![]() For steps to generate your certificate, see Self-Signed Certificates: Creating a Certificate Authority for development. If you are using a self-signed certificate, the key algorithm, key size, and signature algorithm should be set according to your IT administrator's requirements. ![]() Refer to the requirements of your CA for the necessary steps to generate a CSR, your private key, and obtain your SSL certificate. MicroStrategy administrators should refer to the information security policy of your particular organization or IT department before choosing an encryption configuration for your MicroStrategy environment.Ī certificate signing request (CSR) must be generated to obtain an SSL certificate from a third party certification authority(CA). ![]() The second port 39320 provides extra security by enforcing client certificate verification. The default port 39321 uses SSL without client certificate verification. MicroStrategy Intelligence Server opens two ports for SSL communication. SSL (secure socket layer) and TLS (transport layer security) are encryption technologies that encode communication over the Internet or local network so that only the recipient can read it.
0 Comments
Leave a Reply. |