... | ... | @@ -15,7 +15,7 @@ browsers and operating systems, they are only suitable for testing. |
|
|
## Server Certificate
|
|
|
To generate a new server certificate for Jetconf, which will be in the correct
|
|
|
form and accepted even by the more pedantic web browsers like Chrome, just run
|
|
|
the provided `gen_server_cert.sh` script placed in [JetConf repository](https://gitlab.labs.nic.cz/labs/jetconf/tree/master/utils/cert_gen) in `utils/cert_gen` subdirectory.
|
|
|
the provided `gen_server_cert.sh` script.
|
|
|
|
|
|
The script can used in two following ways.
|
|
|
|
... | ... | @@ -47,7 +47,6 @@ publicly known. If you do so, someone could perform a MITM attack to |
|
|
any connection with an SSL-protected website.
|
|
|
|
|
|
## Client Certificate
|
|
|
[JetConf repository](https://gitlab.labs.nic.cz/labs/jetconf/tree/master/utils/cert_gen) in `utils/cert_gen
|
|
|
|
|
|
To generate a new client certificate the `gen_client_cert.sh` script is provided. This will issue a new
|
|
|
client certificate using the `CA.pem` as the certification authority.
|
... | ... | |