One issuer server for multiple servers



Is there an option to install “Let’s Encrypt” on one server and it issues a certificate for multiple servers?
I assume the server will ask for CSR of other servers and it’ll generate public & private keys.



You can use the “manual” method (whereby you provide the CSR of other servers) yes.


Even in manual mode there’s no explicit need to generate your own CSR: the Let’s Encrypt client can do that for you. Granted, if you’ll generate all the private keys and CSR’s on those other servers, it’ll save you the hassle of transferring the privkey.pem safely from the Let’s Encrypt client to those other server in the case you let the client handle everything. But it is possible :wink:


Thanks a lot for the quick respond!
Is there any guide that explains about the manual method process?
What steps should I take to create the certificates?


There is a detailed description at of using manual mode if that helps.


Sorry for the stupid question, but can you tell me where should I add [SAN] configuration?
For example:


Maybe at: /etc/pki/tls/openssl.cnf ?


Yes it would need to go into the openssl.cnf file - you can always copy the default file to an alternate file - see


Depends on your distribution. On my Gentoo it’s found in /etc/ssl/openssl.cnf


Alright, I understood.
So I can create a new openssl.cnf file that contains the specific content, for example:

[ req ]
distinguished_name = req_distinguished_name
[ req_distinguished_name ]
[ san ]

Am I right?


Yes, and then you can use that specific config file with openssl by using the -config your_config_file.cfg option.


I received the following error:

ERROR: An error occurred while sending post-request to (Status 400)

Do you know what is it?


[quote=“asaf, post:11, topic:6562”]
Do you know what is it?
[/quote]Do provide what command line you used.


./ -config


Sorry, I thought you were following the manual method as explained in

and that you were trying (originally to do the step)

openssl req
-new -newkey rsa:2048 -sha256 -nodes
-keyout privkey1.pem -out signreq.der -outform der
-subj “/C=UK/ST=Some State/L=Some Place/
-reqexts SAN

since you were asking about the SAN. My comment about the -config was on that line ( for openssl) and not the LE scrypt.


Ahh… alright,
By the way, I’ve tried to do the manual method but It didn’t worked for me.

I added;


to the openssl.cnf file and edit file to point on openssl.cnf file.
Then I wrote in the command line:

openssl req
-new -newkey rsa:2048 -sha256 -nodes
-keyout privkey1.pem -out signreq.der -outform der
-subj “/C=UK/ST=Some State/L=Some Place/
-reqexts SAN

and I received the following error:

Error Loading request extension section SAN


Where does come from? :question:

#17 doesn’t mention any file, so I have no idea what the file you edited was, but I don’t think it has anything do so with the openssl command, hence the openssl command has (I’m assuming) no idea about the local “openssl.cnf” file you created defining SAN. Hence you are getting the error loading the section “SAN”.


OK… so where should I add:



You can either add it to your main openssl.cnf file, or you can copy / create a new openssl conf file ( possibly called openssl-mydomain.cnf )

If you add it to the correct openssl.cnf file - you can use the openssl command as above ( with obviously changing the values for subject, keys etc). If you created openssl-mydomain.cnf then you will need to add -config openssl-mydomain.cnf onto the openssl command when generating the key and a Certificate Signing Request

Using one (1) SAN certificate with multiple servers (without hitting rate limit)

Thank you very much!