Use this workflow to create a trusted chain between Device Administrator and automation server using a CA certificate.
You need to be an administrator to install the CA certificate in Windows trusted storage. Refer to Windows for information on how to run a program as administrator.
Import the certificate.
Para obtener más información, consulte Importing an SSL Root Certificate Using Device Administrator .
Install the SSL root certificate in Windows trusted storage.
Para obtener más información, consulte Installing an SSL Root Certificate to Windows Trusted Root Certificate Storage Using Device Administrator .
Trust the invalid certificate so that Device Administrator can transfer the certificate to the automation server.
Para obtener más información, consulte Temporarily Trusting an Invalid Certificate .
Generate an SSL certificate for each automation server.
Para obtener más información, consulte Generating an SSL Certificate for an Automation Server Using Device Administrator .
If you have many automation servers in the list, you can use the Manage SSL Certificate Template to add default values for every new SSL certificate you want to generate.
Para obtener más información, consulte Generating an SSL Certificate for an Automation Server Using Device Administrator .
You save the list after you have generated the certificates for each automation server. It is recommended that you save the list after that you have generated the certificate for each automation server.
Para obtener más información, consulte Saving a List of Automation Servers .
Transfer the SSL certificate to all automation servers in the list. This must be done manually for each server.
Para obtener más información, consulte Transferring an SSL Certificate to Automation Server Using Device Administrator .
The certificates are included in the automation server’s backup. You do not need to generate a new certificate if you restore an automation server from a backup generated after the certificate was transferred to the automation server if you retain the original root certificate.