HTTPS Certificate Tab
Administration > General Settings > Setup > HTTPS Certificate
The VXOA software includes a self-signed certificate that secures the communication between the user’s browser and the appliance.
You also have the option to install your own custom certificate, acquired from a CA certificate authority.
To use a custom certificate with a specific appliance:
-
Consult with your IT security team to generate a certificate signing request (CSR), and then submit it to your organization’s chosen SSL Certificate Authority (CA).
Examples of Certificate Authorities include GoDaddy, Verisign, Comodo, Symantec, Microsoft Entrust, GeoTrust, and so forth.
-
For a list of what is supported, refer to EdgeConnect and Orchestrator Security Algorithms.
-
All certificate and key files must be in PEM format.
-
-
After the Certificate Authority provides a CA-verified certificate:
-
If your IT security team advises the use of an Intermediate CA, use an Intermediate Certificate File. Otherwise, skip this file.
-
Click the Edit icon next to the target appliance, and upload the certificate file from the CA.
-
Upload the Private Key File that was generated as part of the CSR.
-
-
To associate the CA-verified certificate for use with Orchestrator, click Add.
HTTPS Certificate Edit Row
Select one of the following two options:
-
Self Signed Certificate – The VXOA software includes a self-signed certificate that secures the communication between the user’s browser and the appliance.
-
Custom Certificate – You also have the option to install your own custom certificate, acquired from a CA certificate authority.
To use a custom certificate with a specific appliance:
-
Consult with your IT security team to generate a certificate signing request (CSR), and then submit it to your organization’s chosen SSL Certificate Authority (CA).
Examples of Certificate Authorities include GoDaddy, Verisign, Comodo, Symantec, Microsoft Entrust, GeoTrust, and so forth.
-
For a list of what is supported, refer to EdgeConnect and Orchestrator Security Algorithms.
-
All certificate and key files must be in PEM format.
-
-
After the Certificate Authority provides a CA-verified certificate:
-
If your IT security team advises the use of an Intermediate CA, use an Intermediate Certificate File. Otherwise, skip this file.
-
Click the Edit icon next to the target appliance, and Upload the Certificate File from the CA.
-
Upload the Private Key File that was generated as part of the CSR.
-
-
To associate the CA verified certificate for use with Orchestrator, click Add.