Retrieve the container logs to find the auto-generated SuperAdmin password using:
sudo docker logs c0d4fdad387b
Open the ejbca.log file and search for the SuperAdmin password.
Navigate to the EJBCA RA interface in your web browser at:
https://192.168.31.1/ejbca/ra/enrollwithusername.xhtml(replace 192.168.31.1 with your actual server IP address).
Login with username superadmin and the password found in the logs to generate a SuperAdmin certificate with RSA key algorithm, 2048 bits key size, and an appropriate certificate profile for admin access.
After generating the certificate, install it in your browser's Personal Certificate Store.
Finally, navigate to the EJBCA Admin Web interface at:
https://192.168.31.1/ejbca/adminweb/, select the newly generated SuperAdmin certificate, and gain full administrative access to EJBCA.
Wowww!!! Congratulations, you have successfully set up EJBCA in your home lab!!!
Project 2
Issuing a Client Authentication Certificate using EJBCA
This guide will how you how to issue a Client Authentication Certificate using your newly deployed EJBCA.
Please follow the below instructions:
Open your browser and go to your EJBCA:
https://192.168.31.1/ejbca/adminweb/
Log in with your admin credentials. (Use the SuperAdmin Certificate from the previous lab)
Create a ClientAuth Certificate Profile:
EJBCA > CA Functions > Certificate Profiles > ENDUSER > Clone > ClientAuth > Create from template.
Edit the new ClientAuth Certificate Profile:
Set Validity or End Date to 1y (1 year) > Check Client Authentication > Save.
Create a ClientAuth End Entity Profile:
EJBCA > RA Functions > Manage End Entity Profiles > Add End Entity Profile > Name it ClientAuth > Add Profile.
Configure the new End Entity Profile:
Subject DN Attributes > Add > emailAddress > Default Certificate Profile to ClientAuth (unselect others) > Set Default Token to P12 file > Save.
Add a New End Entity:
EJBCA > RA Functions > Add End Entity > Choose a unique username > Set a password for certificate pickup > Use data from the e-mail address field.
Pick Up the Certificate at:
https://192.168.31.1/ejbca/ra/#loaded > Enroll > Enter the username and password you set earlier > Select 2048 (key size) > Download P12 to get your certificate file.
Remember to download the CA Certificate too:
Go to CA Certificates and CRLs in EJBCA > Download the CA Certificate in PEM format.
Finally, import the Certificate into Your Browser:
Browser Settings > Security > Manage Certificates > Import > Select the downloaded P12 file > Enter the Enrollment Password.
Wowww!!! Congratulations, you have successfully issued and installed your Client Authentication Certificate.
Project 3
Creating a Root Certificate Authority (Root CA) in EJBCA
This guide will how you how to create a Root Certificate Authority (Root CA) in your newly deployed EJBCA.
Please follow the below instructions:
Access EJBCA Admin Web:
https://192.168.31.1/ejbca/adminweb/
Log in with your admin credentials. (Use the SuperAdmin Certificate from the previous lab)
Create a Certificate Profile for the Root CA:
EJBCA > CA Functions > Certificate Profiles > ROOTCA > Clone > Name it MyRootCAProfile > Create from template.
Edit the New Certificate Profile:
Key Algorithm to RSA > Key Length to 4096 > Validity to 30y > Disable Authority Key ID, Subject Alternative Name, Issuer Alternative Name, LDAP DN Order > Save the profile.
Create a Crypto Token:
EJBCA > CA Functions > Crypto Tokens > New > MyFirstRootCACryptoToken > Type to SOFT HSM for home lab; use HSM for production > Authentication Code (write this down!) > Create 2048 key pair > Save the Crypto Token.
Create the Root CA:
EJBCA > CA Functions > Certificate Authorities > Add CA > MyFirstRootCA > Create > Select the CA settings from earlier > Create Root CA.
Wowww!!! Congratulations, you have successfully created your first Root Certificate Authority in EJBCA.
Project 4
Importing a Virtual Machine OVA into ProxMox
This guide will how you how to import a Virtual Machine OVA into ProxMox.
Please follow the below instructions:
Log into ProxMox VE either via SSH or the web-based shell
Make a working directory for your .OVA file
mkdir ova_import && cd ova_import
Use Proxmox Shell to download the OVA onto our Proxmox server:
Use Proxmox Shell to download the OVA onto our Proxmox server:
tar -xvf ACME_2019_All_Versions.ova
Create a new VM on the top right of Proxmox VE web interface:
- General Tab > VM ID - Assign A Number - General Tab > Name - ACME-2019 - OS Tab > Do not use any media - System Tab > Bios > OVMF (UEFI) - Disk Tab > Leave the default one and next - CPU Tab > Assign it 1 Socket and 4 Cores - Memory Tab > Assign it 8192 MiB
Review the parameters and finally click on “Finish” on the bottom right.
Go to your newly created VM in my case 100 > Click on Hardware.
Detach and remove the current Hard Disk and remove the CD/DVD Drive and the EFI Disk.
Return Proxmox Shell and go to the working directory we created earlier
cd ova_import
Import the disk you extracted earlier into the new VM specifiying its VM ID in my case 100 and the format raw or qcow2 depending on client.
qm importdisk 100 ACME_2019_All_Versions-disk1.vmdk local-lvm --format raw
Go back to your VM > Hardware and double-click the the new Unused Disk to add it to the VM and enable the following: