Create TLS private key and CSR

In order to obtain a signed certificateClosed A digital means of proving your identity. When you send a digitally-signed message, you are sending your certificate and public key. Certificates are issued by a certification authority and can expire or be revoked., you must first create the following private keyClosed The secret key kept on the sender's computer that the sender uses to digitally sign messages to recipients and to decrypt messages from recipients. Private keys should be password protected. and Certificate Signing Request (CSR)Closed A message sent from an applicant to a certificate authority in order to apply for a digital identity certificate. using Red Hat Cockpit on Secure Email Gateway.

File name Description Directory
emailgateway.key The private key file. /root
emailgateway.csr The Certificate Signing Request (CSR) file: it contains your public keyClosed The key a sender gives to a recipient so that the recipient can verify the sender's signature and confirm that the message was not altered. Recipients also use the public key to encrypt email messages to the sender.. /root

Create the TLS private key and CSR

Connect to Red Hat Cockpit

Create the TLS private key

Use the OpenSSL utility on Secure Email Gateway to create the TLS private key.

Create the TLS Certificate Signing Request (CSR)

Use the OpenSSL utility on Secure Email Gateway to create the Certificate Signing Request (CSR).

You have now created a public/private key pair.

 
  • The private key is used for decryption and must be stored locally on Secure Email Gateway.

  • The public key (in the form of the CSR file), is used to register the certificate with your Certificate Authority (CA).

When you have finished

Move the CSR file to home directory

Save the CSR file to local machine

Use the OpenSSH session to copy your CSR for submission to the CA.

See also...