Collect! Credit and Collection Software™

  Detailed Field Information Page Table of Contents Related 'How To' Tutorials

SSL Keys And Certs

Web Host gives you a convenient way to make your database accessible remotely using the Internet. However, information sent over the Internet must be encrypted to provide security. A Secure Socket Layer, or SSL, creates a secure communications channel between your Server and your client's browser and encrypts data that is transmitted.

Each Server that wants to use SSL needs to present a valid X.509 certificate to the client's browser. It also needs a private key to decrypt the incoming data. By default, these security files are created automatically for you when you open the Web Host. It is only necessary to start Web Host with the /W1s argument to enable SSL functionality.

Accessing SSL Keys And Certs

For your convenience, the SSL Keys And Certs form allows you to enter all the information needed if you want to update the security files for using Web Host in secure mode.

DO NOT use this feature to update certificates from a Certificate Authority!


SSL Keys and Certs

The information entered in this form is used in the creation of RSA Private Keys, Certificates and Certificate Requests. Your personal information is displayed in the certificate that is created.


SSL Certificate

In the Details section of the certificate, the subject information displays details that you entered in the fields on the SSL Keys And Certs form.


SSL Certificate Subject Information

There is only one way to reach the SSL Keys and Certs screen.

  1. Open Collect! as you would normally and stop at the Main Menu.
  2. Select System from the top menu bar and then select Network and Environment from the drop-down choices. This will display a sub-menu of additional choices.
  3. Select Security Certificates to open the SSL Keys And Certs form and enter the information needed to generate your certificate.

After you have entered your information:

Select the button labeled Generate Stunnel PEM File to create the stunnel.pem file in the location displayed to the left of the button. By default, this file contains the RSA Private Key, Certificate and DH parameters.

Useful Note If you select ADVANCED from the Generator Output Format pick list, other options are available and additional buttons become visible.

Top of page.

Host To Make Cert For

Enter the Host Name to be used during the generation of certificate requests.

Top of page.

State Or Province

Enter the state or province in which you reside.

Top of page.

Organization

Enter your company name here.

Top of page.

Email

Enter a valid email address to be used as a reference to contact you relating to your certificate.

Top of page.

Country

Enter the two character code of the country you are in.

Top of page.

City

Enter the name of your city here.

Top of page.

Company Division

Enter the name of the section or division of your company that the certificate is being created for.

Top of page.

Version X509

When submitting a certificate request to certain certificate authorities they may require a specific X.509 version. From the pick list, select the version to be used when generating a Certificate Request.

Version 1: Set Collect! to use Version 1 of the X.509 standard.

Version 3: Set Collect! to use Version 3 of the X.509 standard.

Top of page.

Key Size

Select a size to specify the security strength of your Private Key. This value is in bits. Two choices are given. (A key size smaller than 1024 is a potential security risk, and larger than 2048 doesn't actually increase the security strength but just adds overhead.)

Top of page.

Generator Output Format

Select one of the options from the pick list.

Basic:

Not needed.

This will produce an older style Stunnel PEM file which contains an RSA Private Key and Certificate.

Basic with DH:

Not needed.

This will produce an Stunnel PEM file which contains an RSA Private Key, Certificate, and DH Parameters. The DH Parameters are required when using the most recent version of Stunnel. For best security, please use the most recent Stunnel to patch any known vulnerabilities.

Advanced Settings:

Not needed.

Select this to view additional choices which allow you to generate each specific option individually and specify a unique file for each option, if necessary.

Top of page.

Stunnel PEM File

Not needed.

This is the path where Collect! will produce the stunnel.pem file to be used directly with Stunnel.

Top of page.

Generate Stunnel PEM File

Not needed.

Select this to generate the Stunnel PEM file in the location displayed in the Stunnel PEM file field. This file contains the RSA Private Key, Certificate and DH parameters.

Top of page.

Advanced Settings

Not needed.

The Advanced Settings are visible only when you select "Advanced Settings" from the 'General output format' pick list. These may be used to create RSA Private Keys, Certificates, Certificate Requests and DH Parameters. If you already have your own Private Key, for instance, you may want to generate a Certificate Request to submit to a Certificate Authority.


Advanced Settings

Top of page.

Rsa Private Key

Enter the location where your RSA Private Key will be created.

Top of page.

Certificate Request

Enter the location where your Certificate Request will be created.

Top of page.

Web Host Certificate

Enter the location where your Web Host Certificate will be created.

Top of page.

Dh Parameter File

Not needed.

Enter the location where the file that stores your DH Parameters will be created.

Top of page.

Generate Rsa Private Key

Select the Generate RSA Private Key button to create an RSA Private Key using the key size specified in the Key Size field.

This will produce a webhost.rsa file. This key will be stored in the location entered in the RSA Private Key field. This will overwrite any RSA Private Key (webhost.rsa) file in this location.

Top of page.

Generate Certificate Request

Select the Generate Certificate Request button to create an X.509 Certificate Request using the RSA Private Key located in the RSA Private Key field.

This will produce a webhost.req file. This file will be created in the location entered in the Certificate Request field. This will overwrite any Certificate Request (webhost.req) file in this location.

Top of page.

Sign Certificate Request

Select the Sign Certificate Request button to self sign the Certificate Request located in the Certificate Request field using the RSA Private Key located in the RSA Private Key field.

This will produce a webhost.crt file. This signed Certificate will be created in the location entered in the Web Host Certificate field. This will overwrite any Web Host Certificate (webhost.crt) file in this location.

Top of page.

Generate Dh Parameters

Not needed.

Select the Generate DH Parameters button to generate Diffie-Hell man parameters.

This will produce a webhost.dh file in the location displayed in the 'DH parameter file' field.

Top of page.

Viewing The Key And Certificate Files

When you use the SSL Keys And Certs function, files are produced in the folders that you specified in the SSL Keys and Certs screen.

The available options are:

  • webhost.req - the certificate request
  • webhost.rsa - the private key
  • webhost.crt - the signed certificate

The certificate (webhost.crt), may be viewed by selecting it.

You may view the contents of the request (webhost.req), and the key (webhost.rsa) files in a simple text editor.

Top of page.

Generating Or Installing A Security Certificate

Please refer to the help topic How To Setup Security Certificates for more information.

Top of page.

Summary

The SSL Keys And Certs form enables you to update the security files used by Web Host when you enable secure mode by using the /W1s argument in the Web Host icon.

The information entered in this form is used in the creation of RSA Private Keys, Certificates and Certificate Requests.

Warning Note WARNING: Collect! is not responsible for the security of your data over the Internet. Tools provided are for your convenience. A qualified technician is required to ensure that they are used to your best advantage.

It is highly recommended that you acquire a valid security certificate from a recognized Certificate Authority rather than relying on creating your own, self-signed certificates through SSL Keys and Certs.

Top of page.

Was this page helpful? Do you have any comments on this document? Can we make it better? If so how may we improve this page.

Please click this link to send us your comments: helpinfo@collect.org