A simple Windows ACMEv2 client (WACS) Software version 2.2.2.1449 (release, trimmed, standalone, 64-bit) Connecting to https://acme-v02.api.letsencrypt.org/... Connection OK! Scheduled task looks healthy Please report issues at https://github.com/win-acme/win-acme
N: Create certificate (default settings) M: Create certificate (full options) R: Run renewals (0 currently due) A: Manage renewals (1 total) O: More options... Q: Quit
Please choose from the menu: m
选择m,完全自行设定。
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Running in mode: Interactive, Advanced Source plugin IIS not available: No supported version of IIS detected.
Please specify how the list of domain names that will be included in the certificate should be determined. If you choose for one of the "all bindings" options, the list will automatically be updated for future renewals to reflect the bindings at that time.
1: Read bindings from IIS 2: Manual input 3: CSR created by another program C: Abort
How shall we determine the domain(s) to include in the certificate?: 2
选择2,手工输入。
1 2 3 4
Description: A host name to get a certificate for. This may be a comma-separated list.
Host: 【域名】
输入域名
1 2 3
Source generated using plugin Manual: 【域名】
Friendly name '[Manual] 【域名】'. <Enter> to accept or type desired name: <Enter>
确认域名,如果无误,直接回车即可。
1 2 3 4 5 6 7 8 9 10 11 12 13
By default your source identifiers are covered by a single certificate. But if you want to avoid the 100 domain limit, want to prevent information disclosure via the SAN list, and/or reduce the operational impact of a single validation failure, you may choose to convert one source into multiple certificates, using different strategies.
1: Separate certificate for each domain (e.g. *.example.com) 2: Separate certificate for each host (e.g. sub.example.com) 3: Separate certificate for each IIS site 4: Single certificate C: Abort
Would you like to split this source into multiple certificates?: 4
The ACME server will need to verify that you are the owner of the domain names that you are requesting the certificate for. This happens both during initial setup *and* for every future renewal. There are two main methods of doing so: answering specific http requests (http-01) or create specific dns records (dns-01). For wildcard identifiers the latter is the only option. Various additional plugins are available from https://github.com/win-acme/win-acme/.
1: [http] Save verification files on (network) path 2: [http] Serve verification files from memory 3: [http] Upload verification files via FTP(S) 4: [http] Upload verification files via SSH-FTP 5: [http] Upload verification files via WebDav 6: [dns] Create verification records manually (auto-renew not possible) 7: [dns] Create verification records with acme-dns (https://github.com/joohoi/acme-dns) 8: [dns] Create verification records with your own script 9: [tls-alpn] Answer TLS verification request from win-acme C: Abort
How would you like prove ownership for the domain(s)?: 1
选择1,通过本地文件的方式验证。
1 2 3 4
Description: Root path of the site that will serve the HTTP validation requests.
Description: Copy default web.config to the .well-known directory. Default: False Argument: False (press <Enter> to use this)
Copy default web.config before validation? (y/n*) - no
在验证之前,不保存默认的配置。
1 2 3 4 5 6 7 8 9 10
After ownership of the domain(s) has been proven, we will create a Certificate Signing Request (CSR) to obtain the actual certificate. The CSR determines properties of the certificate like which (type of) key to use. If you are not sure what to pick here, RSA is the safe default.
1: Elliptic Curve key 2: RSA key C: Abort
What kind of private key should be used for the certificate?: 1
私钥类型,选择第一种。
1 2 3 4 5 6 7 8 9 10 11
When we have the certificate, you can store in one or more ways to make it accessible to your applications. The Windows Certificate Store is the default location for IIS (unless you are managing a cluster of them).
1: IIS Central Certificate Store (.pfx per host) 2: PEM encoded files (Apache, nginx, etc.) 3: PFX archive 4: Windows Certificate Store (Local Computer) 5: No (additional) store steps
How would you like to store the certificate?: 2
证书类型,因为我们是为nginx申请证书,所以选择第二种。
1 2 3
Description: .pem files are exported to this folder.
File path: C:\APP\ssl
证书保存地址
1 2 3 4 5 6 7
Description: Password to set for the private key .pem file.
1: None 2: Type/paste in console 3: Search in vault