Installing certificates -
Importing a certificate into Windows key storage¶
Follow these instructions on all computers on which a server or client component of a Servicetrace Robotics solution is installed.
To import a certificate into the Windows key storage, use the Certificates snap-in on the Microsoft Management Console.
To open the Microsoft Management Console, open the Start menu, click Run, and enter
mmc.exe
in the input field.
Adding the snap-in certificate¶
Choose Add/Remove Snap-in... from the File menu.
If Certificates is not yet listed under Selected snap-ins, select it with the mouse under Available snap-ins and click Add.
If Certificates is already selected as a snap-in, you can click Cancel to close the window and continue with Importing the root certificate with the Certificates snap-in.
Select Computer account and click Next.
Select Local computer account and click Finish.
The Certificates snap-in can now be used. Click OK.
Importing the root certificate with the Certificates snap-in¶
Follow these instructions on all computers on which a server or client component of a Servicetrace Robotics solution is installed.
In the Console tree, expand the Certificates branch and then the Trusted Root Certification Authorities branch, and then click Certificates.
If your certificate is already contained in this list of root certification authorities, you do not have to do anything else here and can continue with Importing the intermediate certificate with the Certificates snap-in.
If your certificate is not yet contained in this list of root certification authorities, right-click Certificates and then select All Tasks > Import... from the context menu.
Click Next.
Select your root certificate with Browse and click Next.
If your root certificate has a suffix that is not ∗.CER or ∗.CRT, set the filter to All files (∗.∗).The file will then be displayed in File Explorer.
Select Place all certificates in ... certificate store Trusted Root Certification Authorities and click Next.
Click Finish.
Click OK.
Your root certificate is now contained in the list of trusted root certification authorities on the computer.
As a result, this computer can now take part in HTTPS-encrypted communication with another computer that has the same certificate installed (or one from the corresponding chain of trust).
Importing the intermediate certificate with the Certificates snap-in¶
If you do not need intermediate certificates, you do not have to do anything else here and can continue with Importing the root certificate into the Java KeyStore.
Follow these instructions on all computers on which a server component of a Servicetrace Robotics solution is installed.
Follow these instructions for all intermediate certificates in the chain of trust.
The import of an intermediate certificate is essentially identical to the procedure described in Importing a certificate into Windows key storage.
The only difference: the import location is changed to Intermediate Certification Authorities > Certificates.
In the Console tree, expand the Certificates branch and then the Intermediate Certification Authorities branch, and then click Certificates.
If your certificate is already contained in this list of intermediate certification authorities, you do not have to do anything else here and can continue with Importing the root certificate into the Java KeyStore.
If your certificate is not yet contained in this list of intermediate certification authorities, right-click Certificates and then select All Tasks > Import from the context menu.
Click Next.
Select your intermediate certificate with Browse and click Next.
If your intermediate certificate has a suffix that is not ∗.CER or ∗.CRT, set the filter to All files (∗.∗).The file will then be displayed in File Explorer.
Select Place all certificates in ... certificate store Intermediate Certification Authorities and click Next.
Click Finish.
Click OK.
Your intermediate certificate is now contained in the list of intermediate certification authorities on the computer.
As a result, this computer can now take part in HTTPS-encrypted communication with another computer that has the same certificate installed (or one from the corresponding chain of trust).