# SSL
# SAN certs
SAN certs allow you to have multiple domains under the same certificate.
# 1. Create a san.cnf
file
In the directory you want to generate the certificate create a san.cnf
file with the following contents updated for your project.
NOTES
default_bits
can be changed to 4096 if required lower encryption.- Replace all
{...}
with your clients information{rootDomain}
with the domains root domain{countryName}
with clients country{state}
with clients state or province{city}
with clients city{companyName}
with clients company name{organizationalUnit}
with organizational unit name (eg Security)
[alt_names]
You can add or remove alt-names to match your needs.- Make sure you increment the
DNS.#
before the alt-name or it will overwrite with the last one.
- Make sure you increment the
[req]
default_bits = 4096
prompt = no
distinguished_name = req_distinguished_name
req_extensions = req_ext
[req_distinguished_name]
countryName = {countryName}
stateOrProvinceName = {state}
localityName = {city}
organizationName = {companyName}
organizationalUnitName = {organizationalUnit}
commonName = {rootDomain}.com
[req_ext]
subjectAltName = @alt_names
[alt_names]
DNS.1 = admin.{rootDomain}.com
DNS.2 = cdn.{rootDomain}.com
DNS.3 = www.{rootDomain}.com
# 2. Generate Keys & CSR
openssl req -out sslcert.csr -newkey rsa:4096 -nodes -keyout private.key -config san.cnf
# 3. Check CSR
openssl req -noout -text -in sslcert.csr | grep DNS