Difference between revisions of "Automatic HTTP Certificates with Let's Encrypt"

From Tech-Wiki
Jump to: navigation, search
 
(5 intermediate revisions by the same user not shown)
Line 3: Line 3:
  
  
In order to use this, you'll need CloudFlare DNS (which is Free). If you rather using HTML validation instead of DNS, you can use [https://github.com/GLubomirov/Lets-Encrypt_Automate_PowerShell this].
+
In order to use this, you'll need CloudFlare DNS (which is free). If you rather using HTML validation instead of DNS, you can use [https://github.com/GLubomirov/Lets-Encrypt_Automate_PowerShell this].
  
<nowiki>
+
Then you need to run this monthly via Task Scheduler with elevated privileges.
$Domain = "fab.domain.com"
+
 
 +
<nowiki>
 +
$Domain = "www.domain.com"
 
$Email = "helpdesk@domain.com"
 
$Email = "helpdesk@domain.com"
 
$Token = "xxxxxxxxxxxxxxxx"
 
$Token = "xxxxxxxxxxxxxxxx"
 
$pfxfile = "c:\installs\$Domain.pfx"
 
$pfxfile = "c:\installs\$Domain.pfx"
 
$password = ConvertTo-SecureString -String "abc123" -Force -AsPlainText
 
$password = ConvertTo-SecureString -String "abc123" -Force -AsPlainText
 +
 +
# For SANs use:
 +
# $Domains = @("example.com", "www.example.com", "sub.example.com")
 +
# Set-PAOrder -MainDomain $Domains[0] -AltNames $Domains[1..($Domains.Count - 1)]
 +
# $cert = New-PACertificate -Domain $Domains -DnsPlugin Cloudflare -PluginArgs $pArgs
  
 
try{
 
try{
Line 30: Line 37:
 
     return "Installed, run this again"
 
     return "Installed, run this again"
 
}
 
}
 
  
 
$pArgs = @{
 
$pArgs = @{
Line 49: Line 55:
 
       $_.AddSslCertificate($cert.thumbprint, 'My')
 
       $_.AddSslCertificate($cert.thumbprint, 'My')
 
     }
 
     }
 
 
}
 
}
 
</nowiki>
 
</nowiki>

Latest revision as of 19:24, 17 February 2025

Back to Windows Server


In order to use this, you'll need CloudFlare DNS (which is free). If you rather using HTML validation instead of DNS, you can use this.

Then you need to run this monthly via Task Scheduler with elevated privileges.

$Domain = "www.domain.com"
$Email = "helpdesk@domain.com"
$Token = "xxxxxxxxxxxxxxxx"
$pfxfile = "c:\installs\$Domain.pfx"
$password = ConvertTo-SecureString -String "abc123" -Force -AsPlainText

# For SANs use: 
# $Domains = @("example.com", "www.example.com", "sub.example.com")
# Set-PAOrder -MainDomain $Domains[0] -AltNames $Domains[1..($Domains.Count - 1)]
# $cert = New-PACertificate -Domain $Domains -DnsPlugin Cloudflare -PluginArgs $pArgs

try{
    Import-Module -Name Posh-ACME
    Import-Module -Name Posh-ACME.Deploy
    #Identify as existing user
    Set-PAAccount -Contact $Email
    Set-PAOrder $Domain
} catch{
    # New installation - Run once
    Install-PackageProvider -Name NuGet -Force
    Install-Module -Name Posh-ACME  -Force
    Install-Module -Name Posh-ACME.Deploy -Force
    Set-PAServer LE_PROD # (or LE_STAGE)
    # Identify and register
    New-PAAccount -AcceptTOS -Contact $Email
    # Request a new certificate
    New-PAOrder $Domain
    return "Installed, run this again"
}

$pArgs = @{
    CFToken = (ConvertTo-SecureString -String $Token -AsPlainText -Force)
}
$cert = New-PACertificate $Domain -DnsPlugin Cloudflare -PluginArgs $pArgs 

# renew an existing certificate and bind it into IIS
if ($cert = Submit-Renewal) {
	#Import Certificate into Windows
	Import-PfxCertificate -Password $cert.PfxPass -FilePath $cert.PfxFile -CertStoreLocation Cert:\LocalMachine\My -Exportable

    # Export certificate as PFX
    Export-PfxCertificate -Cert ("Cert:\LocalMachine\My\" + $cert.Thumbprint) -FilePath $pfxfile -Password $password

	# Bind new cert into IIS
    Get-WebBinding | Where-Object { $_.protocol -eq "https"} | ForEach-Object {
       $_.AddSslCertificate($cert.thumbprint, 'My')
    }
}