/320141.html
我们一直用心在做
关于我们 文章归档 网站地图 联系我们

版权所有 (c)2021-2022 MSHXW.COM

ICP备案号:晋ICP备2021003244-6号