addon-nginx-proxy-manager
addon-nginx-proxy-manager copied to clipboard
Unable to upload custom certificate
Problem/Motivation
Unable to upload custom certificate
Expected behaviour
Certificate uploads without error
Actual behaviour
Recieve error:
Upload failed: Result Validation Error: Validation timed out. This could be due to the key being passphrase-protected.
Steps to reproduce
- Log on to Active Directory member computer (Windows).
- Launch
certlm.mscMMC snap-in.- Under Certificates (Local Computer), expand Personal.
- Right-click Certificates and choose All Tasks > Request New Certificate....
- In the Certificate Enrolment dialog, click Next.
- Select an enrolment policy and click Next.
- Tick the type of certificate to produce that has a purpose of "Server Authentication". (Based on cert templates)
- Complete the properties, including the common name and corresponding DNS value.
- On the Private key tab, under Key options ensure Make private key exportable is checked.
- Click OK then Enroll and finally Finish
- In the Personal > Certificates store, right-click the certificate just created.
- Click All Tasks > Export....
- In the Welcome to the Certificate Export Wizard, click Next.
- Select Yes, export the private key and click Next.
- Select Personal Information Exchange - PKCS #12 (.PFX).
- Tick **Include all certificates in the path if possible **.
- Tick Enable certificate privacy.
- Ensure other options are not ticked and click Next.
- Tick Password:, enter the same password twice and click Next.
- Provide a file path and name for the
.pfx, click Next, Finish and Ok.- Launch a command prompt and navigate to the location of the
.pfxfile stored on disk.- Run the following
OpenSSLcommands to extract the private key and certificate from the.pfx(entering password when prompted):openssl pkcs12 -in .\example.pfx -nocerts -out example.key -nodesopenssl pkcs12 -in .\example.pfx -nokeys -out example.crt(Note:-nodesremoves the passphrase requirement).- Browse to Nginx Proxy Manager.
- Log in and navigate to SSL Certificates.
- Click Add SSL Certificate and click Custom.
- Provide a name and navigate the the
.crtand.keyfile created earlier.- Click Save.
Proposed changes
N/A
Troubleshooting steps.
I want to secure the internal URL of HA.
- I have two HA instances, both running the latest version of HA and both run Nginx Proxy Manager.
- Both HA instances have a Lets Encrypt cert for the public-facing FQDN.
- The process described above worked perfectly for the first instance.
I have checked the logs for Nginx Proxy Manager, but there is no mention of the failed certificate upload and I cannot find any information on how to increase logging verbosity.
The cert/key does not have a passphrase and I have checked the cert/key match.
I've tried everything I can think of. The fact the process worked for one HA instance is really foxing me. If anyone has any suggestions, I'd be grateful if you could share them.
T.I.A