Skip to main content

Import a CA certificate into MacOS

Import a CA certificate into the MacOS KeyChain Access application

Create the CA key and certificate

  • Open a terminal window.

  • Make sure you have the required command line tools installed by running python3. If you are asked to install the Command Line Developer Tools, please select Install.

    selectInstall.png
  • Next, install pip in order to install the certificates manager scripts dependencies.

    python3 -m ensurepip
  • Now, install the cryptography pip module to satisfy all the dependencies of the certificates manager scripts.

    pip3 install cryptography
  • Once the installation completes, cd into the tools directory of your FairCom bundle.

    cd <faircom>/tools/certman
  • Now, create the CA key files by running the following command:

    python3 createcacert.py

    Make sure you enter all the requested parameters; otherwise, the script will not succeed. A successful run will show the following output:

    successfulRun.png

Create a server certificate which is signed by the CA certificate being imported.

  • Make sure you are still in the <faircom>/tools/certman directory with your terminal, then run:

    python3 createservercert.py

    Make sure you enter the requested details for your server certificate before proceeding to the generation. Please also remember that if you add a passphrase to the certificate, you’ll need to enter the passphrase when you start up the server.

  • Configure the FairCom server to use the server certificate by editing the file <faircom>/config/services.json and add the full path to the certificate you’ve generated in the serverCertificateName property of the tls section under your https configured port. (8443 by default). Please refer to the code snippet below:

    "listeners": [
      …
      {
        "serviceName": "https8443",
        "description": "Port 8443 using TLS-secured HTTPS protocol for REST and Web Apps on all TCP/IP addresses bound to this server",
        "port": 8443,
        "protocol": "https",
        "enabled": true,
        "tls": {
          "serverCertificateFilename": "/Users/fctech/FairCom-Edge.osx.v13.00.arm64.v4.2.2.94/Contents/Home/tools/certman/Expires_On_2026-02-12/FAIRCOMSServer.pem"
        }
      },

    Please note the path to serverCertificateFilename.

  • These optional steps do not need to be done prior to importing this certificate, but they will need to be done prior to testing the server certificate.

  • At this point, if you use your favorite browser to visit the FairCom Server homepage using the FQDN or the IP Address you used during the certificate creation process above, you will still get a security warning because the certification authority is not yet registered.

    security_warning.png

    In the next section of this tutorial, we will show how to register the certification authority we've created above.

Use FairCom's certificate import utility

  1. Open a terminal window.

  2. In that window, navigate to FairCom's Certificate Management program at

    <faircom>/tools/certman
  3. Execute sudo python importcert.py

  4. If you created a CA keypair using these tools, the program will detect those and ask you if you want to import that keypair.  When you see a prompt like this Would you like to import the certificate at Certs\Expires_On_2034-08-12\ca.crt? Type in "yes" or "no".

  5. If you respond "yes", you will be prompted to "Press ENTER to proceed".

  6. If you respond "no", you will be prompted for the filename to import.

  7. After having chosen the certificate to import you will be prompted with the interactive password enter to unlock the MacOS keychain and complete the import of the CA

  8. If you now visit the FairCom Server https homepage using the FQDN or IP Address you’ve entered during the creation of the server certificate (See the Create a server certificate which is signed by the CA certificate being imported section above) you’ll see that the certificate in use is now trusted.

Execute the following command:

sudo security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain certificate_filename

Note

We strongly suggest that you use this command from your MacOS terminal application. If you try to use this command via the remote login (SSH), you will not be able to import the certificate because the keychain can't be unlocked using the interactive prompt.

After the file has been imported, it can be verified using the KeyChain Access application of your MacOS system:

  1. Open KeyChain Access.

  2. Select "system" from the left menu.

  3. Now, on the right side of the KeyChain Access window, you should be able to see the FairCom private CA.

    KeychainAccess.png
  4. Double-click the FairCom Private Certificate Authority to see the certificate details with its trust level.

    FairCom_PCA.png

OpenSSL:

user@sonoma:~$ openssl verify -CAfile /etc/ssl/certs/ca-certificates.crt ca.crtca.crt: OK

Test the connection using Python

Python version 3.7 and later can access the OS trust store. This support may be library-dependent. To test with the "requests" library,

  1. First, install the pip-system-certs package:

    pip install pip-system-certs
  2. Then test using these two lines of code (change 127.0.0.1 to the address of your server):

    import request
    sprint( requests.Session().post( "https://127.0.0.1:8443/api", data = '{"api": "admin","action": "pingSession"}' ).json() )
  3. A successful run will show this output:

    {'errorCode': 0, 'errorMessage': ''}

import a CA certificate into MacOS

MacOSCA certificatehow to importimport certificates
Would you like to provide feedback?