Create Nuix Adaptive Security CSR from IIS

This guide assumes that there is a CA that can sign the .csr that is created. For more details on how to do this view the Creating a new self-signed CA Certificate section.

Use IIS 10 to Create Your CSR

To use IIS 10 to create your CSR:

In the Windows start menu, type Internet Information Services (IIS) Manager and open it.

In Internet Information Services (IIS) Manager, in the Connections menu tree (left pane), locate and click the server name.

A screenshot of a computer
Description automatically generated

On the server name Home page (center pane), in the IIS section, double-click Server Certificates.

On the Server Certificates page (center pane), in the Actions menu (right pane), click the Create Certificate Request… link.

A screenshot of a computer
Description automatically generated

In the Request Certificate wizard, on the Distinguished Name Properties page, provide the information specified below and then click Next:

Common name: Type the fully-qualified domain name (FQDN) (for example, www.nuix.com ).

Organization: Type your company’s legally registered name (for example, Nuix).

Organizational unit: The name of your department within the organization. Frequently this entry is listed as "IT", "Web Security," or is simply left blank (for example, Adaptive QA).

City/locality: Type the city where your company is legally located (for example, Herndon).

State/province: Type the state or province where your company is legally located (for example, VA).

Country: In the drop-down list, select the country where your company is legally located. (for example, US).

A screenshot of a computer
Description automatically generated

On the Cryptographic Service Provider Properties page, provide the information below and then click Next.

Cryptographic service provider: In the drop-down list, select ‘Microsoft RSA SChannel Cryptographic Provider’, unless you have a specific cryptographic provider.

Bit length: In the drop-down list select 2048, unless you have a specific reason for opting for larger bit length.

A screenshot of a computer
Description automatically generated

On the File Name page, under Specify a file name for the certificate request, click the box to browse to a location where you want to save your CSR.

Note: Remember the filename that you choose and the location where you save your .csr file. If you enter a filename without browsing to a location, your CSR will end up in C:\Windows\System32.

A screenshot of a certificate
Description automatically generated

Click Finish.

With the CSR file created, the next step is to add the Subject Alternative Name fields to the .csr that was just created using an Administrator command prompt.

You will need the Hostname, IP address and FQDN of the server to create the file. You can copy these from the original certificate, or manually by running an ipconfig -all command and noting down the Host Name field, the DNS Suffix, and the IPv4 Address.

Add the Subject Alternative Name

To add the subject alternative name:

Create a new .inf file certsigningrequest.inf in the same directory as your .csr location and copy the following entries to the file. Replace the Subject with the subject from the .csr you created earlier. Replace the Hostname, IP Address, and FQDN entries with the server information.

[NewRequest]

;Change to your,country code, company name and common name

Subject = "C=US, S=VA, L=Herndon, O=Nuix, OU=AdaptiveQA, CN=www.nuix.com"

KeySpec = 1

KeyLength = 2048

Exportable = TRUE

MachineKeySet = TRUE

SMIME = False

PrivateKeyArchive = FALSE

UserProtected = FALSE

UseExistingKeySet = FALSE

ProviderName = "Microsoft RSA SChannel Cryptographic Provider"

ProviderType = 12

RequestType = PKCS10

KeyUsage = 0xa0

[EnhancedKeyUsageExtension]

OID=1.3.6.1.5.5.7.3.1 ; this is for Server Authentication / Token Signing

[Extensions]

2.5.29.17 = "{text}"

_continue_ = "dns=adaptive&"

_continue_ = "dns=localhost&"

_continue_ = "dns=WIN-GVC46H9RVO9&"

_continue_ = "dns=WIN-GVC46H9RVO9.hsd1.md.comcast.net&"

_continue_ = "dns=webUI&"

_continue_ = "ipaddress=127.0.0.1&"

_continue_ = "ipaddress=0000:0000:0000:0000:0000:0000:0000:0001&"

_continue_ = "ipaddress=10.0.0.165&"

Save the certsigningrequest.inf.

Generate the updated CSR by opening a command prompt and navigating to the directory where certsigningrequest.inf and your .csr file was saved.

Run the following command to generate the new CSR:

certreq -new certsigningrequest.inf server.csr

Select 'y' to overwrite the file.

Using OpenSSL, view the certificate request to confirm the SAN fields and the correct Subject with the following command:

openssl req -text -noout -verify -in server.csr

Here is a sample of the output:

Certificate Request:

Data:

Version: 1 (0x0)

Subject: C = US, ST = VA, L = Herndon, O = "Adaptive QA Test Server, Limited", CN = QATestServer, emailAddress = test@nuix.com

Subject Public Key Info:

Public Key Algorithm: rsaEncryption

RSA Public-Key: (2048 bit)

Modulus:

00:cc:ac:b8:f9:61:bf:ec:7c:12:03:a5:dc:d8:38:

a9:79:47:3e:9c:da:5c:84:94:da:76:c2:85:6f:11:

41:75:e3:86:9f:83:97:44:54:44:e8:92:c4:c9:9c:

b8:b6:ee:95:28:b2:9a:83:2c:54:65:15:e6:97:6b:

81:08:53:f2:2d:fe:30:96:79:d8:90:f9:9d:7d:87:

56:89:72:58:96:96:a3:2d:e4:15:a1:40:b5:4d:e9:

c3:df:d3:c9:f4:36:01:9f:31:09:32:bc:3e:6e:cd:

1d:7d:3f:5e:23:88:b7:91:63:5e:78:8c:13:13:a2:

64:07:25:75:29:61:b4:18:81:3e:58:7c:35:43:04:

ba:e7:33:31:8d:0e:2f:0c:9e:d7:7f:e1:1c:f0:2a:

fe:28:2a:2f:cf:57:68:56:fd:b6:20:4c:26:49:c4:

b6:e6:d9:fb:a1:a0:1c:be:1a:7a:4b:2d:de:7e:c0:

bd:2a:df:66:e2:6d:11:35:27:cd:5f:14:99:a6:c1:

4d:3e:aa:fa:fa:5a:63:d3:65:cb:7a:d2:46:fc:c1:

41:d8:1a:9e:ee:77:85:91:92:09:59:93:8d:a3:98:

80:48:df:e2:1b:4c:15:fe:fc:fc:26:72:9f:96:38:

a9:b1:2e:27:96:d6:f5:14:aa:a6:2b:88:74:b9:db:

68:4f

Exponent: 65537 (0x10001)

Attributes:

Requested Extensions:

X509v3 Subject Key Identifier:

38:AC:39:12:6E:B5:78:6E:9D:73:BF:A8:08:80:DD:C8:EC:7A:7D:5F

X509v3 Basic Constraints:

CA:FALSE

X509v3 Key Usage:

Digital Signature, Key Encipherment

X509v3 Subject Alternative Name:

DNS:adaptive, DNS:localhost, DNS:WIN-GVC46H9RVO9, DNS:WIN-GVC46H9RVO9.hsd1.md.comcast.net, DNS:AdaptiveQA CA, IP Address:127.0.0.1, IP Address:0:0:0:0:0:0:0:1, IP Address:10.0.0.165

Netscape Comment:

OpenSSL Generated Certificate

Signature Algorithm: sha256WithRSAEncryption

81:d8:b1:02:32:1c:41:18:f5:e8:e7:a5:07:98:9a:e7:c4:30:

7f:db:ca:08:0b:8c:f5:d0:3e:52:30:aa:2a:94:a9:2e:5a:72:

4c:07:f0:64:72:96:fe:fe:e2:07:df:22:8d:9e:b6:06:b7:ef:

b4:a7:ba:96:e1:93:32:b5:bc:33:2c:6a:9a:17:22:bc:cd:19:

a6:d8:13:30:a8:b2:87:81:01:0f:4c:0f:b3:0f:f8:34:ee:e8:

4f:b6:dd:27:26:d0:44:df:d5:c0:ce:ba:99:94:5c:9e:ec:55:

cf:43:4d:f3:c3:f2:13:90:e3:34:00:8b:37:3c:e2:fa:8c:0a:

80:14:8f:4d:e6:9a:c2:ef:d7:78:48:01:ac:7f:66:44:74:a8:

63:88:b8:c0:0b:c2:46:c4:6a:bf:84:af:51:39:cc:b1:44:d3:

49:06:12:a6:8b:56:18:60:73:81:18:75:05:e3:1a:2f:d8:20:

cd:b3:8e:85:d6:78:22:f9:d9:c7:91:cc:82:eb:35:9d:4d:c3:

20:df:4a:03:3b:6b:20:c8:ea:04:82:a2:b7:9f:10:98:8a:68:

49:bc:9c:93:27:88:51:5a:f2:dd:bb:af:a6:a1:b6:1d:09:32:

f4:b5:51:63:f9:f6:39:dd:36:d9:02:dc:ea:14:f3:07:23:db:

af:3d:2b:26

verify OK

After verifying the CSR is correct, sign it with the CA, see the CSR Signing section of CA Certificate Creation and CSR Signing.

Once you have a new server.cer file that is signed, you can return to IIS and complete the certificate request.

A screenshot of a computer
Description automatically generated

Complete the Certificate Request

To complete the certificate request:

Enter the path to the server.cer file. Enter a friendly name and select Personal for the certificate store.

A screenshot of a certificate request
Description automatically generated

Click ‘OK’ to finish the Import. Next, you will see the new certificate listed in the Server Certificates.

A screenshot of a computer
Description automatically generated

Bind the certificate

To bind the certificate to the Nuix Adaptive Security site:

In IIS, select the Server > Sites > Adaptive.

in the right-hand Actions column under Edit Site select Bindings…

A screenshot of a computer
Description automatically generated

Select the https site binding and click the Edit… button.

A screenshot of a computer
Description automatically generated

Select your newly imported certificate from the SSL certificate dropdown.

A screenshot of a computer
Description automatically generated

Click OK and close the site bindings window.

As long as the CA Certificate is installed into the Trusted Root CA certificate store on a client machine, then the Nuix Adaptive Security web connection is secure.

A screenshot of a computer
Description automatically generated