# Each non-default section refer to separate certificate issuance # requests. Options in the default section apply to each sections. # Message digest to sign the Certificate Signing Request with. # #hash = sha512 # Comma-separated list of Key Usages, see x509v3_config(5ssl). # #keyUsage = digitalSignature, keyEncipherment #[www] # Path the service's private key. This option is required. # #certificate-key = /etc/nginx/ssl/srv.key # Where to store the issued certificate (in PEM format). # #certificate = /etc/nginx/ssl/srv.pem # Where to store the issued certificate along with its chain of trust # (in PEM format). # #certificate-chain = /etc/nginx/ssl/srv.chain.pem # For an existing certificate, the minimum number of days before its # expiration date the section is considered for re-issuance. # #min-days = 21 # Path to trusted issuer certificates, used for validating each issued # certificate. Specifying an empty value skips certificate validation. # #CAfile = @@datadir@@/lacme/ca-certificates.crt # Subject field of the Certificate Signing Request. This option is # required. # #subject = /CN=example.org # Comma-separated list of Subject Alternative Names. # #subjectAltName = DNS:example.org,DNS:www.example.org # username[:groupname] to chown the issued certificate and # certificate-chain with. # #chown = root:root # Octal mode to chmod the issued certificate and certificate-chain with. # #chmod = 0644 # Command to pass the the system's command shell ("/bin/sh -c") after # successful installation of the certificate and/or certificate-chain. # #notify = /bin/systemctl reload nginx #[smtp] #certificate-key = /etc/postfix/ssl/srv.key #certificate-chain = /etc/postfix/ssl/srv.pem #subject = /CN=smtp.example.org #notify = /bin/systemctl reload postfix ; vim:ft=dosini