As a part of the certificate issuance process with MaxMD, you'll verify your identity with ID.me, a federally-certified identity provider. The ID.me workflow is simple and straightforward and the entire process should only take a few minutes. Please note: you may be routed to a video call to verify with ID.me.
If you have any questions, please reach out to DirectTrust by replying to support@directtrust.zohodesk.com via your invitation email ticket. In addition, you can check out ID.me's support page at help.id.me and FAQs at https://desk.zoho.com/portal/directtrust/en/kb/articles/id-me-faqs
Verify by Email
To verify domain by email, select the applicable email address and generate a one-time password (OTP).
Enter OTP and SUBMIT OTP.The domain is verified. Click NEXT.Verify by DNS
To verify domain with DNS, start by clicking the VERIFY BY DNS tab.Next:
- Copy the generated token (including “MaxMD-Verification=”)
- Go to your DNS management portal and create a new TXT record
- In the Host field, enter the domain name
- In the Time-to-Live (TTL) field, enter the TTL value or use the default value
- In the Type field, select TXT
- In the Value field, paste the token that you copied from the MaxMD Certificate portal
After the TXT record is created, wait for about 30 seconds to allow the DNS servers to synchronize the new change. Then click VERIFY DNS RECORD.
Auto Generate CSR method
Click AUTO GENERATE CSR.MaxMD will generate and verify the CSR. Click CONTINUE to create the certificate.Review and CREATE CERTIFICATE.Congratulations! Your certificate is now created.Proceed to section 3. Exporting or Downloading your Certificate
Upload CSR method
If you prefer to upload your own CSR, click the UPLOAD CSR tab and paste your PEM encoded CSR.If you have already generated your own CSR you can proceed to section 3. Exporting or Downloading your CertificateGenerating a CSR is done with OpenSSL or Windows IIS. We recommend OpenSSL to make later steps easier. You can download OpenSSL at https://www.openssl.org/source/ or refer to Windows IIS instructions that match your environment. Example: https://www.ssl.com/how-to/generate-a-certificate-signing-request-csr-in-iis-10/On a Windows machine, open Command Prompt and enter the following command with real values for domainname, organizationName, initiative, and organizationalUnit(optional) in the following order:openssl req -out domainname.csr -new -newkey rsa:2048 -nodes -keyout domainname.key -subj"/CN=domain.org/C=US/O=organizationName/OU=initiative/OU=optionalOrganizationalUnit"NOTE: Because MaxMD is validating your CSR against previously validated Organizational information; City, State are not required. If you add them to your CSR, it must match what is on file. If you need to make a change, please alert DirectTrust and a new certificate link will be created for you.The OU initiative value will differ for eHealth Exchange Participants and Carequality Implementers.For Production certificates, the required OU values are as follows:eHealth Exchange: OU=NHINCarequality: OU = CAREQUALITY
Example OpenSSL command for a eHealth Exchange certificate for DirectTrust:openssl req -out directtrust.org.csr -new -newkey rsa:2048 -nodes -keyout directtrust.org.key -subj "/CN=directtrust.org/C=US/O=DirectTrust.org, Inc./OU=NHIN/OU=Health Department"
Open the CSR file and Copy the entire contents:
Click the UPLOAD CSR tab and paste your PEM encoded CSR.NOTE: If your CSR has the words "NEW" in it, delete them.After uploading your CSR, MaxMD will validate the details against the certificate profile. If the CSR is invalid, the next screen will tell you why.If your uploaded CSR is valid, you can CONTINUE to create the certificate.Review the certificate settings and click CREATE CERTIFICATE.Congratulations! Your certificate is now created.
Exporting your Key (Auto Generated CSR method)
If MaxMD generated the CSR for you, the certificate, CA certificates (intermediate and root), and the private key can be exported together as a Keystore. On the certificate screen, you should see the certificate information and an option to export as keystore. Click EXPORT AS KEYSTORE.When exporting your key, select the Keystore Type from the drop down (JKS or PKCS12). Use JKS for Java environments up to Java 8. Java 9+ and all other environments should choose PKCS12. Here you can add optional passwords to protect the keystore.Clicking EXPORT will download domainname.pfx to your computer.Proceed to section 4. Installing your CertificateDownloading your Certificate (Upload CSR method)
From the Certificates tab, click VIEW --> DOWNLOAD CERTIFICATEYou should see domainname.crt download to your computer.Next, download the Intermediate CA certificate, and Root CA certificate files.You should now have three .crt files:
- domainname.crt
- MaxMD TLS RSA CA.crt
- MaxMD Root CA v1.0.crt
Next, we need to use an OpenSSL command to join our three .crt files with your private key to generate a PKCS12 file. From the same directory path with all four files, open the command prompt, with OpenSSL installed, use the following command with real values for:
- domainname.crt
- privatekey.key
- MaxMD TLS RSA CA.crt
- MaxMD Root CA v1.0.crt
openssl pkcs12 -export -in domainname.crt -inkey privatekey.key -out domainname.pfx -certfile "MaxMD TLS RSA CA.crt" -certfile "MaxMD Root CA v1.0.crt"After creating the pkcs12 file, you will be asked to create an optional Export password (press enter to skip password creation):You should now have a domainname.pfx file: