Server Certificates
Generate and install your server certificate for secure connections.
Last updated
Was this helpful?
Generate and install your server certificate for secure connections.
Last updated
Was this helpful?
The server certificate ensure secure connections to Cybus Connectware and must be properly maintained to avoid security issues. Regular certificate updates are necessary following Let's Encrypt renewals through certbot
or when deploying self-signed certificates in your environment.
Without proper certificate configuration, users may encounter browser security warnings when accessing the . To establish trusted communication within enterprise networks, Connectware requires server certificates that are trusted and validated by your organization's Public Key Infrastructure (PKI).
The following procedure can be performed on any system with OpenSSL installed.
To define the server certificate configuration, create or modify an openssl.cnf
file with the following parameters. Customize the values to match your specific environment:
To generate a new private key, run the following command:
Store the cybus_server.key
file in a secure location.
Generate a Certificate Sign Request (CSR) using your private key:
Submit the CSR to your IT department or certificate authority.
After receiving the signed server certificate, store the cybus_server.crt
file in a secure location.
Obtain the corporate certificate (.crt) and key (.key) files from your IT department.
Copy these files to Connectware's certificate volume using the following commands:
Replace [path-to/your-key-file.key]
and [path-to/your-cert-file.crt]
with the absolute paths to your key and certificate files.
Replace [namespace]
with the Kubernetes namespace that hosts your Connectware installation.
After updating the certificates, to apply the changes.
You must also add the CA certificate to Connectware to establish the trust chain. See .
After updating the certificates, to apply the changes.
You must also add the CA certificate to Connectware to establish the trust chain. See .