OPENSSL TUTORIAL: CREATE A PRIVATE KEY AND SSL CERTIFICATE FROM THE TERMINAL

August 26, 2025   /   by Marco  / Categories :  Business
picnie header cc2e2c18

In this guide, we’ll walk through requesting a certificate in AWS Certificate Manager (ACM), exporting it with a passphrase, decrypting the private key on a Linux server, and installing the certificate into HestiaCP. I’ll also point out exactly where each step happens with the screenshots referenced in the transcript.

HOW_TO_EXPORT_AWS_CERTIFICATE_MANAGER_CERTIFICATE_-0-00-00.png

1) Request a public certificate in AWS Certificate Manager

Start by creating a certificate request in ACM for the domain (or subdomain) you want to secure.

  • Open AWS Certificate Manager in your AWS console.
  • Choose “Request” and select “Request a public certificate.”
  • Add your domain names (e.g., example.com and/or subdomains).

HOW_TO_EXPORT_AWS_CERTIFICATE_MANAGER_CERTIFICATE_-0-00-24.png

For validation, choose DNS validation. This method is fast, automatable, and keeps the validation record in your DNS, so future renewals are seamless.

  • Add the provided CNAME records to your DNS host (Route 53 or your external DNS provider).
  • Submit the request and wait for validation.

HOW_TO_EXPORT_AWS_CERTIFICATE_MANAGER_CERTIFICATE_-0-00-54.png

Once AWS confirms the DNS record, the certificate status will show as “Issued.”

2) Export the certificate from ACM

After the certificate is issued, click into the certificate details page via its Certificate ID.

Use the Export option and set an encryption passphrase. This passphrase will be used to protect the private key during export.

HOW_TO_EXPORT_AWS_CERTIFICATE_MANAGER_CERTIFICATE_-0-01-22.png

Choose PEM encoding, then export and download the files. You’ll get:

  • Certificate body (certificate)
  • Certificate chain (intermediate/CA bundle)
  • Private key (encrypted with your passphrase)

HOW_TO_EXPORT_AWS_CERTIFICATE_MANAGER_CERTIFICATE_-0-01-52.png

Save all three files securely. We’ll need them to install the certificate later.

3) Decrypt the private key on a Linux server

To use the certificate with HestiaCP, you’ll need the unencrypted private key. We’ll decrypt it using OpenSSL on a Linux box (Ubuntu in this example).

Create a file on your server and paste in the exported encrypted private key (the one you downloaded from ACM):

HOW_TO_EXPORT_AWS_CERTIFICATE_MANAGER_CERTIFICATE_-0-02-20.png

Verify OpenSSL is installed. If you see usage options when running the command below, you’re good to go. Otherwise, install it (for Ubuntu: sudo apt update && sudo apt install openssl).

HOW_TO_EXPORT_AWS_CERTIFICATE_MANAGER_CERTIFICATE_-0-02-55.png

Run the following command to decrypt the key. Replace the filenames with your actual paths.

openssl rsa -in encrypted-private-key.pem -out decrypted-private-key.pem

When prompted, enter the passphrase you set during export. After success, you’ll have a decrypted private key file you can use with HestiaCP.

HOW_TO_EXPORT_AWS_CERTIFICATE_MANAGER_CERTIFICATE_-0-03-24.png

4) Install the certificate in HestiaCP

In HestiaCP, go to the domain’s web settings (Web → your domain → Edit) and open the SSL section.

  • SSL Certificate (CRT) field: Paste the Certificate body.
  • SSL Certificate Authority / Intermediate (CA bundle) field: Paste the Certificate chain.
  • SSL Key (KEY) field: Paste the decrypted private key (not the encrypted one).

HOW_TO_EXPORT_AWS_CERTIFICATE_MANAGER_CERTIFICATE_-0-03-50.png

Do not paste the original encrypted key. Make sure you copy the contents of the decrypted key you generated with OpenSSL.

HOW_TO_EXPORT_AWS_CERTIFICATE_MANAGER_CERTIFICATE_-0-04-16.png

Save your changes. After saving, the certificate should be active for the domain, and your site should load over HTTPS without warnings.

HOW_TO_EXPORT_AWS_CERTIFICATE_MANAGER_CERTIFICATE_-0-04-50.png

Tips and troubleshooting

  • If the Export option isn’t visible in ACM, double-check the certificate type and region. Ensure you’re exporting the certificate you just issued.
  • If HestiaCP rejects the key, confirm you pasted the decrypted private key (PEM format with -----BEGIN PRIVATE KEY----- headers).
  • Ensure your CA bundle is complete. Paste the full chain provided by AWS.
  • After installation, test with an SSL checker (e.g., SSL Labs) to verify the chain and expiry.

That’s it! You’ve requested, exported, decrypted, and installed an AWS Certificate Manager certificate in HestiaCP.


Infographic

DO YOU LIKE WHAT YOU'VE READ?
Join our subscription list and receive our content right in your mailbox. If you like to receive some Great deals our Freebies then subscribe now!

Our Sponsors

  • Follow us:

OTHER ARTICLES YOU MAY LIKE


OPENSSL TUTORIAL: CREATE A PRIVATE KEY AND SSL CERTIFICATE FROM THE TERMINAL

OPENSSL TUTORIAL: CREATE A PRIVATE KEY AND SSL CERTIFICATE FROM THE TERMINAL

In this guide, we’ll walk through requesting a certificate in AWS Certificate Manager (ACM), exporting it with a passphrase, decrypting the private key on a Linux server, and installing the certificate into HestiaCP. I’ll also point out exactly where each step happens with the screenshots referenced in the transcript. 1) Request a public certificate in […]

read more
HOW TO ADD OPENAI GPT-5 MODEL IN AZURE AI FOUNDRY

HOW TO ADD OPENAI GPT-5 MODEL IN AZURE AI FOUNDRY

Looking to try the new GPT‑5 model inside Azure AI Foundry? In this walkthrough, I’ll take you through the exact journey shown in the video—from signing in, requesting access (because the model is gated), all the way to deploying the base model and grabbing the endpoint you’ll use in your apps. If you’ve never deployed […]

read more

Like our Page