Openvpn License Key Generator

To secure the OpenVPN connection, a secret key is needed. First, we will generate such a key. This website uses cookies and other tracking technology to analyse traffic, personalise ads and learn how we can improve the experience for our visitors and customers. We may also share information with trusted third-party providers. When the OpenVPN Access Server is installed without a license key it allows only 2 simultaneous VPN connections. There is no time limit or functionality limit on this mode. The only difference between a licensed Access Server and an unlicensed one is the amount of simultaneous OpenVPN tunnel connections the Access Server allows. Aid file recovery software register code for spore.

At the prompt, change the Common Name to your client's domain name using the format client2.example.com. Leave all of the remaining fields as the default values.

Openvpn License Keygen

Important: If you don't follow the format specified above for setting common names, the domain names aren't available when you import the certificate into ACM. As a result, the certificate isn't an available option for specifying the server certificate or client certificate when you create the AWS Client VPN endpoint.

Openvpn

Openvpn Access Server License Key Generator

Import the server and client certificates and keys into ACM

Generator

Note: The server and client certificates, and their respective keys, are available in C:Program FilesOpenVPNeasy-rsakeys.

1. Open the following files: server.crt, server.key, client1.crt, client1.key, and ca.crt.

2. Open the ACM console, and then choose Import a certificate.

3. On the Import a certificate page, copy/paste the content:
From the server.crt file to Certificate body.
From the server.key file to Certificate private key.
From the ca.crt file to Certificate chain.

4. Choose Import to import the server certificate.

Openvpn License Key Generator

5. Choose Import a certificate again and copy/paste the content:
From the client1.crt file to Certificate body.
From the client1.key file to Certificate private key.
From the ca.crt fileto Certificate chain.

6. Choose Import to import the client certificate.

Or, you can use the AWS Command Line Interface (AWS CLI) to import the server and client certificates and their keys into ACM:

openvpn-client-key-gen.sh
#!/bin/bash
#
# OpenVPN Client Key Generation Script
#
# Author: rtfpessoa
# Date: 03-09-2016
#
# Based on the guide:
# * https://www.digitalocean.com/community/tutorials/how-to-set-up-an-openvpn-server-on-ubuntu-16-04
#
# First argument: Client identifier
# Second argument: Generate key with password
client_key_name=$1
key_with_pass=$2
if [[ -z$client_key_name ]];then
echo'Missing client key name!'
exit 1
fi
VPN_DIR=~/openvpn-ca
KEY_DIR=${VPN_DIR}/keys
CLIENT_CFG_DIR=~/client-configs
OUTPUT_DIR=${CLIENT_CFG_DIR}/files
BASE_CONFIG=${CLIENT_CFG_DIR}/base.conf
mkdir -p $OUTPUT_DIR
chmod 700 ~/client-configs/files
# cp /usr/share/doc/openvpn/examples/sample-config-files/client.conf ~/client-configs/base.conf
cd${VPN_DIR}
source vars
if [[ -n$key_with_pass ]];then
./build-key-pass ${client_key_name}
else
./build-key ${client_key_name}
fi
cat ${BASE_CONFIG}
<(echo -e '<ca>')
${KEY_DIR}/ca.crt
<(echo -e '</ca>n<cert>')
${KEY_DIR}/${1}.crt
<(echo -e '</cert>n<key>')
${KEY_DIR}/${1}.key
<(echo -e '</key>n<tls-auth>')
${KEY_DIR}/ta.key
<(echo -e '</tls-auth>')
>${OUTPUT_DIR}/${1}.ovpn
openvpn-client-key-revoke.sh
License
#!/bin/bash
#
# OpenVPN Client Key Revocation Script
#
# Author: rtfpessoa
# Date: 03-09-2016
#
# Based on the guide:
# * https://www.digitalocean.com/community/tutorials/how-to-set-up-an-openvpn-server-on-ubuntu-16-04
#
# First argument: Client identifier
client_key_name=$1
if [[ -z$client_key_name ]];then
echo'Missing client key name!'
exit 1
fi
cd~/openvpn-ca
source vars
./revoke-full ${client_key_name}
sudo cp -f ~/openvpn-ca/keys/crl.pem /etc/openvpn
Sign up for freeto join this conversation on GitHub. Already have an account? Sign in to comment