Proof-of-concept implementation of in-Browser CSR generation for client certificates
You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
Jan Dittberner 3503e09212 Update README.md for the Go backend 4 years ago
src Add PKCS#12 creation 4 years ago
.gitignore Add signer backend 4 years ago
COPYING Add GPL-2 license text 4 years ago
README.md Update README.md for the Go backend 4 years ago
ca.cnf Add signer backend 4 years ago
go.mod Add signer backend 4 years ago
gulpfile.js Add initial implementation 4 years ago
main.go Add signer backend 4 years ago
package-lock.json Update package-lock.json, use UTF8 for common name 4 years ago
package.json Add initial implementation 4 years ago
setup_example_ca.sh Add signer backend 4 years ago

README.md

Browser PKCS#10 CSR generation PoC

This repository contains a small proof of concept implementation of browser based PKCS#10 certificate signing request and PKCS#12 key store generation using node-forge.

The backend is implemented in Go and utilizes openssl for the signing operations.

Running

  1. Clone the repository

    git clone https://git.dittberner.info/jan/browser_csr_generation.git
    
  2. Get dependencies and build assets

    cd browser_csr_generation
    npm install --global gulp-cli
    npm install
    gulp
    
  3. Setup the example CA and a server certificate and key

    ./setup_example_ca.sh
    openssl req -new -x509 -days 365 -subj "/CN=localhost" -addext subjectAltName=DNS:localhost -newkey rsa:3072 \
      -nodes -out server.crt.pem -keyout server.key.pem
    
  4. Run the Go based backend

    go run main.go
    

    Open https://localhost:8000/ in your browser.

  5. Run gulp watch

    You can run a gulp watch in a second terminal window to automatically publish changes to the files in the src directory:

    gulp watch