Use Your Own Security Certificate

This procedure, combined with proper Certificate Authority (internal or external) will fix NET::ERR_CERT_AUTHORITY_INVALID errors.

This procedure is most useful for the IT department or domain manager.

This is an optional procedure you can perform if you wish to use your own certificate for OIDC instead of the one created by octoplant.

octoplant will create a self-certificate and private key automatically at run time.

To use your own certificate, create a 41388 entry in the server.ini file under the section Common as shown below:

Copy
[Common]
41388=https://<insert_server_name>

Use the name of your server in place of <insert_server_name> here and in the instructions below.

Other valid base URIs for the entry 41388=https://<insert_server_name> could be similar to one of the following:

The host or domain name must contain ASCII characters only. If you have unicode characters you must replace them with their punycode representation.

Create the SSL certificate

  1. Install OpenSSL.

  2. Create an empty text file named sssan.conf in the OpenSSL executable folder.

    The executable folder may vary depending on the OpenSSL distribution. The executable folder will be the one with openssl.exe in it.

  3. Edit the new file with Notepad or similar plain text editor.

    1. Enter the following text into that file:

      Copy
      [req]
      default_bits = 4096
      prompt = no
      default_md = sha256
      x509_extensions = v3_req
      distinguished_name = dn

      [dn]
      C = <insert country code>
      O = <insert company name>
      CN = <insert_server_name>

      [v3_req]
      subjectAltName = @alt_names

      [alt_names]
      DNS.1 = <insert_server_name>
                                  
    2. Save sssan.conf.

  4. Open a CMD shell with Administrator rights.

    Make sure you use Administrator rights for the shell.

  5. Change the shell to the OpenSSL executable folder.

  6. Set the environment property OPENSSL_CONF. Enter the following in the shell:

    Copy
    SET OPENSSL_CONF=<full path to the OpenSSL executable folder>\openssl.cfg
  7. To generate an SSL certificate with SAN, enter the following in the shell:

    Copy
    openssl.exe req -new -x509 -newkey rsa:4096 -sha256 -nodes -keyout "<insert cert location>\server.key" -days 3560 -out “<insert cert location>\cert.crt" -config "sssan.conf"

    This will create two files in the chosen certificate directory:

    • server.key: A private key file
    • cert.crt: The certificate

    Leave the Administrator shell open if you will install the certificate on the server.

  8. Move to the configuration local directory

  9. Rename:

    • cert.crt to ApiCertificate (no extension)
    • server.key to ApiPrivateKey (no extension)

    Certificate creation process complete" The certificate creation process is complete. Now you can:

Install the certificate on the server

  1. Open Microsoft Management Console by typing mmc<Enter> at the shell command line.

    Make sure you start the Microsoft Management Console with administrator rights.

    The Microsoft Management Console appears:

    Figure: MMC

  2. Create a new console snap-in:

    1. Select File -> Add/Remove Snap-in….

      The Add or Remove Snap-ins dialog appears:

      Figure: OIDC-Cert-Step-1

    2. Select Certificates, and then the Add button.

      The Certificates snap-in wizard will appear:

      Figure: OIDC-Cert-Step-2

    3. Select the Computer account radio button then the Next> button.

      The Select Computer dialog will appear:

      Figure: OIDC-Cert-Step-3

    4. Select the Local computer radio button then the Finish button.

    5. Select the OK button on the Add or Remove Snap-ins dialog.

  3. Expand Certificates under the Console Root.

    1. Right-click on Trusted Root Certification Authorities.

    2. Select All Tasks.

    3. Then select Import, as in the following illustration:

      Figure: OIDC-Cert-Step-4

      The Certificate Import Wizard will appear:

      Figure: OIDC-Cert-Step-5

  4. Select the Next button.

  5. Select the Browse button.

    A Windows Explorer dialog will open:

    Figure: OIDC-Cert-Step-6

    1. Browse to the location where you saved the ApiCertificate above, then select it.

      Change the file type in the Explorer window to All files (*.*).

    2. Select the Open button.

      The Certificate Import Wizard will display the file:

      Figure: OIDC-Cert-Step-7

  6. Select the Next button.

    The next step is to verify the Certificate Store location:

    Figure: OIDC-Cert-Step-8

    Verify the certificate store is the Trusted Root Certification Authorities.

  7. Select the Next button.

    The wizard will display the results:

    Figure: OIDC-Cert-Step-9

  8. Verify the settings for this certificate.

  9. Select the Finish button to complete the wizard.

    The wizard will complete the import and display a dialog:

    Figure: OIDC-Cert-Step-10

  10. Select the OK button.

Verify the certificate

  1. Under Certificates, find and right-click on <insert_server_name>:

    Figure: OIDC-Cert-Step-11

  2. Select the Open menu item.

    The certificate information will be displayed:

    Figure: OIDC-Cert-Step-12

  3. Select the Details tab, then the Subject Alternative Name to see the DNS and IP information you entered for this certificate:

    Figure: OIDC-Cert-Step-13

  4. Select the OK button, and exit the console.

Following the procedure described in this page, combined with proper Certificate Authority (internal or external) will fix NET::ERR_CERT_AUTHORITY_INVALID errors.

OIDC (OpenID Connect)