Before replacing the operating system certificates, apply for the certificates from the CA. Table 6-17 lists the certificates.
How Do I Log In to the Operating System Through a Network Port?)export LD_LIBRARY_PATH=/lib64:$LD_LIBRARY_PATH
openssl pkcs12 -export -clcerts -in server.crt -inkey server.key -out server.p12
openssl pkcs12 -in server.p12 -out server.pem
The parameters in the preceding command are described as follows:
After the OpenSSL command is executed, the following information is displayed. Enter the password as prompted. After the password is entered, the server.pem file is generated in the directory where the OpenSSL command is executed.
Enter Import Password: Enter PEM pass phrase: Verifying - Enter PEM pass phrase
Copy -----BEGIN ENCRYPTED PRIVATE KEY----- and -----END ENCRYPTED PRIVATE KEY----- with the character string.

How Do I Log In to the Operating System Through a Network Port?)export LD_LIBRARY_PATH=/lib64:$LD_LIBRARY_PATH
openssl pkcs12 -export -clcerts -in client.crt -inkey client.key -out client.p12
Convert client.p12 into client.pem.
openssl pkcs12 -in client.p12 -out client.pem
-in: indicates the path of the pkcs12 file, including the file name.
-out: indicates the path of the certificate or private key file, including the file name. The file name must be in *.pem format.
After the OpenSSL command is executed, the following information is displayed. Enter the password as prompted. After the password is entered, the client.pem file is generated in the directory where the OpenSSL command is executed.
Enter Import Password: Enter PEM pass phrase: Verifying - Enter PEM pass phrase:
Copy -----BEGIN ENCRYPTED PRIVATE KEY----- and -----END ENCRYPTED PRIVATE KEY----- with the character string.

cp server.p12 catrust.jks
keytool -import -v -file client.crt -storetype PKCS12 -keystore catrust.jks
-import: imports a signed digital certificate to the keystore.
-v: displays the detailed certification information in the keystore.
-file: indicates that the certificate to be imported is client.crt.
-storetype PKCS12: indicates that the type of the specified keystore is PKCS12.
-keystore: indicates that the keystore name is catrust.jks.
Enter the password for accessing catrust.jks (that is, server.p12) as prompted.
Enter yes to confirm whether to trust the certificate as prompted.
Check whether the client.crt certificate is trusted.
keytool -list -storetype PKCS12 -keystore catrust.jks
-list: displays the certification information in the keystore.
-storetype PKCS12: indicates that the type of the specified keystore is PKCS12.
-keystore: indicates that the keystore name is catrust.jks.
cat server.crt > ca.crt
echo -e >> ca.crt
cat client.crt >> ca.crt
Table 6-18 lists the default certificates.
For security purposes, you are advised to replace the default certificate and key pair with your own certificate and key pair.
No. |
Certificate Type |
Path |
Certificate File Name |
|---|---|---|---|
1 |
Root certificate |
/home/data/miniD/driver/tools/ |
ide_daemon_cacert.pem |
2 |
Server signature certificate |
/home/data/miniD/driver/tools/ |
ide_daemon_server_cert.pem |
3 |
Private key of the server signature certificate |
/home/data/miniD/driver/tools/ |
ide_daemon_server_key.pem The default private key is MindStudio@123. |
4 |
Client signature certificate |
/home/data/miniD/driver/tools/ |
ide_daemon_client_cert.pem |
5 |
Private key of the client signature certificate |
/home/data/miniD/driver/tools/ |
ide_daemon_client_key.pem The default private key is MindStudio@123. |
Original Name |
New Name |
|---|---|
server.key |
ide_daemon_server_key.pem |
server.crt |
ide_daemon_server_cert.pem |
client.key |
ide_daemon_client_key.pem |
client.crt |
ide_daemon_client_cert.pem |
ca.crt |
ide_daemon_cacert.pem |
How Do I Log In to the Operating System Through a Network Port?)export LD_LIBRARY_PATH=/lib64:$LD_LIBRARY_PATH
cd /home/data/miniD/driver/tools
./IDE-daemon-client --key
Enter the password as prompted.
openssl base64 -out secu -in ide_daemon.secu
openssl base64 -out store -in ide_daemon.store
cd /home/data/miniD/driver/tools
vi ide_daemon.cfg
Combine multiple lines of character strings in the secu file into one line and change the value of SECU to the combined character string.
Combine multiple lines of character strings in the store file into one line and change the value of STORE to the combined character string.
cp /tmp/ide_daemon_server_key.pem /home/data/miniD/driver/tools/ide_daemon_server_key.pem
cp /tmp/ide_daemon_server_cert.pem /home/data/miniD/driver/tools/ide_daemon_server_cert.pem
cp /tmp/ide_daemon_client_key.pem /home/data/miniD/driver/tools/ide_daemon_client_key.pem
cp /tmp/ide_daemon_client_cert.pem /home/data/miniD/driver/tools/ide_daemon_client_cert.pem
cp /tmp/ide_daemon_cacert.pem /home/data/miniD/driver/tools/ide_daemon_cacert.pem
cd /home/data/miniD/driver/tools
chown HwHiAiUser:HwHiAiUser ide_daemon_server_key.pem
chown HwHiAiUser:HwHiAiUser ide_daemon_server_cert.pem
chown HwHiAiUser:HwHiAiUser ide_daemon_client_key.pem
chown HwHiAiUser:HwHiAiUser ide_daemon_client_cert.pem
chown HwHiAiUser:HwHiAiUser ide_daemon_cacert.pem
openssl verify -CAfile ide_daemon_cacert.pem ide_daemon_client_cert.pem
openssl verify -CAfile ide_daemon_cacert.pem ide_daemon_server_cert.pem
reboot
How Do I Log In to the Operating System Through a Network Port?)When the MiNID acceleration module is installed on the , the IDE-deamon-host process is started on the server. Run the following command to check whether the process is running properly:
ps -ef | grep IDE-daemon | grep -v grep
If the following information is displayed, the IDE process is running properly and the certificates are successfully replaced:
HwHiAiU+ 2216 1 1 Mar12 ? 00:42:51 /home/data/miniD/driver/boot/../../driver/tools/IDE-daemon-host
You have applied for the desired certificates from the CA or purchased a commercial certificate. Table 6-20 lists the required certificates.
Logging In to the OMU portal)Updating the certificate will restart the system. To restore the default local certificate, refer to Restoring a Certificate.
Logging In to the OMU portal)If the root certificate in the imported certificate is changed, the certificate of the connected camera also needs to be replaced. For details, see the product documentation of the corresponding camera.
You have obtained the certificate from the official website of the mail server provider if mail server connection has been configured.
If no mail server connection has been configured, you can visit https://curl.se/docs/caextract.html to obtain the general certificate.
Table 6-21 lists the required certificates.
Logging In to the OMU portal)
CRLs are used to verify the validity of peer device certificates to ensure secure communication. You must upload the digital certificate before uploading the CRL. Otherwise, the digital certificate will fail to be uploaded.
Logging In to the OMU portal)
CRLs are used to verify the validity of the peer device's certificates to ensure secure communication. You must upload the digital certificate before uploading the CRL. Otherwise, the digital certificate will fail to be uploaded.
Logging In to the OMU portal)Table 6-22 describes the parameters.
Parameter |
Description |
|---|---|
Certificate verification |
This function is enabled by default.
|
CRLs are used to verify the validity of the peer device's certificates to ensure secure communication. You must upload the digital certificate before uploading the CRL. Otherwise, the digital certificate will fail to be uploaded.
In this scenario, you need to upload the CA certificate corresponding to the ONVIF certificate of the camera to the OMU portal. If cameras use ONVIF certificates issued by different CAs, you need to upload the CA certificates corresponding to the ONVIF certificates to the OMU portal in sequence.
You have applied for the desired certificates from the CA or purchased a commercial certificate. Table 6-23 lists the certificates for SDK interconnection. Table 6-24 lists the certificates for southbound ONVIF interconnection.
No. |
Certificate |
Example |
|---|---|---|
1 |
Root certificate |
common_cacert.pem |
2 |
Server signature certificate |
common_server.pem |
3 |
Private key of the server signature certificate |
common_server.key You need to enter the certificate private key password when uploading the private key. |
Logging In to the OMU portal)
CRLs are used to verify the validity of the peer device's certificates to ensure secure communication. You must upload the digital certificate before uploading the CRL. Otherwise, the digital certificate will fail to be uploaded.
Logging In to the OMU portal)
CRLs are used to verify the validity of the peer device's certificates to ensure secure communication. You must upload the digital certificate before uploading the CRL. Otherwise, the digital certificate will fail to be uploaded.
You have applied for the desired certificates from the CA or purchased a commercial certificate. Table 6-25 lists the required certificates.
Logging In to the OMU portal)
CRLs are used to verify the validity of the peer device's certificates to ensure secure communication. You must upload the digital certificate before uploading the CRL. Otherwise, the digital certificate will fail to be uploaded.