Search Results for ""

Custom Root CA

Supporting Custom Root CA

Some installation environments use internal root certificate authorities for encrypting and establishing trust between servers. If using a root certificate, you may need to import and mark it as a trusted certificate at CircleCI Enterprise instances. CircleCI will respect such trust when communicating with GitHub and webhook API calls.

You can establish that trust if you SSH into the Services box machine as ubuntu and run the following script (you should already have a certificate file):

$ # Let's trust the root CA -- but first confirm that the root CA isn't trusted
$ curl -I
$ # The previous command should fail with root CA error
$ # Now let's add it to the trusted store
$ sudo ccie-ssl-ca-certificate-install internal_root_ca.crt
$ # or something like `curl -k https://path_to_internal_crt | sudo ccie-ssl-ca-certificate-install
$ # Now confirm that the cert got imported correctly -- this time it should work
$ curl -I

Then navigate to the system console at port 8800 - now you can change the protocol to upgraded, you can change the protocol to “HTTPS (TLS/SSLEnabled)”setting. When trying “Test GitHub Authentication” you should get Success now rather than x509 related error.

New builders deployed from now on will automatically trust this root CA as well.