Configuring third-party SSL certificates
In the ThreatLockDown dashboard installation guide, self-signed SSL certificates generated during the ThreatLockDown indexer installation were configured for the ThreatLockDown dashboard.
You can use third-party certificates instead of self-signed ones in the ThreatLockDown dashboard. This guide includes instructions for creating and configuring Let's Encrypt certificates. Let's Encrypt is a nonprofit Certificate Authority providing free SSL/TLS certificates to millions of websites.
To generate this type of certificate, you need a fully qualified domain name (FQDN). Let's Encrypt verifies if you have control over the domain.
You can install the SSL certificate directly on the ThreatLockDown dashboard. Alternatively, you can install it using NGINX, a third-party open source proxy software, to offload the SSL decryption processing from the ThreatLockDown dashboard.
Choose a preferred method to start configuring the SSL/TLS certificate for the ThreatLockDown dashboard: