TLS/SSL certificates are essential for secure data exchange and verifying information integrity. To simplify working with certificates, Mividas Installer provides a suite of tools for certificate management.
Note: If valid certificates are delayed, Mividas Installer can generate temporary test certificates, including both a root CA and an intermediate CA issuer. These test certificates are intended only for development or proof-of-concept environments.
Access the certificate management tools by navigating to Certificates in the top menu.
Certificate Management Overview
In Certificates, you can upload certificate pairs, view certificate details, and manage existing certificates. For demo setups, a self-signed CA and certificate generator are also included.
When you first open Certificates, you’ll see an overview listing all available certificates with details such as expiration date, upload date, and issuer. You can also delete certificates as needed.
Click on a certificate’s title to view its details. You’ll find options to update the certificate, create a CSR request, or export the private key.
General Information about Certificates
Certificates should be in Base64-encoded PEM format, with the public certificate containing the full chain for compatibility across various services, browsers, and video conferencing systems.
The public certificate file should include the service certificate followed by the intermediate certificate(s) and the root CA. If the file contains only one certificate, some devices or services may not work correctly, even if everything looks good in the administrator’s web browser.
The public certificate file should include:
- The service certificate.
- Any intermediate certificates.
- The root CA.
Example Public Certificate Structure:
-----BEGIN CERTIFICATE-----
(Service certificate content)
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
(Intermediate CA content)
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
(Root CA content)
-----END CERTIFICATE-----
For external validation, use tools like SSL Labs or run openssl s_client -connect core.example.org:443
from the command line.
Uploading or Generating Certificates
Scroll down on the Certificate Overview page to find tools for:
- Uploading new certificates.
- Generating temporary self-signed certificates for products without assigned certificates.
- Creating new certificates.
Adding Custom CA Certificates
To allow secure communication between services, such as enabling Meeting Portal (e.g. portal.example.org
) to interact with Mividas Core (e.g., core.example.org
), upload custom CA certificates. This ensures that the CA signing core.example.org
is trusted by the Mividas Portal server.
Access custom CA tools by navigating to Certificates > CA / Intermediary in the Mividas Installer.
Certificate details
The Certificate Details page allows you to view information and perform actions for a specific certificate. To access this page, navigate to Certificates in the header menu and click on the desired certificate name in the overview.
Certificate details
At the top, you’ll see a table displaying general information about the certificate. Scroll down to access additional tools and actions, as described below.
Update Certificate
To update the certificate, fill in the form with the certificate name, private key, and public certificate. Click
to save changes or to remove the certificate.Public Certificate
The public certificate content is displayed in a text field, and you can download it by clicking
.Generate CSR
To create a CSR (Certificate Signing Request), complete the form and click
.Export Private Key
If you need to export the private key, simply click
.FAQ
Here are some frequently asked questions (FAQs) to help you find the answers you’re looking for.
To create a certificate bundle for your Mividas setup, follow these steps to ensure the correct sequence and format:
- Open a Plain Text Editor: Use a simple text editor, such as Notepad or Gedit, to avoid adding hidden formatting.
- Order the Certificates:
- Nginx and similar servers require all certificates in a single file.
- Start with the server certificate, followed by the intermediate certificate(s), and finally the root certificate.
- Copy and Paste Certificates:
- Begin by copying the entire text of the server certificate
(including the-----BEGIN CERTIFICATE-----
and-----END CERTIFICATE-----
lines)
and paste it at the top of the document. - Next, add the intermediate certificate below the server certificate.
- Finally, paste the root certificate at the end.
- Begin by copying the entire text of the server certificate
- Save the Bundle: Save the file with an appropriate name (e.g.,
certificate_bundle.crt
).
Make sure it retains the.crt
,.pem
or.cer
extension. - Verification: Before deploying, verify the concatenated order aligns with your server’s requirements. For example:
- Nginx expects the server certificate at the beginning of the file, followed by intermediate and root certificates.
By following these steps, you create a valid certificate chain that Mividas and other servers can use to verify secure connections.
Certificate Bundle Example:
-----BEGIN CERTIFICATE-----
MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG
A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv
...SERVER CERTIFICATE
AbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhHhm4qxFYxldBniYUr+WymXUad
DKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveCX4XSQRjbgbME
HMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A==
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIEYDCCA0igAwIBAgILBAAAAAABL07hRQwwDQYJKoZIhvcNAQEFBQAwVzELMAkG
A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv
...INTERMEDIATE CERTIFICATE(S)
pOBWYdw9P91nbHZF2krqrhqkYE/Ho9aqp9nNgSvBZnWygI/1h01fwlr1kMbawb30
hag8IyrhFHvBN91i0ZJsumB9iOQct+R2UTjEqUdOqCsukNK1OFHrwZyKarXMsh3o
wFZUTKiL8IkyhtyTMr5NGvo1dbU=
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIEYDCCA0igAwIBAgILBAAAAAABL07hRQwwDQYJKoZIhvcNAQEFBQAwVzELMAkG
A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv
...ROOT CERTIFICATE
pOBWYdw9P91nbHZF2krqrhqkYE/Ho9aqp9nNgSvBZnWygI/1h01fwlr1kMbawb30
hag8IyrhFHvBN91i0ZJsumB9iOQct+R2UTjEqUdOqCsukNK1OFHrwZyKarXMsh3o
wFZUTKiL8IkyhtyTMr5NGvo1dbU=
-----END CERTIFICATE-----
For external validation, use tools like SSL Labs or run openssl s_client -connect core.example.org:443
from the command line.
If you encounter issues due to an expired local certificate, you can attempt to resolve it by reinitializing the Docker swarm cluster. This can be done using the following command:
sudo docker swarm init --force-new-cluster
This command forces Docker to create a new swarm cluster, which can help renew the local certificate and restore cluster functionality. Note that this should be done with caution and only if necessary, as it resets the swarm configuration.