亚洲香蕉成人av网站在线观看_欧美精品成人91久久久久久久_久久久久久久久久久亚洲_热久久视久久精品18亚洲精品_国产精自产拍久久久久久_亚洲色图国产精品_91精品国产网站_中文字幕欧美日韩精品_国产精品久久久久久亚洲调教_国产精品久久一区_性夜试看影院91社区_97在线观看视频国产_68精品久久久久久欧美_欧美精品在线观看_国产精品一区二区久久精品_欧美老女人bb

首頁 > 服務器 > Web服務器 > 正文

Windows Server 2008 R2 下配置TLS1.2添加自簽名證書的圖文教程

2024-09-01 13:49:48
字體:
來源:轉載
供稿:網友

前言

2017年1月1日起App Store上的所有App應用將強制開啟ATS功能。

蘋果的ATS(App Transport Security)對服務器硬性3點要求:

① ATS要求TLS1.2或者更高,TLS 是 SSL 新的別稱。

② 通訊中的加密套件配置要求支持列出的正向保密。

③ 數字證書必須使用sha256或者更高級的簽名哈希算法,并且保證密鑰是2048位及以上的RSA密鑰或者256位及以上的ECC密鑰。

由于領導舍不得花錢,只能辛苦我們自己搞個不花錢的證書。在網上找了一大堆各種配置證書服務的文章,在ios端運行的時候總是直接報錯,很是費解,后來注意到必須是TLS1.2或者更高的版本,而按照網上的配置弄好后都是ssl1.0,根本原因沒有解決。所以必須先升級服務器ssl的版本,這個升級的文章很多,有用的不多。在這里整理下找到的資料,供大家參考。注意:證書服務可以不用安裝,升級ssl后即可正常訪問。

1.首先打開服務器組策略,命令行輸入gpedit.msc,找到ssl配置設置,雙擊ssl密碼套件順序,選擇已啟用,并保存。準備工作完成!

server2008自簽名證書,server2008r2,證書

2.在下面選擇您需要的配置并復制,打開Powershell直接粘貼。最后會提示是否重啟服務器,輸入Y會直接重啟,根據自己的情況而定吧,重啟后生效哦~

2.1. configure your IIS server with Perfect Forward Secrecy and TLS 1.2:

# Copyright 2016, Alexander Hass# http://www.hass.de/content/setup-your-iis-ssl-perfect-forward-secrecy-and-tls-12## Version 1.7# - Windows Version compare failed. Get-CimInstance requires Windows 2012 or later.# Version 1.6# - OS version detection for cipher suites order.# Version 1.5# - Enabled ECDH and more secure hash functions and reorderd cipher list.# - Added Client setting for all ciphers.# Version 1.4# - RC4 has been disabled.# Version 1.3# - MD5 has been disabled.# Version 1.2# - Re-factored code style and output# Version 1.1# - SSLv3 has been disabled. (Poodle attack protection)Write-Host 'Configuring IIS with SSL/TLS Deployment Best Practices...'Write-Host '--------------------------------------------------------------------------------'# Disable Multi-Protocol Unified HelloNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/Multi-Protocol Unified Hello/Server' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/Multi-Protocol Unified Hello/Server' -name Enabled -value 0 -PropertyType 'DWord' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/Multi-Protocol Unified Hello/Server' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-NullNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/Multi-Protocol Unified Hello/Client' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/Multi-Protocol Unified Hello/Client' -name Enabled -value 0 -PropertyType 'DWord' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/Multi-Protocol Unified Hello/Client' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-NullWrite-Host 'Multi-Protocol Unified Hello has been disabled.'# Disable PCT 1.0New-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/PCT 1.0/Server' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/PCT 1.0/Server' -name Enabled -value 0 -PropertyType 'DWord' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/PCT 1.0/Server' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-NullNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/PCT 1.0/Client' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/PCT 1.0/Client' -name Enabled -value 0 -PropertyType 'DWord' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/PCT 1.0/Client' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-NullWrite-Host 'PCT 1.0 has been disabled.'# Disable SSL 2.0 (PCI Compliance)New-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/SSL 2.0/Server' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/SSL 2.0/Server' -name Enabled -value 0 -PropertyType 'DWord' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/SSL 2.0/Server' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-NullNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/SSL 2.0/Client' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/SSL 2.0/Client' -name Enabled -value 0 -PropertyType 'DWord' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/SSL 2.0/Client' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-NullWrite-Host 'SSL 2.0 has been disabled.'# NOTE: If you disable SSL 3.0 the you may lock out some people still using# Windows XP with IE6/7. Without SSL 3.0 enabled, there is no protocol available# for these people to fall back. Safer shopping certifications may require that# you disable SSLv3.## Disable SSL 3.0 (PCI Compliance) and enable "Poodle" protectionNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/SSL 3.0/Server' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/SSL 3.0/Server' -name Enabled -value 0 -PropertyType 'DWord' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/SSL 3.0/Server' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-NullNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/SSL 3.0/Client' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/SSL 3.0/Client' -name Enabled -value 0 -PropertyType 'DWord' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/SSL 3.0/Client' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-NullWrite-Host 'SSL 3.0 has been disabled.'# Add and Enable TLS 1.0 for client and server SCHANNEL communicationsNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.0/Server' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.0/Server' -name 'Enabled' -value '0xffffffff' -PropertyType 'DWord' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.0/Server' -name 'DisabledByDefault' -value 0 -PropertyType 'DWord' -Force | Out-NullNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.0/Client' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.0/Client' -name 'Enabled' -value '0xffffffff' -PropertyType 'DWord' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.0/Client' -name 'DisabledByDefault' -value 0 -PropertyType 'DWord' -Force | Out-NullWrite-Host 'TLS 1.0 has been enabled.'# Add and Enable TLS 1.1 for client and server SCHANNEL communicationsNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Server' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Server' -name 'Enabled' -value '0xffffffff' -PropertyType 'DWord' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Server' -name 'DisabledByDefault' -value 0 -PropertyType 'DWord' -Force | Out-NullNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Client' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Client' -name 'Enabled' -value '0xffffffff' -PropertyType 'DWord' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.1/Client' -name 'DisabledByDefault' -value 0 -PropertyType 'DWord' -Force | Out-NullWrite-Host 'TLS 1.1 has been enabled.'# Add and Enable TLS 1.2 for client and server SCHANNEL communicationsNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.2/Server' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.2/Server' -name 'Enabled' -value '0xffffffff' -PropertyType 'DWord' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.2/Server' -name 'DisabledByDefault' -value 0 -PropertyType 'DWord' -Force | Out-NullNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.2/Client' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.2/Client' -name 'Enabled' -value '0xffffffff' -PropertyType 'DWord' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/TLS 1.2/Client' -name 'DisabledByDefault' -value 0 -PropertyType 'DWord' -Force | Out-NullWrite-Host 'TLS 1.2 has been enabled.'# Re-create the ciphers key.New-Item 'HKLM:SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Ciphers' -Force | Out-Null# Disable insecure/weak ciphers.$insecureCiphers = @( 'DES 56/56', 'NULL', 'RC2 128/128', 'RC2 40/128', 'RC2 56/128', 'RC4 40/128', 'RC4 56/128', 'RC4 64/128', 'RC4 128/128')Foreach ($insecureCipher in $insecureCiphers) { $key = (Get-Item HKLM:/).OpenSubKey('SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Ciphers', $true).CreateSubKey($insecureCipher) $key.SetValue('Enabled', 0, 'DWord') $key.close() Write-Host "Weak cipher $insecureCipher has been disabled."}# Enable new secure ciphers.# - RC4: It is recommended to disable RC4, but you may lock out WinXP/IE8 if you enforce this. This is a requirement for FIPS 140-2.# - 3DES: It is recommended to disable these in near future. This is the last cipher supported by Windows XP.# - Windows Vista and before 'Triple DES 168' was named 'Triple DES 168/168' per https://support.microsoft.com/en-us/kb/245030$secureCiphers = @( 'AES 128/128', 'AES 256/256', 'Triple DES 168')Foreach ($secureCipher in $secureCiphers) { $key = (Get-Item HKLM:/).OpenSubKey('SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Ciphers', $true).CreateSubKey($secureCipher) New-ItemProperty -path "HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Ciphers/$secureCipher" -name 'Enabled' -value '0xffffffff' -PropertyType 'DWord' -Force | Out-Null $key.close() Write-Host "Strong cipher $secureCipher has been enabled."}# Set hashes configuration.New-Item 'HKLM:SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Hashes' -Force | Out-NullNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Hashes/MD5' -Force | Out-NullNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Hashes/MD5' -name Enabled -value 0 -PropertyType 'DWord' -Force | Out-Null$secureHashes = @( 'SHA', 'SHA256', 'SHA384', 'SHA512')Foreach ($secureHash in $secureHashes) { $key = (Get-Item HKLM:/).OpenSubKey('SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Hashes', $true).CreateSubKey($secureHash) New-ItemProperty -path "HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Hashes/$secureHash" -name 'Enabled' -value '0xffffffff' -PropertyType 'DWord' -Force | Out-Null $key.close() Write-Host "Hash $secureHash has been enabled."}# Set KeyExchangeAlgorithms configuration.New-Item 'HKLM:SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/KeyExchangeAlgorithms' -Force | Out-Null$secureKeyExchangeAlgorithms = @( 'Diffie-Hellman', 'ECDH', 'PKCS')Foreach ($secureKeyExchangeAlgorithm in $secureKeyExchangeAlgorithms) { $key = (Get-Item HKLM:/).OpenSubKey('SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/KeyExchangeAlgorithms', $true).CreateSubKey($secureKeyExchangeAlgorithm) New-ItemProperty -path "HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/KeyExchangeAlgorithms/$secureKeyExchangeAlgorithm" -name 'Enabled' -value '0xffffffff' -PropertyType 'DWord' -Force | Out-Null $key.close() Write-Host "KeyExchangeAlgorithm $secureKeyExchangeAlgorithm has been enabled."}# Set cipher suites order as secure as possible (Enables Perfect Forward Secrecy).$os = Get-WmiObject -class Win32_OperatingSystemif ([System.Version]$os.Version -lt [System.Version]'10.0') { Write-Host 'Use cipher suites order for Windows 2008R2/2012/2012R2.' $cipherSuitesOrder = @( 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521', 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384', 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256', 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P521', 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384', 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256', 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P521', 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384', 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256', 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P521', 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P384', 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256', 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P521', 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384', 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P521', 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384', 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256', 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P521', 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384_P384', 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P521', 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384', 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256', 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P521', 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P384', 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P256', 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P521', 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P384', 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P256', 'TLS_RSA_WITH_AES_256_GCM_SHA384', 'TLS_RSA_WITH_AES_128_GCM_SHA256', 'TLS_RSA_WITH_AES_256_CBC_SHA256', 'TLS_RSA_WITH_AES_128_CBC_SHA256', 'TLS_RSA_WITH_AES_256_CBC_SHA', 'TLS_RSA_WITH_AES_128_CBC_SHA', 'TLS_RSA_WITH_3DES_EDE_CBC_SHA' )}else { Write-Host 'Use cipher suites order for Windows 10/2016 and later.' $cipherSuitesOrder = @( 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384', 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256', 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384', 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256', 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA', 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA', 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384', 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256', 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384', 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256', 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA', 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA', 'TLS_RSA_WITH_AES_256_GCM_SHA384', 'TLS_RSA_WITH_AES_128_GCM_SHA256', 'TLS_RSA_WITH_AES_256_CBC_SHA256', 'TLS_RSA_WITH_AES_128_CBC_SHA256', 'TLS_RSA_WITH_AES_256_CBC_SHA', 'TLS_RSA_WITH_AES_128_CBC_SHA', 'TLS_RSA_WITH_3DES_EDE_CBC_SHA' )}$cipherSuitesAsString = [string]::join(',', $cipherSuitesOrder)# One user reported this key does not exists on Windows 2012R2. Cannot repro myself on a brand new Windows 2012R2 core machine. Adding this just to be save.New-Item 'HKLM:/SOFTWARE/Policies/Microsoft/Cryptography/Configuration/SSL/00010002' -ErrorAction SilentlyContinueNew-ItemProperty -path 'HKLM:/SOFTWARE/Policies/Microsoft/Cryptography/Configuration/SSL/00010002' -name 'Functions' -value $cipherSuitesAsString -PropertyType 'String' -Force | Out-NullWrite-Host '--------------------------------------------------------------------------------'Write-Host 'NOTE: After the system has been rebooted you can verify your server'Write-Host '  configuration at https://www.ssllabs.com/ssltest/'Write-Host "--------------------------------------------------------------------------------`n"Write-Host -ForegroundColor Red 'A computer restart is required to apply settings. Restart computer now?'Restart-Computer -Force -Confirm

2.2 iisresetssltoweakdefaults

# Copyright 2016, Alexander Hass# http://www.hass.de/content/setup-your-iis-ssl-perfect-forward-secrecy-and-tls-12## Version 1.0# - Rollback script created.Write-Host 'Reset IIS to weak and insecure SSL defaults...'Write-Host '--------------------------------------------------------------------------------'New-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Ciphers' -ForceNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/CipherSuites' -ForceNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Hashes' -ForceNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/KeyExchangeAlgorithms' -ForceNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols' -ForceNew-Item 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/SSL 2.0/Client' -ForceNew-ItemProperty -path 'HKLM:/SYSTEM/CurrentControlSet/Control/SecurityProviders/SCHANNEL/Protocols/SSL 2.0/Client' -name DisabledByDefault -value 1 -PropertyType 'DWord'New-Item 'HKLM:/SOFTWARE/Policies/Microsoft/Cryptography/Configuration/SSL/00010002' -ForceRestart-Computer -Force

3.最后配置IIS站點,添加ssl自簽名證書,站點綁定https,并選擇剛添加的自簽名證書即可。

4.全稱無需給服務器安裝證書服務,ios客戶端證書校驗時默認全部通過即可,如果對安全要求嚴格的客戶端可導入證書做校驗。


發表評論 共有條評論
用戶名: 密碼:
驗證碼: 匿名發表
亚洲香蕉成人av网站在线观看_欧美精品成人91久久久久久久_久久久久久久久久久亚洲_热久久视久久精品18亚洲精品_国产精自产拍久久久久久_亚洲色图国产精品_91精品国产网站_中文字幕欧美日韩精品_国产精品久久久久久亚洲调教_国产精品久久一区_性夜试看影院91社区_97在线观看视频国产_68精品久久久久久欧美_欧美精品在线观看_国产精品一区二区久久精品_欧美老女人bb
国产精品久久久久久五月尺| 欧美激情一区二区三级高清视频| 热re99久久精品国产66热| 亚洲精品视频播放| 米奇精品一区二区三区在线观看| 国产精品视频播放| 在线看日韩av| 国产精自产拍久久久久久蜜| 国产精品h在线观看| 国产欧美日韩高清| 精品毛片三在线观看| 国产成人高潮免费观看精品| 欧美日韩国产综合视频在线观看中文| 色多多国产成人永久免费网站| 91精品久久久久| 亚洲一品av免费观看| 国产亚洲人成网站在线观看| 国产精品视频99| 欧美人成在线视频| 欧美精品一二区| 国产精品视频永久免费播放| 在线免费观看羞羞视频一区二区| 国产精品www| 亚洲精品一区二三区不卡| 亚洲专区中文字幕| 欧美大全免费观看电视剧大泉洋| 亚洲日本欧美日韩高观看| 国产精品日日摸夜夜添夜夜av| 日韩视频欧美视频| 亚洲性线免费观看视频成熟| 国产日韩欧美在线看| 国产亚洲欧美一区| 亚洲人成在线观看网站高清| 欧美裸体xxxx极品少妇软件| 国产精品久久久久av免费| 色狠狠av一区二区三区香蕉蜜桃| 不卡av电影院| 夜夜狂射影院欧美极品| 97国产在线视频| 欧美精品久久久久| 亚洲美女性视频| 日韩专区在线播放| 国产91对白在线播放| 国产精品户外野外| 国产精品丝袜一区二区三区| 国产精品一区二区性色av| 欧美性受xxxx黑人猛交| 国产一区二区在线免费视频| xxx一区二区| 成人激情春色网| 久久精品免费播放| 日韩欧美一区二区三区久久| 久久久久久久影视| 欧美激情欧美狂野欧美精品| 日韩av电影在线播放| 日韩中文字幕第一页| 97视频人免费观看| 精品久久久久久久久久久久久| 亚洲国产精品字幕| 欧美一二三视频| 久久国产精彩视频| 欧美贵妇videos办公室| 亚洲欧美色图片| 亚洲精品videossex少妇| 精品国产1区2区| 久久人人97超碰精品888| 红桃视频成人在线观看| 成人免费xxxxx在线观看| 久久亚洲一区二区三区四区五区高| 午夜精品久久久久久久久久久久| 国产极品精品在线观看| 国产色婷婷国产综合在线理论片a| 视频直播国产精品| 久久资源免费视频| 欧美国产日本在线| 亚洲国产成人精品久久| 日本欧美黄网站| 少妇高潮久久77777| 日韩一区二区av| 日韩成人性视频| 精品国产乱码久久久久久婷婷| 日韩欧亚中文在线| 欧美激情精品久久久久久变态| 日韩电影网在线| 亚洲人成网站999久久久综合| 奇米四色中文综合久久| 亚洲护士老师的毛茸茸最新章节| 精品视频9999| 91久久久久久久久久久久久| 日韩av在线影视| 色爱av美腿丝袜综合粉嫩av| 成人网欧美在线视频| 成人性教育视频在线观看| 久久久久久久香蕉网| 国产这里只有精品| 日韩中文字幕网址| 亚洲美女免费精品视频在线观看| 国内揄拍国内精品少妇国语| 国产综合色香蕉精品| 欧美久久精品一级黑人c片| 91青草视频久久| 亚洲精品欧美日韩| 永久免费毛片在线播放不卡| 欧美激情免费观看| 久久综合伊人77777尤物| 久久成人这里只有精品| 成人久久久久久久| 久久精品国产91精品亚洲| 日韩在线欧美在线国产在线| 一区二区亚洲精品国产| 中文字幕亚洲情99在线| 欧美精品videossex88| www高清在线视频日韩欧美| 红桃视频成人在线观看| 欧美疯狂性受xxxxx另类| 欧美成人精品h版在线观看| 国色天香2019中文字幕在线观看| 欧美裸体视频网站| 亚洲午夜小视频| 日韩精品免费在线视频| 亚洲国产精品久久久久秋霞不卡| 欧美激情喷水视频| 国产免费久久av| 久久国产精品网站| 国产v综合ⅴ日韩v欧美大片| 亚洲人午夜精品| 成人中文字幕在线观看| 国产精品自产拍高潮在线观看| 日韩成人在线观看| 欧美精品在线免费观看| 国产一区二区黄| 日韩视频―中文字幕| 视频一区视频二区国产精品| 欧美黄色片免费观看| 欧美性猛交xxxx免费看久久久| 中文字幕亚洲欧美日韩在线不卡| 亚洲片国产一区一级在线观看| 国产免费成人av| 欧美xxxx18国产| 久久久999精品免费| 亚洲最大福利视频网站| 欧美久久精品午夜青青大伊人| 日韩av网址在线观看| 国产亚洲xxx| 久久久久久久久久久人体| 欧美专区国产专区| 日本一区二三区好的精华液| 中文字幕欧美专区| 久久在线精品视频| 超碰日本道色综合久久综合| 91理论片午午论夜理片久久| 91在线国产电影| 亚洲成人a**站| 欧美亚洲国产视频| 亚洲跨种族黑人xxx| 久久久亚洲福利精品午夜| 久久99热精品这里久久精品| 欧美黑人一级爽快片淫片高清| 正在播放国产一区| 国产精品v片在线观看不卡| 日韩亚洲精品电影| 91久久久久久国产精品| 欧美在线视频免费| 亚洲品质视频自拍网|