Hi! I probably have a very basic question, but I need to describe my problem in detail to make sure everybody understands what I'm seeking for, because I may not possibly use the correct terminology. I want to have this kind of organizational structure (OU = Organizational Unit):
Root-CA | +---OU1 | +----OU1-Server-1-Key | | | +----OU1-Server-2-Key | | | +----OU1-Client-1-Key | | | +----OU1-Client-2-Key | | | +----OU1-Client-3-Key | +---OU2 +---- ... (and so on) For my project I would have some dozends OUs. In this project clients connect to servers (not http, no DNS) and transfer data over that connection to a custom application. Now I want the Servers (OU1-Server-n) to check the client's certificate when a client connects to a server. Any client who is member of the same OU should be able to connect the any of the servers of the same OU, but not to a server of a different OU. And the clients should check that the certificate of server-n is a valid certificate, signed by OU1's key (or/and our root-key?). It should also be allowed that Server-1 will connect to Server-2 (for synchronization purposes). I tried to achieve this the following way: Create root key Create root certificate Create OU1 key Create OU1 certificate Sign ou1's certificate with our root key. Create OU1-Server-1-key Create OU1-Server-1-certificate Sign OU1-Server-1-certificate with OU1's key. Do the last three steps for each OU1-Client-[1-n]-key If I have made any obvious mistakes (maybe in concept), please let me know. I have quite a couple of files now. The main question is, which files are now needed on the clients and which on the servers and how to generate them from the files I have? [Should I just copy the server's certificate into a certificate-file which then contains the root-cert as well as the cert of OU1 and the certs of all OU1's servers into one file and have that file on the clients? And the same with the servers (all client-certs, OU1's certs as well as the root-cert)? What's confusing me is that I've seen so many files where certificates and keys are mixed up in one file. What's also confusing me is that I've seen cert files with not only ASCII coded binary code in it, but also with readable strings like "Issuer = ..." mixed up. Which format can be used for certificates?] -- Regards, Torsten (0> //\ V_/_ Tolerance rocks! --------------------------------------------------------------------- # head PCA/private/PCAkey.pem -----BEGIN RSA PRIVATE KEY----- Proc-Type: 4,ENCRYPTED DEK-Info: DES-EDE3-CBC,abcdefghijklmnopq 1234567890abcdefghijklmnopqrstuvwxyz[modified...] # head PCA/private/PCAcert.pem -----BEGIN CERTIFICATE----- MIIIEDCCBfigAwIBAgIBADANBgkqhkiG9w0BAQQFADCBqTELMAkGA1UEBhMCREUx # grep '^---' /Server/server.pem -----BEGIN CERTIFICATE----- -----END CERTIFICATE----- -----BEGIN RSA PRIVATE KEY----- -----END RSA PRIVATE KEY----- -----BEGIN X509 CERTIFICATE----- -----END X509 CERTIFICATE----- -----BEGIN CERTIFICATE----- -----END CERTIFICATE----- [and so on, about 50 lines] # grep '^---' /Server/client.pem -----BEGIN CERTIFICATE----- -----END CERTIFICATE----- -----BEGIN RSA PRIVATE KEY----- -----END RSA PRIVATE KEY----- ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]