Download page Creating Certificates from an Existing Root Certificate.
Creating Certificates from an Existing Root Certificate
Required Certificate Files
The following files are required:
- CA certificate
CA private keyIf you need to export the CA signing root certificate and key from a Microsoft CA server, you can follow this document from Cisco: How do I export and convert a pfx CA root certificate and key from a Microsoft CA server
With UMS 6.03 or higher, you can use the ICG remote installer for installing and creating certificates. This procedure is described here. For the procedure with UMS 6.02 or lower, see the how-to Creating Certificates from an Existing Root Certificate (UMS 6.02 or Older).
Importing Your Existing Private CA Files into the UMS
- In the UMS Console, go to UMS Administration > UMS Network > IGEL Cloud Gateway.
- In the toolbar in the upper right, click the icon (Install new IGEL Cloud Gateway).
- The ICG remote installer opens. Any existing ICG certificates are shown in the Certificates area.
- Click to import the root certificate.
- Choose the CA's root certificate file (PEM format) and click Open.
The CA's root certificate appears on the list.
- Select the CA certificate and click .If the private key is protected with a passphrase, you need to decrypt it using the OpenSSL command line tool:
openssl rsa -in encrypted.key -out decrypted.key to import the decrypted private key for the CA certificate
Choose the decrypted private key file for the CA certificate and click Open.
If everything went well, a success message is shown.
Continue by creating a signed certificate.
Creating a Signed Certificate
- Select the CA's root certificate and click
- Fill in the certificate fields:
All IP addresses and hostnames by which the ICG will be reachable from within the company network or from outside must be provided here.
- Display name: Name of the certificate
- Your first and last name: Name of the certificate holder
- Your organization: Organization or company name
- Your city or locality: Location
- Your two-letter country code: ISO 3166 country code, e.g.
- Hostname and/or IP address of certificate target server: Hostname(s) or IP address(es) for which the certificate is valid. Multiple entries are allowed, separated by semicolons.
- Valid until: Local date on which this certificate expires. (Default: one year from now)
- Certificate Type: Select "End Entity".
A key pair and a certificate are generated.
Generating keys may take substantial time on virtual machines (VMs), as these do not have a powerful (pseudo) random number source. On Linux VMs, this can be improved by installing the haveged package.
The signed certificate appears on the list.
- Continue with Installing the IGEL Cloud Gateway.