Security configuration in SharpOS 12.7 Portal - SharpV | SharpOS 12.7

AutoVu Handbook for SharpV Fixed Installations 12.7

series
SharpV | SharpOS 12.7
revised_modified
2019-08-21

Starting with SharpOS 12.7, SharpV cameras must communicate using TLS encryption (HTTPS). After you upgrade a SharpV that previously used HTTP, the browser will indicate that the site is not secure.

You can configure your workstation to use HTTPS by installing a certificate. You can either use the self-signed certificate that is auto-generated on the SharpV, generate a new self-signed certificate using the tools provided in the Sharp Portal, or use a signed certificate from your own public key infrastructure (PKI) or from a Certificate Authority such as VeriSign.

NOTE:
  • It is always recommended that you use the HTTPS connection to log on to the SharpV Portal. This is especially important if you are on a public network. Using HTTPS ensures that logon credentials and the data transmission are encrypted.
  • If a certificate signature is issued by a certificate authority that is not included in the list of Windows of third-party root certificate authorities (CA), or if your organization has its own public key infrastructure (PKI) which manages signatures, you must add the CA to the platform software running on the SharpV so that the host can validate the chain of trust. For more information, see KBA-78971: Adding a certificate to a pre-12.8 SharpV from an unknown certificate authorityon the Genetecâ„¢ TechDoc Hub.