create a self signed certificate in iis in windows server 2012 R2 - iis

I have tried to so many ways but is sys,
Attackers might be trying to steal your information from mttnihar.com (for example, passwords, messages or credit cards). Learn more
NET::ERR_CERT_AUTHORITY_INVALID
in my case, I have published my site in windows server 2012R2 ISS -> then in our office internal DNS server I have config domain with my server IP. HTTP its working fine but HTTPS:// not working.
I try to create a certificate in my windows server IIS but it's not solved my issue.
I need to implement all my internal staff can use with HTTPS(certified). Any suggestions?
Thanks in advance.

You get this error message when you are not using a trusted CA certificate. to resolve the issue you could try on of try below solution:
1)Click on the advanced button:
Click on the proceed to unsafe link:
Now you can work with the sell signed certificate.
This will only recommend when you are using sit internally. if you are hosting a site on internet it is recommended to use a trusted CA certificate.
or
2)ad the self-signed certificate to the browser ca store:
https://superuser.com/questions/947927/chrome-is-not-accepting-my-iis-self-signed-certificate

Related

How to host angular website in personal server with registered domain

We have developed an angular website and we have both personal server and a registered domain extension. We were able to host through public ip using iis but when the domain name was used in throws NET::ERR_CERT_AUTHORITY_INVALID. It also redirects to https by default.
We also tried using xampp too. We don't want to use any cloud servers as our custom domain extension can't be used.
kindly help us to host the website.
As you mentioned the error message: ERR_CERT_AUTHORITY_INVALID.
This issue is related to your certificate. If you do not currently have a certificate, you can choose to create a self-signed certificate, or apply for a certificate from the Authority.
If you already have a certificate and still have this issue, you can check to see if it is expired and try renewing the certificate.

how to use client certificates to access website

I have website hosted on IIS. My main issue is that I want only users with a specific certificate installed to be able to access the site. I tried to follow some tutorials but I can't find anyone covering both server and client side, since I can't get it to work.
I have some questions to the main issue:
What kind of certificate should I use (domain/selfed signed in IIS 7.5)? I do have access to a Active Directory Certificate Services where I can create other types of certificates (CA), but the problem is when trying to import them to my IIS ("certificate cannot be used as an ssl server certificate")
I would like to use a CA certificate, but is that possible when using IIS? Or do I need to write all the code the check if the user has the right certificate?
When created a certificate for the website (e.g. though IIS)..How do I create user certificates that are trusted by the server certificate?
As you may noticed by now I'm not sure how to do all of this, and would really like some help..
Server should use SSL server certificate. This certificate has to have Server Authentication extension in Extended key usage. Server certificate should have SAN extension (Subject alternative name) with domain name of server as DNS name (i.e. somesite.com)
CA certificate has to be imported to Trusted root store (preferably Local Machine) on both server and client machines.
Client certificate should contain Client Authentication extension in Extended key usage.
All EndEntity (client and server) certificates should have CRL distribution point in them where there is URL to CRL that is issued by CA. CRL has to be accessible by both client and server and should be always valid.
You can use XCA for training purposes. It has a nice GUI and it has templates for CA, SSL server and SSL client certificates by default. Then you can mimic these certificates in your Active Directory Certificate Services. Documentation and some guides can be found here.

How to setup SSL on an IIS development server?

Our team has a Windows 2008 server which is used primary for a common IIS dev box.
I want to enable SSL on one of the websites on IIS, so that it can only be accessed via HTTPS.
I created a self-signing certificate in IIS and installed it. However when I access the website via the browser (Chrome, Firefox or IE - doesn't matter), it always gives the scary..."this is not secure" screen. I've tried installing the certificate on my own computer, rebooting and I still get that screen.
One thing that I noticed is when I create a self-signed certificate, it adds the domain name to it...for instance, the name of the box is webIIS and our login domain is COMPANYDOMAIN. So it will say that the certificate was created by webIIS.COMPANYDOMAIN.com. This url resolves to nothing, since there is no such thing.
Am I going about it the wrong way?
I've answered a similar question here.
Few afterwords:
Your server should have a dns name. If it is in a domain (Active directory or something) it surely does. Find it, use it in CN of the SSL certificate.
CA that will issue SSL certificate should be trusted by clients accessing the server and by the server itself. Place CA certificate in Trusted Root Store (in LocalMachine store) on the server and all clients that will access it. If you have Active Directory it should be pretty simple to distribute it.
CRL that CA has to issue in defined intervals (it's up to you if the CRL will be issued one a day, month, year or lifetime) has to be accessible by clients and server. Either place it at http url that you gave when issuing SSL certificate or manually place in each certificate store (in Trusted Root Store).

SSL Certificates Popup in nodejs

I have installed SSL on node server. I have made changes in app.js too.
Now when i am trying to run my website
example.com
I am getting Popup like this
Why i am getting this popup?
Is certificates doesn't installed correctly?
Thanks
The browser is asking you if you wish to authenticate yourself to the server using a certificate.
Clearly you have a certificate and a public/private key pair attached to your local account, or it wouldn't be asking you.
Simply click cancel if this is not intended.
Use the Windows Certificate Manager to check what certificate it is. In all likelihood you have installed the server certificate as a personal certificate on your account.

How do I get browsers to trust self-signed certificates for testing? Website address is slightly different than fully qualified domain name

I have a website that is being configured with SSL, and I am using a self-signed certificate for testing purposes, for now. The machine is running Windows 2008 R2 with IIs 7.5 and Apache Tomcat 5.5.
The problem is FireFox is gives the error that the connection is untrusted because it's a self-signed certificate and it also says that the site is using an invalid security certificate. I tried importing the certificate into Firefox, to remedy the situation, and it did not help. However, with IE, exporting the certificate from IIS and importing it into the browser's Trusted Root Certificate Authorities store permitted IE to trust the self-signed certificate.
It's important to note that the server's fully qualified domain name is webdev.dev.mysite.com, whereas the website address is webdev.mysite.com and I've had no problems with the site under HTTP. And with the help of the site here, I setup the self-signed certificate such that it's name is webdev.mysite.com.
How can I get Firefox to trust the self-signed certificate?
Thank you very much for any help.
I believe this page should help you:
In FireFox, go to Tools -> Options
Click the Advanced Tab, then the View Certificates button
Go to the Servers tab and press the Add Exception button
Note: It might depend on your version of Firefox
Source: www.poweradmin.com/help/sslhints/FireFox.aspx

Resources