FTL Server Certificates and Web Browsers

The FTL server generates its own certificates. Web browsers detect and reject such self-signed certificates. Administrators can resolve this issue at the FTL server, or at each individual browser.

A secure FTL server uses a self-signed private key certificate, with which it identifies itself to client applications, web clients, utilities, and affiliated FTL servers.

Web browsers recognize that the web certificate is not signed by a trusted root certificate, and warn users that it might compromise security. To circumvent this issue, choose from these strategies:
  • Users of the FTL server GUI load the FTL server’s trust store file, ftl-trust.pem, into the browser’s trusted certificate store.
  • Users of the FTL server GUI respond to the browser’s warning by explicitly trusting the FTL server’s web certificate.
Related concepts
Related tasks