Security configuration in the SharpOS 13.2 Sharp Portal - SharpV | SharpOS 13.2

AutoVu™ SharpV Administrator Guide 13.2

Applies to
SharpV | SharpOS 13.2
Last updated
2020-09-16
Content type
Guides
Guides > Administrator guides
Language
English (United States)
Product
SharpOS
SharpV
Version
13.2

SharpV cameras must communicate using TLS encryption (HTTPS) using either the certificate that is auto-generated on the SharpV, a new self-signed certificate, or a signed certificate from your own public key infrastructure (PKI) or from a Certificate Authority such as VeriSign.

Consider the following:

  • The first time you log on to the Sharp Portal, a self-signed certificate is generated and HTTPS is activated by default.
  • You must install the certificate on all machines that communicate with the SharpV camera. This includes the servers hosting the ALPR Manager, the Archiver, and all machines that connect to the Sharp Portal
  • You can install multiple certificates and then select a certificate to activate.
    IMPORTANT: If the current certificate is a signed certificate, deleting the certificate signing request prevents the certificate from being reinstalled.
  • To capture context and ALPR images directly from the SharpV using the Record button on the Camera feeds window of the Sharp Portal, you cannot use the camera's auto-generated certificate. You must install a signed or self-signed certificate that includes the IP address of the camera as the common name.
  • If the IP address of the SharpV changes, you must regenerate and reinstall the signed or self-signed certificate.