diff --git a/_security-plugin/configuration/generate-certificates.md b/_security-plugin/configuration/generate-certificates.md index 69945d7e..da73f7ec 100755 --- a/_security-plugin/configuration/generate-certificates.md +++ b/_security-plugin/configuration/generate-certificates.md @@ -42,10 +42,10 @@ You can optionally add the `-aes256` option to encrypt the key using the AES-256 Next, use the key to generate a self-signed certificate for the root CA: ```bash -openssl req -new -x509 -sha256 -key root-ca-key.pem -out root-ca.pem -days 30 +openssl req -new -x509 -sha256 -key root-ca-key.pem -out root-ca.pem -days 730 ``` -Change `-days 30` to 3650 (10 years) or some other number to set a non-default expiration date. The default value of 30 days is best for testing purposes. +The default `-days` value of 30 is only useful for testing purposes. This sample command specifies 730 (two years) for the certificate expiration date, but use whatever value makes sense for your organization. - The `-x509` option specifies that you want a self-signed certificate rather than a certificate request. - The `-sha256` option sets the hash algorithm to SHA-256. SHA-256 is the default in later versions of OpenSSL, but earlier versions might use SHA-1. @@ -78,7 +78,7 @@ Follow the prompts to fill in the details. You don't need to specify a challenge Finally, generate the certificate itself: ```bash -openssl x509 -req -in admin.csr -CA root-ca.pem -CAkey root-ca-key.pem -CAcreateserial -sha256 -out admin.pem -days 30 +openssl x509 -req -in admin.csr -CA root-ca.pem -CAkey root-ca-key.pem -CAcreateserial -sha256 -out admin.pem -days 730 ``` Just like the root certificate, use the `-days` option to specify an expiration date of longer than 30 days.