The instructions in this article are for self-generating a certificate for the tSaaS appliance using OpenSSL
Generating the certificate
- Download the OpenSSL for Windows tool, such as from Google Code Archive - Open SSL for Windows.
- Extract the ZIP file downloaded using an extractor such as WinZIP , WinRAR or 7zip.
- Open Command Prompt (cmd.exe) and navigate to the folder where the OpenSSL zip was extracted.
- Run the below commands in the Command Prompt window:
bin\openssl.exe genrsa -passout pass:1234 -des3 -out CA_key_password.pem 2048
bin\openssl.exe rsa -in CA_key_password.pem -passin pass:1234 -out CA_key.pem
bin\openssl.exe req -x509 -days 11000 -new –sha256 -key CA_key.pem -out Path/CA_cert.pem -config openssl.cnf
*openssl.exe x509 -outform der -in ca_cert.pem -out ca_cert.crt (convert .pem to crt)
- Save the files CA_key.pem and CA_cert.pem in your File Server. Make sure no one has permissions to the location they are saved at, but the IT department.
Upload the Certificate to the Appliance
Uploading the certificates to the appliance is done via the Cloud Portal.
- Login to the Cloud Portal.
- Click Network Devices.
- Click your Appliance.
- Click Certificates.
- Mark "Use the following certificates:".
- Under Public certificate, Click the Choose File button. Choose your CA_cert.pem file, and click OK.
- Under Private certificate, Click the Choose File button. Choose your CA_key.pem file, and click OK.
- Click Save.
Download the Root Certificate for Cloud
- Login to the Cloud Portal.
- Click Web Security.
- Choose your Policy.
- Click the SSL Decryption tab.
- Right-Click the Websense root certificate link and Choose save target as...
- Save the certificate along-side the certificates you self-generated.
Manually install the certificate on a Windows 7 machine
- Open the Run command (shortcut: Winkey+R).
- Type mmc and press OK.
- Click File, then Click Add/Remove Snap-ins.
- Choose Certificates, click Add.
- Choose Computer account, click Next, then click Finish and OK.
- Browse to Certificates > Trusted Root Certification Authorities > Certificates.
- Right-Click Certificates, choose import, then click Next.
- Click the Browse button, and choose the CA_cert.pem file. Click Next.
- Make sure that "Trusted Root Certificate Authorities" is written under "Place all certificates in the following store". Click Next.
- Click Finish.
Distribute the certificates using a GPO
These instruction were written for Windows Server 2012. They might differ between different versions of Windows Server.
To force the settings onto a client machine, use one of the following methods:
- Open Group Policy Management Console.
- Choose a GPO you wish to enroll the certificate though. Right-Click it and Choose Edit. Note It is recommended that you make these changes on a test OU first.
- Browse to Computer Configuration > Windows Settings > Security Settings >Public Key Policies > Trusted Root Certification Authorities.
- Right-Click Trusted Root Certificate Authorities and Choose import. Click Next.
- Click the Browse button, and choose the CA_cert.pem file.
- Make sure that "Trusted Root Certificate Authorities" is written under "Place all certificates in the following store". Click Next. Click Finish.
- Force through GPO update.
- Start Command Prompt.
- Type gpupdate /force
- Check if the certificate shows up on Internet Explorer.
- Restart the machine and then check if the certificate shows up on Internet Explorer.