Certificates Configuration Parameters

Document created by RSA Information Design and Development Employee on Nov 22, 2016Last modified by RSA Information Design and Development Employee on May 4, 2017
Version 10Show Document
  • View in full screen mode

This topic describes the Certificates configuration parameters.

To access the Certificates configuration parameters:

  1. In the Security Analytics menu, select Administration >Services.
  2. In the Services grid, select a Log Collector service.
  3. Click Actions menu cropped under Actions and select View > Config.
  4. Click the Settings tab.
  5. In the options panel, select Certificates to add or delete certificates.


The Certificates view in the Settings tab has one section: Certificates.


You manage certificates by creating trust stores on the Log Collector. The Log Collector refers to these trust stores to determine whether or not the event sources are trusted.

Icon-Add.pngOpens the Add Cert dialog in which you can add a certificate and password.
icon-edit.pngDeletes the selected certificates.
Checkbox.pngSelects certificates.
Trust Store NameDisplays the name of the trust store.
Certificate Distinguished NameFor Check Point event source only, displays the distinguished name for the certificate.
Certificate Password NameFor Check Point event source only, displays the password name for the certificate.

Add Cert Dialog

These are the fields in the Add Cert dialog.

Trust Store NameEnter a trust store name.
FileClick Browse to select a certificate (*.PEM file) file from your network
PasswordSpecify the password for this certificate. 
CloseCloses the dialog without adding a certificate.
SavesAdds the certificate.
You are here
Table of Contents > Log Collection Configuration Guide > Reference - Configuration Parameters Interface > Log Collection Parameters > Log Collection Settings Tab > Certificates Configuration Parameters