@@ -62,53 +62,53 @@ Supports SSL, but doesnt use it by default (not necessary as sensitive Data is p
6262 * ` RemoteDesktopAuthentication `
6363 * ` PrivateKeyArchival `
6464
65- ### Sample: Creating a Certificate Hierarchy in a 3-Liner
65+ ### Sample: Creating a PKI Hierarchy in a 3-Liner
6666
6767``` powershell
68- $a = New-CertificateRequest -CA -CommonName " Root CA" -SelfSign
69- $b = New-CertificateRequest -CA -CommonName " Sub CA" -SigningCert $a -PathLength 0
70- $c = New-CertificateRequest -Eku "ServerAuth " -CommonName " www.demo.org" -DnsName "www.demo.org" -SigningCert $b
68+ $a = New-CertificateRequest -CA -Subject "CN= Root CA" -SelfSign
69+ $b = New-CertificateRequest -CA -Subject "CN= Sub CA" -SigningCert $a -PathLength 0
70+ $c = New-CertificateRequest -Eku "ServerAuthentication " -Subject "CN= www.demo.org" -Dns "www.demo.org" -SigningCert $b
7171$a,$b,$c
7272```
7373
7474### Sample: Demonstrating a Path length Constraint violation
7575
7676``` powershell
77- $a = New-CertificateRequest -CA -CommonName " Root CA" -SelfSign
78- $b = New-CertificateRequest -CA -CommonName " Sub CA" -SigningCert $a -PathLength 0
79- $c = New-CertificateRequest -CA -CommonName " Invalid Path Length CA" -SigningCert $b
80- $d = New-CertificateRequest -Eku "ServerAuth " -CommonName " Invalid Path Length Certificate" -DnsName "www.demo.org" -SigningCert $c
77+ $a = New-CertificateRequest -CA -Subject "CN= Root CA" -SelfSign
78+ $b = New-CertificateRequest -CA -Subject "CN= Sub CA" -SigningCert $a -PathLength 0
79+ $c = New-CertificateRequest -CA -Subject "CN= Invalid Path Length CA" -SigningCert $b
80+ $d = New-CertificateRequest -Eku "ServerAuthentication " -Subject "CN= Invalid Path Length Certificate" -Dns "www.demo.org" -SigningCert $c
8181$a,$b,$c,$d
8282```
8383
8484### Sample: Demonstrating an EKU Constraint violation
8585
8686``` powershell
87- $a = New-CertificateRequest -CA -CommonName " Root CA" -SelfSign
88- $b = New-CertificateRequest -CA -Eku "ClientAuth " -CommonName " Sub CA 1" -SigningCert $a
89- $c = New-CertificateRequest -Eku "ServerAuth " -CommonName " Invalid EKU Certificate" -DnsName "www.demo.org" -SigningCert $b
87+ $a = New-CertificateRequest -CA -Subject "CN= Root CA" -SelfSign
88+ $b = New-CertificateRequest -CA -Eku "ClientAuthentication " -Subject "CN= Sub CA 1" -SigningCert $a
89+ $c = New-CertificateRequest -Eku "ServerAuthentication " -Subject "CN= Invalid EKU Certificate" -Dns "www.demo.org" -SigningCert $b
9090$a,$b,$c
9191```
9292
93- ### Sample: Creating a Certificate Signing Request (CSR) for a Web Server Certificate containing multiple SANs of Type DNSName
93+ ### Sample: Creating a Certificate Signing Request (CSR) for a Web Server Certificate containing multiple SANs of Type DnsName and IPAdress
9494
9595``` powershell
9696New-CertificateRequest ´
97- -Eku ServerAuth ´
98- -DnsName "web1.fabrikam.com","web2.fabrikam.com","web3.fabrikam.com" ´
99- -IP "192.168.0.1" ´
100- -KeyLength 4096 ´ |
101- Out-File CertificateRequestFile.csr -Encoding ascii
97+ -Eku ServerAuth ´
98+ -Dns "web1.fabrikam.com","web2.fabrikam.com","web3.fabrikam.com" ´
99+ -IP "192.168.0.1" ´
100+ -KeyLength 4096 ´ |
101+ Out-File CertificateRequestFile.csr -Encoding ascii
102102```
103103
104- ### Sample: Creating a manual OCSP Request specifying AKI and a HSM
104+ ### Sample: Creating a manual OCSP Request specifying AKI and a Hardware Security Module ( HSM) Key Storage Provider (KSP)
105105
106106``` powershell
107107New-CertificateRequest ´
108- -CommonName " My-Responder" ´
109- -Ksp "nCipher Security World Key Storage Provider" ´
110- -Eku "OCSPSigning" ´
111- -Aki "060DDD83737C311EDA5E5B677D8C4D663ED5C5BF" ´
112- -KeyLength 4096 |
113- Out-File CertificateRequestFile.csr -Encoding ascii
108+ -Subject "CN= My-Responder" ´
109+ -Ksp "nCipher Security World Key Storage Provider" ´
110+ -Eku "OCSPSigning" ´
111+ -Aki "060DDD83737C311EDA5E5B677D8C4D663ED5C5BF" ´
112+ -KeyLength 4096 |
113+ Out-File CertificateRequestFile.csr -Encoding ascii
114114```
0 commit comments