En Windows, por línea de comando:

Debe generar el archivo de configuración request.inf con las siguientes características:

Debe generar el archivo de configuración con las siguientes características:

Signature="$Windows NT$"

Subject="CN=www.acme.com,OU=WebServer,O=Acme inc,S=Montevideo,L=Montevideo,C=UY"

;EncipherOnly = FALSE
Exportable =TRUE ;FALSE =Claveno exportable
KeyLength = 2048 ; Posibles largos: 1024, 2048, 4096
KeySpec = 1 ; Intercambio de Claves – Requerido
KeyUsage = 0xA0 ; Digital Signature, Key Encipherment
MachineKeySet = True
ProviderName = "Microsoft RSA SChannel Cryptographic Provider"
RequestType = PKCS10 ; o CMC.

OID= ; Server Authentication;
OID= ; Client Authentication

[Extensions] = "{text}"
_continue_ = "dns=www.acme.com&"
_continue_ = "dns=www01.acme.com&"
_continue_ = "dns=www02.acme.com&"
_continue_ = "dns=www03.acme.com&"


Por linea de comando ejecute:

certreq -new request.inf request.req

El archivo request.req está listo para certificar por el correo que le entregará un archivo.cer

Para instalarlo ejecute:

certreq -accept -machine certificado.cer

En Windows, con entorno gráfico:

In the Certificates snap-in, right-click the Personal folder, point to All Tasks, point to Advanced Operations, and then click Create Custom Request.

  1. This will start the Certificate Enrollment wizard.

  2. Click Next.

  3. Click Proceed without enrollment policy, and then click Next.

  4. In the Template list, click either (No template) CNG key or (No template) Legacy key. (No template) CNG key will ensure that the private key will be generated by the new Cryptography Next Generation key storage provider (KSP) and may not be usable by all applications. To ensure interoperability, click (No template) Legacy key, which will use the CAPI2 cryptographic service provider (CSP).

  5. For Request format, click either PKCS #10 or CMC. PKCS #10 is generally accepted by all CAs. If you will not submit the custom request to a Microsoft standalone CA, check with your CA vendor to determine if the CMC format is supported.

  6. Click Next.

  7. Click the Details arrow, and then click Properties. You will need to configure all the certificate request options so that the issued certificate will be suitable for TLS/SSL.

  8. On the Subject tab:

    Because SSL/TLS does not require a Subject name when a SAN extension is included, the Subject name can be empty. If you are using another protocol, verify the certificate requirements. To use an empty Subject name, skip steps 8a and 8b.

    1. In the Subject name area under Type, click Common Name.

    2. In the Subject name area under Value, enter the fully qualified domain name of the server, and then click Add.

    3. In the Alternative name area under Type, click DNS.

    4. In the Alternative name area under Value, enter the fully qualified domain name of the server, and then click Add.

    5. Repeat steps c and d above for each SAN you want to specify.

  9. On the Extensions tab:

    1. Click the Key usage arrow. In the Available options list, click Digital signature, and then click Add. Click Key encipherment, and then click Add.

    2. Click the Extended Key Usage (application policies) arrow. In the Available options list, click Server Authentication and Client Authentication, and then click Add.

  10. On the Private Key tab:

    1. Click the Cryptographic Service Provider arrow, and verify the following:

      1. If you selected CNG key in step 4 above, the RSA, Microsoft Software Key Storage Provider is enabled.

      2. If you select Legacy key in step 4 above, the Microsoft RSA SChannel Cryptographic Provider is enabled.

    2. Click the Key options arrow. In the Key size list, select a key size. If desired, select the Make private key exportable check box. Do not select either the Allow private key to be archived or Strong private key protection check box.

    3. Click the Select Hash Algorithm arrow. In the Hash Algorithm list, select the desired hash algorithm.

      The specified hash algorithm is used in the request. You must specify a hash algorithm that is compatible with your client computer and CA.

    4. Click the Key permissions arrow. If the application or service runs as Network Service, grant the Network Service account Read permission. If the application or service that will use this certificate runs as Local System, no permissions changes are required.

  11. Click OK.

  12. Click Next.

  13. Enter a path and file name indicating where the request file will be saved.

  14. Select the Base 64 format.

  15. Click Finish.