A company’s root CA certificate is a self-signed certificate.
Companies that serve as their own CA use its private key to sign their
intermediate, server, client and code-signing certificates. The root
CA certificate resides in the Workbench Certificate Management User Key Store with both its public and private keys. You export it with only its
public key so that you can import it into each platform/station’s User Trust Store.
You have the required authority to create certificates. You
are working in Workbench on a computer that is dedicated to certificate
management, is not on the Internet or the company’s LAN and is physically
secure in a vault or other secure location.
- Access the Workbench Certificate Management view
by clicking .
The
Certificate Management view opens
to the
User Key Store.

As of Niagara 4.13, the default tridium certificate
was replaced by the default certificate,
which has enhanced features and cannot be deleted. The installation
of a new Niagara version will not by default include a tridium certificate, but upgrading a system may have both, the tridium and the default certificate.
- Confirm that you opened the Workbench User Key Store and click
the New button at the bottom of the view.
Note: If you opened the platform/station Certificate
Management view by mistake, you can still create a root
CA certificate, but it will not be available to sign the other certificates.
The
Generate Self Signed Certificate window opens.

All certificates begin as self-signed certificates.
Only the root CA certificate remains self-signed because it sits at
the top of the certificate chain.
- Fill in the form and click OK.
Use Alias to identify this as a root certificate.
- Use the Distinguished Name (CN) edit
mode to fill in the following information:
The Common Name(CN) becomes the Subject (also known as the Distinguished Name). For a
root CA certificate, the Common Name(CN) may
be the same as the Alias.
Organization should be the name of the
company.
Although Locality and State/Province are not required and are arbitrary, leaving them blank generates
a warning message.
The two-character Country Code is required
and must be a known value, such as: US, IN, CA, FR, DE, ES, etc. (refer
to the ISO CODE column at countrycode.org).
Based on the Not Before and Not After dates, certificate validity defaults to a year.
A longer period is not recommended and not tolerated by some browsers.
Changing to a new certificate annually or even within a year makes
it more likely that your certificate contains the latest cryptographic
standards, and reduces the number of old, neglected certificates that
can be stolen and re-used for phishing and drive-by malware attacks.
Key Size defaults to 2048. A larger key
improves security and does not significantly affect communication
time. The only impact it has is to lengthen the time it takes to create
the certificate initially.
For Certificate Usage, select CA.
The Private Key Password window opens.
- Enter and confirm a strong password, and click OK.
The system informs you that the certificate has been submitted.
Soon the certificate appears behind the Info message in the User Key Store table.
- To continue, click OK.
The root CA certificate now exists with both its keys
in the
Workbench User Key Store. From this
location you can use it to sign other certificates (intermediate,
server, client and code-signing).
Note: The exclamation icon (

) indicates that the certificate is not signed
by a Certificate Authority. For a server, client, or code signing
certificate, it means that the certificate will not be trusted by
other parties. For a root CA, which itself is the source of trust,
this is normal and expected.
For this certificate to authenticate
the certificates it signs, you now need to export it with only its
public key and import it into the User Trust Store of each client computer and platform/station.
- Select the new root CA certificate and click Export.
The
Certificate Export window opens.

CAUTION: Do not click the check box
to Export the private key.The only time you click
this check box is when you are backing up the certificate to another
location for safe keeping.
- To create the root CA certificate that will reside in each
client’s User Trust Store, click OK.
The Certificate Export window opens with the file ready
to export as a .pem file.

Notice the Current Path. This
is where the system stores the exported certificate.
- Navigate to a rootcert folder or location
on a thumb drive, and click Save.
The system reports that it exported the certificate successfully.
- To complete the export, click OK.
When exported with only its public key, the root CA certificate
may be freely distributed. You are ready to manually import the root
CA certificate with only its public key into the User Trust
Store of the computer, usually a Supervisor (or engineering) computer, from which to either manually,
or with a provisioning job, install this certificate in the User Trust Store of all remote platforms/stations.