Certificate Installer
The
This feature is available in
Requirements
To configure the certificate installer, you must have:
-
Your own certificate(s).
-
A method to distribute them, such as Active Directory.
-
Policies in place that enable certificates in your network.
-
Role of System Administrator or the relevant permissions in a custom role.
Configuration Options
This feature enable you to set the following different configuration options to manage self-signed certificates:
-
Upload and distribute certificates, and set up rotation policies with the Connection Manager and the Connection Manager Installer.
-
Pull and distribute certificates with Active Directory.
-
Set up a rotation policy in the server and install certificates manually.
If you upload your certificates ensure that the certificate is able to sign other certificates. you upload the certificate and its key to your
Installation Guide
You can install the certificate installer automatically or manually on MacOS and Windows operating systems. Linux distributions only enable manual installation.

To automatically install the Certificate Installer in MacOS:
-
Navigate to Help > Download Certificate Installer.
-
Download the MacOS Certificate Installer.
-
Run the
CertInstaller.dmg
file.
The application closes when the installation finishes. -
Verify that the certificate is installed on your keychain.

To automatically install the Certificate Installer in Windows:
-
Navigate to Help > Download Certificate Installer.
-
Download the Windows Certificate Installer.
-
Extract the files from the
CertInstaller.zip
file. -
Run the
CertInstaller.exe
file.
The application closes when the installation finishes. -
Verify that the certificate is installed on your root trust store.

To manually install the Certificate Installer:
-
Navigate to Help > Download Certificate Installer.
-
Download the
Imprivata Root CA
. -
Open your terminal or console (depending on your OS.)
-
Open the directory that contains the downloaded
Imprivata Root CA
. -
Run the following command, depending on your OS:
-
For MacOS:
sudo security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain ca.cert.der
-
For Windows:
certutil.exe -addstore root ca.cert.der
-
For Linux:
Consult the Linux (Ububtu, Debian) section of Adding trusted root certificates to the server.
-

Firefox users are required to modify an enterprise policy to trust the certificate after its installation. To do so, follow the next steps:
-
Enter
about:config
in the address bar and continue to the list of preferences. -
Set the preference security.enterprise_roots.enabled to true.
-
Restart Firefox.
The Firefox certificate store only refreshes once Firefox has been restarted. Therefore connecting to your HTTPS service, in the same browser session as your initial certificate installation, might result in a Warning or Secure Connection Failed page displaying. Restart Firefox and reconnect to continue using the installed certificate as intended.
Update Your Certificates
If you cannot access your web services due to outdated certificates, follow the steps below to install and update your HTTP(S) certificate. You can download and install the certificates directly from the UI.
You will notice the certificate needs an update if you try to connect to a service and see a web page error with NET::ERR_CERT_INVALID
. If this happens, launch the Certificate Installer in one of the two following ways:

-
Open Help and click Download Certificate Installer.
-
Select the installer for your operating system.
-
Agree to the conditions.
-
Click Open to allow this file to make changes on your device.
-
Click Ok when prompted for administrator credentials.
-
Enter your administrator credentials and click Update Settings to verify the changes made to your Certificate Trust Settings.

This option requires v21.1.7 or higher and must be enabled by our
This method appears every 3 months, not each time you make a connection (via gatekeeper or application).
-
Click Connect in the application you want to launch.
-
The certificate (
.dmg file
) automatically downloads once you click Connect using the Connection Manager button. -
Fill in the Connection Form Information fields and click Submit.
-
An authorization prompt appears—enter your credentials and click Update Settings.
-
After clicking Update Settings, the certificate installs. If successful, you will receive a confirmation message.
You can now access your web server or HTTP(S) service without certificate issues.
Certificates are valid for 90 days by default. After this period, you must apply them again.
Certificate Installer in Previous Versions
If you try to connect to a web service and encounter the NET::ERR_CERT_AUTHORITY_INVALID
error, you can still connect to your web services.
-
Click Advanced at the bottom of the screen.
-
Click Proceed to SecureLink (unsafe) when it appears.
Type "thisisunsafe" in the URL field to continue. No prompt appears to type this in—just type it on your keyboard, and the web page will advance you.
If you're on version 20.4, you can install your server's root certificate and use it, but the Connection Manager installer does not exist in that version.