Back to Blog
Drivers pc bematech rc 80005/28/2023 ![]() Organizational Unit Name (eg, section) : SecurityĬommon Name (e.g. ![]() server FQDN or YOUR name) : MethodDevelopmentĮmail Address : in your C:/Certs you should have 2 files (root.key, root.crt). You will want to keep these in a secure place, maybe disconnected form the network, say a thumb drive somewhere? Now we have all of the cert files we need, should be a total of 6 Generate CSR (the request) openssl req -out db_methoddev_com.csr -new -newkey rsa:2048 -nodes -keyout db_methoddev_com.key -subj "/CN=db."įullfill the request with our CA (root.crt), make it last 10 years (3650 days) openssl x509 -req -in db_methoddev_com.csr -CA root.crt -CAkey root.key -CAcreateserial -out db_methoddev_com.crt -days 3650 -sha256 Here we are going to generate a certificate for the Postgres Server, for now let's have a common name for it "db." Step 3: Generate Server Certificate (more PowerShell) These will be used to generate working certificates, if you trust this cert (root.crt) then you trust any children generated from it. Let's assume that your client is a webserver that needs to talk to your Postgres via an encrypted connection. You need to trust the cert that the Postgres server will be throwing out at you, easiest way to do that is to trust the root cert that you generated in Step 1.Right Click on the file -> install Certificate.Select: Trusted Root Certification Authorities -> OK.Choose: Place all certificates in the following store -> Browse. Easy postgresql client windows install#.
0 Comments
Read More
Leave a Reply. |