In the last step it is important to use a password for the target key, as it must be encrypted.
When the steps are finished, upload the files certificate.pem and key.pkcs8 in the administration service and select the check boxes for each CA certificate in the chain.