Use this workflow to create a trusted chain between Device Administrator and automation server using a CA certificate.
You need to be an administrator to install the CA certificate in Windows trusted storage. Refer to Windows for information on how to run a program as administrator.
Import the certificate.
For more information, see Importing an SSL Root Certificate Using Device Administrator .
Install the SSL root certificate in Windows trusted storage.
For more information, see Installing an SSL Root Certificate to Windows Trusted Root Certificate Storage Using Device Administrator .
Trust the invalid certificate so that Device Administrator can transfer the certificate to the automation server.
For more information, see Temporarily Trusting an Invalid Certificate .
Generate an SSL certificate for each automation server.
For more information, see Generating an SSL Certificate for an Automation Server Using Device Administrator .
If you have many automation servers in the list, you can use the Manage SSL Certificate Template to add default values for every new SSL certificate you want to generate.
For more information, see Generating an SSL Certificate for an Automation Server Using Device Administrator .
You save the list after you have generated the certificates for each automation server. It is recommended that you save the list after that you have generated the certificate for each automation server.
For more information, see Saving a List of Automation Servers .
Transfer the SSL certificate to all automation servers in the list. This must be done manually for each server.
For more information, see Transferring an SSL Certificate to Automation Server Using Device Administrator .
The certificates are included in the automation server’s backup. You do not need to generate a new certificate if you restore an automation server from a backup generated after the certificate was transferred to the automation server if you retain the original root certificate.