AWS Cert Mgr - 如何创建客户端和设备证书?

AWS Cert Mgr - How to create client & device certificates?

AWS tech talk,我了解到,

我可以使用以下选项创建私人服务器证书:

--------------------

服务器证书用于加密和解密内容的基本原理。

顾名思义,客户端证书显然用于向相应用户标识客户端

设备证书为物联网生态系统中的每个“事物”创建一个身份, 确保每个设备在连接时都经过身份验证,并保护设备之间的通信。


我们已经通过控制台使用 AWS Cert mgr 创建了根 CA 和从属 CA。

如何使用 ACM GoLang sdk 创建设备和客户端证书(私有)?

[ACM 提问后更新]

使用aws acm-pca issue-certificate命令申请证书:

CLIENT_ID="device-0001"
CLIENT_SERIAL=0001

# Create the CSR and Private Key
openssl req -new -newkey rsa:2048 -days 365 -keyout ${CLIENT_ID}.key -out ${CLIENT_ID}.csr

# Replace --certificate-authority-arn with your ARN returned when you create the certificate authority.

aws acm-pca issue-certificate \
--csr file://${CLIENT_ID}.csr \
--signing-algorithm "SHA256WITHRSA" \
--validity Value=375,Type="DAYS" \
--idempotency-token 12983 \
--certificate-authority-arn arn:aws:acm-pca:region:account:\
certificate-authority/12345678-1234-1234-1234-123456789012

此命令输出 ARN,为下一个命令保存此值 ($MY-CERT-ARN)

aws acm-pca get-certificate \
--certificate-authority-arn arn:aws:acm-pca:region:account:\
certificate-authority/12345678-1234-1234-1234-123456789012 \
--certificate-arn $MY-CERT-ARN \
 --output text > ${CLIENT_ID}-cert.pem

[更新结束]

生成客户端证书的示例代码。为您生成的每个证书更改 CLIENT_ID 和 CLIENT_SERIAL。 ca.pem 和 ca.key 是您的 CA 证书和私钥。

CLIENT_ID="device-0001"
CLIENT_SERIAL=0001

openssl genrsa -aes256 -passout pass:xxxx -out ${CLIENT_ID}.pass.key 4096
openssl rsa -passin pass:xxxx -in ${CLIENT_ID}.pass.key -out ${CLIENT_ID}.key
rm ${CLIENT_ID}.pass.key

# generate the CSR
openssl req -new -key ${CLIENT_ID}.key -out ${CLIENT_ID}.csr

# issue this certificate, signed by the CA (ca.pem ca.key)
openssl x509 -req -days 375 -in ${CLIENT_ID}.csr -CA ca.pem -CAkey ca.key -set_serial ${CLIENT_SERIAL} -out ${CLIENT_ID}.pem

# Give the client the file: ${CLIENT_ID}.full.pem
cat ${CLIENT_ID}.key ${CLIENT_ID}.pem ca.pem > ${CLIENT_ID}.full.pem