Skip to main content
Skip table of contents

Using a Self-Signed Certificate on Windows Server 2019 Core

NOT AVAILABLE IN SAAS


The PowerShell commands (using the PowerShell admin prompt) to use on Windows Server 2019 Core are as follows:

• To export a self-signed certificate, use the following PowerShell commands:

• $password = ConvertTo-SecureString -String "my_password" -Force -AsPlainText

• Get-ChildItem -Path Cert:\LocalMachine\My\<cert_thumbprint> | Export-PfxCertificate -FilePath "C:\cert.pfx" -Password $password

• To import a self-signed certificate, use the following PowerShell commands:

• $password = ConvertTo-SecureString -String "my_password" -Force -AsPlainText

• Import-PfxCertificate -FilePath <path_to_certificate> -CertStoreLocation Cert:\LocalMachine\My -Password $password

• To generate a self-signed certificate with the name “ekransystem” and bind it to port 443, use the following PowerShell commands:

• $site = "Default Web Site"

• New-WebBinding -Name $site -IPAddress * -Port 443 -Protocol https

• $cert = New-SelfSignedCertificate -CertStoreLocation 'Cert:\LocalMachine\My' -DnsName "ekransystem"

• $certPath = "Cert:\LocalMachine\My\$($cert.Thumbprint)"

• $providerPath = 'IIS:\SslBindings\0.0.0.0!443'

• Get-Item $certPath | New-Item $providerPath


JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.