Are you sure you want to delete this access key?
title | intro | redirect_from | versions |
---|---|---|---|
Troubleshooting SSL errors | If you run into SSL issues with your appliance, you can take actions to resolve them. | [/enterprise/admin/articles/troubleshooting-ssl-errors/ /enterprise/admin/categories/dns-ssl-and-subdomain-configuration/ /enterprise/admin/installation/troubleshooting-ssl-errors /enterprise/admin/configuration/troubleshooting-ssl-errors] | [{enterprise-server *}] |
If you have a Linux machine with OpenSSL installed, you can remove your passphrase.
$ mv yourdomain.key yourdomain.key.orig
$ openssl rsa -in yourdomain.key.orig -out yourdomain.key
You'll be prompted for the key's passphrase when you run this command.
For more information about OpenSSL, see OpenSSL's documentation.
If you have OpenSSL installed, you can convert your key into PEM format by using the openssl
command. For example, you can convert a key from DER format into PEM format.
$ openssl rsa -in yourdomain.der -inform DER -out yourdomain.key -outform PEM
Otherwise, you can use the SSL Converter tool to convert your certificate into the PEM format. For more information, see the SSL Converter tool's documentation.
If {% data variables.product.product_location %} is unresponsive after uploading an SSL key, please contact {% data variables.product.prodname_enterprise %} Support with specific details, including a copy of your SSL certificate.
Clients such as web browsers and command-line Git will display an error message if they cannot verify the validity of an SSL certificate. This often occurs with self-signed certificates as well as "chained root" certificates issued from an intermediate root certificate that is not recognized by the client.
If you are using a certificate signed by a certificate authority (CA), the certificate file that you upload to {% data variables.product.prodname_ghe_server %} must include a certificate chain with that CA's root certificate. To create such a file, concatenate your entire certificate chain (or "certificate bundle") onto the end of your certificate, ensuring that the principal certificate with your hostname comes first. On most systems you can do this with a command similar to:
$ cat yourdomain.com.crt bundle-certificates.crt > yourdomain.combined.crt
You should be able to download a certificate bundle (for example, bundle-certificates.crt
) from your certificate authority or SSL vendor.
If your {% data variables.product.prodname_ghe_server %} appliance interacts with other machines on your network that use a self-signed or untrusted certificate, you will need to import the signing CA's root certificate into the system-wide certificate store in order to access those systems over HTTPS.
$ scp -P 122 rootCA.crt admin@HOSTNAME:/home/admin
$ ssh -p 122 admin@HOSTNAME
$ ghe-ssl-ca-certificate-install -c rootCA.crt
Press p or to see the previous file or, n or to see the next file
Are you sure you want to delete this access key?
Are you sure you want to delete this access key?
Are you sure you want to delete this access key?
Are you sure you want to delete this access key?