From fb0e9bcce264d1d38404aadc301cd9b607c68e2d Mon Sep 17 00:00:00 2001 From: jgaunt Date: Sun, 11 Aug 2019 13:19:58 -0400 Subject: [PATCH] Delete 'custom_unifi_ssl.txt' --- custom_unifi_ssl.txt | 21 --------------------- 1 file changed, 21 deletions(-) delete mode 100644 custom_unifi_ssl.txt diff --git a/custom_unifi_ssl.txt b/custom_unifi_ssl.txt deleted file mode 100644 index bc821ab..0000000 --- a/custom_unifi_ssl.txt +++ /dev/null @@ -1,21 +0,0 @@ -https://community.ubnt.com/t5/UniFi-Wireless/Your-own-SSL-key-and-cert/td-p/285508 -Posted this to another thread, but maybe it'll help some people here as well.... -I just spent about 4 hours tonight trying to get this working. After a LOT of trial and error, I finally got it working with our godaddy wildcard ssl certificate. We're running this on a Rackspace cloud server with a Ubuntu 12.04 LTS instance. -It's actually very simple to do with the help of one program.... -Short version of what I had to do to get the certificate working on Ubuntu: -- Concatenated the wildcard certificate file and godaddy bundle certificate into one file. -- Downloaded "Keystore Explorer 4.1.1" on a windows. -- Created a new keystore file (JKS type) -- Tools > Import Key Pair -- Select the key type (we used OpenSSL) I had to select PKCS #8 -- Choose the key file from your previous server you performed your CSR on. -- Select the concatenated certificate file -- Enter "unifi" for the alias -- Use "aircontrolenterprise" for the key pair password when requested. -- Choose File, Save As -- Set the keystore password to "aircontrolenterprise" -- Save file as "keystore" -- Upload to /var/lib/unifi/ and replace the existing "keystore" file. -- Restart ace.jar -- Done! -Hope this helps some others out there!