Overview
Transfer the CSR to cont16059, elevate to the appropriate account, and sign the CSR with the internal CA to produce CRT output plus signing details for audit.
- Download CSR from JIRA and place it in the CyberArk Downloads folder.
-
Upload CSR to cont16059:
scp Downloads/<ATTACHED-CSR-FILE-NAME> cont16059:/tmp -
SSH into cont16059:
ssh cont16059 -
Switch to apizone:
su - apizoneCredentials (restricted)
!Password = NwQsR@404 Retrieve the password from the enterprise secrets vault or CyberArk; avoid embedding plaintext secrets in documentation.<PASSWORD-REDACTED—FETCH-FROM-VAULT> -
Gain root privileges:
sudo su - -
Go to module CSR directory:
cd /home/apizone/CSR/<COUNTRY>/DTBRootCACert.pem /csr/<COUNTRY>/<MODULE-DIRECTORY> -
Move CSR from /tmp:
mv /tmp/<ATTACHED-CSR-FILE-NAME> . -
Sign CSR and write details to a text file:
openssl ca -policy policy_anything -in <ATTACHED-CSR-FILE-NAME> \ -cert /home/apizone/CSR/<COUNTRY>/DTBRootCACert.pem \ -keyfile /home/apizone/CSR/<COUNTRY>/DTBRootCA.key \ -out <CERT-OUTPUT-FILE-NAME.crt> > certificate_name&date.txtCA key passphrase prompt
! Enter the CA key passphrase from the vault; do not store secrets in shell history or in plaintext files.<CA-KEY-PASSPHRASE-REDACTED>
- Copy the contents of certificate_name&date.txt into a note and attach to the JIRA ticket for audit traceability.