Server certificates for web servers can be obtained via the PKI of the DFN (currently operated by HARICA). Certificates should be obtained through the ACME protocol. Certificate domains will be validated during the certificate issuing process.
In the most common case (Debian/Ubuntu server with Apache webserver) you can get a certificate with the following commands:
sudo apt install certbot python3-certbot-apache
sudo certbot run -m ADMIN-EMAIL@tu-dresden.de --server https://acme.pki.cert.tu-dresden.de/ -d example1.tud.de
More details about ACME clients and their usage can be found in ACME Clients.
ACME is a network protocol by which a server can obtain tls server certificates from a certificate authority (CA) in an automated way. During this process, the CA will verify that the requesting server controls the domain names that will be addedd to the certificate. This work roughly like this:
There are various scenarios in which it is not possible to use ACME as described before:
Servers are managed via configuration management, certificates are rolled out through config management
Servers/commercial appliances that do not support ACME or only support certain providers
Cluster setups where it cannot be guaranteed that the ACME challenge will be processed by the server where the ACME client is running
In such cases, the preferred option is to activate/authorize an ACME accounts for individual domains. This ACME account is to be used on a protected administrative computer to obtain server certificates. Instructions can be found in "ACME account activation".
In exceptional cases, it is also possible to submit a CSR for certificate creation via the Service Desk. However, ACME should be preferred in most cases because certificate issuance and renewal can be automated. There are plans to cut certificate validity in the internet to 30 days. If this is implemented, the effort required for manual certificate renewal is not sustainable.
The domains must be registered and validated with the certification authority (CA) HARICA
the CA mus check for "CAA" DNS records for the requested domains and higher level domains. If such records exist, they must contain "harica.gr". This is already configured for domains managed by ZIH
All domains in the certificate require a DNS entry pointing to an IP in the TU Dresden campus network (does not apply to ACME accounts with activation)
All domains in the certificate require a DNS entry pointing to the server on which the ACME client is running (does not apply to ACME accounts with activation)
The domains in the certificate must be accessible via HTTP/HTTPS from the server acme.pki.cert.tu-dresden.de (does not apply to ACME accounts with activation)
at most 100 domains (Subject Alternative Names, SANs) can be applied for per certificate