Certificates Configuration Parameters

Document created by RSA Information Design and Development on Mar 23, 2017Last modified by RSA Information Design and Development on May 4, 2017
Version 4Show Document
  • View in full screen mode
  

This topic describes the Certificates configuration parameters.

To access the Certificates configuration parameters:

  1. In the Security Analytics menu, select Administration >Services.
  2. In the Services grid, select a Log Collector service.
  3. Click Actions menu cropped under Actions and select View > Config.
  4. Click the Settings tab.
  5. In the options panel, select Certificates to add or delete certificates.

Features

The Certificates view in the Settings tab has one section: Certificates.

Certificates

You manage certificates by creating trust stores on the Log Collector. The Log Collector refers to these trust stores to determine whether or not the event sources are trusted.

                       
FieldDescription
Icon-Add.pngOpens the Add Cert dialog in which you can add a certificate and password.
icon-edit.pngDeletes the selected certificates.
Checkbox.pngSelects certificates.
Trust Store NameDisplays the name of the trust store.
Certificate Distinguished NameFor Check Point event source only, displays the distinguished name for the certificate.
Certificate Password NameFor Check Point event source only, displays the password name for the certificate.

Add Cert Dialog

These are the fields in the Add Cert dialog.

                   
FieldDescription
Trust Store NameEnter a trust store name.
FileClick Browse to select a certificate (*.PEM file) file from your network
PasswordSpecify the password for this certificate. 
CloseCloses the dialog without adding a certificate.
SavesAdds the certificate.
You are here
Table of Contents > Log Collection Configuration Guide > Reference - Configuration Parameters Interface > Log Collection Parameters > Log Collection Settings Tab > Certificates Configuration Parameters

Attachments

    Outcomes