RADIUSdesk

logo

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
technical:uam_ssl_update [2022/11/05 06:11]
admin created
technical:uam_ssl_update [2023/11/06 06:02] (current)
admin [Background]
Line 2: Line 2:
   * The UAM SSL key and certificate is located on the Access Points controlled by MESHdesk and APdesk.   * The UAM SSL key and certificate is located on the Access Points controlled by MESHdesk and APdesk.
   * This certificate are used by CoovaChilli to encrypt the Ajax calls between your browser and CoovaChilli.   * This certificate are used by CoovaChilli to encrypt the Ajax calls between your browser and CoovaChilli.
-  * It expired on 5November 2022.+  * It expired on 5November 2023.
   * We updated the Git repository with a new version.   * We updated the Git repository with a new version.
   * These instructions should be used to patch any existing Access Points which use the certificate during the login process of CoovaChilli.   * These instructions should be used to patch any existing Access Points which use the certificate during the login process of CoovaChilli.
Line 8: Line 8:
         - Host the new key and cert files on the server running RADIUSdesk         - Host the new key and cert files on the server running RADIUSdesk
         - Do remote command execution on the Access Points to patch them with the new key and cert files.         - Do remote command execution on the Access Points to patch them with the new key and cert files.
 +
 +====== Host the new files ======
 +  * Connect to the server running RADIUSdesk using SSH
 +  * Check out the latest openwrt-meshdesk code
 +<code bash>
 +#Do this in a temporary workspace
 +mkdir temp_cert
 +cd temp_cert
 +git clone https://github.com/RADIUSdesk/openwrt-meshdesk.git openwrt-meshdesk
 +</code>
 +  * Create a directory where Nginx can serve the new cert and key files from and copy them to that directory.
 +<code bash>
 +sudo mkdir -p /var/www/html/certs
 +sudo cp ./openwrt-meshdesk/MESHdesk/files/MESHdesk/captive_portals/cert.pem /var/www/html/certs
 +sudo cp ./openwrt-meshdesk/MESHdesk/files/MESHdesk/captive_portals/key.pem /var/www/html/certs
 +</code>
 +
 +====== Remote command Execution (Patch) ======
 +{{:technical:uam_update.png?nolink|}}
 +  * Select the Access Point you want to patch
 +  * Click on the **Execute** button to execute a command.
 +  * Select **Execute Command** from the radio button.
 +  * Enter the following (while adapting it to your server setup)
 +  * //This means you have to substitute cloud.radiusdesk.com with the FQDN of your RADIUSdesk server.//
 +<code bash>
 +cd /etc/MESHdesk/captive_portals/ ; rm key.pem ; rm cert.pem ; wget http://cloud.radiusdesk.com/certs/key.pem; wget http://cloud.radiusdesk.com/certs/cert.pem 
 +</code>
 +  * Sent the Access Point a reboot instruction to activate the new key and certificate.
 +  * Test to see if the error is gone.
 +
 +
 +