3.3. Certificate management#
Nubus for UCS always encrypts sensitive data in transit. For example, it uses SSH for signing in to systems and TLS for domain replication and LDAP communication.
Each computer must verify each other’s identity before exchanging encrypted data. To do this, each computer has a host certificate that a certification authority (CA) issues and signs.
This section describes the built-in UCS certificate authority, which manages trust within the Nubus for UCS domain. For publicly trusted certificates for web-facing services such as Apache, see Let’s Encrypt.
3.3.2. Certificate validity#
The Nubus for UCS root certificate and all host certificates issued from it expire after a set period. To renew the root certificate and all host certificates, see KB 37 - Renewing the SSL/TLS certificates.
Caution
When a certificate expires, services that use TLS-encrypted communication, such as LDAP or domain replication, stop working.
3.3.3. Monitor certificate expiry#
Nubus for UCS monitors certificate validity automatically.
The Nagios plugin monitors the validity period,
and the Management UI shows a warning
when the root certificate is about to expire.
You can configure the warning period with the UCR variable
ssl/validity/warning.
The default warning period is 30 days.
You must renew the root certificate before the root certificate expires.
Each day, a separate cron job on Nubus for UCS systems checks the validity of the host certificate and the root certificate. The cron job stores the expiry dates in the following UCR variables. These values are the number of days since 1970-01-01.
- Host certificate:
- Root certificate:
To download the root certificate and the certificate revocation list in the Management UI:
Open the hamburger menu.
For the root certificate select .
For the revocation list select .