diff --git a/buildCert.yml b/buildCert.yml
new file mode 100644
index 0000000000000000000000000000000000000000..6ac5a3df76833d1f00febd5e100e30ff5a75360c
--- /dev/null
+++ b/buildCert.yml
@@ -0,0 +1,88 @@
+--- 
+- name: "Check client ca certificate"
+  register: ca_cert
+  stat: "path={{ x509_cacert_file }}"
+
+- name: "Check certificate and key"
+  shell: (openssl x509 -noout -modulus -in {{ x509_cert_file }}  | openssl md5 ; openssl rsa -noout -modulus -in {{ x509_key_file }} | openssl md5) | uniq | wc -l
+  register: certcheck
+
+- name: "Check certificate"
+  register: cert
+  stat: "path={{ x509_cert_file }}"
+
+- name: "Check key"
+  register: key
+  stat: "path={{ x509_key_file }}"
+  sudo: true
+
+- name: "Default: we don't need a new certificate"
+  set_fact: needcert=False
+
+- name: "Set need cert if key is missing"
+  set_fact: needcert=True
+  when: key.stat.exists == false
+
+- name: "set needcert if cert is missing"
+  set_fact: needcert=True
+  when: cert.stat.exists == false
+
+- name: "set needcert if cert doesn't match key"
+  set_fact: needcert=True
+  when: certcheck.stdout == '2'
+
+
+- name: "Creating Keypair"
+  shell: "echo noop when using easy-rsa"
+  when: needcert
+
+- name: "Creating CSR"
+  shell: " cd /etc/easy-rsa/2.0; source ./vars; export EASY_RSA=\"${EASY_RSA:-.}\"; \"$EASY_RSA\"/pkitool --csr {{ x509_csr_args }} {{ common_name }}"
+  when: needcert
+  sudo: true
+
+- name: "Copy CSR to ansible host"
+  fetch: "src=/etc/easy-rsa/2.0/keys/{{ common_name }}.csr dest=/tmp/{{ common_name }}/ fail_on_missing=yes validate_md5=yes flat=yes"
+  sudo: true
+  when: needcert
+
+- name: "Copy CSR to CA"
+  delegate_to: "{{ x509_ca_server }}"
+  copy: "src=/tmp/{{ ansible_fqdn }}/{{ common_name }}.csr dest=/etc/easy-rsa/2.0/keys/{{ common_name }}.csr force=yes"
+  when: needcert
+  sudo: true
+
+- name: "Sign Certificate"
+  delegate_to: "{{ x509_ca_server }}"
+  shell:    "source ./vars; export EASY_RSA=\"${EASY_RSA:-.}\" ;\"$EASY_RSA\"/pkitool --sign {{ common_name }}"
+  args:
+    chdir: "/etc/easy-rsa/2.0"
+  sudo: true
+  when: needcert
+
+- name: "Copy the Certificate to ansible host"
+  delegate_to: "{{ x509_ca_server }}"
+  fetch: "src=/etc/easy-rsa/2.0/keys/{{ common_name }}.crt dest=/tmp/{{ common_name }}/ fail_on_missing=yes validate_md5=yes flat=yes"
+  sudo: true
+  when: needcert
+
+- name: "Copy the CA Certificate to the ansible host"
+  delegate_to: "{{ x509_ca_server }}"
+  fetch: "src=/etc/easy-rsa/2.0/keys/ca.crt dest=/tmp/ca.crt fail_on_missing=yes validate_md5=yes flat=yes"
+  sudo: true
+  when: "ca_cert.stat.exists == false"
+
+- name: "Copy the certificate to the node"
+  copy: "src=/tmp/{{ common_name }}/{{ common_name }}.crt dest={{ x509_cert_file }} force=yes"
+  sudo: true
+  when: needcert
+
+- name: "Copy the CA certificate to the node"
+  copy: "src=/tmp/ca.crt dest={{ x509_cacert_file }}"
+  sudo: true
+  when: "ca_cert.stat.exists == false"
+
+- name: "Copy the key to the correct location"
+  shell: "mkdir -p `dirname {{ x509_key_file }}` ; chmod 700 `dirname {{ x509_key_file }}` ; cp /etc/easy-rsa/2.0/keys/{{ common_name }}.key {{ x509_key_file }}"
+  sudo: true
+  when: needcert
diff --git a/roles/OpenVPN-Client/defaults/main.yml b/roles/OpenVPN-Client/defaults/main.yml
deleted file mode 100644
index 6d22a916d5873c96abec94d19b7a180d7ac7d280..0000000000000000000000000000000000000000
--- a/roles/OpenVPN-Client/defaults/main.yml
+++ /dev/null
@@ -1,8 +0,0 @@
----
-countryName: "AU" 
-reginalName: "Victoria" 
-cityName: "Melbourne"
-organizationName: "Monash University"
-emailAddress: "default@default.org"
-organizationUnit: "defaultUnit"
-
diff --git a/roles/OpenVPN-Client/handlers/main.yml b/roles/OpenVPN-Client/handlers/main.yml
index f4d46a524e4bead9d9c68d927029967e6b915737..576203a36d646abaeed00f1688f1758cb750eb3b 100644
--- a/roles/OpenVPN-Client/handlers/main.yml
+++ b/roles/OpenVPN-Client/handlers/main.yml
@@ -1,3 +1,4 @@
 ---
   - name: restart openvpn
-    service: name=openvpn state=restarted
\ No newline at end of file
+    service: name=openvpn state=restarted
+    sudo: true
diff --git a/roles/OpenVPN-Client/meta/main.yml b/roles/OpenVPN-Client/meta/main.yml
new file mode 100644
index 0000000000000000000000000000000000000000..ffdd74765462d9ff83e248c56a56f17064dda0ed
--- /dev/null
+++ b/roles/OpenVPN-Client/meta/main.yml
@@ -0,0 +1,3 @@
+---
+dependencies:
+  - { role: easy-rsa-certificate, x509_csr_args="" }
diff --git a/roles/OpenVPN-Client/tasks/installOpenVPN.yml b/roles/OpenVPN-Client/tasks/installOpenVPN.yml
index 3b5999e0b6f834c44356c84a0b911c12098e0f6d..7c1777813feab0e88526addd358c7c5c29d4b9d2 100644
--- a/roles/OpenVPN-Client/tasks/installOpenVPN.yml
+++ b/roles/OpenVPN-Client/tasks/installOpenVPN.yml
@@ -1,4 +1,11 @@
 --- 
-- 
-  name: "Install OpenVPN"
+- name: "Install OpenVPN"
   yum: "name=openvpn state=present"
+  sudo: true
+  notify: restart openvpn
+
+- name: "Copying client.conf to the OpenVPN client"
+  template: "src=client.conf.j2 dest=/etc/openvpn/client.conf"
+  sudo: true
+  notify: restart openvpn
+
diff --git a/roles/OpenVPN-Client/tasks/main.yml b/roles/OpenVPN-Client/tasks/main.yml
index 7939b7cdbe2222af4bc5436553bc99a103d867fb..640caecb77a0a6dd6b63c0347e2ebef484ff182f 100644
--- a/roles/OpenVPN-Client/tasks/main.yml
+++ b/roles/OpenVPN-Client/tasks/main.yml
@@ -1,5 +1,8 @@
 ---
 -
  include: installOpenVPN.yml
--
- include: copyCerts.yml
+
+- name: "Start OpenVPN"
+  service: name=openvpn state=started
+  sudo: true
+
diff --git a/roles/OpenVPN-Client/templates/client.conf.j2 b/roles/OpenVPN-Client/templates/client.conf.j2
index ab437a6687ba19603c723c0340630fb5d6da692a..279e50543b60b984531a1052faa4684a0c23b4c7 100644
--- a/roles/OpenVPN-Client/templates/client.conf.j2
+++ b/roles/OpenVPN-Client/templates/client.conf.j2
@@ -33,13 +33,15 @@ dev tun
 # Are we connecting to a TCP or
 # UDP server?  Use the same setting as
 # on the server.
-proto tcp
-;proto udp
+;proto tcp
+proto udp
 
 # The hostname/IP and port of the server.
 # You can have multiple remote entries
 # to load balance between the servers.
-remote {{ server }} 1194
+{% for item in openvpn_servers %}
+remote {{ item }} 1194
+{% endfor %}
 
 # Choose a random host from the remote
 # list for load-balancing.  Otherwise
@@ -84,9 +86,9 @@ persist-tun
 # a separate .crt/.key file pair
 # for each client.  A single ca
 # file can be used for all clients.
-ca ca.crt
-cert {{ inventory_hostname }}.crt
-key {{ inventory_hostname }}.key
+ca {{ x509_cacert_file }}
+cert {{ x509_cert_file }}
+key {{ x509_key_file }}
 
 # Verify server certificate by checking
 # that the certicate has the nsCertType
diff --git a/roles/OpenVPN-Client/vars/main.yml b/roles/OpenVPN-Client/vars/main.yml
new file mode 100644
index 0000000000000000000000000000000000000000..878dc2458eb9c62766729944803045e8aec7a68b
--- /dev/null
+++ b/roles/OpenVPN-Client/vars/main.yml
@@ -0,0 +1,6 @@
+---
+x509_csr_args: ""
+x509_cacert_file: "/etc/ssl/certs/cacert.crt"
+x509_key_file: "/etc/ssl/private/client.key"
+x509_cert_file: "/etc/ssl/certs/client.crt"
+x509_common_name: "{{ ansible_fqdn }}_OpenVPN_Client"
diff --git a/roles/OpenVPN-Server/defaults/main.yml b/roles/OpenVPN-Server/defaults/main.yml
deleted file mode 100644
index 85154e01ac9067415beb78d84ecf4dbf7c7e60ff..0000000000000000000000000000000000000000
--- a/roles/OpenVPN-Server/defaults/main.yml
+++ /dev/null
@@ -1,7 +0,0 @@
----
-countryName: "AU" 
-reginalName: "Victoria" 
-cityName: "Melbourne"
-organizationName: "Monash University"
-emailAddress: "default@default.org"
-organizationUnit: "defaultUnit"
diff --git a/roles/OpenVPN-Server/files/server.conf b/roles/OpenVPN-Server/files/server.conf
deleted file mode 100644
index 3db92f285081e470e1cf89154ebfe26e79644dc2..0000000000000000000000000000000000000000
--- a/roles/OpenVPN-Server/files/server.conf
+++ /dev/null
@@ -1,299 +0,0 @@
-#################################################
-# Sample OpenVPN 2.0 config file for            #
-# multi-client server.                          #
-#                                               #
-# This file is for the server side              #
-# of a many-clients <-> one-server              #
-# OpenVPN configuration.                        #
-#                                               #
-# OpenVPN also supports                         #
-# single-machine <-> single-machine             #
-# configurations (See the Examples page         #
-# on the web site for more info).               #
-#                                               #
-# This config should work on Windows            #
-# or Linux/BSD systems.  Remember on            #
-# Windows to quote pathnames and use            #
-# double backslashes, e.g.:                     #
-# "C:\\Program Files\\OpenVPN\\config\\foo.key" #
-#                                               #
-# Comments are preceded with '#' or ';'         #
-#################################################
-
-# Which local IP address should OpenVPN
-# listen on? (optional)
-local vm-server
-
-# Which TCP/UDP port should OpenVPN listen on?
-# If you want to run multiple OpenVPN instances
-# on the same machine, use a different port
-# number for each one.  You will need to
-# open up this port on your firewall.
-port 1194
-
-# TCP or UDP server?
-proto tcp
-;proto udp
-
-# "dev tun" will create a routed IP tunnel,
-# "dev tap" will create an ethernet tunnel.
-# Use "dev tap0" if you are ethernet bridging
-# and have precreated a tap0 virtual interface
-# and bridged it with your ethernet interface.
-# If you want to control access policies
-# over the VPN, you must create firewall
-# rules for the the TUN/TAP interface.
-# On non-Windows systems, you can give
-# an explicit unit number, such as tun0.
-# On Windows, use "dev-node" for this.
-# On most systems, the VPN will not function
-# unless you partially or fully disable
-# the firewall for the TUN/TAP interface.
-;dev tap
-dev tun
-
-# Windows needs the TAP-Win32 adapter name
-# from the Network Connections panel if you
-# have more than one.  On XP SP2 or higher,
-# you may need to selectively disable the
-# Windows firewall for the TAP adapter.
-# Non-Windows systems usually don't need this.
-;dev-node MyTap
-
-# SSL/TLS root certificate (ca), certificate
-# (cert), and private key (key).  Each client
-# and the server must have their own cert and
-# key file.  The server and all clients will
-# use the same ca file.
-#
-# See the "easy-rsa" directory for a series
-# of scripts for generating RSA certificates
-# and private keys.  Remember to use
-# a unique Common Name for the server
-# and each of the client certificates.
-#
-# Any X509 key management system can be used.
-# OpenVPN can also use a PKCS #12 formatted key file
-# (see "pkcs12" directive in man page).
-ca ca.crt
-cert vm-server.crt
-key vm-server.key  # This file should be kept secret
-
-# Diffie hellman parameters.
-# Generate your own with:
-#   openssl dhparam -out dh1024.pem 1024
-# Substitute 2048 for 1024 if you are using
-# 2048 bit keys. 
-dh dh512.pem
-
-# Configure server mode and supply a VPN subnet
-# for OpenVPN to draw client addresses from.
-# The server will take 10.8.0.1 for itself,
-# the rest will be made available to clients.
-# Each client will be able to reach the server
-# on 10.8.0.1. Comment this line out if you are
-# ethernet bridging. See the man page for more info.
-server 10.8.0.0 255.255.255.0
-
-# Maintain a record of client <-> virtual IP address
-# associations in this file.  If OpenVPN goes down or
-# is restarted, reconnecting clients can be assigned
-# the same virtual IP address from the pool that was
-# previously assigned.
-ifconfig-pool-persist ipp.txt
-
-# Configure server mode for ethernet bridging.
-# You must first use your OS's bridging capability
-# to bridge the TAP interface with the ethernet
-# NIC interface.  Then you must manually set the
-# IP/netmask on the bridge interface, here we
-# assume 10.8.0.4/255.255.255.0.  Finally we
-# must set aside an IP range in this subnet
-# (start=10.8.0.50 end=10.8.0.100) to allocate
-# to connecting clients.  Leave this line commented
-# out unless you are ethernet bridging.
-;server-bridge 10.8.0.4 255.255.255.0 10.8.0.50 10.8.0.100
-
-# Configure server mode for ethernet bridging
-# using a DHCP-proxy, where clients talk
-# to the OpenVPN server-side DHCP server
-# to receive their IP address allocation
-# and DNS server addresses.  You must first use
-# your OS's bridging capability to bridge the TAP
-# interface with the ethernet NIC interface.
-# Note: this mode only works on clients (such as
-# Windows), where the client-side TAP adapter is
-# bound to a DHCP client.
-;server-bridge
-
-# Push routes to the client to allow it
-# to reach other private subnets behind
-# the server.  Remember that these
-# private subnets will also need
-# to know to route the OpenVPN client
-# address pool (10.8.0.0/255.255.255.0)
-# back to the OpenVPN server.
-;push "route 192.168.10.0 255.255.255.0"
-;push "route 192.168.20.0 255.255.255.0"
-
-# To assign specific IP addresses to specific
-# clients or if a connecting client has a private
-# subnet behind it that should also have VPN access,
-# use the subdirectory "ccd" for client-specific
-# configuration files (see man page for more info).
-
-# EXAMPLE: Suppose the client
-# having the certificate common name "Thelonious"
-# also has a small subnet behind his connecting
-# machine, such as 192.168.40.128/255.255.255.248.
-# First, uncomment out these lines:
-;client-config-dir ccd
-;route 192.168.40.128 255.255.255.248
-# Then create a file ccd/Thelonious with this line:
-#   iroute 192.168.40.128 255.255.255.248
-# This will allow Thelonious' private subnet to
-# access the VPN.  This example will only work
-# if you are routing, not bridging, i.e. you are
-# using "dev tun" and "server" directives.
-
-# EXAMPLE: Suppose you want to give
-# Thelonious a fixed VPN IP address of 10.9.0.1.
-# First uncomment out these lines:
-;client-config-dir ccd
-;route 10.9.0.0 255.255.255.252
-# Then add this line to ccd/Thelonious:
-#   ifconfig-push 10.9.0.1 10.9.0.2
-
-# Suppose that you want to enable different
-# firewall access policies for different groups
-# of clients.  There are two methods:
-# (1) Run multiple OpenVPN daemons, one for each
-#     group, and firewall the TUN/TAP interface
-#     for each group/daemon appropriately.
-# (2) (Advanced) Create a script to dynamically
-#     modify the firewall in response to access
-#     from different clients.  See man
-#     page for more info on learn-address script.
-;learn-address ./script
-
-# If enabled, this directive will configure
-# all clients to redirect their default
-# network gateway through the VPN, causing
-# all IP traffic such as web browsing and
-# and DNS lookups to go through the VPN
-# (The OpenVPN server machine may need to NAT
-# or bridge the TUN/TAP interface to the internet
-# in order for this to work properly).
-;push "redirect-gateway def1 bypass-dhcp"
-
-# Certain Windows-specific network settings
-# can be pushed to clients, such as DNS
-# or WINS server addresses.  CAVEAT:
-# http://openvpn.net/faq.html#dhcpcaveats
-# The addresses below refer to the public
-# DNS servers provided by opendns.com.
-;push "dhcp-option DNS 208.67.222.222"
-;push "dhcp-option DNS 208.67.220.220"
-
-# Uncomment this directive to allow different
-# clients to be able to "see" each other.
-# By default, clients will only see the server.
-# To force clients to only see the server, you
-# will also need to appropriately firewall the
-# server's TUN/TAP interface.
-;client-to-client
-
-# Uncomment this directive if multiple clients
-# might connect with the same certificate/key
-# files or common names.  This is recommended
-# only for testing purposes.  For production use,
-# each client should have its own certificate/key
-# pair.
-#
-# IF YOU HAVE NOT GENERATED INDIVIDUAL
-# CERTIFICATE/KEY PAIRS FOR EACH CLIENT,
-# EACH HAVING ITS OWN UNIQUE "COMMON NAME",
-# UNCOMMENT THIS LINE OUT.
-;duplicate-cn
-
-# The keepalive directive causes ping-like
-# messages to be sent back and forth over
-# the link so that each side knows when
-# the other side has gone down.
-# Ping every 10 seconds, assume that remote
-# peer is down if no ping received during
-# a 120 second time period.
-keepalive 10 120
-
-# For extra security beyond that provided
-# by SSL/TLS, create an "HMAC firewall"
-# to help block DoS attacks and UDP port flooding.
-#
-# Generate with:
-#   openvpn --genkey --secret ta.key
-#
-# The server and each client must have
-# a copy of this key.
-# The second parameter should be '0'
-# on the server and '1' on the clients.
-;tls-auth ta.key 0 # This file is secret
-
-# Select a cryptographic cipher.
-# This config item must be copied to
-# the client config file as well.
-cipher BF-CBC        # Blowfish (default)
-;cipher AES-128-CBC   # AES
-;cipher DES-EDE3-CBC  # Triple-DES
-
-# Enable compression on the VPN link.
-# If you enable it here, you must also
-# enable it in the client config file.
-comp-lzo
-
-# The maximum number of concurrently connected
-# clients we want to allow.
-max-clients 100
-
-# It's a good idea to reduce the OpenVPN
-# daemon's privileges after initialization.
-#
-# You can uncomment this out on
-# non-Windows systems.
-;user nobody
-;group nobody
-
-# The persist options will try to avoid
-# accessing certain resources on restart
-# that may no longer be accessible because
-# of the privilege downgrade.
-persist-key
-persist-tun
-
-# Output a short status file showing
-# current connections, truncated
-# and rewritten every minute.
-status openvpn-status.log
-
-# By default, log messages will go to the syslog (or
-# on Windows, if running as a service, they will go to
-# the "\Program Files\OpenVPN\log" directory).
-# Use log or log-append to override this default.
-# "log" will truncate the log file on OpenVPN startup,
-# while "log-append" will append to it.  Use one
-# or the other (but not both).
-log         openvpn.log
-;log-append  openvpn.log
-
-# Set the appropriate level of log
-# file verbosity.
-#
-# 0 is silent, except for fatal errors
-# 4 is reasonable for general usage
-# 5 and 6 can help to debug connection problems
-# 9 is extremely verbose
-verb 3
-
-# Silence repeating messages.  At most 20
-# sequential messages of the same message
-# category will be output to the log.
-;mute 20
diff --git a/roles/OpenVPN-Server/handlers/main.yml b/roles/OpenVPN-Server/handlers/main.yml
index f4d46a524e4bead9d9c68d927029967e6b915737..576203a36d646abaeed00f1688f1758cb750eb3b 100644
--- a/roles/OpenVPN-Server/handlers/main.yml
+++ b/roles/OpenVPN-Server/handlers/main.yml
@@ -1,3 +1,4 @@
 ---
   - name: restart openvpn
-    service: name=openvpn state=restarted
\ No newline at end of file
+    service: name=openvpn state=restarted
+    sudo: true
diff --git a/roles/OpenVPN-Server/meta/main.yml b/roles/OpenVPN-Server/meta/main.yml
new file mode 100644
index 0000000000000000000000000000000000000000..fea95205a62ffc78fd8ebcf73b61a89b46916eb5
--- /dev/null
+++ b/roles/OpenVPN-Server/meta/main.yml
@@ -0,0 +1,3 @@
+---
+dependencies:
+  - { role: easy-rsa-certificate, x509_csr_args="--server" }
diff --git a/roles/OpenVPN-Server/tasks/copyCerts.yml b/roles/OpenVPN-Server/tasks/copyCerts.yml
index 243fae4b19a47abde51879f623bb73d80fe1b466..c0a99622227b16d3465b8694e625f874246524ef 100644
--- a/roles/OpenVPN-Server/tasks/copyCerts.yml
+++ b/roles/OpenVPN-Server/tasks/copyCerts.yml
@@ -17,3 +17,6 @@
         - ../files/
   notify: restart openvpn
 
+- name: "Start OpenVPN"
+  service: name=openvpn state=started
+  sudo: true
diff --git a/roles/OpenVPN-Server/tasks/installOpenVPN.yml b/roles/OpenVPN-Server/tasks/installOpenVPN.yml
index 3b5999e0b6f834c44356c84a0b911c12098e0f6d..fe7c052f8a153fbb4baff29ed47bdfe953e88edc 100644
--- a/roles/OpenVPN-Server/tasks/installOpenVPN.yml
+++ b/roles/OpenVPN-Server/tasks/installOpenVPN.yml
@@ -1,4 +1,16 @@
 --- 
-- 
-  name: "Install OpenVPN"
+- name: "Install OpenVPN"
   yum: "name=openvpn state=present"
+  notify: "restart openvpn"
+  sudo: true
+
+- name: "Generate DH parameters"
+  shell: openssl dhparam -out {{ dhparms_file }} 512
+  args:
+    creates: "{{ dhparms_file }}"
+  sudo: true
+
+- name: "Configure OpenVPN Server"
+  template: "src=server.conf.j2 dest=/etc/openvpn/server.conf"
+  notify: "restart openvpn"
+  sudo: true
diff --git a/roles/OpenVPN-Server/tasks/main.yml b/roles/OpenVPN-Server/tasks/main.yml
index 7939b7cdbe2222af4bc5436553bc99a103d867fb..387f2bca8837485a71491c9becc9e4fc0362e416 100644
--- a/roles/OpenVPN-Server/tasks/main.yml
+++ b/roles/OpenVPN-Server/tasks/main.yml
@@ -1,5 +1,7 @@
 ---
 -
  include: installOpenVPN.yml
--
- include: copyCerts.yml
+
+- name: "Start OpenVPN"
+  service: name=openvpn state=started
+  sudo: true
diff --git a/roles/OpenVPN-Server/templates/server.conf.j2 b/roles/OpenVPN-Server/templates/server.conf.j2
index f191cb4571d09f01912c74943598a4c3cf3779a1..9d9d5fef88145687378d9e307d5adad91166b364 100644
--- a/roles/OpenVPN-Server/templates/server.conf.j2
+++ b/roles/OpenVPN-Server/templates/server.conf.j2
@@ -32,8 +32,8 @@ local {{ inventory_hostname }}
 port 1194
 
 # TCP or UDP server?
-proto tcp
-;proto udp
+;proto tcp
+proto udp
 
 # "dev tun" will create a routed IP tunnel,
 # "dev tap" will create an ethernet tunnel.
@@ -75,16 +75,16 @@ dev tun
 # Any X509 key management system can be used.
 # OpenVPN can also use a PKCS #12 formatted key file
 # (see "pkcs12" directive in man page).
-ca ca.crt
-cert {{ inventory_hostname }}.crt
-key {{ inventory_hostname }}.key  
+ca {{ x509_cacert_file }}
+cert {{ x509_cert_file }}
+key {{ x509_key_file }}
 
 # Diffie hellman parameters.
 # Generate your own with:
 #   openssl dhparam -out dh1024.pem 1024
 # Substitute 2048 for 1024 if you are using
 # 2048 bit keys. 
-dh dh512.pem
+dh {{ dhparms_file }}
 
 # Configure server mode and supply a VPN subnet
 # for OpenVPN to draw client addresses from.
@@ -201,7 +201,7 @@ ifconfig-pool-persist ipp.txt
 # To force clients to only see the server, you
 # will also need to appropriately firewall the
 # server's TUN/TAP interface.
-;client-to-client
+client-to-client
 
 # Uncomment this directive if multiple clients
 # might connect with the same certificate/key
diff --git a/roles/OpenVPN-Server/vars/main.yml b/roles/OpenVPN-Server/vars/main.yml
new file mode 100644
index 0000000000000000000000000000000000000000..84cc2861a18390a45dafc791ee80de8bf1e3a132
--- /dev/null
+++ b/roles/OpenVPN-Server/vars/main.yml
@@ -0,0 +1,7 @@
+---
+x509_csr_args: "--server"
+x509_cacert_file: "/etc/ssl/certs/cacert.pem"
+x509_key_file: "/etc/ssl/private/server.key"
+x509_cert_file: "/etc/ssl/certs/server.pem"
+x509_common_name: "{{ ansible_fqdn }}_OpenVPN_Server"
+dhparms_file: "/etc/ssl/private/dh.pem"
diff --git a/roles/easy-rsa-CA-client/meta/main.yml b/roles/easy-rsa-CA-client/meta/main.yml
deleted file mode 100644
index 47d82924b50117d9d5b167e74845abc912ac292e..0000000000000000000000000000000000000000
--- a/roles/easy-rsa-CA-client/meta/main.yml
+++ /dev/null
@@ -1,4 +0,0 @@
----
-depdenencies:
-  - {role: easy-rsa-common }
-
diff --git a/roles/easy-rsa-CA-client/tasks/buildClientCert.yml b/roles/easy-rsa-CA-client/tasks/buildClientCert.yml
deleted file mode 100644
index 8aa0107f94a014111438d61476be16d9aa3f635e..0000000000000000000000000000000000000000
--- a/roles/easy-rsa-CA-client/tasks/buildClientCert.yml
+++ /dev/null
@@ -1,31 +0,0 @@
---- 
-- name: "Check client ca certificate"
-  register: client_ca_cert
-  stat: "path=/etc/openvpn/ca.crt"
-
-- name: "Check client signed key certificate"
-  register: client_sign_cert
-  stat: "path=/etc/openvpn/{{ inventory_hostname }}.crt"
-
-- name: "Check client key"
-  register: client_key
-  stat: "path=/etc/openvpn/{{ inventory_hostname }}.key"
-
-- name: "Creating Client certificate"
-  delegate_to: "{{ server }}"
-  shell: " cd /etc/easy-rsa/2.0; source ./vars; export EASY_RSA=\"${EASY_RSA:-.}\"; \"$EASY_RSA\"/pkitool --csr {{ inventory_hostname }} ;\"$EASY_RSA\"/pkitool --sign {{ inventory_hostname }} creates=/etc/easy-rsa/2.0/keys/{{ inventory_hostname }}.crt"
-
-- name: "Copy the Client signed certificate to the master node"
-  delegate_to: "{{ server }}"
-  fetch: "src=/etc/easy-rsa/2.0/keys/{{ inventory_hostname }}.crt dest=/tmp/{{ inventory_hostname }}/ fail_on_missing=yes validate_md5=yes flat=yes"
-  when: "client_sign_cert.stat.exists == false"
-
-- name: "Copy the Client Key to the master node"
-  delegate_to: "{{ server }}"
-  fetch: "src=/etc/easy-rsa/2.0/keys/{{ inventory_hostname }}.key dest=/tmp/{{ inventory_hostname }}/ fail_on_missing=yes validate_md5=yes flat=yes"
-  when: "client_key.stat.exists == false"
-
-- name: "Copy the CA Certificate to the master node"
-  delegate_to: "{{ server }}"
-  fetch: "src=/etc/easy-rsa/2.0/keys/ca.crt dest=/tmp/{{ inventory_hostname }}/ fail_on_missing=yes validate_md5=yes flat=yes"
-  when: "client_ca_cert.stat.exists == false"
diff --git a/roles/easy-rsa-CA-client/tasks/main.yml b/roles/easy-rsa-CA-client/tasks/main.yml
deleted file mode 100644
index 73fc5d8700f83f489084aa0b075e86c0e3750c17..0000000000000000000000000000000000000000
--- a/roles/easy-rsa-CA-client/tasks/main.yml
+++ /dev/null
@@ -1,3 +0,0 @@
---- 
-- 
-  include: buildClientCert.yml
diff --git a/roles/easy-rsa-CA-server/tasks/buildServerCert.yml b/roles/easy-rsa-CA-server/tasks/buildServerCert.yml
deleted file mode 100644
index 1a35032965f45ca8ae1c12b88e433138af60939b..0000000000000000000000000000000000000000
--- a/roles/easy-rsa-CA-server/tasks/buildServerCert.yml
+++ /dev/null
@@ -1,9 +0,0 @@
---- 
-- name: "Creating Server certificate"
-  shell: "cd /etc/easy-rsa/2.0; source ./vars; export EASY_RSA=\"${EASY_RSA:-.}\"; \"$EASY_RSA/pkitool\" --server {{ server }} creates=/etc/easy-rsa/2.0/keys/{{ server }}.crt"
-
-- name: "Generating Diffie-Hellman Parameters"
-  shell: "cd /etc/easy-rsa/2.0; source ./vars; ./build-dh"
-  args:
-    chdir: /etc/easy-rsa/2.0/keys/
-    creates: dh512.pem
diff --git a/roles/easy-rsa-CA-server/tasks/main.yml b/roles/easy-rsa-CA-server/tasks/main.yml
deleted file mode 100644
index 69333644c40726ecf03556abf311c22838f1116a..0000000000000000000000000000000000000000
--- a/roles/easy-rsa-CA-server/tasks/main.yml
+++ /dev/null
@@ -1,3 +0,0 @@
---- 
-- 
-  include: buildServerCert.yml
diff --git a/roles/easy-rsa-CA/meta/main.yml b/roles/easy-rsa-CA/meta/main.yml
index 47d82924b50117d9d5b167e74845abc912ac292e..dc914d62df792bede60e60e0efe363085750c9f8 100644
--- a/roles/easy-rsa-CA/meta/main.yml
+++ b/roles/easy-rsa-CA/meta/main.yml
@@ -1,4 +1,5 @@
 ---
-depdenencies:
-  - {role: easy-rsa-common }
+allow_duplicates: yes
+dependencies:
+  - { role: easy-rsa-common }
 
diff --git a/roles/easy-rsa-CA/tasks/buildCA.yml b/roles/easy-rsa-CA/tasks/buildCA.yml
index f6624664d58df6670e926d5dad261f0e7f28e72b..671ef4e8eb3801d4442834f2a7eea94fa322b13d 100644
--- a/roles/easy-rsa-CA/tasks/buildCA.yml
+++ b/roles/easy-rsa-CA/tasks/buildCA.yml
@@ -3,4 +3,5 @@
   name: "Building the CA Certificate"
   shell: ' cd /etc/easy-rsa/2.0; source ./vars; ./clean-all;  export EASY_RSA="${EASY_RSA:-.}"; "$EASY_RSA/pkitool" --initca $*'
   args:
-    creates: /etc/easy-rsa/2.0/keys
+    creates: /etc/easy-rsa/2.0/keys/ca.crt
+  sudo: True
diff --git a/roles/easy-rsa-CA-server/meta/main.yml b/roles/easy-rsa-certificate/meta/main.yml
similarity index 70%
rename from roles/easy-rsa-CA-server/meta/main.yml
rename to roles/easy-rsa-certificate/meta/main.yml
index 47d82924b50117d9d5b167e74845abc912ac292e..837a763b2876b919420ce91f0d9fdcd0cfe6afd2 100644
--- a/roles/easy-rsa-CA-server/meta/main.yml
+++ b/roles/easy-rsa-certificate/meta/main.yml
@@ -1,4 +1,4 @@
 ---
-depdenencies:
+dependencies:
   - {role: easy-rsa-common }
 
diff --git a/roles/easy-rsa-certificate/tasks/buildCert.yml b/roles/easy-rsa-certificate/tasks/buildCert.yml
new file mode 100644
index 0000000000000000000000000000000000000000..e2f1517f767e040f51a19670e853344008ec99bf
--- /dev/null
+++ b/roles/easy-rsa-certificate/tasks/buildCert.yml
@@ -0,0 +1,96 @@
+--- 
+- name: "Check client ca certificate"
+  register: ca_cert
+  stat: "path={{ x509_cacert_file }}"
+
+- name: "Check certificate and key"
+  shell: (openssl x509 -noout -modulus -in {{ x509_cert_file }}  | openssl md5 ; openssl rsa -noout -modulus -in {{ x509_key_file }} | openssl md5) | uniq | wc -l
+  register: certcheck
+  sudo: true
+
+- name: "Check certificate"
+  register: cert
+  stat: "path={{ x509_cert_file }}"
+  sudo: true
+
+- name: "Check key"
+  register: key
+  stat: "path={{ x509_key_file }}"
+  sudo: true
+
+- name: "Default: we don't need a new certificate"
+  set_fact: needcert=False
+
+- name: "Set need cert if key is missing"
+  set_fact: needcert=True
+  when: key.stat.exists == false
+
+- name: "set needcert if cert is missing"
+  set_fact: needcert=True
+  when: cert.stat.exists == false
+
+- name: "set needcert if cert doesn't match key"
+  set_fact: needcert=True
+  when: certcheck.stdout == '2'
+
+
+- name: "Creating Keypair"
+  shell: "echo noop when using easy-rsa"
+  when: needcert
+
+- name: "Creating CSR"
+  shell: " cd /etc/easy-rsa/2.0; source ./vars; export EASY_RSA=\"${EASY_RSA:-.}\"; \"$EASY_RSA\"/pkitool --csr {{ x509_csr_args }} {{ x509_common_name }}"
+  args:
+    creates: "/etc/easy-rsa/2.0/keys/{{ x509_common_name }}.key"
+  when: needcert
+  sudo: true
+
+- name: "Copy CSR to ansible host"
+  fetch: "src=/etc/easy-rsa/2.0/keys/{{ x509_common_name }}.csr dest=/tmp/ fail_on_missing=yes validate_md5=yes flat=yes"
+  sudo: true
+  when: needcert
+
+- name: "Copy CSR to CA"
+  delegate_to: "{{ x509_ca_server }}"
+  copy: "src=/tmp/{{ x509_common_name }}.csr dest=/etc/easy-rsa/2.0/keys/{{ x509_common_name }}.csr force=yes"
+  when: needcert
+  sudo: true
+
+- name: "Sign Certificate"
+  delegate_to: "{{ x509_ca_server }}"
+  shell:    "source ./vars; export EASY_RSA=\"${EASY_RSA:-.}\" ;\"$EASY_RSA\"/pkitool --sign {{ x509_sign_args }} {{ x509_common_name }}"
+  args:
+    chdir: "/etc/easy-rsa/2.0"
+    creates: "/etc/easy-rsa/2.0/keys/{{ x509_common_name }}.crt"
+  sudo: true
+
+- name: "Copy the Certificate to ansible host"
+  delegate_to: "{{ x509_ca_server }}"
+  fetch: "src=/etc/easy-rsa/2.0/keys/{{ x509_common_name }}.crt dest=/tmp/ fail_on_missing=yes validate_md5=yes flat=yes"
+  sudo: true
+  when: needcert
+
+- name: "Copy the CA Certificate to the ansible host"
+  delegate_to: "{{ x509_ca_server }}"
+  fetch: "src=/etc/easy-rsa/2.0/keys/ca.crt dest=/tmp/ca.crt fail_on_missing=yes validate_md5=yes flat=yes"
+  sudo: true
+  when: "ca_cert.stat.exists == false"
+
+- name: "Make sure the path to the certificate exists"
+  shell: "mkdir -p `dirname {{ x509_cert_file }}` ; chmod 755  `dirname {{ x509_cert_file }}`"
+  sudo: true
+
+- name: "Copy the certificate to the node"
+  copy: "src=/tmp/{{ x509_common_name }}.crt dest={{ x509_cert_file }} force=yes"
+  sudo: true
+  when: needcert
+
+- name: "Copy the CA certificate to the node"
+  copy: "src=/tmp/ca.crt dest={{ x509_cacert_file }}"
+  sudo: true
+  when: "ca_cert.stat.exists == false"
+
+- name: "Copy the key to the correct location"
+  shell: "mkdir -p `dirname {{ x509_key_file }}` ; chmod 700 `dirname {{ x509_key_file }}` ; cp /etc/easy-rsa/2.0/keys/{{ x509_common_name }}.key {{ x509_key_file }}"
+  sudo: true
+  when: needcert
diff --git a/roles/easy-rsa-certificate/tasks/main.yml b/roles/easy-rsa-certificate/tasks/main.yml
new file mode 100644
index 0000000000000000000000000000000000000000..475415cc2e1cf8b2d9b7303f530544caf699011e
--- /dev/null
+++ b/roles/easy-rsa-certificate/tasks/main.yml
@@ -0,0 +1,3 @@
+--- 
+- 
+  include: buildCert.yml
diff --git a/roles/easy-rsa-certificate/vars/main.yml b/roles/easy-rsa-certificate/vars/main.yml
new file mode 100644
index 0000000000000000000000000000000000000000..b59020414c56eab836ff7d61f866758d9593d551
--- /dev/null
+++ b/roles/easy-rsa-certificate/vars/main.yml
@@ -0,0 +1,7 @@
+---
+x509_key_file: "/etc/ssl/private/server.key"
+x509_cert_file: "/etc/ssl/certs/server.crt"
+x509_cacert_file: "/etc/ssl/certs/ca.crt"
+x509_csr_args: ""
+x509_sign_args: "{{ x509_csr_args }}"
+x509_common_name: "{{ ansible_fqdn }}"
diff --git a/roles/easy-rsa-common/tasks/copyConfigurationFile.yml b/roles/easy-rsa-common/tasks/copyConfigurationFile.yml
index 0bd44099d8380443f30698d35f164c5dcf5b85f1..c7e3635b36f2e4e862fe47b6e70285f26bf26dd5 100644
--- a/roles/easy-rsa-common/tasks/copyConfigurationFile.yml
+++ b/roles/easy-rsa-common/tasks/copyConfigurationFile.yml
@@ -10,3 +10,11 @@
         - ../../../templates/easy-rsa/
         - ../files/
 
+  sudo: True
+
+- name: "Initialise easy-rsa"
+  shell: " source ./vars ; ./clean-all"
+  args:
+    chdir: "/etc/easy-rsa/2.0"
+    creates: "/etc/easy-rsa/2.0/keys"
+  sudo: true
diff --git a/roles/easy-rsa-common/tasks/installEasyRsa.yml b/roles/easy-rsa-common/tasks/installEasyRsa.yml
index 80d80a19dd03c8959774dd0a7d94d4a1ac4d7004..9062831491020d4597030217af28bde6b8eb9392 100644
--- a/roles/easy-rsa-common/tasks/installEasyRsa.yml
+++ b/roles/easy-rsa-common/tasks/installEasyRsa.yml
@@ -2,8 +2,10 @@
 - 
   name: "Installing easy-rsa"
   yum: "name=easy-rsa state=latest"
+  sudo: True
 - 
   name: "Moving easy-rsa to /etc"
   shell: "cp -rf /usr/share/easy-rsa /etc/"
   args:
     creates: /etc/easy-rsa
+  sudo: True