skip to main content
Using ICE-Generated Certificates
This option creates a 12-month self-signed TLS certificate and assigns it to the ICE Server for use in securing HTTPS connections. The RTS certstores generated by the configuration wizard cannot be downloaded. Connecting a Tactical component requires the generation of your own RTS Certstores and their installation. For instructions see Creating a Certstore in the ICE Admin Guide.
Note: Federation requires manual creation of a certstore that is uploaded to the systems after installation or upgrade. Optionally, organizational certs valid with FIPS requirements are also supported.
To use an ICE-Generated Self-Signed Certificate Authority (CA)
1. Select Enable TLS to activate the fields for creating a TLS certstore and/or uploading certificates.
2. Select Generate Self-Signed Certificate Authority (CA).A green and white button AI-generated content may be incorrect.
3. Open Status and wait for Node Status to turn green
4. Click Apply.
You will be notified if the keys are successfully provisioned.
A black background with white text AI-generated content may be incorrect.
5. In Cluster Ingress Hostname, enter the Ingress FQDN. This address must be resolvable on the DNS. If your ICE Server has multiple Ingress Hostnames, then enter them one at a time on a separate line.
A screenshot of a computer screen AI-generated content may be incorrect.
Click Apply and continue to the Server tab instructions.
Note: You can download the root CA certificate and private key for use as needed by activating Show Self-Signed Certificate Chain.
A screenshot of a black screen AI-generated content may be incorrect.