Skip to content

Commit be6e765

Browse files
committed
Update manage-security-certificates.md
1 parent 890e2a1 commit be6e765

File tree

1 file changed

+2
-14
lines changed

1 file changed

+2
-14
lines changed

deploy-manage/security/secure-your-elastic-cloud-enterprise-installation/manage-security-certificates.md

Lines changed: 2 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,7 @@ Proxy certificate
3232
After the certificates have been installed, connecting securely to {{es}}, {{kib}}, and the Cloud UI or making secure RESTful API calls to ECE should not result in any security warnings or errors.
3333

3434
Adminconsole certificate
35-
: Used to connect securely to make RESTful API calls.
36-
35+
: This certificate facilitates a secure connection to an alternative API port, which can be used in rare scenarios where the UI is unavailable. We recommend reusing the UI certificate for this purpose.
3736

3837

3938
## Before you begin [ece_before_you_begin_7]
@@ -325,18 +324,7 @@ To add an Adminconsole certificate from the Cloud UI:
325324
326325
To get the details of the certificate you added, select **Show certificate chain**.
327326
328-
To add an Adminconsole certificate from the command line:
329-
330-
1. Add the certificate for the Adminconsole to your {{ece}} installation, where `CA_CERTIFICATE_FILENAME` is the name of the CA certificate you downloaded earlier and `ADMINCONSOLE_PEM_FILENAME` is the name of the concatenated file containing your RSA private key, server certificate, and CA certificate:
331-
332-
```
333-
curl --cacert CA_CERTIFICATE_FILENAME -H 'Content-Type: application/json' --data-binary @ADMINCONSOLE_PEM_FILENAME --user "admin:PASSWORD" "https://admin:12443/api/v1/platform/configuration/security/tls/adminconsole"
334-
```
335-
336-
2. Log out of the Cloud UI and log in again.
337-
3. Verify that you are now using the new certificate chain. There should be no security warnings when you connect to the Cloud UI over HTTPS in your web browser.
338-
339-
Alternatively, you can also check the certificate using the openssl command:
327+
You can verify the new certificate chain by using the openssl command:
340328
341329
```
342330
openssl s_client -CAfile CA_CERTIFICATE_FILENAME -showcerts -connect containerhost:12343 < /dev/zero

0 commit comments

Comments
 (0)