![]() ![]() Openssl req -new -key server.key -out server.csr Openssl genrsa -des3 -out server.key 1024 In Terminal, enter the following commands, each followed by a return: Step 2: Generate a private key for the web server The Terminal output for this step will look something like this: You will be asked for some details about you (as the certificate authority), and for a passphrase – use something simple and memorable it doesn’t have to be secure. These commands create a myssl folder in your Documents folder, a RSA key file, and a Certificate Authority certificate. Openssl req -new -x509 -days 3650 -key ca.key -out ca.crt In Terminal, type (or copy-and-paste) the following commands, each followed by a return: Step 1: Create a Certificate Authority (CA) certificate These instructions are suitable for Mac OS X versions 10.5 through 10.8. You will also need to use the Terminal application, which is in your Utilities folder within your Applications folder. ![]() This guide assumes that you have already set up the web server feature of SecuritySpy and are familiar with concepts such as dynamic DNS, port forwarding, and IP addressing on local networks.įor editing the configuration files, we highly recommend TextMate – this is a flexible and user-friendly editor that will make editing these files easy. This is only really applicable for web servers available to the general public, and a self-signed certificate is appropriate for when the server will be accessed by you or your employees or agents, as in this case there is no doubt about the server’s authenticity.Īlthough we have made every effort to make this guide easy to follow, this is a complex setup that requires use of the Terminal and editing of Apache configuration files, so is not for the novice user. A Certificate Authority is a trusted entity that confirms to whomever is connecting to your web server that you are who you say you are. This allows you to get everything up and running, however for a proper installation you should ideally obtain a certificate from a Certificate Authority (such as Verisign or Thawte). These instructions describe how to set up SSL using “self-signed” certificates. In this way, Apache will be acting as a secure “reverse proxy” web server for SecuritySpy. SecuritySpy does not have built-in support for SSL, however Mac OS X comes with Apache, a fully-featured and powerful web server, that can be used to set up the secure communication between the internet and SecuritySpy. SSL increases security as it makes it impossible for someone intercepting the stream of data to decode any information from it. ![]() URLs that require an SSL connection start with insead of and operate on port 443 instead of 80 by default. It uses two keys to encrypt data: a public key and a private key. Secure Sockets Layer (SSL) is a cryptographic protocol that provides secure communications on the internet. See the Web Server Settings section in the SecuritySpy user manual for information about the built-in HTTPS feature. UPDATE 4 JUNE 2014: SecuritySpy now has built-in support for HTTPS, so the setup described below is no longer needed for setting up SecuritySpy over SSL (although it may still be useful for generating SSL keys, certificates and certificate signing requests for other purposes). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |