Security configuration in the SharpOS 13.0 Sharp Portal - SharpZ3 | SharpOS 13.0

AutoVu SharpZ3 Deployment Guide 13.0

Applies to
SharpZ3 | SharpOS 13.0
Last updated
Content type
Guides > Deployment guides

SharpZ3 cameras must communicate using TLS encryption (HTTPS) using either the certificate that is auto-generated on the SharpZ3, a new self-signed certificate, or a signed certificate from your own public key infrastructure (PKI) or from a Certificate Authority such as VeriSign.

Consider the following:

  • The first time you log on to the Sharp Portal, a self-signed certificate is generated and HTTPS is activated by default.
  • You must install the certificate on all machines that communicate with the SharpZ3 camera. This includes the servers hosting the LPR Manager, the Archiver, and all machines that connect to the Sharp Portal
  • You can install multiple certificates and then select a certificate to activate.
    IMPORTANT: If the current certificate is a signed certificate, deleting the certificate signing request prevents the certificate from being reinstalled.
  • To capture context and ALPR images directly from the SharpZ3 using the Record button on the Camera feeds window of the Sharp Portal, you cannot use the camera's auto-generated certificate. You must install a signed or self-signed certificate that includes the IP address of the camera as the common name.
  • If the IP address of the SharpZ3 changes, you must regenerate and reinstall the signed or self-signed certificate.