summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--openssl-ca-acf.cnf22
1 files changed, 14 insertions, 8 deletions
diff --git a/openssl-ca-acf.cnf b/openssl-ca-acf.cnf
index 73db0c6..7530240 100644
--- a/openssl-ca-acf.cnf
+++ b/openssl-ca-acf.cnf
@@ -69,14 +69,13 @@ countryName = optional
commonName = supplied
emailAddress = optional
localityName = optional
-subjectAltName = optional
-
+subjectAltName = optional
[ policy_acf_cert ]
organizationalUnitName = optional
commonName = supplied
emailAddress = optional
-subjectAltName = optional
+subjectAltName = optional
####################################################################
@@ -147,34 +146,42 @@ authorityKeyIdentifier = keyid,issuer:always
[ general_cert ]
# Non-specific
+policy = policy_acf_cert
+x509_extensions = general
+[ general ]
basicConstraints = CA:FALSE
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid,issuer:always
-policy = policy_acf_cert
-
[ ssl_server_cert ]
# SSL server
+policy = policy_acf_cert
+x509_extensions = ssl_server
+[ ssl_server ]
basicConstraints = CA:FALSE
nsCertType = server
keyUsage = digitalSignature, keyEncipherment
extendedKeyUsage = serverAuth
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid,issuer:always
-policy = policy_acf_cert
[ ssl_client_cert ]
# SSL client
+policy = policy_acf_cert
+x509_extensions = ssl_client
+[ ssl_client ]
basicConstraints = CA:FALSE
nsCertType = client
keyUsage = digitalSignature, keyEncipherment
extendedKeyUsage = clientAuth
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid,issuer:always
-policy = policy_acf_cert
[ ssl_ca_cert ]
# SSL Certifying Authority
+policy = policy_acf_ca
+x509_extensions = ssl_ca
+[ ssl_ca ]
basicConstraints = critical, CA:true
nsCertType = sslCA
# Below is correct, but may prevent self-signed certs from working
@@ -182,7 +189,6 @@ keyUsage = cRLSign, keyCertSign
extendedKeyUsage =
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid,issuer:always
-policy = policy_acf_ca
[ crl_ext ]
authorityKeyIdentifier = keyid,issuer:always