Skip to content

Installing certificates -
Importing a certificate into Windows key storage

Follow these instructions on all computers on which a server or client component of a Servicetrace Robotics solution is installed.

To import a certificate into the Windows key storage, use the Certificates snap-in on the Microsoft Management Console.

conf_ImportCert_WinKeystore_RunMMC_Start

conf_ImportCert_WinKeystore_RunMMC_Run

To open the Microsoft Management Console, open the Start menu, click Run, and enter

mmc.exe

in the input field.

Adding the snap-in certificate

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn

Choose Add/Remove Snap-in... from the File menu.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates

If Certificates is not yet listed under Selected snap-ins, select it with the mouse under Available snap-ins and click Add.

If Certificates is already selected as a snap-in, you can click Cancel to close the window and continue with Importing the root certificate with the Certificates snap-in.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_ComputerAccount

Select Computer account and click Next.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_LocalComputer

Select Local computer account and click Finish.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_Selected

The Certificates snap-in can now be used. Click OK.

Importing the root certificate with the Certificates snap-in

Follow these instructions on all computers on which a server or client component of a Servicetrace Robotics solution is installed.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_TrustedRootCA_Import

In the Console tree, expand the Certificates branch and then the Trusted Root Certification Authorities branch, and then click Certificates.

If your certificate is already contained in this list of root certification authorities, you do not have to do anything else here and can continue with Importing the intermediate certificate with the Certificates snap-in.

If your certificate is not yet contained in this list of root certification authorities, right-click Certificates and then select All Tasks > Import... from the context menu.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_TrustedRootCA_Import_LocalMachine

Click Next.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_TrustedRootCA_Import_SpecifyFile

Select your root certificate with Browse and click Next.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_TrustedRootCA_Import_SpecifyFile_Filter

If your root certificate has a suffix that is not ∗.CER or ∗.CRT, set the filter to All files (∗.∗).The file will then be displayed in File Explorer.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_TrustedRootCA_Import_CertificateStore

Select Place all certificates in ... certificate store Trusted Root Certification Authorities and click Next.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_TrustedRootCA_Import_Finish

Click Finish.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_TrustedRootCA_Import_Succesful

Click OK.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_TrustedRootCA_Import_RootCAImported

Your root certificate is now contained in the list of trusted root certification authorities on the computer.

As a result, this computer can now take part in HTTPS-encrypted communication with another computer that has the same certificate installed (or one from the corresponding chain of trust).

Importing the intermediate certificate with the Certificates snap-in

If you do not need intermediate certificates, you do not have to do anything else here and can continue with Importing the root certificate into the Java KeyStore.

Follow these instructions on all computers on which a server component of a Servicetrace Robotics solution is installed.

Follow these instructions for all intermediate certificates in the chain of trust.

The import of an intermediate certificate is essentially identical to the procedure described in Importing a certificate into Windows key storage.

The only difference: the import location is changed to Intermediate Certification Authorities > Certificates.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_IntermediateCA_Import

In the Console tree, expand the Certificates branch and then the Intermediate Certification Authorities branch, and then click Certificates.

If your certificate is already contained in this list of intermediate certification authorities, you do not have to do anything else here and can continue with Importing the root certificate into the Java KeyStore.

If your certificate is not yet contained in this list of intermediate certification authorities, right-click Certificates and then select All Tasks > Import from the context menu.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_IntermediateCA_Import_LocalMachine

Click Next.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_IntermediateCA_Import_SpecifyFile

Select your intermediate certificate with Browse and click Next.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_TrustedRootCA_Import_SpecifyFile_Filter

If your intermediate certificate has a suffix that is not ∗.CER or ∗.CRT, set the filter to All files (∗.∗).The file will then be displayed in File Explorer.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_IntermediateCA_Import_CertificateStore

Select Place all certificates in ... certificate store Intermediate Certification Authorities and click Next.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_IntermediateCA_Import_Finish

Click Finish.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_IntermediateCA_Import_Succesful

Click OK.

conf_ImportCert_WinKeystore_MMC_File_AddSnapIn_Certificates_IntermediateCA_Import_IntermediateCAImported

Your intermediate certificate is now contained in the list of intermediate certification authorities on the computer.

As a result, this computer can now take part in HTTPS-encrypted communication with another computer that has the same certificate installed (or one from the corresponding chain of trust).