LDAP Account Manager (LAM)
easy-rsa
Our great sponsors
LDAP Account Manager (LAM) | easy-rsa | |
---|---|---|
0 | 26 | |
403 | 3,854 | |
2.2% | 1.1% | |
9.6 | 9.4 | |
7 days ago | 1 day ago | |
PHP | Shell | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
LDAP Account Manager (LAM)
We haven't tracked posts mentioning LDAP Account Manager (LAM) yet.
Tracking mentions began in Dec 2020.
easy-rsa
-
Running one’s own root Certificate Authority in 2023
Easy-rsa to the rescue. Been using it for a while, works great and makes life easier :)
Link: https://github.com/OpenVPN/easy-rsa
Summary from that page:
easy-rsa is a CLI utility to build and manage a PKI CA. In laymen's terms, this means to create a root certificate authority, and request and sign certificates, including intermediate CAs and certificate revocation lists (CRL).
-
Invalid Security Certificate Warnings are ANNOYING
Regarding the keys, csr and certificates it's pretty easy to manage them with easy-rsa (https://github.com/OpenVPN/easy-rsa)
-
How to manage lots of self-signed certificates
Depending on your use case, either https://github.com/FiloSottile/mkcert or https://github.com/OpenVPN/easy-rsa
-
Totally local web server on HTTPS.
If you can add CAs to the hosts that will access this server, you can be your own certificate authority. mkcert is good, as mentioned elsewhere, or you can go all out: https://github.com/OpenVPN/easy-rsa
- Private CA management
-
Where can I find a ca.crt file for openvpn?
for that. you need learn this
See https://github.com/OpenVPN/easy-rsa/blob/master/README.quickstart.md for the recommended (and easy-to-use) easy-rsa toolkit.
-
CFSSL vs Step CA for private PKI
I need a pki for a hobby/side project which involves Golang and I would also like to utilize ed25519, nothing less. I have experience with setting up a two tier pki AD CS in a Windows domain. I have not only read into cfssl and step ca, but also EasyRSA and EJBCA. EasyRSA seems overkill and does not involve Golang, but I can be convinced otherwise. EJBCA failed for me, because it needed systemd, which means an extra server/vm just for running it.
-
Vaultwarden - Bitwarden App Failed to fetch Error - Guess self signed Cert??
For easy setup, I would recommend you to user Easy-RSA. https://github.com/OpenVPN/easy-rsa
-
Which light weight CA do you like best?
easy-rsa, https://github.com/OpenVPN/easy-rsa no ui though
What are some alternatives?
OpenSSL - TLS/SSL and crypto library
FreeIPA - Mirror of FreeIPA, an integrated security information management solution
cfssl - CFSSL: Cloudflare's PKI and TLS toolkit
OpenID - OpenID Certified™ OpenID Connect Relying Party implementation for Apache HTTP Server 2.x
Samba - https://gitlab.com/samba-team/samba is the Official GitLab mirror of https://git.samba.org/samba.git -- Merge requests should be made on GitLab (not on GitHub)
LetsEncrypt-PRTG - Post request script to install an SSL certificate obtained with Certify the Web or win-acme in PRTG.
Pomerium - Pomerium is an identity and context-aware reverse proxy for zero-trust access to web applications and services.
certificates - 🛡️ A private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH.
BounCA - BounCA is a web tool to generate self-signed SSL certificates and setup a key infrastructure
certify - Professional ACME Client for Windows. Certificate Management UI, powered by Let's Encrypt and compatible with all ACME v2 CAs. Download from certifytheweb.com