It's been a long time since I've added anything about Domino here, but I wanted to put this where I'd find it next year and though some of you might find it useful as well.
There's lots of instructions out there around using "LetsEncrypt" or whatever to generate short lived SSL certificates for Domino, but if you want to use a full blown certificate authority -- or maybe your company does self signed certificates and you want to use those, here's a quick reference.
Prerequisite:
You should already have created the certstore.nsf on your servers.   If you haven't,  just go to your administration server and issue the command "load certmgr" and it will create the certstore.nsf on that server.  Once you've done that, issue the same command on any servers you want to replicate it with and they'll pull it from the admin server.   Add "certmgr" to your servertasks= line in the servers' INI file as well.
So here's quick reference:
1. Open certstore.nsf and click "Add TLS Credentials"
	Fill out the stuff on the Main Tab.  Primarily these fields are the minimum.
		Host Names:	- Whatever the FQDN name of the website will be.   For wildcards, you can use *.
				- example:  *.thenorth.com
		Provider:	- Manual (you must set this)
		CN:		-The primary FQDN of the website.  For wildcards, you can use *.
				- example:  *.thenorth.com
2. Click the action button "Create Exportable Key"
 	You'll be required to enter a strong password.  Write it down.
3. Click the action button "Submit Request"
	Wait a sec for it to process, then re-open the document
4.  Make a folder somewhere to put all the text files and certificates in
	I recommend something like "\certificates\domainname\[currentyear]\"
5. Copy the CSR from the "Manual Request" tab
	You'll need this to make the request from the SSL provider
	I recommend you save this to a folder and name it something ending in .csr
6.  Copy the Private Key from the "Exportable Key" field on the "Manual" tab
	Save the exportable private key in a text file.  I suggest adding "-encrypted.key" to the end of the file name.
7.  Submit the CSR to your provider and jump through their verification hoops
8.  Download the certificate bundle from the provider
	If it's in P7b format, convert it to PEM with this command:
		openssl pkcs7 -print_certs -in bundlfilename.p7b -out bundlefilename.pem
9. Go back to the certstore.nsf file and edit that TLS document
	On the "Manual" tab, paste contents of the PEM file info the "Certificates and Roots" field
10.  Submit the request again
	Wait a minute for it to process
	It should be a valid TLS configuration at this point.
11.  You still need a keyring file to put in fields (why? don't know) and you may want to use this credential set elsewhere
12.  Export from the TLS document using the "export TLS Credentials" button.  
	This is mostly for people like me who use a wildcard certificate so you can use these credentials 
	on appliances that can import them, but it's also need to make a proper kyr file.
	Use the radio button for  "Base64 Encoded x.509"
	Set the 	friendlyname:	No spaces.  Probably you should  just use the fqdn.
	File name to export:  	(example) thenorth_wildcard_tls_exported.pem
 
13. Decrypt the exported private key
	openssl rsa -in keyfilename-encrypted.key -out keyfilename-decrypted.key
14. Create a Domino kyr file
	kyrtool create -k kyrfilename.kyr -p "xxxxxxxxx"
	Notes:
		If you don't already have the kyrtool get it from HCL or find it on a windows server install.
		Copy the kyrtool.exe to your notes program directory.
		Make sure the notes program directory is in your path
		The most common cause of errors is a path problem.  if in doubt, put quotes 
		around your paths and specify exact paths to all files on that command line.
		
		The keyfile will be created in the notes data directory!!
15. Import the private key into the kyr file
	kyrtool import keys -k keyfilename.kyr -i keyfilename-decrypted.key
	
16. Import the PEM bundle into the kyr file
	kyrtool import certs -i exported-tls-file.pem -k keyfilename.kyr 
17. Copy the kyr an sth files from the notes data directory to somewhere safe.
	Probably a great idea to put all these files you've used together in one place
	(remember that folder we created before) and maybe back it up.
18.  Reference the "KYR" keyring file on the server document and the website document as usual 
	(yes, even though you're using certstore.nsf) and You should now have a valid TLS/SSL 
	configuration that lasts until the certificate expires. 
|  | Comment Entry | 
Please wait while your document is saved.