You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A small comment on getting the certificates from the other servers to the hub master. I would put a line it to rename the certificate or rather add the name of the server to the certificate name. All certificates will have the same name. Knowing the customer they will often overwrite the other certificates. And also if you need to replace a certificate it is easier when the server name is included
Original text:
Note
In order to use https to connect to peripheral Servers, in addition to setting HUB_CONNECT_USING_SSL flag to true, SSL certificates for all the peripheral Servers need to be installed on the machine where the hub-xmlrpc-api service runs. This can be achieved by copying the RHN-ORG-TRUSTED-SSL-CERT certificate file from each peripheral Server's pub directory (https:///pub/) to /etc/pki/trust/anchors/ and then running the update-ca-certificates command.
Maybe better version:
Note
In order to use https to connect to peripheral Servers, in addition to setting HUB_CONNECT_USING_SSL flag to true, SSL certificates for all the peripheral Servers need to be installed on the machine where the hub-xmlrpc-api service runs. This can be achieved by copying the RHN-ORG-TRUSTED-SSL-CERT certificate file from each peripheral Server's pub directory (https:///pub/) to /etc/pki/trust/anchors/. Add the name of the server where the certificate is being copied from to the name to prevent confusion and overwriting of certificates. To apply the certificates run the update-ca-certificates command.
The text was updated successfully, but these errors were encountered:
A small comment on getting the certificates from the other servers to the hub master. I would put a line it to rename the certificate or rather add the name of the server to the certificate name. All certificates will have the same name. Knowing the customer they will often overwrite the other certificates. And also if you need to replace a certificate it is easier when the server name is included
Original text:
Note
In order to use https to connect to peripheral Servers, in addition to setting HUB_CONNECT_USING_SSL flag to true, SSL certificates for all the peripheral Servers need to be installed on the machine where the hub-xmlrpc-api service runs. This can be achieved by copying the RHN-ORG-TRUSTED-SSL-CERT certificate file from each peripheral Server's pub directory (https:///pub/) to /etc/pki/trust/anchors/ and then running the update-ca-certificates command.
Maybe better version:
Note
In order to use https to connect to peripheral Servers, in addition to setting HUB_CONNECT_USING_SSL flag to true, SSL certificates for all the peripheral Servers need to be installed on the machine where the hub-xmlrpc-api service runs. This can be achieved by copying the RHN-ORG-TRUSTED-SSL-CERT certificate file from each peripheral Server's pub directory (https:///pub/) to /etc/pki/trust/anchors/. Add the name of the server where the certificate is being copied from to the name to prevent confusion and overwriting of certificates. To apply the certificates run the update-ca-certificates command.
The text was updated successfully, but these errors were encountered: