The Dynatrace UI is only accessible over encrypted HTTPS connections. To ensure secure access and avoid browser warnings, you must configure a valid SSL certificate. Dynatrace can manage this for you automatically—each cluster gets a dedicated web domain (subdomain of dynatrace-managed.com
) and a trusted SSL certificate. You can use this domain to access the Dynatrace UI without receiving browser warnings.
If you don't want Dynatrace to create the domain and SSL certificate for you, go to Settings > Preferences in the Cluster Management Console and disable the Manage domain name and SSL certificates option. Dynatrace will then use a self-signed SSL certificate. Self-signed certificates aren't trusted by default—the first time you attempt to connect to Dynatrace Managed, you'll receive a security warning. Confirm this exception within your browser security settings.
To use your own trusted SSL certificate, disable automatic management and then follow the instructions below.
You need your SSL certificate and the key files you received from Certificate Authority (CA):
Server certificate (.cer
or .cert
)
Root and Intermediate certificates (.cer
or .cert
)
Private key for certificates (.pem
)
We don't support encrypted private keys. To decrypt an SSL private key, run the following command:
openssl rsa -in encrypted.ssl.key -out decrypted.ssl.key
where
encrypted.ssl.key
is the filename of your encrypted SSL private key.decrypted.ssl.key
is the output file for your decrypted SSL private key.The command will prompt you for the password and save the decrypted key in the decrypted.ssl.key
file.
optional For command line installation, you need:
If you want to use your own certificate or a CA-issued certificate, upload or paste the certificate to the Dynatrace Cluster node. You can also set the host name associated with the certificate to be part of the Dynatrace Cluster node configuration.
Sign in to Dynatrace Managed as an administrator.
On the Dynatrace Managed deployment status page, select the cluster node that needs the new certificate.
On the Node Details page, select Edit SSL certificate.
You can paste or upload the key files you received from the CA authority.
The key and certificates need to be in PEM format with the full BEGIN
headers and END
footers.
Key header and footer format:
-----BEGIN PRIVATE KEY-----(Private Key)-----END PRIVATE KEY-----
Certificate header and footer format:
-----BEGIN CERTIFICATE-----(SSL Certificate)-----END CERTIFICATE-----
Select Save to upload the certificates.
Your certificate is associated with a specific host name. To avoid a name-mismatch error, make sure that the common name (domain name) in the SSL certificate matches the address displayed in the address bar of the browser.