Prepare a certificate directory for the service.
[$OPENACS_SERVICE_NAME etc]$mkdir /var/lib/aolserver/
-[$OPENACS_SERVICE_NAME etc]$$OPENACS_SERVICE_NAME
/etc/certschmod 700 /var/lib/aolserver/
+$OPENACS_SERVICE_NAME
/etc/certs+Prepare a +certificate directory for the service.
[$OPENACS_SERVICE_NAME etc]$mkdir /var/lib/aolserver/$OPENACS_SERVICE_NAME/etc/certs
+[$OPENACS_SERVICE_NAME etc]$chmod 700 /var/lib/aolserver/$OPENACS_SERVICE_NAME/etc/certs
[$OPENACS_SERVICE_NAME etc]$ -mkdir /var/lib/aolserver/$OPENACS_SERVICE_NAME
/etc/certs -chmod 700 /var/lib/aolserver/$OPENACS_SERVICE_NAME
/etc/certs +mkdir /var/lib/aolserver/$OPENACS_SERVICE_NAME/etc/certs +chmod 700 /var/lib/aolserver/$OPENACS_SERVICE_NAME/etc/certs
It takes two files to support an SSL connection. The certificate @@ -38,7 +40,7 @@ section, we'll generate an unsigned certificate which will work in most browsers, albeit with pop-up messages.
Use an OpenSSL perl script to generate a certificate and key.
Debian users: use /usr/lib/ssl/misc/CA.pl instead of -/usr/share/ssl/CA
Mac OS X users: use perl /System/Library/OpenSSL/misc/CA.pl +/usr/share/ssl/CA
macOS users: use perl /System/Library/OpenSSL/misc/CA.pl -newcert instead of /usr/share/ssl/CA
[$OPENACS_SERVICE_NAME $OPENACS_SERVICE_NAME]$cd /var/lib/aolserver/$OPENACS_SERVICE_NAME/etc/certs
[$OPENACS_SERVICE_NAME certs]$perl /usr/share/ssl/misc/CA -newcert