Quantcast
Channel: Syncplify.me
Viewing all articles
Browse latest Browse all 144

HTTPS “connection not private/secure”– what it is?

$
0
0

After installing Syncplify.me Server! v4.0 you will be able to manage it securely via web interface over HTTPS.

Now, a very common choice is to use a self-signed certificate, because it saves money and if you know what you’re doing it doesn’t compromise security. This is, in fact, the default choice offered by the HTTP/REST Configuration Wizard, and the most common choice among Chief Technology Officers (according to our surveys).

But if you use a self-signed certificate, your browser will warn you that your connection may not be private or secure. That’s because self-signed certificates are often used for man-in-the-middle (MITM) attacks. But this is not the case, of course, because in this case this particular self-signed certificate was created by you and for you.

To get rid of this annoying message, you basically have 2 options:

  1. Spend some money to buy a trusted X.509 (SSL/TLS) certificate from a Certification Authority like DigiCert, Comodo, Thawte, and the like.
  2. Simply accept the self-signed certificate you have just created and add it to the trusted keychain of your browser.

If you have chosen option #2, here’s how you do it in Chrome:

chromecertexcept

This is how you do it in Firefox:

mozillacertexcept

And this is how you do it in Microsoft Edge (Internet Explorer behaves similar to this):

edgecertexcept

Once you do that, you will be able to securely access Syncplify.me Server!’s web management interface

edgesuccesslogin


Viewing all articles
Browse latest Browse all 144

Trending Articles