> root@ucs-7927:~# ln -s /etc/univention/ssl/ucsCA/CAcert.pem /usr/local/share/ca-certificates/ucsCA.crt
> root@ucs-7927:~# update-ca-certificates
> Updating certificates in /etc/ssl/certs... 1 added, 0 removed; done.
> Running hooks in /etc/ca-certificates/update.d....done.
Need an account in StartSSL, get the API token and API certificate;
- Install and run, no any coding, support Windows server and Linux server;
- Not just get the SSL certificate automatically, but install it automatically;
- Not just Encrypted, but also identity validated to display EV Green Bar;
- Not just 90 days period, but up to 39 months, more than 1180 days;
- Not just low assurance DV SSL certificate, but also High assurance OV SSL and EV SSL;
- Not just for one domain, but up to 120 domains with wildcard support;
- For OV SSL and EV SSL, just charge the validation cost annually, certificate is FREE!
tl;dr das .well-known Verzeichnis mittels Reverse Proxy auf eine zentrale Instanz weiterleiten (die auch den lets-encrypt client hat).
the cert-file must only contain the PEM encoded certificate. Which looks like that:
Open the file with a text editor. If the file starts with human readable data like that:
Version: 3 (0x2)
Serial Number...and so on
Than that has to be deleted so that only the encoded certificate remains.
Are you sure you want to delete this link?
The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community