SSL/TLS Manager

20+ years of Proud Existence in Web, Intranet, Mobile App development in India

Ask for Quotation Upload Resume

SSL/TLS Manager:

 

What is SSH? SSH allows secure file transfer and remote logins over the internet. Your connection via SSH is encrypted for a secure connection. You can manage your SSH keys to allow automation when logging in via SSH. Using public key authentication is an alternative to password authentication. Since the private key must be held to authenticate, it is virtually impossible to brute force. You can Import existing keys, generate new keys, as well as manage/delete keys. 

 

SSH (Secure Shell) is a program to log into another computer/server over a network securely. It provides strong authentication and secure communications over insecure channels. Your login, commands, text are all encrypted when using ssh. 

 

Manage SSH Keys

 

1. Click on the 'Generate a new Key' link.
2. Set the following: 

 

Key Name - Enter the key name you want to use. It can be anything specific to your personal preferences. (If you leave this option empty, it will default to key name 'id_dsa').

 

Key Password - Enter a password you want to use for this key. You can leave this option blank if you do not want to use a password.

 

Key Type - Select either DSA or RSA from the drop-down menu. RSA and DSA are encryption algorithms used to encrypt your key. DSA is faster for Key Generation and Signing and RSA is faster for Verification.

 

Key Size - Select the key size you want to use for this key. Your choices include (1024, 2048, 4096). 

 

3. Click on the 'Generate Key' button.

 

4. If the key has been generated successfully, you will see a pop-up appear stating 'Key Generation Complete!' Click on the 'OK' button. 

 

5. Click on the 'Go Back' link. 

 

6. When the page loads, you will see a 'Public Keys' table with your newly public key containing the following information, split into three columns: 

 

Name - This entry will be the Key name you chose in Step 2 above.

 

Authorization Status - If your key has not been authorized, it will state 'not authorized' in this column. To authorize your key, follow the instructions in the 'Manage Authorization' section below.

 

Actions - You have three choices:

 

Delete - Click on this link to delete the key.

 

View/Download - Click on this link to view or download the key.

 

Manage Authorization - Click on this link to authorize your key. Once the page loads, click on the 'Authorize' button. You should receive a confirmation stating 'KEY_NAME has been Authorized.' Click on the 'Go Back' link. Now when you view the Public Keys table, you should see 'authorized' in the 'Authorization Status' column for your new key. 

 

7. In addition to the 'Public Keys' table, you will also see a 'Private Keys' table with your newly public key containing the following information, split into two columns: 

 

Name - This entry will be the Key name you chose in Step 2 above.

 

Actions - You have three choices:

 

Delete - Click on this link to delete the key.

 

View/Download - Click on this link to view or download the key. 

 

8. Now that you have created a new key, review the following information: 

 

The public and private key are similar to a puzzle. They are created together to use during the login/authentication process. The public key resides on the server (the remote location) The private key resides locally on your computer/server. When you attempt to login to a server, the public and private key are compared. If they 'match', then you will be allowed to login to the server location. 

 

You can download the private/public keys here and import into PuTTY (or other SSH clients) if you prefer using something else for SSH connections. Or, if you have been using PuTTY, you can import the public/private keys by click on Import Key. You can also download your key in PuTTY's ppk format under View/Download. 

 

9. Click on the 'Go Back' link. 

 

SSL/TLS Manager (Need more information on this topic?)
The SSL/TLS Manager will allow you to generate ssl certificates, signing requests, and keys. These are all parts of using SSL to secure your website. SSL allows you to secure pages on your site so that information such as logins, credit card numbers, etc are sent encrypted instead of plain text. It is important to secure your site's login areas, shopping areas, and other pages where sensitive information could be sent over the web. 

 

The first step in generating an SSL certificate is to create a Private Key. Start by reading the instructions in the 'Private Keys (KEY)' section below. 

 

Step 1: Private Keys (KEY):

 

1. Click on the 'Generate, view, upload, or delete your private keys' link.

 

2. When the page loads, scroll to the bottom and you will see the 'Generate a New Key' section. Enter the domain you want to create an SSL Certificate in the 'Host' text box. Or you can select the domain from the 'Select a Domain' drop down menu. 

 

3. Click on the 'Generate' button. 

 

4. Click on the 'Return to SSL Manager' link. 

 

5. When the page loads, click on the 'Go Back' link. This will take you to the main 'SSL/TLS Manager' page. 

 

6. Continue with 'Step 2' below. 

 

Step 2: Certificate Signing Requests (CSR):

 

Before you being, check with your SSL provider as they may require your information in a specific way. Please check with their necessary CSR information for Apache. Then proceed with the steps below.

 

1. Click on the 'Generate, view, or delete SSL certificate signing requests' link.

 

2. When the page loads, set the following

 

  • Host - Select the domain  name from the drop down menu.
  • Country - Enter your two-digit country code.
  • State - Enter your two-digit state abbreviation.
  • City - Enter your city's name.
  • Company - Enter your company's name.
  • Company Division - Enter your company's division.
  • Email - Enter your email address.
  • Pass Phrase - Enter any phrase you want to use for the pass phrase.

 

3. Click on the 'Generate' button.

 

4. Click on the 'Go Back' link. 

 

5. Use the CSR you copied in Step 5 above to generate your SSL Certificate with your SSL provider. Your SSL provider will create a CRT file and send it to you. Save the file on your computer so you can use it in a later step. 

 

6. Continue with 'Step 3' below.

 

Step 3: Certificates (CRT):

 

1. Click on the 'Generate, view, upload, or delete SSL certificates' link. 

 

2. Paste the CSR you copied in Step 5 of the 'Certificate Signing Request (CSR)' section above. 

 

3. When the page loads, click on the 'Browse' button and locate the CRT file your SSL provider created for you. Or if you have highlighted and copied the contents of your CRT file, paste it in the 'Upload a New Certificate' text box. 

 

4. Click on the 'Upload' button. 

 

5. Continue with 'Step 4' below. 

 

Step 4: Activate SSL on Your Web Site (HTTPS) 

 

NOTICE! This step must be done prior to using your SSL Certificate.

 

1. Click on the 'Setup a SSL certificate to work with your site' link. 

 

2. Select the domain you are using to install a SSL Certificate from the 'Domain' drop down menu. The system will attempt to 'Fetch' the SSL Certificate for you. If you receive an error, please contact your web hosting provider for further support. 

 

When using the Java SSH clients, you have your choice of two types of clients:

 

Connect using SSHTerm - SSH Term allows you to connect through public key or password authentication without downloading any software. Public key authentication require you to have a copy of your private key locally.

 

This can be obtained by following the instructions in the 'Manage SSH Keys' above.Connect using Java Telnet Applet - Java Telnet Applet allows you to connect using password authentication without downloading any software. 

 

To use either client, click on the appropriate link.