Tagged articles
17 articles
Page 1 of 1
21CTO
21CTO
Dec 2, 2025 · Information Security

What Let’s Encrypt’s New Certificate Validity Rules Mean for Your SSL Setup

Let’s Encrypt will shorten default TLS/SSL certificate lifetimes from 90 to 45 days and reduce domain‑validation reuse windows to seven hours, rolling out a trial in May 2026, a default change in July 2027, and full enforcement in August 2028, while also introducing a persistent DNS‑TXT validation method.

ACMELet’s EncryptSSL
0 likes · 4 min read
What Let’s Encrypt’s New Certificate Validity Rules Mean for Your SSL Setup
Liangxu Linux
Liangxu Linux
Aug 26, 2025 · Information Security

How to Build a Private Certificate Authority (CA) on Linux with OpenSSL

This guide walks you through installing OpenSSL, creating a secure directory layout, configuring OpenSSL, generating a self‑signed root certificate, issuing client certificates, managing CA files, revoking certificates, and inspecting certificate details, all with clear command‑line examples and diagrams.

Certificate AuthorityLinuxOpenSSL
0 likes · 16 min read
How to Build a Private Certificate Authority (CA) on Linux with OpenSSL
dbaplus Community
dbaplus Community
Jul 3, 2025 · Cloud Native

Rescue Expired Kubernetes Certificates Offline: A 4‑Step Emergency Guide

Facing certificate expiration in isolated, regulated Kubernetes clusters? This guide explains the hidden risks, outlines a four‑step offline rescue toolkit, details automated rotation with Cert‑Manager and Vault, and provides compliance audit and disaster‑recovery strategies, illustrated with real‑world banking case studies.

AutomationCloud NativeKubernetes
0 likes · 11 min read
Rescue Expired Kubernetes Certificates Offline: A 4‑Step Emergency Guide
Liangxu Linux
Liangxu Linux
Oct 17, 2024 · Information Security

How to Build a Private CA and Manage Certificates with OpenSSL

This guide explains the concepts of CA and PKI, walks through setting up a private Certificate Authority using OpenSSL, and details the complete lifecycle of certificate issuance, revocation, and verification with practical commands and configuration examples.

CRLOpenSSLPKI
0 likes · 16 min read
How to Build a Private CA and Manage Certificates with OpenSSL
MaGe Linux Operations
MaGe Linux Operations
Sep 27, 2024 · Information Security

How to Build a Private CA and Manage Certificates with OpenSSL

Learn step‑by‑step how to set up a private Certificate Authority using OpenSSL, create the necessary directory structure, configure files, generate self‑signed root certificates, issue and revoke client certificates, and understand related files and processes such as CRL, index databases, and certificate verification.

Certificate AuthorityOpenSSLPKI
0 likes · 17 min read
How to Build a Private CA and Manage Certificates with OpenSSL
php Courses
php Courses
Sep 9, 2024 · Information Security

What Is ServBay Local CA and How to Manage It

This guide explains what ServBay Local CA is, how to locate it using macOS Keychain Access, and provides step‑by‑step instructions for reinstalling or deleting the certificate to resolve HTTPS errors during local development.

HTTPSKeychain AccessLocal CA
0 likes · 4 min read
What Is ServBay Local CA and How to Manage It
vivo Internet Technology
vivo Internet Technology
Jun 28, 2023 · Operations

Certificate Management Platform Practice: From Manual to Platform-Based Operations at Scale

vivo replaced fragile, engineer‑driven certificate handling with a centralized Vue‑2/Go platform that automates application, secure key storage, renewal alerts, and multi‑environment pushes, eliminating availability incidents and paving the way for future blockchain‑based, immutable certificate distribution.

DevOpsInfrastructureOperations Automation
0 likes · 7 min read
Certificate Management Platform Practice: From Manual to Platform-Based Operations at Scale
DevOps
DevOps
Sep 27, 2019 · Mobile Development

Centralized Build Methods for iOS Applications: Strategies, Tools, and Automation

This article examines the challenges of iOS centralized building, introduces two build methods—single‑certificate single‑profile and single‑certificate dual‑profile—detailing required commands, certificate management, provisioning profiles, and automation steps to achieve fully automated, reproducible iOS app packaging.

Mobile DevelopmentXcodecentralized build
0 likes · 19 min read
Centralized Build Methods for iOS Applications: Strategies, Tools, and Automation
Efficient Ops
Efficient Ops
Mar 6, 2018 · Operations

How Tencent’s SNG Ops Team Overcame Five Massive Service Challenges

The SNG Operations team shares the five critical challenges of managing tens of thousands of domains, certificates, server failures, automation, and rapid scaling during peak events, and outlines the practical strategies they used to ensure reliable, near‑real‑time service delivery.

AutomationOperationscertificate-management
0 likes · 6 min read
How Tencent’s SNG Ops Team Overcame Five Massive Service Challenges
MaGe Linux Operations
MaGe Linux Operations
Mar 11, 2016 · Information Security

Secure Your Site for Free: Let’s Encrypt SSL Setup on CentOS with Docker

This guide explains how Let’s Encrypt provides free SSL certificates, outlines its key features, shows step‑by‑step installation on CentOS (including Docker usage), demonstrates domain validation, certificate issuance, renewal and revocation, and details configuration files and supported plugins.

CentOSHTTPSLet’s Encrypt
0 likes · 11 min read
Secure Your Site for Free: Let’s Encrypt SSL Setup on CentOS with Docker
Architect
Architect
Oct 25, 2015 · Information Security

iOS Man-in-the-Middle Attack Techniques and Trusted Certificate Management

This article explains iOS man‑in‑the‑middle (MITM) attack levels, demonstrates practical exploits on a jail‑broken iPhone using Burp Suite, and reveals how the hidden TrustStore.sqlite3 file can be manipulated to add or remove trusted certificates beyond what iOS Settings displays.

Man-in-the-Middlecertificate-managementiOS
0 likes · 9 min read
iOS Man-in-the-Middle Attack Techniques and Trusted Certificate Management
High Availability Architecture
High Availability Architecture
Aug 8, 2015 · Information Security

Managing HTTPS Certificates When Using Third‑Party CDN Services

The article explains how HTTPS works, why traditional CDN architectures based on CNAME aliases can conflict with HTTPS certificate validation, and compares two common approaches—custom certificates and shared certificates—highlighting their security implications and performance considerations for web operators.

CDNHTTPSSecurity
0 likes · 6 min read
Managing HTTPS Certificates When Using Third‑Party CDN Services