It is preferable you contact your IT/Network Security department to obtain instruction for the creation and use of TLS Certificates, but the following steps are provided as an example for a test environment.
These steps and the certificates created from them should not be used for a production environment without approval from your company’s Security professional.