Jump to content

Fresh ESET Security Management Center Setup but rubbish certificate for browser


Aad Slingerland
 Share

Recommended Posts

Greetings,

Just did a fresh install of ESMC on a Windows Server 2019 Essentials machine (again). All the installation tasks complete okay as far as I can see. As part of the installation a digital certificate for supporting HTTPS (I think) was generated. I filled in the form describing the certificate details.

When connecting with Google Chrome (or another browser BTW) the site https://10.0.0.6/era is not trusted. I am able to go through this by clicking Advanced and proceed but would like to fix this issue. 

When I inspect the certificate bij clicking on the red 'Not secure' text left of the URL in the address bar and have a look at the certificate details the most of it is rubbish. See also attached images.

Could use some insight in this matter and help here,

Aad

 

cert_1.JPG

cert_2.JPG

Link to comment
Share on other sites

  • ESET Staff

Certificate is self-signed, meaning it´s signed by a certification authority created by ESMC installer, during installation. Which means, it is of course not trusted. You can achieve trust, by importing the CA into the trusted root certification authorities on your system, or alternatively changing the certificate with a trusted one. 

Instructions are provided here: https://support.eset.com/kb6721/ 

In the upcoming release, we will allow choosing a custom HTTPS certificate during the installation using all in one installer. 

 

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...