{"id":5961,"date":"2012-06-13T00:00:00","date_gmt":"2012-06-13T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2012\/06\/13\/how-to-run-your-own-certificate-authority\/"},"modified":"2023-03-29T19:25:11","modified_gmt":"2023-03-29T19:25:11","slug":"how-to-run-your-own-certificate-authority","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/","title":{"rendered":"How to Run Your Own Certificate Authority"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>Digital certificates lie at the heart of Public Key Infrastructure (PKI) security technologies such as encrypted email, document signing, VPN access, server SSL authentication, and software code signing. Certificates are a vital part of PKI because they provide a means to establish the ownership of an encryption key.<\/p>\n<p>If you have someone else&#8217;s public key, then you can send them an encrypted message that only they can decrypt with their private key. You can also verify someone else&#8217;s identity by using their public key to decrypt something that could only have been encrypted with their private key.<\/p>\n<p>Certificates are typically issued by Certificate Authorities (CAs), which are trusted third parties whose root certificates (containing their public keys) are bundled in all popular web browsers . A certificate issued by a CA states that something is true, and is digitally signed with the CA&#8217;s private key. Since every browser has the CA&#8217;s public key, it can use that to verify that the certificate really was issued by the CA in question. Then it simply comes down to a matter of trust: Do you trust the reputation of the CA, and therefore do you believe that what the CA certifies to be true really is true?<\/p>\n<p>Established CAs such as VeriSign have good reputations, and for that reason they can charge for the certificates they issue. In fact they charge a range of prices for certificates, based on the length of keys that are employed and the amount of effort they put into verifying that the information they are certifying is correct. For example, a basic VeriSign SSL certificate valid for one year costs $399, while an Extended Validation certificate which requires more extensive fact checks\u00a0 costs $1499 for one year.<\/p>\n<p>But if your organization runs a secure web server that&#8217;s only used by employees, or if you encrypt email sent between employees, or if you use digital certificates to authenticate employees onto the corporate VPN, \u00a0then there&#8217;s really no need to pay a CA for certificates at all. That&#8217;s because you can act as your own CA and issue your own digital certificates for internal corporate use.<\/p>\n<p>The benefit to rolling your own certificates is that you can issue as many certificates as you like for free, although you do have to factor in potential CA software licensing fees, plus the cost of the server hardware used to run the software. You&#8217;ll need to keep your CA private key secure to prevent hackers from using it to issue fraudulent certificates , but this is arguably no riskier than relying on a third party CA to keep its private key secure (as the Diginotar debacle proved).<\/p>\n<p>So what happens when a web browser encounters a certificate issued by your company? Normally, it would alert the user that the certificate has not been issued by one of the trusted CAs whose root certificates are bundled with the browser. To avoid this alert, you&#8217;ll need to equip your employees&#8217; browsers with your organization&#8217;s root certificate, which is easy to do. What you can&#8217;t do is put your CA root certificate into the browsers of people outside your organization \u2013 and that&#8217;s why certificates issued by your organization are only really useful for internal corporate use.<\/p>\n<p><strong>How to issue your organization&#8217;s own digital certificates<\/strong><\/p>\n<p>There are many packages around for different operating system environments, including <a href=\"https:\/\/www.openssl.org\/\">OpenSSL<\/a> (multi-platform) and Keychain Assistant (part of OS X.) (An article on <a href=\"http:\/\/www.enterprisenetworkingplanet.com\/netsecur\/article.php\/3802221\/Run-OpenVPN-on-Windows-Mac-and-LinuxUnix.htm\">Enterprise Networking Planet<\/a> explains how to set up your own CA using OpennSSL as part of a VPN implementation.) For the purposes of this guide we will use <a href=\"http:\/\/simpleauthority.com\/\">SimpleAuthority<\/a>, a GUI -driven application which is available for Linux, Windows and OS X. The software is free for up to 4 users, $50 for up to 50 users, and $860 for 50 or more users.<\/p>\n<p>Software that issues certificates needs to be secure, so it is highly recommended you install SimpleAuthority on a <a href=\"https:\/\/www.atlantic.net\/dedicated-server-hosting\/\" target=\"_blank\" rel=\"noopener noreferrer\">dedicated server<\/a>. Once SimpleAuthority has been installed, the first thing you&#8217;ll be asked to do before you can issue any certificates is create a new Certificate Authority. Click Yes to create a new CA.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/how-to-run-your-own-certificate-authority_5facdf6de69d6.png\" alt=\"SimpleAuthority 1\" width=\"600\" height=\"288\" \/><\/p>\n<p>Next, fill in the details such as the CA&#8217;s name (probably the name of your organization) and the expiry date of your CA. Ten years is a good default term.<\/p>\n<p>You&#8217;ll now need to add some entropy into the system by moving your mouse or pressing keys until the software has enough &#8220;randomness&#8221; to generate the keys for the CA certificate. You&#8217;ll also be asked for a master password to protect the CA certificate. Be sure to choose a strong password as the CA certificate needs to be highly secure.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/how-to-run-your-own-certificate-authority_5facdf6f367eb.png\" alt=\"SimpleAuthority - 2\" width=\"450\" height=\"311\" \/><\/p>\n<p>SimpleAuthority works with the concept of users, to whom certificates are issued. A user can be a person or a server. To enroll a new user \u00a0and create a certificate, click on the New User icon at the top left hand side of the application, or select File-New User. Then fill in the user&#8217;s name, select General Purpose (for a person) or SSL Server (for a server) from the Certificate Type drop down box, and add an email address and other information if you wish. Select a validity period (usually 365 days), and click New Certificate at the bottom of the screen.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/how-to-run-your-own-certificate-authority_5facdf701bbe7.png\" alt=\"SimpleAuthority - 3\" width=\"600\" height=\"346\" \/><\/p>\n<p>Next, export all your certificates to a folder for distribution to end-users or servers by going to the Tools \u00a0menu and choosing Export &#8211; Latest Certificates.<\/p>\n<p><strong>Importing your CA root certificate into users&#8217; browsers<\/strong><\/p>\n<p>To avoid presenting users with a warning every time they encounter one of your organization&#8217;s certificates, you need to import your CA certificate into their browsers. To do this you&#8217;ll first need to export the CA certificate from Simple Authority by selecting Tools &#8211; Export &#8211; CA Certificate. The certificate can then be distributed to individual users.<\/p>\n<p>To import the CA certificate into Internet Explorer on a user&#8217;s machine:<\/p>\n<ol start=\"1\">\n<li>Select Tools &#8211; Internet Options<\/li>\n<li>Click the Contents tab, and then Certificates<\/li>\n<li>Click the Trusted Root Certification authorities tab, and the Import\u2026 button so that the Certificate Import Wizard starts.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/how-to-run-your-own-certificate-authority_5facdf71ac6b2.png\" alt=\"IE - 4\" width=\"450\" height=\"409\" \/><\/p>\n<p>Next, select the certificate and allow Windows to select the correct certificate store, and click finish. A security warning will appear to alert you that you are about to install a CA certificate. Click Yes to install the certificate anyway.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/how-to-run-your-own-certificate-authority_5facdf7327141.png\" alt=\"IE - 5\" width=\"450\" height=\"385\" \/><\/p>\n<p>Your CA certificate will now appear in Internet Explorer&#8217;s Trusted Root Certification Authorities lists:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/how-to-run-your-own-certificate-authority_5facdf7465d37.png\" alt=\"IE - 6\" width=\"450\" height=\"326\" \/><\/p>\n<p>In Mozilla Firefox, you&#8217;ll need to go to Tools &#8211; Options and then click the Advanced and then the Encryption tabs. Then click View Certificates, and finally click Import to select and import your CA certificate.<\/p>\n<p>Once your CA root certificate is installed in user browsers, you can then use the certificates you issue just as you would commercially available certificates &#8211; but without the associated costs.<\/p>\n<p><em>Paul Rubens is an award-winning technology journalist who has been covering IT security for over 20 years. He has written for leading international publications including The Economist, The Times, The Financial Times, The Guardian, the BBC, and Computing.<\/em><\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d702af9a6e1-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d702af9a6e1\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d702af9a6e1\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d702af9a6e1\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d702af9a6e1\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d702af9a6e1\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d702af9a6e1\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Digital certificates lie at the heart of Public Key Infrastructure (PKI) security technologies such as encrypted email, document signing, VPN access, server SSL authentication, and software code signing. Certificates are a vital part of PKI because they provide a means to establish the ownership of an encryption key. If you have someone else&#8217;s public [&hellip;]<\/p>\n","protected":false},"author":226,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[592,2016],"b2b_audience":[25],"b2b_industry":[],"b2b_product":[377,143],"class_list":["post-5961","post","type-post","status-publish","format-standard","hentry","category-networks","tag-ssl","tag-vpn","b2b_audience-audience","b2b_product-gateway-and-network-security","b2b_product-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Run Your Own Certificate Authority | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Your business can save money by issuing its own digital certificates for internal corporate resources such as intranets and VPNs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Run Your Own Certificate Authority | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Your business can save money by issuing its own digital certificates for internal corporate resources such as intranets and VPNs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-13T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-29T19:25:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/how-to-run-your-own-certificate-authority_5facdf6de69d6.png\" \/>\n<meta name=\"author\" content=\"Paul Rubens\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Rubens\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/\"},\"author\":{\"name\":\"Paul Rubens\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/98ff3e45922f3d3cc322e48f2036768c\"},\"headline\":\"How to Run Your Own Certificate Authority\",\"datePublished\":\"2012-06-13T00:00:00+00:00\",\"dateModified\":\"2023-03-29T19:25:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/\"},\"wordCount\":1191,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/how-to-run-your-own-certificate-authority_5facdf6de69d6.png\",\"keywords\":[\"SSL\",\"VPN\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/\",\"name\":\"How to Run Your Own Certificate Authority | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/how-to-run-your-own-certificate-authority_5facdf6de69d6.png\",\"datePublished\":\"2012-06-13T00:00:00+00:00\",\"dateModified\":\"2023-03-29T19:25:11+00:00\",\"description\":\"Your business can save money by issuing its own digital certificates for internal corporate resources such as intranets and VPNs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/#primaryimage\",\"url\":\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/how-to-run-your-own-certificate-authority_5facdf6de69d6.png\",\"contentUrl\":\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/how-to-run-your-own-certificate-authority_5facdf6de69d6.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Run Your Own Certificate Authority\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/98ff3e45922f3d3cc322e48f2036768c\",\"name\":\"Paul Rubens\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/Paul_head_An_400x400-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/Paul_head_An_400x400-150x150.jpg\",\"caption\":\"Paul Rubens\"},\"description\":\"Paul Rubens is a technology journalist based in England, and is an eSecurity Planet contributor.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-rubens-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Run Your Own Certificate Authority | eSecurity Planet","description":"Your business can save money by issuing its own digital certificates for internal corporate resources such as intranets and VPNs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/","og_locale":"en_US","og_type":"article","og_title":"How to Run Your Own Certificate Authority | eSecurity Planet","og_description":"Your business can save money by issuing its own digital certificates for internal corporate resources such as intranets and VPNs.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/","og_site_name":"eSecurity Planet","article_published_time":"2012-06-13T00:00:00+00:00","article_modified_time":"2023-03-29T19:25:11+00:00","og_image":[{"url":"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/how-to-run-your-own-certificate-authority_5facdf6de69d6.png"}],"author":"Paul Rubens","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Rubens","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/"},"author":{"name":"Paul Rubens","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/98ff3e45922f3d3cc322e48f2036768c"},"headline":"How to Run Your Own Certificate Authority","datePublished":"2012-06-13T00:00:00+00:00","dateModified":"2023-03-29T19:25:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/"},"wordCount":1191,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/how-to-run-your-own-certificate-authority_5facdf6de69d6.png","keywords":["SSL","VPN"],"articleSection":["Networks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/","url":"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/","name":"How to Run Your Own Certificate Authority | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/how-to-run-your-own-certificate-authority_5facdf6de69d6.png","datePublished":"2012-06-13T00:00:00+00:00","dateModified":"2023-03-29T19:25:11+00:00","description":"Your business can save money by issuing its own digital certificates for internal corporate resources such as intranets and VPNs.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/#primaryimage","url":"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/how-to-run-your-own-certificate-authority_5facdf6de69d6.png","contentUrl":"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2020\/11\/how-to-run-your-own-certificate-authority_5facdf6de69d6.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-run-your-own-certificate-authority\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"How to Run Your Own Certificate Authority"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/98ff3e45922f3d3cc322e48f2036768c","name":"Paul Rubens","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/Paul_head_An_400x400-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/Paul_head_An_400x400-150x150.jpg","caption":"Paul Rubens"},"description":"Paul Rubens is a technology journalist based in England, and is an eSecurity Planet contributor.","url":"https:\/\/www.esecurityplanet.com\/author\/paul-rubens-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/5961"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/226"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=5961"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/5961\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=5961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=5961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=5961"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=5961"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=5961"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=5961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}