sudo tee /usr/local/share/ca-certificates/9net.crt
```
2. Run `sudo update-ca-certificates`
## Requesting a certificate via ACME
Note: These instructions use the `step` CLI. Make sure you have the root CA installed as above. Also, to make renewals easier, I'd recommend having one certificate for all domains on a single machine (fairly easy with multiple `--san` parameteres)
1. Configure your webserver however you need to for webroot cert verification
2. Generate certificate/key (replace BASE_DOMAIN, YOUR_WEBROOT, and DOMAIN2-DOMAIN _n_ as needed)
```sh
sudo-H step ca certificate \
BASE_DOMAIN.9net \
/etc/ssl/certs/cert-9net.pem \
/etc/ssl/private/key-9net.pem \
--provisioner acme \
--webroot /var/www/YOUR_WEBROOT \
--san BASE_DOMAIN.9net \ # the only required --san parameter
--san DOMAIN2.9net \
--san DOMAIN3.9net \
--san DOMAIN4.9net # repeat as needed
```
3. Certificate renewal:
- Method A: Cron job - Put the following in a cron job
```sh
step ca renew /etc/ssl/certs/cert-9net.pem /etc/ssl/private/key-9net.pem \
--exec"systemctl reload nginx"
```
- Method B: Run `step` in daemon mode for automatic renewals under `systemd`
```ini
[Unit]
Description=Automatically renew SSL certificates for 9net
After=network.target
StartLimitIntervalSec=0
[Service]
Type=simple
Restart=always
RestartSec=1
ExecStart=/usr/bin/step ca renew --daemon --exec=systemctl\x20reload\x20nginx --ca-url=https://ca.9net /etc/ssl/certs/cert-9net.pem /etc/ssl/private/key-9net.pem