RADIUSdesk

logo

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
technical:uam_ssl_update [2022/11/05 06:30]
admin [Remote command Execution (Patch)]
technical:uam_ssl_update [2023/11/06 06:02] (current)
admin [Background]
Line 2: Line 2:
   * The UAM SSL key and certificate is located on the Access Points controlled by MESHdesk and APdesk.   * The UAM SSL key and certificate is located on the Access Points controlled by MESHdesk and APdesk.
   * This certificate are used by CoovaChilli to encrypt the Ajax calls between your browser and CoovaChilli.   * This certificate are used by CoovaChilli to encrypt the Ajax calls between your browser and CoovaChilli.
-  * It expired on 5November 2022.+  * It expired on 5November 2023.
   * We updated the Git repository with a new version.   * We updated the Git repository with a new version.
   * These instructions should be used to patch any existing Access Points which use the certificate during the login process of CoovaChilli.   * These instructions should be used to patch any existing Access Points which use the certificate during the login process of CoovaChilli.
Line 18: Line 18:
 git clone https://github.com/RADIUSdesk/openwrt-meshdesk.git openwrt-meshdesk git clone https://github.com/RADIUSdesk/openwrt-meshdesk.git openwrt-meshdesk
 </code> </code>
-  * Copy the cert and key files to directory under //webroot// of Nginx+  * Create a directory where Nginx can serve the new cert and key files from and copy them to that directory.
 <code bash> <code bash>
 sudo mkdir -p /var/www/html/certs sudo mkdir -p /var/www/html/certs
Line 26: Line 26:
  
 ====== Remote command Execution (Patch) ====== ====== Remote command Execution (Patch) ======
 +{{:technical:uam_update.png?nolink|}}
   * Select the Access Point you want to patch   * Select the Access Point you want to patch
   * Click on the **Execute** button to execute a command.   * Click on the **Execute** button to execute a command.