When you absoluetly must deal with IIS and SAN...
- Create a request config file for your server
[Version]
Signature="$Windows NT$"
[NewRequest]
Subject = "CN=me.com, OU=YourDepartment, O=YourCompany, L=YourCity, S=YourState, C=US"
KeySpec = 1
KeyLength = 2048
Exportable = TRUE
MachineKeySet = TRUE
SMIME = FALSE
PrivateKeyArchive = FALSE
UserProtected = FALSE
UseExistingKeySet = FALSE
ProviderName = "Microsoft RSA SChannel Cryptographic Provider"
ProviderType = 12
RequestType = PKCS10
KeyUsage = 0xa0
[Extensions]
2.5.29.17 = "{text}"
_continue_ = "dns=me.com"
[RequestAttributes]
CertificateTemplate = WebServer
- Create that file in a directory on the server and run the following command with an elevated CMD prompt against it:
certreq -new request.inf request.csr
- When you get the CSR returned with CER, run the following command to add it:
certreq -accept your_cert.cer