Skip to content

Commit 47d3d83

Browse files
Merge pull request #270400 from cherylmc/openssl-fix1
format
2 parents 4e2a793 + 49ff9b8 commit 47d3d83

File tree

1 file changed

+2
-11
lines changed

1 file changed

+2
-11
lines changed

articles/vpn-gateway/point-to-site-certificates-linux-openssl.md

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -45,10 +45,10 @@ In this section, you generate the user certificate (client certificate). Certifi
4545
export USERNAME=$(hostnamectl --static)
4646
4747
# Generate a private key
48-
openssl genrsa -out "${USERNAME}Key.pem" 2048
48+
openssl genrsa -out "${USERNAME}Key.pem" 2048
4949
5050
# Generate a CSR (Certificate Sign Request)
51-
openssl req -new -key "${USERNAME}Key.pem" -out "${USERNAME}Req.pem" -subj "/CN=${USERNAME}"
51+
openssl req -new -key "${USERNAME}Key.pem" -out "${USERNAME}Req.pem" -subj "/CN=${USERNAME}"
5252
5353
# Sign the CSR using the CA certificate and CA key
5454
openssl x509 -req -days 365 -in "${USERNAME}Req.pem" -CA caCert.pem -CAkey caKey.pem -CAcreateserial -out "${USERNAME}Cert.pem" -extfile <(echo -e "subjectAltName=DNS:${USERNAME}\nextendedKeyUsage=clientAuth")
@@ -60,15 +60,6 @@ In this section, you generate the user certificate (client certificate). Certifi
6060
openssl verify -CAfile caCert.pem caCert.pem "${USERNAME}Cert.pem"
6161
```
6262

63-
## To use this client certificate on another Linux computer
64-
65-
Each client computer requires two files in order to authenticate:
66-
67-
* The file that contains the client key: caKey.pem
68-
* The file that contains the certificate public data: caCert.pem
69-
70-
Copy both of these files and transfer them to the Linux client computer.
71-
7263
## Next steps
7364

7465
To continue configuration steps, see [Point-to-site certificate authentication](vpn-gateway-howto-point-to-site-resource-manager-portal.md#uploadfile).

0 commit comments

Comments
 (0)