Created
August 26, 2016 03:32
-
-
Save jimmyca15/64e66db322a67a52d2216acc41f69808 to your computer and use it in GitHub Desktop.
Create a self signed certificate on Windows (Compatible with Server 2008 R2 - Nano Server)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function Create-SelfSignedCertificate | |
{ | |
[cmdletbinding()] | |
Param( | |
[string]$Subject | |
) | |
$subjectDn = new-object -com "X509Enrollment.CX500DistinguishedName" | |
$subjectDn.Encode( "CN=" + $subject, $subjectDn.X500NameFlags.X500NameFlags.XCN_CERT_NAME_STR_NONE) | |
$issuer = $Subject | |
$issuerDn = new-object -com "X509Enrollment.CX500DistinguishedName" | |
$issuerDn.Encode("CN=" + $issuer, $subjectDn.X500NameFlags.X500NameFlags.XCN_CERT_NAME_STR_NONE) | |
# | |
# Create a new Private Key | |
$key = new-object -com "X509Enrollment.CX509PrivateKey" | |
$key.ProviderName = "Microsoft Enhanced RSA and AES Cryptographic Provider" | |
# XCN_AT_SIGNATURE, The key can be used for signing | |
$key.KeySpec = 2 | |
$key.Length = 2048 | |
# MachineContext 0: Current User, 1: Local Machine | |
$key.MachineContext = 1 | |
$key.Create() | |
# | |
# Extended key usage | |
$clientAuthOid = New-Object -ComObject "X509Enrollment.CObjectId" | |
$clientAuthOid.InitializeFromValue("1.3.6.1.5.5.7.3.2") | |
$serverAuthOid = new-object -com "X509Enrollment.CObjectId" | |
$serverAuthOid.InitializeFromValue("1.3.6.1.5.5.7.3.1") | |
$ekuOids = new-object -com "X509Enrollment.CObjectIds.1" | |
$ekuOids.add($clientAuthOid) | |
$ekuOids.add($serverAuthOid) | |
$ekuExt = new-object -com "X509Enrollment.CX509ExtensionEnhancedKeyUsage" | |
$ekuExt.InitializeEncode($ekuOids) | |
# | |
# Key usage | |
$keyUsage = New-Object -com "X509Enrollment.cx509extensionkeyusage" | |
# XCN_CERT_KEY_ENCIPHERMENT_KEY_USAGE | |
$flags = 0x20 | |
# XCN_CERT_DIGITAL_SIGNATURE_KEY_USAGE | |
$flags = $flags -bor 0x80 | |
$keyUsage.InitializeEncode($flags) | |
# | |
# Subject alternative names | |
$alternativeNames = new-object -com "X509Enrollment.CX509ExtensionAlternativeNames" | |
$names = new-object -com "X509Enrollment.CAlternativeNames" | |
$name = new-object -com "X509Enrollment.CAlternativeName" | |
# Dns Alternative Name | |
$name.InitializeFromString(3, "$(hostname)") | |
$names.Add($name) | |
$alternativeNames.InitializeEncode($names) | |
$cert = new-object -com "X509Enrollment.CX509CertificateRequestCertificate" | |
$cert.InitializeFromPrivateKey(2, $key, "") | |
$cert.Subject = $subjectDn | |
$cert.Issuer = $issuerDn | |
$cert.NotBefore = (get-date).AddMinutes(-10) | |
$cert.NotAfter = $cert.NotBefore.AddYears(1) | |
$hashAlgorithm = New-Object -ComObject X509Enrollment.CObjectId | |
$hashAlgorithm.InitializeFromAlgorithmName(1,0,0,"SHA256") | |
$cert.HashAlgorithm = $hashAlgorithm | |
$cert.X509Extensions.Add($ekuext) | |
$cert.X509Extensions.Add($keyUsage) | |
$cert.X509Extensions.Add($alternativeNames) | |
$cert.Encode() | |
$locator = $(New-Object "System.Guid").ToString() | |
$enrollment = new-object -com "X509Enrollment.CX509Enrollment" | |
$enrollment.CertificateFriendlyName = $locator | |
$enrollment.InitializeFromRequest($cert) | |
$certdata = $enrollment.CreateRequest(0) | |
$enrollment.InstallResponse(2, $certdata, 0, "") | |
# Wait for certificate to be populated | |
$end = $(Get-Date).AddSeconds(1) | |
do { | |
$newCert = (Get-ChildItem Cert:\LocalMachine\My | Where-Object {$_.FriendlyName -eq $locator }) | |
} while ($newCert -eq $null -and $(Get-Date) -lt $end) | |
$newCert.FriendlyName = "" | |
return $newCert | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment