Client Certificates for Configuration Hub
For a browser to have a secure connection to Configuration Hub, the Configuration Hub certificate must be copied to the remote machine and added to the trusted root folder. Client-side certificates validate the client’s identity to the Configuration Hub web server.
Configuration Hub Root Certificate
To install the Configuration Hub root certificate:
- Copy the ConfigHubRootCA.crt file on the server machine. By default, this file can be found in the C:\Program Files (x86)\GE\ConfigurationHub\ConfigHubPki folder.
- Paste the ConfigHubRootCA.crt file to the destination computer.
- Double-click ConfigHubRootCA.crt to install the certificate. The Install Certificate screen appears.
- Click the Install Certificate button. The Import Certificate screen appears.
- Select Local Machine, and then Next. A message appears requesting if you want to proceed.
- Click Yes. The Certificate Store Screen appears.
- Select Place All Certificates in the Following Store.
- Click Browse, and then select Trusted Root Certificate Authorities and then click OK.
- Click Next. The final screen appears.
- Click Finish. A message should appear indicating the import was successful.
- Click OK.
- Restart the browser.
iFIX Configuration Hub Client Root Certificate
To install the iFIX OPC UA Client root certificate:
- Copy the iFIX_OpcuaConfigRoot.crt file on the server machine. By default, this file can be found in the C:\Program Files (x86)\GE\iFIX\CFG\iFIX_OpcuaConfigService folder.
- Paste the iFIX_OpcuaConfigRoot.crt file to the destination computer.
- Double-click iFIX_OpcuaConfigRoot.crt to install the certificate. The Install Certificate screen appears.
- Click the Install Certificate button. The Import Certificate screen appears.
- Select Local Machine, and then Next. A message appears requesting if you want to proceed.
- Click Yes. The Certificate Store Screen appears.
- Select Place All Certificates in the Following Store.
- Click Browse, and then select Trusted Root Certificate Authorities and then click OK.
- Click Next. The final screen appears.
- Click Finish. A message should appear indicating the import was successful.
- Click OK.
- Restart the browser.
Enable a Trust with Historian with a Self-Signed Certificate in Chrome
During Historian installation, a self-signed certificate is generated for use with Historian web applications. A self-signed certificate is a certificate that is signed by itself rather than signed by a trusted authority. Therefore, a warning appears in the browser when connecting to a server that uses a self-signed certificate until it is permanently stored in your certificate store. These steps describe how to ensure that Google Chrome trusts the self-signed certificate.
To enable a trust with Historian using a Self-Signed Certificate in Chrome:
- Using Google Chrome, access the site to which you want to connect. A message appears to inform you that the certificate is not trusted by the computer or browser.
- Select Not Secure in the URL, and then select Certificate. The Certificate window appears.
- Select the Certification Path tab, and then select the root certificate.
- Select View Certificate The Certificate window appears, displaying the General, Details, and Certification Path sections. Select Details, and then select Copy to Files.
- Follow the on-screen instructions to save the certificate to a local file. Use the default format: DER encoded binary X.509 (.CER).
- Right-click the .CER file that you have exported, and select Install Certificate. The Certificate Import Wizard window appears.
- Select Local Machine and click Next.
- Select Trusted Root Certificate Authorities, and then select OK. Note: Do not let the wizard select the store for you.A Security Warning window may appear. If it does, ignore the message by selecting Yes. The certificate is installed.
- Restart the browser, and connect to the server.
- Open the URL authenticated by the certificate. If error messages do not appear, the certificate is successfully imported.
Import an Issuer Certificate in Chrome for Historian
If you want to use an external UAA, you must import an issuer certificate.
- Copy the issuer certificate from the machine on which UAA is installed.
- Access the Certificate Management tool. The GE Operations Hub Certificate Management Tool page appears, displaying the Server Certificate section.
- In the External Trust subsection, next to the Certificate File box, select Select.
- Navigate to and select the certificate file, and then select Open.
- Select Import. A message appears, asking you to confirm that you want to import a certificate.
- Select Yes. You are now ready to use Configuration Hub.
For more information on Historian, security, and certificates, refer to the Historian online documentation.