Actions

Create A SIP Certificate A: Difference between revisions

(re-order article)
Line 4: Line 4:
Certificates are used to provide secure connections, such as HTTPs (secure connection to the web portal) or [[FreeSBC]] secure SIP calls (SIP over TLS).
Certificates are used to provide secure connections, such as HTTPs (secure connection to the web portal) or [[FreeSBC]] secure SIP calls (SIP over TLS).


This article describes how to import or create certificates. These certificates are later grouped into [[Toolpack:Tsbc_TLS_Profiles|TLS Profiles]], which is the first step in configuring secure SIP on [[FreeSBC]]. [[Toolpack:Certificates#Create_new_private_key|Use standard openssl shell commands to create your own certificates.]]
This article describes how to import certificates. These certificates are later grouped into [[Toolpack:Tsbc_TLS_Profiles|TLS Profiles]], which is the first step in configuring secure SIP on [[FreeSBC]].  
 
 
== Upload Local Certificates ==
Toolpack already contains, by default, a unique self-signed certificate (unique for each Toolpack system, shared for 1+1 hosts). This certificate is used for HTTPs, and can also be used for TLS.
Note:If you want create your own local certificate, [[Toolpack:Certificates|use can use openssl to create a self-signed certificate.]]
 
In case you want to use a custom local certificate, proceed as follows:
 
1. Select '''Certificates''' from the navigation panel:
 
[[Image:ConfigureCertificates_0.png|150px]]
 
2. Click ''' Create New Certificate ''' ===
 
[[Image:ConfigureCertificates_1.png|250px]]
 
3. Enters (but using "Local" certificate type) to import the local certificate.
* Provide a name that is meaningful to you.
* Select "Local" certificate.
* Drag-and-drop (or copy-paste) the certificate's text content into the appropriate text box
* Click "Create"
 
[[Image:ConfigureCertificates_3.png|500px]]
 
4. Make sure to copy the private key in the following directory:
  /lib/tb/toolpack/pkg/ssl_certificate/
 
You can use ssh (command-line or using a tool like Filezilla) to upload the private key to the unit on the following path.
We recommend to use the same name for the key and certificate (except the extension of course):
Example:
  scp my_local_cert.key root@MyFreeSbcHostName:/lib/tb/toolpack/pkg/ssl_certificate/


These TLS profiles can later be used to create SIP Transport servers using TLS.
<br>


== Upload Trusted Certificate ==
== Upload Trusted Certificate ==
Line 27: Line 56:
[[Image:ConfigureCertificates_2.png|500px]]
[[Image:ConfigureCertificates_2.png|500px]]


== Upload Local Certificates (optional) ==
Toolpack already contains, by default, a unique self-signed certificate (unique for each Toolpack system, shared for 1+1 hosts). This certificate is used for HTTPs, and can also be used for TLS.
In case you want to use a custom local certificate (like an officially signed certificate for your domain name), proceed as follows:
1. Repeat the same procedure as above (but using "Local" certificate type) to import the local certificate.
2. Use ssh (command-line or using a tool like Filezilla) to upload the private key to the unit on the following path.
* Use the '''same file''' name as the local certificate name previously used to import in the web portal (except file extension):
  /lib/tb/toolpack/pkg/ssl_certificate/
Example:
[[Image:ConfigureCertificates_3.png|500px]]


Then:
  scp my_local_cert.key root@MyFreeSbcHostName:/lib/tb/toolpack/pkg/ssl_certificate/


== List of Parameters ==
== List of Parameters ==

Revision as of 16:39, 5 September 2019

Applies to version(s): v3.1

Certificates are used to provide secure connections, such as HTTPs (secure connection to the web portal) or FreeSBC secure SIP calls (SIP over TLS).

This article describes how to import certificates. These certificates are later grouped into TLS Profiles, which is the first step in configuring secure SIP on FreeSBC.


Upload Local Certificates

Toolpack already contains, by default, a unique self-signed certificate (unique for each Toolpack system, shared for 1+1 hosts). This certificate is used for HTTPs, and can also be used for TLS. Note:If you want create your own local certificate, use can use openssl to create a self-signed certificate.

In case you want to use a custom local certificate, proceed as follows:

1. Select Certificates from the navigation panel:

ConfigureCertificates 0.png

2. Click Create New Certificate ===

ConfigureCertificates 1.png

3. Enters (but using "Local" certificate type) to import the local certificate.

  • Provide a name that is meaningful to you.
  • Select "Local" certificate.
  • Drag-and-drop (or copy-paste) the certificate's text content into the appropriate text box
  • Click "Create"

ConfigureCertificates 3.png

4. Make sure to copy the private key in the following directory:

  /lib/tb/toolpack/pkg/ssl_certificate/

You can use ssh (command-line or using a tool like Filezilla) to upload the private key to the unit on the following path. We recommend to use the same name for the key and certificate (except the extension of course): Example:

 scp my_local_cert.key root@MyFreeSbcHostName:/lib/tb/toolpack/pkg/ssl_certificate/


Upload Trusted Certificate

1. Select Certificates from the navigation panel:

ConfigureCertificates 0.png

2. Click Create New Certificate ===

ConfigureCertificates 1.png

3. Configure the certificate parameters:

  • Provide a name that is meaningful to you.
  • Select "Trusted" certificate to import a remote party's certificate to trust.
  • Drag-and-drop (or copy-paste) the certificate's text content into the appropriate text box
  • Click "Create"

ConfigureCertificates 2.png


List of Parameters