I've spent too much time trying to figure out something that is probably well
know here.

I have a restricted community application that seems a perfect fit for using
openssl to self-generate our own CA, and self-sign it, and self-generate our
own web client authentication certificate and self-sign them. All this so
that we can validate the Distinguished Name presented when web browser
connecting to our nginx web server.

I have done all this many times but have not been able to get various web
browsers to use the self-generated/self-signed client authentication certs.

I have imported both the CA.crt and the client.crt into the OS certificate
store. But after that the web browser does not seem to use the cert for
authentication.

I've tried to set the properties on the imported certificate to be used for
"web client authentication". - it just does not work!

I just cannot keep spending time on this problem. If I cannot find help, I
will urge the the requirement for client certs be dropped from the project.

(personal lore) It seems that the web browsers fail because our
self-generated/self-signed CA is not signed by some higher CA that is
trusted. Is that true or false? 

If it is false, I need help to overcome the failure of the web browsers to
correctly use our certs.

Thanks!!!!
David
-- 
View this message in context: 
http://old.nabble.com/self-generated%2C-self-signed-root-CA-and-Client-Auth-Certs-not-working-tp33965371p33965371.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to