Open the Mac App Store; Hold the Option key and click on “Purchases” Option-click on “OS X Lion” from the purchased app list “Installed’ should now say “Install” which allows you to re-download OS X Lion, otherwise you can Option-click again on the “Install” button to start re-downloading OS X Lion, shown in the screenshot above. Watch the music video and get to know the five LEGO® friends in this new hit sing along song! You and your best friends, forever till the end!http://www.lego.

  1. If OS X is to continue to prosper as a platform, let it win in the market based on its own proven merits. It's time for Apple to tear down the moat around OS X and let it be free of its artificial.
  2. Screen Time- This popular new feature on iPhone and iPad comes to the Mac in Catalina, and lets you tie it all together across platforms. Parents of younger Mac users will thank Apple for this one.
Article ID = 211
Article Title = How To Setup Let's Encrypt For OS X / macOS + Server 5.x
Article Author(s) = Graham Needham (BH)
Article Created On = 23rd November 2017
Article Last Updated = 9th March 2020
Article URL = https://www.macstrategy.com/article.php?211
Article Brief Description:
How to setup and configure Let's Encrypt secure certificates with OS X / macOS and Server 5.x

How To Setup Let's Encrypt For OS X / macOS + Server 5.x

WARNING: As of September 2018 Apple has gutted macOS Server and removed most/all of the useful Server features!
Instructions for installing Let's Encrypt website secure SSL certificates for OS X / macOS with websites hosted by OS X / macOS Server.

Preparation

In this article:
  • Replace all instances of 'your_domain_name' with your actual Domain Name
  • Replace all instances of '.tld' with the appropriate Top-Level Domain' code applicable to your Domain Name purchase/registration e.g. '.com'
  • This article assumes you have not moved the standard OS X / macOS Server web folders directory from it's standard location at /Library/Server/Web/Data/Sites/ - if you have you will need to replace all instances of /Library/Server/Web/Data/Sites/ with the path to your alternate location
  • the ~ character refers to your home directory i.e. usually, Macintosh HD > Users >your home directory (usually a house icon)
  • To get to hidden folders/directories in the Finder e.g. /etc/, in the Finder, go to the Go menu > Go to Folder… > enter the path to the folder/directory you want to go to e.g. '/etc/'
  • Replace 'admin_password' with your actual computer administrator account password
You will need the following before you can continue with this configuration article:
  • Basic skills at using the Terminal command line - iMore has a good introduction to it here
  • A decent text editor that is better than TextEdit e.g. BBEdit (US$49.99)
  • A launchd plist editor e.g. Lingon X (US$10.99)
  • Apple Mac computer running OS X 10.10 or later:
  • OS X / macOS Server:
  • At least one domain name and website configured via OS X / macOS Server. We have some articles that may help with this:
    • macOS 10.14 Mojave + Server 5.7.x - coming soon
    • macOS 10.13 High Sierra + Server 5.4-5.6.3 - coming soon
  • The domain(s) you want to obtain certificates for must be configured in OS X / macOS Server and publicly accessible via the normal internet
  • Consider the timing - Let's Encrypt issues 90 day certificates that can be renewed with less than 30 days to go - so 90 days is the max renewal via manual methods, 60 days is the auto renewal timeframe - so think about when those dates will fall after the initial setup and that you will be around/available to perform the manual renewal or check that the auto renewal method has worked!
  • You will need a contact/registration email address for each domain certificate that you initially request - this is also used for renewal/problem emails so it might be worth setting up a special email address for this sort of thing if you haven't already got one

Install and setup 'Let's Encrypt' (Certbot) with Homebrew

To install Homebrew vist http://brew.sh then return to here. Go to Macintosh HD > Applications > Terminal > and enter the following commandsbrew update
sudo mkdir /etc/letsencrypt
sudo mkdir /var/lib/letsencrypt
sudo mkdir /var/log/letsencrypt
brew install letsencrypt
git clone https://github.com/letsencrypt/letsencrypt
If everything went okay, you should see the following folders in:Friends
  • ~/letsencrypt
  • /etc/letsencrypt
UPDATE 09/03/2020: From 01/06/2020 Let's Encrypt will stop supporting the old ACMEv1 protocol. You must have an ACMEv2 compatible client. If you have already installed Let's Encrypt's Certbot you can easily update it via the command:brew upgrade certbot

Friend Os Download

If you are running an outdated version it will update. If you are running the current version it will let you know that it does not need to be updated.

Create required (hidden) directories

Using the Terminal, create two folders/directories for automated scripts:mkdir ~/letsencrypt/my_script
mkdir ~/letsencrypt/my_script/logs
You need to create two (hidden) folders/directories in the website for each domain that you want certificates for:sudo mkdir /Library/Server/Web/Data/Sites/your_domain_name's website folder/.well-known/
sudo mkdir /Library/Server/Web/Data/Sites/your_domain_name's website folder/.well-known/acme-challenge
Files in these folders must be publicly accessible via the normal internet. To test this put a quick and dirty html file named 'test.html' in each of the folders then make sure you can access them via a browser at:
  • http://www.your_domain_name.tld/.well-known/test.html
  • http://www.your_domain_name.tld/.well-known/acme-challenge/test.html

Obtain the initial domain certificate manually

Using the Terminal, enter the following command:
NOTE: As wildcard certificates are not available yet, you can add multiple, additional sub-domain cerificates with '-d additional.your_domain_name.tld' on the end of the command below e.g. '-d mail.your_domain_name.tld'
UPDATE 19/03/2018: Let's Encrypt - ACME v2 and Wildcard Certificate Support is Livesudo certbot certonly --webroot -w /Library/Server/Web/Data/Sites/your_domain_name's website folder -d your_domain_name.tld -d www.your_domain_name.tldFollow the on-screen instructions. If successful your certificate (a 'cert.pem' file) will appear in /etc/letsencrypt/live/your_domain_name.tld/

Manually convert the certificate for use with OS X / macOS

Using the Terminal, enter the following command:sudo openssl pkcs12 -export -inkey /etc/letsencrypt/live/your_domain_name.tld/privkey.pem -in /etc/letsencrypt/live/your_domain_name.tld/cert.pem -certfile /etc/letsencrypt/live/your_domain_name.tld/fullchain.pem -out /etc/letsencrypt/live/your_domain_name.tld/letsencrypt_sslcert.p12 -passout pass:'admin_password'

Import the certificate into the OS X / macOS Keychain

Using the Terminal, enter the following command:sudo security import /etc/letsencrypt/live/your_domain_name.tld/letsencrypt_sslcert.p12 -f pkcs12 -k /Library/Keychains/System.keychain -P 'admin_password' -T /Applications/Server.app/Contents/ServerRoot/System/Library/CoreServices/ServerManagerDaemon.bundle/Contents/MacOS/servermgrdCheck the certificate has been installed successfully (into the OS X / macOS Keychain) by going to Server app > Certificates - you should see the certificate for your domain listed as Issuer: 'Let's Encrypt Authority X3'. Quit and relaunch the Server application if it was open while you were doing the above.

Configure your website(s) to use https

Open the Server application and for each website:
  1. Click on 'Websites' on the left
  2. Make sure the domain already has a non-secure website entry using port 80 - do not delete this or edit this to be a secure entry
  3. Create a new website entry for the website and set:
    • 'Domain name' to 'your_domain_name.tld'
    • 'SSL Certificate' to the one you just installed i.e. 'your_domain_name.tld - Let’s Encrypt Authority X3' and check that the port number automatically changes to '443'
    • 'Store Site Files In' to the directory for your website files
    • Click the 'Edit…' button to the right of 'Additional Domains' and add 'www.your_domain_name.tld'
    • Click the 'Edit…' button to the right of 'Index Files' and set accordingly
    • Click 'OK' to return to the main Websites list window
  4. Optional - update the domain's non-secure website entry with a redirect so that all web page accesses go to https:
  5. NOTE: See also the considerations of moving to https section below for some important implications of moving your web site to https.
    • Edit the non-secure website entry
    • Click the 'Edit…' button to the right of 'Redirects'
    • Set 'Source' to '/' (everything)
    • Set 'Destination' to 'https://www.your_domain_name.tld/' with status 'permanent 301' (redirection)
    • Click 'OK'
    • Click 'OK' to return to the main Websites list window

Manual certificate renewal

Using the Terminal, enter the following command:
NOTE: As wildcard certificates are not available yet, you can add multiple, additional sub-domain cerificates with '-d additional.your_domain_name.tld' on the end of the command below e.g. '-d mail.your_domain_name.tld'. This should be the same as the initial certificate but if they are different you should get a special 'update configuration' prompt when doing the following command.
UPDATE 19/03/2018: Let's Encrypt - ACME v2 and Wildcard Certificate Support is Livesudo certbot certonly --webroot -w /Library/Server/Web/Data/Sites/your_domain_name's website folder -n -d your_domain_name.tld -d www.your_domain_name.tldFollow the on-screen instructions. If successful your certificate (a 'cert.pem' file) will appear in /etc/letsencrypt/live/your_domain_name.tld/ with a current date and time creation date

Automate certificate renewal

Using the Terminal, enter the following command and note the output result:echo $PATHFor each domain/website, create a command text file using your favourite text editor e.g. BBEdit in ~/letsencrypt/my_script:Use a launchd editor e.g. Lingon X to add a launchd automated task, running as root, to run the script you just created and pick a regular day and/or time. For example to trigger your automated certificate renewal script to run every Tuesday at 08:00:
  • Create a new task
  • TICK 'Enabled'
  • Set 'User' to 'root'
  • Name = 'com.your_domain_name.cert_renewal_tuesday.plist'
  • Run = '/Users/replace_with_your_home_directory_name/letsencrypt/my_script/cert_renewal_your_domain_name_tuesday.sh'
  • NOTE: The .sh filename should match the name of the script you created above.
  • When tab > TICK 'Scheduled'
  • Set schedule to 'Day of week' + 'Tuesday' + '08:00'
  • Click 'Save'
To test it works, select it and click the 'Test' button - if there are no error messages you can check the script has run correctly by checking:
  • A new, converted certificate titled 'letsencrypt_sslcert.p12' will appear in /etc/letsencrypt/live/your_domain_name.tld/ with a current date and time creation date.
  • If (and only if) the certificate has been renewed a new, updated certificate titled 'cert.pem' will appear in /etc/letsencrypt/live/your_domain_name.tld/ with a current date and time creation date.
  • If (and only if) the certificate has been renewed a new, updated certificate will have been imported successfully into the OS X / macOS Keychain - go to the Server application > Certificates - you should see the new certificate for your domain listed as Issuer: 'Let's Encrypt Authority X3' and an updated 'Expiration Date'. Quit and relaunch the Server application if it was open while you were doing the above.
  • Old certificates will still show in the Server application - you can manually delete them and services should automatically switch over to using the renewed/new certificate.

Lets Be Friends Mac Os X

Considerations of moving to https

Lets Be Friends Mac Os 11

Friends
  • Redirecting all http accesses to https - there are several ways to do this (one is listed above in our configure your website(s) to use https section above)
  • Canonical links in page headers
  • Robots
  • Google page ranking (a https link may be treated differently to a http link)
  • Mixed content on your page i.e. content server up from other servers e.g. adverts - this will cause browsers to show users that your site is not totally secure
  • Useful information:

References

Lets Be Friends Mac Os Download

The following pages were extremely useful in compiling this set of instructions:

Friend Os Server

  • Certbot instructions for macOS users - running Apache (instructions also available for Nginx, Haproxy, Plesk, other)

Article Keywords: OS X OSX 1010 1011 macOS 1012 1013 1014 Yosemite El Capitan Sierra High Sierra Mojave Server 4 5 internet web email SMTP POP PO3 IMAP secure SSL certificate free domain domains name names plist cron job cronjob launchd automate automatic regular renew Let's Encrypt letsencrypt certbot

This article is © MacStrategy » a trading name of Burning Helix. As an Amazon Associate, employees of MacStrategy's holding company (Burning Helix sro) may earn from qualifying purchases. Apple, the Apple logo, and Mac are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc.

If this information helped you or saved you time and/or money why not donate a little to us via PayPal?
All proceeds go directly to MacStrategy / Burning Helix to help fund this web site.
If this information helped you or saved you time and/or money why not donate a little to us via PayPal?
All proceeds go directly to MacStrategy / Burning Helix to help fund this web site.
Go to this
web page
to donate to us.

The Friends of MAC organization includes board members, and volunteers from the community, who participate in fundraising and many other opportunities to support MAC and its programs.

Other opportunities may include serving as hosts at MAC events, helping to greet people and give tours of the building. Friends members are encouraged to learn about MAC’s many programs, enabling them to talk generally about MAC services and to be advocates for the agency when out in the community.

For more information:
Cindy Robinson
410-742-0505, ext. 118
cfr@macinc.org