Obtain CA-signed or self-signed TLS certificate

Once the TLS private keyClosed The secret key kept on the sender's computer that the sender uses to digitally sign messages to recipients and to decrypt messages from recipients. Private keys should be password protected. and Certificate Signing Request (CSR)Closed A message sent from an applicant to a certificate authority in order to apply for a digital identity certificate. have been created, you can register your certificateClosed A digital means of proving your identity. When you send a digitally-signed message, you are sending your certificate and public key. Certificates are issued by a certification authority and can expire or be revoked. with a Certificate Authority (CA). You can either:

 

You can select the latter if you do not want to purchase a digital certificate from a third-party CA, or if you want to use digital signing immediately.

However, self-signed certificates are not recommended for production use.

Submit the CSR to a third-party CA

Before proceeding with the following instructions, ensure that you create the TLS private key and CSR first.

Submit the CSR to CA

Create a CA on Secure Email Gateway and self-sign the certificate

Before proceeding with the following instructions, ensure that you create the TLS private key and CSR first.

Connect to Red Hat Cockpit

Create a CA on the Gateway

Self-sign the certificate

You now have three TLS certificate and private key files that you can import into the Gateway.

File name Description Directory
emailgateway.key The private key file. /root
emailgateway.crt The self-signed TLS certificate file. /tmp/CA
CA.crt The signing certificate file by the Gateway CA. /tmp/CA

See also...