SSL Certificate Management

You can generate and activate SSL certificates for an appliance in any of the following ways:

  • LogLogic signed certificate: the appliance creates and activates its own certificate and private key
  • Certificate Authority (CA) certificate: a CA is used to provide the root and signed (reply) certificates; the private key of the appliance is used.
  • Other certificate: the appliance uses certificates and a private key that you generate and provide from a source other than the first two options
Important:
  • After upgrading to LogLogic LMI version 6.2.0 or later, it is recommended to regenerate the SSL Certificate of LogLogic LMI, in order to take advantage of the latest cipher updates. As per industry best practices, insecure ciphers have been removed from the cipher list. If your Blue Coat device sends logs over HTTPS to LogLogic LMI to be collected, you might face log collection issues due to cipher mismatch. For more information, see SSL Certificate Management in the TIBCO LogLogic® Log Management Intelligence Administration Guide.
  • When changing the system time of your LogLogic LMI appliance, ensure that the validity period of the certificates imported into LogLogic LMI matches the new system time.