FTL Server Certificates and Web Browsers
The FTL server generates its own certificates. Web browsers detect and reject such self-signed certificates. Administrators can resolve this issue at the FTL server, or at each individual browser.
A secure FTL server uses a self-signed private key certificate, with which it identifies itself to client applications, web clients, utilities, and affiliated FTL servers.
Web browsers recognize that the web certificate is not signed by a trusted root certificate, and warn users that it might compromise security. To circumvent this issue, choose from these strategies:
- Users of the FTL server GUI load the FTL server’s trust store file, ftl-trust.pem, into the browser’s trusted certificate store.
- Users of the FTL server GUI respond to the browser’s warning by explicitly trusting the FTL server’s web certificate.