-
Download the latest RPM package.
-
Install "Extra Packages for Enterprise Linux (EPEL)"
sudo yum install -y epel-release
sudo yum update -y
- Install the RPM packages
sudo yum -y localinstall /tmp/acme2certifier/acme2certifier-0.23.1-1.0.noarch.rpm
In case you install on Redhat 8.x you need to upgrade following packages
- python3-cryptography to version 36.0.1 or higher
- python3-dns to version 2.1 or higher.
- python3-jwcrypto package to version 0.8 or higher.
Backports of these packages being part of RHEL9 can be found in the the a2c rpm repository
- python3-cryptography-36.0.1-4.el8.x86_64.rpm
- python3-dns-2.1.0-6.el8.noarch.rpm
- python3-jwcrypto-0.8-4.el8.noarch.rpm
Depending on your ca_handler you may need additional modules:
- python3-impacket-0.11.0-1.el8.noarch.rpm when using MS wcce handler
- python3-ntlm-auth-1.5.0-2.el8.noarch.rpm when using MS wse handler
- python3-requests_ntlm-1.1.0-14.el8.noarch.rpm when using MS wse handler
- python3-requests-pkcs12-1.16-1.el8.noarch.rpm when using EST or EJBCA handler
- Copy NGINX configuration file
cp /opt/acme2certifier/examples/nginx/nginx_acme_srv.conf /etc/nginx/conf.d
- Copy NGINX ssl configuration file (optional)
cp /opt/acme2certifier/examples/nginx/nginx_acme_srv_ssl.conf /etc/nginx/conf.d
- Create a configuration file
acme_srv.cfg
in/opt/acme2certifier/acme_srv/
or use the example stored in the examples directory - Modify the configuration file according to you needs
- Configure the CA handler according to your needs. Example for Insta Certifier
- Enable and start the acme2certifier service
sudo systemctl enable acme2certifier.service
sudo systemctl start acme2certifier.service
- Enable and start the nginx service
sudo systemctl enable nginx.service
sudo systemctl start nginx.service
- Test the server by accessing the directory resource
$ curl http://<your server name>/directory
{"newAccount": "http://127.0.0.1:8000/acme_srv/newaccount", "fa8b347d3849421ebc4b234205418805": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "http://127.0.0.1:8000/acme_srv/key-change", "newNonce": "http://127.0.0.1:8000/acme_srv/newnonce", "meta": {"home": "https://github.com/grindsa/acme2certifier", "author": "grindsa <grindelsack@gmail.com>"}, "newOrder": "http://127.0.0.1:8000/acme_srv/neworders", "revokeCert": "http://127.0.0.1:8000/acme_srv/revokecert"}
- Try to enroll a certificate by using your favourite acme-client. If something does not work enable debugging in
/opt/acme2certifier/acme_srv/acme_srv.cfg
and check/var/log/messages
for errors.