You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/2024.7/getting-started/on-premise/add-innovation-to-72/multiple-server-with-ha/install-web-application-server/prerequisites.md
+2-5Lines changed: 2 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,11 +31,8 @@ In order to ensure that the correct certificate is used during the upgrade of {{
31
31
<br />
32
32
The Flow Debugger also requires an X.509 SSL certificate to be installed on the Web Application Server. This can use the same certificate as {{% ctx %}} Gateway, however it must have the following properties:
33
33
34
-
* Subject field must be in one of the following formats depending on whether a multi-domain or wildcard certificate is used:
35
-
* Multi-domain certificate - If using the [gobetween][] load balancer this should be specified as the FQDN of the load balancer server (e.g. `CN=load-balancer.domain.com`). If using a different load balancer this must be specified as the FQDN of one of the application servers (e.g. `CN=application-server.domain.com`)
36
-
* Wildcard certificate - wildcard format, pertaining to the domain of the Application Servers (e.g. `CN=*.domain.com`).
37
-
* Subject alternative names must include any additional host names that should be able to be used to access the API Gateway Service. Additionally if using a multi-domain certificate:
38
-
* The FQDN, NetBIOS Name and IP address of the web application server and all application servers must be added.
34
+
* Subject field must be in a wildcard format, pertaining to the domain of the Application Servers (e.g. `CN=*.domain.com`).
35
+
* Subject alternative names must include any additional host names that should be able to be used to access the API Gateway Service.
39
36
* Certificate file must be in a .PFX file format, with a known password.
40
37
* Certificate file must contain the full chain of certificates.
Copy file name to clipboardExpand all lines: content/en/docs/2024.7/getting-started/on-premise/add-innovation-to-72/multiple-server-with-ha/prerequisites.md
+8-14Lines changed: 8 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -258,10 +258,10 @@ The `Cortex.Innovation.Test.PortUsage.ps1` script is provided during installatio
258
258
#### Application Servers
259
259
260
260
{{% alert title="Note" %}}
261
-
For production platforms it is recommended that X.509 SSL multi-domain or wildcard certificates are obtained from a Certificate Authority and used for installation. For non-production platforms, certificates can be omitted from installation and it will create and use self-signed certificates. This may prevent 3rd parties that require valid certificate verification to access the API Gateway Service.
261
+
For production platforms it is recommended that X.509 SSL wildcard certificates are obtained from a Certificate Authority and used for installation. For non-production platforms, certificates can be omitted from installation and it will create and use self-signed certificates. This may prevent 3rd parties that require valid certificate verification to access the API Gateway Service.
262
262
{{% / alert %}}
263
263
264
-
An X.509 SSL multi-domain or wildcard certificate should be used to:
264
+
An X.509 SSL wildcard certificate should be used to:
265
265
266
266
* Secure communication between the load balancer and the nodes on the Application Servers.
267
267
* Secure communication between the Application Services.
@@ -271,12 +271,8 @@ An X.509 SSL multi-domain or wildcard certificate should be used to:
271
271
272
272
The certificate can be obtained from a Certificate Authority, such as [Let’s Encrypt](<https://letsencrypt.org/>), and must meet the following requirements:
273
273
274
-
* Subject field must be in one of the following formats depending on whether a multi-domain or wildcard certificate is used:
275
-
* Multi-domain certificate - If using the [gobetween][] load balancer this should be specified as the FQDN of the load balancer server (e.g. `CN=load-balancer.domain.com`). If using a different load balancer this must be specified as the FQDN of one of the application servers (e.g. `CN=application-server.domain.com`)
276
-
* Wildcard certificate - wildcard format, pertaining to the domain of the Application Servers (e.g. `CN=*.domain.com`).
277
-
* Subject alternative names must include any additional host names that should be able to be used to access the API Gateway Service. Additionally if using a multi-domain certificate:
278
-
* The FQDN, NetBIOS Name and IP address of all application servers must be added.
279
-
* Optionally, the FQDN, NetBIOS Name and IP address of the web application server must be added if the same certificate will be used for the [web application server][].
274
+
* Subject field must be in a wildcard format, pertaining to the domain of the Application Servers (e.g. `CN=*.domain.com`).
275
+
* Subject alternative names must include any additional host names that should be able to be used to access the API Gateway Service.
280
276
* Certificate file must be in a .PFX file format, with a known password.
281
277
* Certificate file must contain the full chain of certificates.
282
278
* Certificate file must include the private key.
@@ -285,21 +281,20 @@ The certificate can be obtained from a Certificate Authority, such as [Let’s E
285
281
286
282
This file should be placed in a known location on the Application Server where the installation scripts will be run. This location will be required when running the installation script.
287
283
288
-
If required, a separate X.509 SSL certificate can be obtained to be used by the load balancer to communicate with the Application Services. It must meet all of the other requirements laid out above, except the subject field can also be the FQDN of the load balancer (e.g. `CN=load-balancer.domain.com`).
284
+
If required, a separate X.509 SSL certificate can be obtained to be used by the load balancer to communicate with the Application Services. It must meet all of the other requirements laid out above, except the subject field can also be the FQDN of the load balancer (e.g. `CN=machine-name.domain.com`).
289
285
290
286
#### Web Application Server
291
287
292
-
{{% ctx %}} Gateway requires an X.509 SSL certificate to be installed on the Web Application Server. This can be the same certificate as used for the application servers or a different certificate.
293
-
294
-
The certificate must have the following properties:
288
+
{{% ctx %}} Gateway requires an X.509 SSL certificate to be installed on the Web Application Server. The certificate must have the following properties:
295
289
296
290
* Enhanced Key Usage: `Server Authentication` and `Client Authentication`
297
291
* Subject Alternative Names (SAN): At minimum the FQDN of the Server. It can also include NetBIOS Name, IP address, localhost, 127.0.0.1
298
292
299
293
If the user tries to navigate to an address not in the SAN list, then they will receive a certificate error.
300
294
301
295
{{% alert title="Important" color="warning" %}}
302
-
Multi-domain certificates, wildcard certificates, auto-generated self-signed certificates and {{< ahref path="Cortex.GettingStarted.OnPremise.InstallInnovationOnly.Advanced.CreateSelfSignedCertificates" title="manually created self-signed certificates" >}} can be used. However, self-signed certificates are not recommended for production instances.
296
+
Certificates, wildcard certificates, auto-generated self-signed certificates and manually created self-signed certificates can be used. However, self-signed certificates are not recommended for production instances.
297
+
Details on how to create a self-signed certificate can be found at {{< ahref path="Cortex.GettingStarted.OnPremise.InstallInnovationOnly.Advanced.CreateSelfSignedCertificates" title="Create Self-Signed Certificates" >}}.
303
298
{{% /alert %}}
304
299
305
300
More information about importing the certificate is given during installation.
@@ -350,5 +345,4 @@ Innovation has a [gobetween][] load balancer included that isn't highly availabl
Copy file name to clipboardExpand all lines: content/en/docs/2024.7/getting-started/on-premise/install-innovation-only/advanced/rollover-certificates.md
+3-7Lines changed: 3 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,12 +26,8 @@ A new, valid X.509 certificate needs to be obtained to update the certificates.
26
26
27
27
The certificate can be obtained from a Certificate Authority, such as [Let’s Encrypt](<https://letsencrypt.org/>), and must meet the following requirements:
28
28
29
-
* Subject field must be in one of the following formats depending on whether a multi-domain or wildcard certificate is used:
30
-
* Multi-domain certificate - If using the [gobetween][] load balancer this should be specified as the FQDN of the load balancer server (e.g. `CN=load-balancer.domain.com`). If using a different load balancer this must be specified as the FQDN of one of the application servers (e.g. `CN=application-server.domain.com`)
31
-
* Wildcard certificate - wildcard format, pertaining to the domain of the Application Servers (e.g. `CN=*.domain.com`).
32
-
* Subject alternative names must include any additional host names that should be able to be used to access the API Gateway Service. Additionally if using a multi-domain certificate:
33
-
* The FQDN, NetBIOS Name and IP address of all application servers must be added.
34
-
* Optionally, the FQDN, NetBIOS Name and IP address of the web application server must be added if the same certificate is used for the web application server.
29
+
* Subject parameter must be in a wildcard format, pertaining to the domain of the Application Servers (e.g. `CN=*.domain.com`).
30
+
* Subject alternative names must include any additional host names that should be able to be used to access the API Gateway Service.
35
31
* Certificate file must be in a .PFX file format, with a known password.
36
32
* Certificate file must contain the full chain of certificates.
37
33
* Certificate file must include the private key.
@@ -40,7 +36,7 @@ The certificate can be obtained from a Certificate Authority, such as [Let’s E
40
36
41
37
This file should be placed in a known location on the Application Server where the certificate update script will be run. This location will be required when running the update script.
42
38
43
-
If required, a separate X.509 SSL certificate can be obtained to be used by the load balancer to communicate with the Application Services. It must meet all of the other requirements laid out above, except the subject parameter can also be the FQDN of the load balancer (e.g. `CN=load-balancer.domain.com`).
39
+
If required, a separate X.509 SSL certificate can be obtained to be used by the load balancer to communicate with the Application Services. It must meet all of the other requirements laid out above, except the subject parameter can also be the FQDN of the load balancer (e.g. `CN=machine-name.domain.com`).
Copy file name to clipboardExpand all lines: content/en/docs/2024.7/getting-started/on-premise/install-innovation-only/multiple-server-with-ha/install-web-application-server/prerequisites.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,19 +44,17 @@ If the user tries to navigate to an address not in the SAN list, then they will
44
44
<br/>
45
45
For the Flow Debugger, the certificate must have the following properties:
46
46
47
-
* Subject field must be in one of the following formats depending on whether a multi-domain or wildcard certificate is used:
48
-
* Multi-domain certificate - If using the [gobetween][] load balancer this should be specified as the FQDN of the load balancer server (e.g. `CN=load-balancer.domain.com`). If using a different load balancer this must be specified as the FQDN of one of the application servers (e.g. `CN=application-server.domain.com`)
49
-
* Wildcard certificate - wildcard format, pertaining to the domain of the Application Servers (e.g. `CN=*.domain.com`).
50
-
* Subject alternative names must include any additional host names that should be able to be used to access the API Gateway Service. Additionally if using a multi-domain certificate:
51
-
* The FQDN, NetBIOS Name and IP address of the web application server and all application servers must be added.
47
+
* Subject field must be in a wildcard format, pertaining to the domain of the Application Servers (e.g. `CN=*.domain.com`).
48
+
* Subject alternative names must include any additional host names that should be able to be used to access the API Gateway Service.
52
49
* Certificate file must be in a .PFX file format, with a known password.
53
50
* Certificate file must contain the full chain of certificates.
54
51
* Certificate file must include the private key.
55
52
* Key Usage extension must have a value of `Digital Signature, Key Encipherment (a0)`.
56
53
* Enhanced Key Usage must include `Server Authentication` and `Client Authentication`.
57
54
58
55
{{% alert title="Important" color="warning" %}}
59
-
Multi-domain certificates, wildcard certificates, auto-generated self-signed certificates and {{< ahref path="Cortex.GettingStarted.OnPremise.InstallInnovationOnly.Advanced.CreateSelfSignedCertificates" title="manually created self-signed certificates" >}} can be used. However, self-signed certificates are not recommended for production instances.
56
+
Certificates, wildcard certificates, auto-generated self-signed certificates and manually created self-signed certificates can be used. However, self-signed certificates are not recommended for production instances.
57
+
Details on how to create a self-signed certificate can be found at {{< ahref path="Cortex.GettingStarted.OnPremise.InstallInnovationOnly.Advanced.CreateSelfSignedCertificates" title="Create Self-Signed Certificates" >}}.
60
58
<br />
61
59
It is possible to reuse the Flow Debugger certificate for {{% ctx %}} Gateway; If doing so, you must {{< ahref path="Cortex.GettingStarted.OnPremise.InstallInnovationOnly.MultipleServerWithHA.AssignCertificateFriendlyNameNew" title="Assign a Certificate Friendly Name" >}} after the debugger has been installed and set the `ImportCertificate` parameter to `$false` in {{< ahref path="Cortex.GettingStarted.OnPremise.InstallInnovationOnly.MultipleServerWithHA.ConfigureCortexGatewayInstallationScriptNew" title="Configure CORTEX Gateway Installation Script" >}} to ensure use of the correct certificate and to prevent it from being overwritten.
Copy file name to clipboardExpand all lines: content/en/docs/2024.7/getting-started/on-premise/install-innovation-only/multiple-server-with-ha/prerequisites.md
+8-14Lines changed: 8 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -206,10 +206,10 @@ The `Cortex.Innovation.Test.PortUsage.ps1` script is provided during installatio
206
206
#### Application Servers
207
207
208
208
{{% alert title="Note" %}}
209
-
For production systems it is recommended that X.509 SSL multi-domain or wildcard certificates are obtained from a Certificate Authority and used for installation. For non-production systems, certificates can be omitted from installation and it will create and use self-signed certificates. This may prevent 3rd parties that require valid certificate verification to access the API Gateway Service.
209
+
For production systems it is recommended that X.509 SSL wildcard certificates are obtained from a Certificate Authority and used for installation. For non-production systems, certificates can be omitted from installation and it will create and use self-signed certificates. This may prevent 3rd parties that require valid certificate verification to access the API Gateway Service.
210
210
{{% / alert %}}
211
211
212
-
An X.509 SSL multi-domain or wildcard certificate should be used to:
212
+
An X.509 SSL wildcard certificate should be used to:
213
213
214
214
* Secure communication between the load balancer and the nodes on the Application Servers.
215
215
* Secure communication between the Application Services.
@@ -219,12 +219,8 @@ An X.509 SSL multi-domain or wildcard certificate should be used to:
219
219
220
220
The certificate can be obtained from a Certificate Authority, such as [Let’s Encrypt](<https://letsencrypt.org/>), and must meet the following requirements:
221
221
222
-
* Subject field must be in one of the following formats depending on whether a multi-domain or wildcard certificate is used:
223
-
* Multi-domain certificate - If using the [gobetween][] load balancer this should be specified as the FQDN of the load balancer server (e.g. `CN=load-balancer.domain.com`). If using a different load balancer this must be specified as the FQDN of one of the application servers (e.g. `CN=application-server.domain.com`)
224
-
* Wildcard certificate - wildcard format, pertaining to the domain of the Application Servers (e.g. `CN=*.domain.com`).
225
-
* Subject alternative names must include any additional host names that should be able to be used to access the API Gateway Service. Additionally if using a multi-domain certificate:
226
-
* The FQDN, NetBIOS Name and IP address of all application servers must be added.
227
-
* Optionally, the FQDN, NetBIOS Name and IP address of the web application server must be added if the same certificate will be used for the [web application server][].
222
+
* Subject field must be in a wildcard format, pertaining to the domain of the Application Servers (e.g. `CN=*.domain.com`).
223
+
* Subject alternative names must include any additional host names that should be able to be used to access the API Gateway Service.
228
224
* Certificate file must be in a .PFX file format, with a known password.
229
225
* Certificate file must contain the full chain of certificates.
230
226
* Certificate file must include the private key.
@@ -233,21 +229,20 @@ The certificate can be obtained from a Certificate Authority, such as [Let’s E
233
229
234
230
This file should be placed in a known location on the Application Server where the installation scripts will be run. This location will be required when running the installation script.
235
231
236
-
If required, a separate X.509 SSL certificate can be obtained to be used by the load balancer to communicate with the Application Services. It must meet all of the other requirements laid out above, except the subject field can also be the FQDN of the load balancer (e.g. `CN=load-balancer.domain.com`).
232
+
If required, a separate X.509 SSL certificate can be obtained to be used by the load balancer to communicate with the Application Services. It must meet all of the other requirements laid out above, except the subject field can also be the FQDN of the load balancer (e.g. `CN=machine-name.domain.com`).
237
233
238
234
#### Web Application Server
239
235
240
-
{{% ctx %}} Gateway requires an X.509 SSL certificate to be installed on the Web Application Server. This can be the same certificate as used for the application servers or a different certificate.
241
-
242
-
The certificate must have the following properties:
236
+
{{% ctx %}} Gateway requires an X.509 SSL certificate to be installed on the Web Application Server. The certificate must have the following properties:
243
237
244
238
* Enhanced Key Usage: `Server Authentication` and `Client Authentication`
245
239
* Subject Alternative Names (SAN): At minimum the FQDN of the Server. It can also include NetBIOS Name, IP address, localhost, 127.0.0.1
246
240
247
241
If the user tries to navigate to an address not in the SAN list, then they will receive a certificate error.
248
242
249
243
{{% alert title="Important" color="warning" %}}
250
-
Multi-domain certificates, wildcard certificates, auto-generated self-signed certificates and {{< ahref path="Cortex.GettingStarted.OnPremise.InstallInnovationOnly.Advanced.CreateSelfSignedCertificates" title="manually created self-signed certificates" >}} can be used. However, self-signed certificates are not recommended for production instances.
244
+
Certificates, wildcard certificates, auto-generated self-signed certificates and manually created self-signed certificates can be used. However, self-signed certificates are not recommended for production instances.
245
+
Details on how to create a self-signed certificate can be found at {{< ahref path="Cortex.GettingStarted.OnPremise.InstallInnovationOnly.Advanced.CreateSelfSignedCertificates" title="Create Self-Signed Certificates" >}}.
251
246
{{% /alert %}}
252
247
253
248
More information about importing the certificate is given during installation.
@@ -300,5 +295,4 @@ Innovation has a [gobetween][] load balancer included that isn't highly availabl
0 commit comments