I am using mkcert to generate local certificates for private ips and domains
but the CA certificate generated by mkcert is by default of the local machine where mkcert is installed and OU and CN fields are generated as per the local machine hostname.
Is there a way (using mkcert or other application) to generate custom CA certifcates with organisation name or any other name??
i did that… have pfsense running as firewall.
created a new CA
created a server certifcate for proxmox server with hostname and ip address.
installed server certificate in proxmox.
added CA certifcate in the windows trusted root CA authorities…
exited chrome and restarted chrome.
Still whenever i load proxmox, i get unsecure error.
most probably,
i have already done the second part…added certificate in the trusted CA of windows
any idea what will be the equivalent in google chrome… for point number 4 - first part
also as a added note… i am not screwing with pfsense…
i am trying it with proxmox.
another issue -
TP link omada controller accepts JKS/PEM/PFX certificates…
pfsense does not create any of these…
You can use ACME in both pfsense and Proxmox to generate real trusted certificates from Let’s Encrypt to avoid this headache.
I am using ACME in pfsense to generate those certs for my servers that’s part of the HA Proxy. Works like a champ. You don’t even have to open any ports on the firewall. ACME can use other methods to verify that you’re the domain owner. I use Cloudflare to manage my domains.
Can you use ACME to generate .local, .LAN, etc. domains that are not registered with ICANN? If you can, I need a tutorial because I haven’t found a way to get certs. through Let’s Encrypt for local domains. I haven’t spent more than a couple hours on this subject, so I may have missed the process. Again, if possible someone please school me on this because it would help a huge amount.
No, it has to be a real domain that’s reachable on the internet. You can create something like mydomain.org and it’ll work fine long as you update the internal DNS to point to those servers internally.
Thanks, that’s what I thought. My department keeps choosing names that we can’t register so I’m kind of stuck with local only naming. I need to set up a Windows CA which should push the certificates out to the clients (I think). All I need is time, after I fix the things that are broken!