Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Code Block
languagepowershell
[HKLM/SOFTWARE/DocIntegrate/USE_HTTPS] — DWORD32 — values [0;1] (where 1 is https "on")
[HKLM/SOFTWARE/DocIntegrate/HTTPS_PORT] — DWORD32 — int value (defines port number; optional, if not present port 443 will be used)
[HKLM/SOFTWARE/DocIntegrate/SKIP_HTTPS_CERTIFICATEKEY_VALIDATION] — DWORD32 — values [0;1]

...

Edit this file and for all entries in <angle brackets> enter your own data. Copy the modified file to /storage/nginx and execute

To generate .key and .csr file:

Code Block
languagebash
openssl req -new -sha256 -out patricia-edms.csr -config SAN_CERT.conf -keyout patricia-edms.key

Replace patricia-edms.* with your chosen name; The hashing algorithm ('-sha256') can also be modified by choice.
This generates is a .key and .csr file. Send the .csr file to your CA for signing. In return, you will receive a certificate; place this in the same folder.

To generate only .csr file for an existing .key file, without altering old .key file:

Code Block
languagebash
openssl req -new -sha256 -out patricia-edms.csr -config SAN_CERT.conf -key patricia-edms.key

Replace patricia-edms.csr with your chosen name; Replace patricia-edms.key with your existing key file name; The hashing algorithm ('-sha256') can also be modified by choice.
This generates a .csr file. Send the .csr file to your CA for signing. In return, you will receive a certificate; place this in the same folder.

Either way, do Do NOT send the .key file. Make sure the key file kept secure; if your key file is shared, your security may be compromised.

...