-
Notifications
You must be signed in to change notification settings - Fork 184
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Almost there, "Cannot export PKCS12; Issuer certificate hasn't been resolved" #98
Comments
[EDIT] Don't do this. See detailed help/instructions in comments from @bseddon below without using other software Following abcdef here I was able to use OpenSSL to create the necessary package to import to IIS on Windows. Is there a way to do it within ACMESharp? Steps for anyone else: |
There is a much simpler mechanism and no need to install OpenSSL. It will be great if you can correct your message so no one is left with that impression. The instructions here are long but that's because I'm trying to provide an explanation. Here's the short version:
OK. Now the long form but if you want to have all this taken care of for you, use the script attached to this post: #76. You can use this command to export in PKCS12 format: Get-ACMECertificate myalias -ExportPkcs12 mycert.pfx This command will fail unless you have already imported the LE intermediary certificate in to the Windows CA certificate store. The LE intermediary certificate is in the vault. By default you will find it in this folder: C:\ProgramData\ACMESharp\sysVault\75-ISUPM Your path may be different but as you point out, you can use the following command to see the path on your machine: (Get-ACMEVaultProfile).VaultParameters['RootPath'] The LE certificate will be the only file in this folder. Or you can export the file so you don't need to mess with the vault: Get-ACMEIssuerCertificate -ExportCertificatePEM le.pem You then have two choices. Using the certificate applet, import this file into the intermediate certificate store. Or temporarily rename the file to have a .crt extension. Then click with the right mouse button to see the context menu and select 'Install Certificate'. Install it into the local machine and select the intermediate certificate store. Now the command above to export your certificate as a .pfx will work. You can import the .pfx file you create into the store used by IIS by using the command: Import-PfxCertificate -CertStoreLocation "cert:\LocalMachine\WebHosting" -FilePath mycert.pfx Because the intermediate certificate has been imported, there's no need to create a .pfx file. Your certificate in a .pem file can be imported: Get-ACMECertificate myalias -ExportCertificatePEM mycert.pem Import-Certificate -CertStoreLocation "cert:\LocalMachine\WebHosting" -FilePath mycert.pem Note: the cmdlet used in the last step is Import-Certificate while earlier Import-PfxCertificate was used. |
Thank you for the excellent module and support. I do not appear to have a 75-ISUPM folder in my vault and the |
Have you generated a certificate yet? I think the issuer certificate is retrieved as part of the process of successfully generating a certificate but its a while since I had to worry about this. However the LE certificates are available from their site so you can download and import them manually. It's a one time task. |
Just to be sure, today I started over by deleting my vault. The issuer certificates are downloaded and stored in the vault only after the command: Update-ACMECertificate certalias Until this command is issued, you may have a valid certificate (assuming you have been through the steps to generate one) but the issuer certificates are not downloaded. |
Thank you, that was the missing step for me. I followed the quick start and did not run [The only other hiccup as I went through the quick start was checking the DNS challenge status. It looked like it was permanently pending until I used Thanks again for a great module. |
Looks like the issue is resolved, so I'm closing it out. If there are further questions, please reopen. |
I had same issue, after applying solution for "#286" The newly generated Vault:
To resolve it and get it exporting certificates:
I had already installed:
Should I then install the three SSL certs
Thanks in advance, and apologies for any errors in the posting rules, is apply. Best regards, Pablo. |
Hi,
New to this so bear with me. I have got as far as generating the certificate crt and crt.pem files but I cannot get the pfx file created. Apparently that is what I need for the certificate to be available on Windows servers.
What is the extra step I am missing from the quick start? This works:
Get-ACMECertificate MyCertName -ExportCertificatePEM "\\pathto\certs\MyCertName.crt.pem" -ExportCertificateDER "\\pathto\certs\MyCertName.crt"
but this does not:
Get-ACMECertificate MyCertName -ExportPkcs12 "\\pathto\certs\MyCertName.pfx"
Thanks
The text was updated successfully, but these errors were encountered: