2. Kedua lakukan konfigurasi web server (apache2/nginx), untuk langkah-langkahnya bisa di cek pada konten berikut:
3. Silakan buka browser dan akses web menggunakan ip atau domain, lalu perhatikan kotak merah pada gambar, disana terdapat kalimat "Not Secure".
4. Dan jika kita coba copy-paste ip atau domainnya, maka akan tampil protokolnya yaitu http (80).
5. Berikutnya kita install SSL
6. Selanjutnya kita buat folder untuk menaruh sertifikat CA nya dan pindah ke folder tersebut
mkdir CA && cd CA
7. Membuat Root CA (Sertifikat Induk)
a. Buat Private Key untuk CA
openssl genrsa -out ca.key 4096
b. Buat Sertifikat Self-Signed CA
openssl req -x509 -new -nodes -key ca.key -sha256 -days 1825 -out ca.crt
Country Name (2 letter code) [AU]: ID
State or Province Name (full name) [Some-State]: West Java
Locality Name (eg, city) []: Bogor Regency
Organization Name (eg, company) [Internet Widgits Pty Ltd]: Webverra
Organization Unit Name (eg, section) []: Software
Common Name (e.g. server FQDN or YOUR name) []: inidomain.net
Email Address []: admin@inidomain.net
8. Membuat Sertifikat untuk Web Server
a. Buat Private Key untuk Web Server
openssl genrsa -out server.key 4096
a. Buat Private Key untuk Web Server
openssl genrsa -out server.key 4096
b. Buat CSR (Certificate Signing Request)
openssl req -new -key server.key -out server.csr
openssl req -new -key server.key -out server.csr
Country Name (2 letter code) [AU]: ID
State or Province Name (full name) [Some-State]: West Java
Locality Name (eg, city) []: Bogor Regency
Organization Name (eg, company) [Internet Widgits Pty Ltd]: Webverra
Organization Unit Name (eg, section) []: Software
Common Name (e.g. server FQDN or YOUR name) []: inidomain.net
Email Address []: admin@inidomain.net
A challenge password []: kosongkan saja dulu
An optional company name []: kosongkan saja dulu
c. Generate Sertifikat
openssl x509 -req -in server.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out server.crt -days 365 -sha256

openssl x509 -req -in server.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out server.crt -days 365 -sha256
9. Verifikasi Hasil
ls
10. Pindahkan sertifikat ke folder ssl
cp server.crt /etc/ssl/certs/
cp ca.crt /etc/ssl/certs/

cp server.crt /etc/ssl/certs/
cp ca.crt /etc/ssl/certs/
11. Pindahkan private key ke folder private
cp server.key /etc/ssl/private
cp server.key /etc/ssl/private
12. Aktifkan Modul SSL di Apache
a2enmod ssl

a2enmod ssl
13. Restart Layanan Server
systemctl restart apache2
14. Konfigurasi VirtualHost HTTPS
nano /etc/apache2/sites-available/default-ssl.conf

nano /etc/apache2/sites-available/default-ssl.conf
ubah baris berikut
SSLEngine on
SSLCertificateFile /etc/ssl/certs/server.crt
SSLCertificateKeyFile /etc/ssl/private/server.key
SSLCertificateChainFile /etc/ssl/certs/ca.crt
save dan exit

15. Aktifkan Site & Restart Service
a. Aktifkan site SSL
a2ensite default-ssl.conf
SSLEngine on
SSLCertificateFile /etc/ssl/certs/server.crt
SSLCertificateKeyFile /etc/ssl/private/server.key
SSLCertificateChainFile /etc/ssl/certs/ca.crt
save dan exit
15. Aktifkan Site & Restart Service
a. Aktifkan site SSL
a2ensite default-ssl.conf
b. Reload & Restart Apache
systemctl reload apache2
systemctl restart apache2
systemctl restart apache2
16. Pengujian di Client (HOST)
buka browser dan ketikkan https://<IP/DOMAIN_DEBIAN>
buka browser dan ketikkan https://<IP/DOMAIN_DEBIAN>




0 Komentar
Berkomentar dengan bijak