Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Note

This feature has changed since present version!

In previous PrivateServer releases you had to paste private key, certificate and possibly CA root to add a new Certificate and thus validate your hostname for the services exposed. That method obliged Service Administrators to directly deal with Certificate's Private Key, which is kind of sensitive information. Also keypair creation and management had to take place somewhere else outside PrivateServer and then imported. As an improvement of both security and usability since Since present version you can (and must) deal with Certificates directly on PrivateServer: you can create CSR on PrivateServer with automatic sdlfkslf. Thisi is why Certificate Creation has been split in two steps:

  1. New Key and CSR creation
  2. Actual New Certificate upload

New Key and CSR

So first of all you start by creating a CSR: click on the New Key and CSR link above the certificate table.

...

A warning confirming creation and a new row in TLS Keypair list shows generation process has been successful. 

Notetip

Using this new Certificate creation process you no longer don't have to deal directly with Private Keys.

...

Anyway you need to Download CSR before you're done with Certificate creation, so use first link shown in detailed view 

Xref
AnchorNameEdit_CSR_links
.

New Certificate upload

Once you have your CSR you just follow instructions by CA of your choice to obtain a new Certificate. As it's done, you can get back to form in 

Xref
AnchorNameEdit CSR
 and this time Upload certificate.

...