Configuring SSL connections - Adaptive Applications - BlueCat Gateway - 21.1

BlueCat Distributed DDNS Administration Guide

prodname
BlueCat Gateway
version_custom
21.1

By default, all connections between the Distributed DDNS components are encrypted using preconfigured certificates and private keys. If required, you can configure and deploy your own custom certificates and private keys to be used in the Distributed DDNS system.

The default root CA contains the following information:
Issuer: C = AU, ST = Some-State, O = Internet Widgits Pty Ltd, CN = RootCA
Validity
Not Before: Sep 7 11:08:03 2020 GMT
Not After: Jan 9 11:08:03 3020 GMT
Subject: C = AU, ST = Some-State, O = Internet Widgits Pty Ltd, CN = RootCA
The default database node server certificate contains the following information:
Issuer: C = AU, ST = Some-State, O = Internet Widgits Pty Ltd, CN = RootCA
Validity
Not Before: Sep 29 10:15:47 2020 GMT
Not After: Sep 28 10:15:47 2030 GMT
Subject: C = AU, ST = Some-State, O = Internet Widgits Pty Ltd, CN = <db_node_IP>
The default Distributed DDNS workflow certificate contains the following information:
Issuer: C = AU, ST = Some-State, O = Internet Widgits Pty Ltd, CN = RootCA
Validity
Not Before: Sep 7 11:13:03 2020 GMT
Not After: Jan 9 11:13:03 3020 GMT
Subject: C = AU, ST = Some-State, O = Internet Widgits Pty Ltd, CN = WorkflowUI
The default API server certificate contains the following information:
Issuer: C = AU, ST = Some-State, O = Internet Widgits Pty Ltd, CN = RootCA
Validity
Not Before: Sep 29 10:44:13 2020 GMT
Not After: Sep 28 10:44:13 2030 GMT
Subject: C = AU, ST = Some-State, O = Internet Widgits Pty Ltd, CN = <API_server_IP>