Local Certificates

<< Click to Display Table of Contents >>

Navigation:  Low-code Process Automation > Automation - Test and Production environments > Automation Service Management > How to manage your environment with the Management Console > Environment > Options > Custom Parameters >

Local Certificates

Overview

Local certificate support enables invoking web services with local or self-signed certificates, whether called from a rule, the component library, or system interfaces.

 

This feature is relevant only when using a VPN, to enforce secure TLS traffic with your integrated servers/services (e.g., HTTPS web services, SMTPS emailing, FTPS file transfers, etc.).

 

In Windows environments, this functionality ensures seamless integration and certificate validation through tools like Microsoft Management Console (MMC) or PowerShell, enabling secure interactions with web services even when using non-commercial or self-signed certificates. Similarly, in OpenSSL, administrators can manage and verify certificates, generating fingerprints as unique identifiers for secure communication across platforms. This capability enhances flexibility and security, supporting robust service integration within diverse IT infrastructures.

 

To enable this feature, you need to configure a Custom parameter in the Management Console as described below.

 

What you need to do

To enable local certificate support, add the Custom parameter AllowedLocalCertificatesWhitelist in the Environment settings of the Management Console. Follow these steps:

 

1.Under the Environment tab, click Options.

2.Click the Custom tab.

3.Click Add Property.

 

LCMCW00

 

4.In the Add Property window, enter the following values:

Name: AllowedLocalCertificatesWhitelist

Value: Your certificate’s thumbprint. Refer to How to extract the Thumbprint of a certificate for details.

Description: A brief description of this property.

 

LCMCW01

 

5.Click Add to save the property.

 

LMCCW02


Last Updated 2/18/2025 2:37:21 PM