mirror of
https://github.com/Start9Labs/documentation.git
synced 2026-03-30 20:14:50 +00:00
rename all svgs to pngs for proper display
This commit is contained in:
@@ -8,19 +8,19 @@ Brave
|
||||
|
||||
#. Open a new tab in Brave and Navigate to ``Settings`` from the top-right hamburger menu.
|
||||
|
||||
.. figure:: /_static/images/ssl/browser/brave_settings.svg
|
||||
.. figure:: /_static/images/ssl/browser/brave_settings.png
|
||||
:width: 30%
|
||||
:alt: Brave settings page
|
||||
|
||||
#. On the left hand sidebar, select the Security and Privacy section, then the Security menu item.
|
||||
|
||||
.. figure:: /_static/images/ssl/browser/brave_security.svg
|
||||
.. figure:: /_static/images/ssl/browser/brave_security.png
|
||||
:width: 60%
|
||||
:alt: Brave Security and Privacy settings
|
||||
|
||||
#. At the bottom of the section, select "Manage Certificates".
|
||||
|
||||
.. figure:: /_static/images/ssl/browser/brave_security_settings.svg
|
||||
.. figure:: /_static/images/ssl/browser/brave_security_settings.png
|
||||
:width: 60%
|
||||
:alt: Brave Security settings page
|
||||
|
||||
@@ -31,7 +31,7 @@ Brave
|
||||
#. If you do not see "org-Start9"in the list, ensure the certificate is properly set up on your computer system. Otherwise, click “Import” and open the downloaded ``Embassy Local Root CA.crt`` file on your device. If you cannot find this, make sure you completed the :ref:`device setup steps <lan-os>`.
|
||||
|
||||
|
||||
.. figure:: /_static/images/ssl/browser/brave_view_certs.svg
|
||||
.. figure:: /_static/images/ssl/browser/brave_view_certs.png
|
||||
:width: 60%
|
||||
:alt: Brave Manage Certificates sub-menu on MacOS
|
||||
|
||||
|
||||
@@ -10,19 +10,19 @@ Chrome
|
||||
|
||||
#. Open a new tab in Chrome and navigate to ``chrome://settings/certificates``.
|
||||
|
||||
.. figure:: /_static/images/ssl/browser/chrome_settings.svg
|
||||
.. figure:: /_static/images/ssl/browser/chrome_settings.png
|
||||
:width: 60%
|
||||
:alt: Chrome Certificates Settings page
|
||||
|
||||
#. Click on the "Authorities" tab.
|
||||
|
||||
.. figure:: /_static/images/ssl/browser/chrome_authorities.svg
|
||||
.. figure:: /_static/images/ssl/browser/chrome_authorities.png
|
||||
:width: 60%
|
||||
:alt: Chrome Certificate Authorities page
|
||||
|
||||
#. You will **EITHER** see "org-Start9" with a trusted “Embassy Local Root CA” listed under it,
|
||||
|
||||
.. figure:: /_static/images/ssl/browser/chrome_s9ca.svg
|
||||
.. figure:: /_static/images/ssl/browser/chrome_s9ca.png
|
||||
:width: 60%
|
||||
:alt: Start9 Certificate Authority
|
||||
|
||||
@@ -32,7 +32,7 @@ Chrome
|
||||
|
||||
#. If you do not see "org-Start9"in the list, ensure the certificate is properly set up on your computer system. Otherwise, click “Import” and open the downloaded ``Embassy Local Root CA.crt`` file on your device. If you cannot find this, make sure you completed the :ref:`device setup steps <lan-os>`.
|
||||
|
||||
.. figure:: /_static/images/ssl/browser/chrome_trust.svg
|
||||
.. figure:: /_static/images/ssl/browser/chrome_trust.png
|
||||
:width: 60%
|
||||
:alt: Trust the CA
|
||||
|
||||
@@ -42,7 +42,7 @@ Chrome
|
||||
|
||||
.. tip:: You may need to restart the browser
|
||||
|
||||
.. figure:: /_static/images/ssl/browser/chrome_https.svg
|
||||
.. figure:: /_static/images/ssl/browser/chrome_https.png
|
||||
:width: 60%
|
||||
:alt: Success
|
||||
|
||||
|
||||
@@ -6,7 +6,7 @@ Firefox
|
||||
|
||||
#. Open Firefox and in a new tab select ``Settings`` from the right-hand hamburger menu:
|
||||
|
||||
.. figure:: /_static/images/tor/os_ff_settings.svg
|
||||
.. figure:: /_static/images/tor/os_ff_settings.png
|
||||
:width: 30%
|
||||
:alt: Firefox options screenshot
|
||||
|
||||
@@ -14,7 +14,7 @@ Firefox
|
||||
|
||||
#. Scroll all the way to the bottom of the page and select “View Certificates”.
|
||||
|
||||
.. figure:: /_static/images/ssl/browser/firefox_security_settings.svg
|
||||
.. figure:: /_static/images/ssl/browser/firefox_security_settings.png
|
||||
:width: 80%
|
||||
:alt: Firefox security settings
|
||||
|
||||
@@ -26,7 +26,7 @@ Firefox
|
||||
|
||||
#. When prompted, check “Trust this CA to identity websites” and select “OK”.
|
||||
|
||||
.. figure:: /_static/images/ssl/browser/firefox_view_certs.svg
|
||||
.. figure:: /_static/images/ssl/browser/firefox_view_certs.png
|
||||
:width: 80%
|
||||
:alt: Firefox import cert
|
||||
|
||||
|
||||
@@ -10,13 +10,13 @@ If you are running Android 12+ (not yet available on Calyx/Graphene), you can se
|
||||
|
||||
#. Either use the Root CA you downloaded at the completion of :ref:`Initial Setup<initial-setup>`, or visit your Embassy at its Tor Address (for security purposes), and navigate to the :ref:`Embassy tab<embassy-tab>` -> LAN
|
||||
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup.svg
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup.png
|
||||
:width: 60%
|
||||
:alt: LAN setup menu item
|
||||
|
||||
#. Click "Download Root CA". This will prompt a download to save the certificate file to your machine
|
||||
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup0.svg
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup0.png
|
||||
:width: 60%
|
||||
:alt: LAN setup page
|
||||
|
||||
@@ -24,13 +24,13 @@ If you are running Android 12+ (not yet available on Calyx/Graphene), you can se
|
||||
|
||||
#. Go to Settings -> Security -> Advanced -> Encryption and Credentials -> Install a Certificate and select the cert you downloaded from the file system
|
||||
|
||||
.. figure:: /_static/images/ssl/android/droidLAN0.svg
|
||||
.. figure:: /_static/images/ssl/android/droidLAN0.png
|
||||
:width: 30%
|
||||
:alt: Install certificate
|
||||
|
||||
#. To setup in Firefox, enter ``about:config`` in URL bar, search for "security.enterprise_roots.enabled", and set to ``true``
|
||||
|
||||
.. figure:: /_static/images/ssl/android/droidLAN1.svg
|
||||
.. figure:: /_static/images/ssl/android/droidLAN1.png
|
||||
:width: 30%
|
||||
:alt: Firefox about:config
|
||||
|
||||
|
||||
@@ -14,13 +14,13 @@ iOS
|
||||
|
||||
#. In the ``Embassy`` tab in your Embassy, under ``Settings`` -> ``LAN``
|
||||
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup.svg
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup.png
|
||||
:width: 60%
|
||||
:alt: LAN setup menu item
|
||||
|
||||
#. Select ``Download Root CA``. Clicking this will prompt you to “Save to device”.
|
||||
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup0.svg
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup0.png
|
||||
:width: 60%
|
||||
:alt: LAN setup page
|
||||
|
||||
@@ -29,7 +29,7 @@ iOS
|
||||
.. note::
|
||||
If you have changed the default browser from Safari to Brave, the following auto save certificate to device flow will *not* work. Safari, Firefox, and Chrome work as expected. We recommend you temporarily use one of these browsers to complete this action.
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/ssl_certificate_install_page.svg
|
||||
.. figure:: /_static/images/ssl/ios/ssl_certificate_install_page.png
|
||||
:width: 40%
|
||||
:alt: Certificate install page
|
||||
|
||||
@@ -37,17 +37,17 @@ iOS
|
||||
|
||||
#. Go to Settings on your iOS device.
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/ssl_ipad_general_settings.svg
|
||||
.. figure:: /_static/images/ssl/ios/ssl_ipad_general_settings.png
|
||||
:width: 40%
|
||||
:alt: General settings
|
||||
|
||||
#. Navigate to *General > Profile(s) > Downloaded Profile > Install*.
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/ssl_ipad_profiles.svg
|
||||
.. figure:: /_static/images/ssl/ios/ssl_ipad_profiles.png
|
||||
:width: 40%
|
||||
:alt: Profiles
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/ssl_ipad_install_profile.svg
|
||||
.. figure:: /_static/images/ssl/ios/ssl_ipad_install_profile.png
|
||||
:width: 40%
|
||||
:alt: Install profile
|
||||
|
||||
@@ -57,7 +57,7 @@ iOS
|
||||
|
||||
#. Next, navigate to *General > About > Certificate Trust Settings*.
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/ssl_ipad_cert_trust_settings.svg
|
||||
.. figure:: /_static/images/ssl/ios/ssl_ipad_cert_trust_settings.png
|
||||
:width: 40%
|
||||
:alt: Certificate trust settings
|
||||
|
||||
@@ -65,7 +65,7 @@ iOS
|
||||
|
||||
#. Enable full trust for root certificates.
|
||||
|
||||
.. figure:: /_static/images/ssl/ios/ssl_ipad_cert_trust.svg
|
||||
.. figure:: /_static/images/ssl/ios/ssl_ipad_cert_trust.png
|
||||
:width: 40%
|
||||
:alt: Enable full trust
|
||||
|
||||
|
||||
@@ -12,13 +12,13 @@ Nothing specific needs to be configured for the Linux environment, so you just n
|
||||
|
||||
#. Navigate to the :ref:`Embassy tab<embassy-tab>` -> Settings -> LAN
|
||||
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup.svg
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup.png
|
||||
:width: 60%
|
||||
:alt: LAN setup menu item
|
||||
|
||||
#. Click "Download Root CA". This will prompt a download to save the certificate file to your machine.
|
||||
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup0.svg
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup0.png
|
||||
:width: 60%
|
||||
:alt: LAN setup page
|
||||
|
||||
|
||||
@@ -6,25 +6,25 @@ Mac
|
||||
|
||||
#. Visit your Embassy at its Tor Address (for security purposes), and navigate to the :ref:`Embassy tab<embassy-tab>` -> LAN
|
||||
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup.svg
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup.png
|
||||
:width: 60%
|
||||
:alt: LAN setup menu item
|
||||
|
||||
#. Click "Download Root CA". This will prompt a download to save the certificate file to your machine.
|
||||
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup0.svg
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup0.png
|
||||
:width: 60%
|
||||
:alt: LAN setup page
|
||||
|
||||
#. Select the option to ``Open with`` "Keychain Access" and select ``OK``. If you choose to save the file, double click on it once downloaded.
|
||||
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup1.svg
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup1.png
|
||||
:width: 60%
|
||||
:alt: LAN setup prompt
|
||||
|
||||
#. Enter your computer password when prompted. It will be imported into your mac's keychain.
|
||||
|
||||
.. figure:: /_static/images/ssl/macos/certificate_untrusted.svg
|
||||
.. figure:: /_static/images/ssl/macos/certificate_untrusted.png
|
||||
:width: 60%
|
||||
:alt: Keychain access import menu
|
||||
|
||||
@@ -36,7 +36,7 @@ Mac
|
||||
|
||||
#. Open the “Trust” dropdown and select “Always Trust” from the dropdown next to “When using this certificate”.
|
||||
|
||||
.. figure:: /_static/images/ssl/macos/always_trust.svg
|
||||
.. figure:: /_static/images/ssl/macos/always_trust.png
|
||||
:width: 60%
|
||||
:alt: Keychain submenu
|
||||
|
||||
@@ -46,7 +46,7 @@ Mac
|
||||
|
||||
#. The “Embassy Local Root CA” cert will now read “This certificate is marked as trusted for all users” in Keychain Access.
|
||||
|
||||
.. figure:: /_static/images/ssl/macos/certificate_trusted.svg
|
||||
.. figure:: /_static/images/ssl/macos/certificate_trusted.png
|
||||
:width: 60%
|
||||
:alt: Keychain menu trusted certificate
|
||||
|
||||
|
||||
@@ -22,13 +22,13 @@ Unfortunately, Windows does not have mDNS support built-in, which is necessary i
|
||||
|
||||
#. Navigate to the :ref:`Embassy tab<embassy-tab>` -> Settings -> LAN
|
||||
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup.svg
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup.png
|
||||
:width: 90%
|
||||
:alt: LAN setup menu item
|
||||
|
||||
#. Click "Download Root CA". This will prompt a download to save the certificate file to your machine.
|
||||
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup0.svg
|
||||
.. figure:: /_static/images/ssl/embassy_lan_setup0.png
|
||||
:width: 90%
|
||||
:alt: LAN setup page
|
||||
|
||||
@@ -36,7 +36,7 @@ Unfortunately, Windows does not have mDNS support built-in, which is necessary i
|
||||
|
||||
#. Type in “mmc” and click “OK”. When prompted on the “User Account Control” window, select “Yes” to allow this program to run.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/1_windows_mmc.svg
|
||||
.. figure:: /_static/images/ssl/windows/1_windows_mmc.png
|
||||
:width: 90%
|
||||
:alt: Windows MMC
|
||||
|
||||
@@ -44,7 +44,7 @@ Unfortunately, Windows does not have mDNS support built-in, which is necessary i
|
||||
|
||||
#. When the Management Console opens, navigate to *File > Add/Remove Snap-in*.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/2_windows_console_root.svg
|
||||
.. figure:: /_static/images/ssl/windows/2_windows_console_root.png
|
||||
:width: 90%
|
||||
:alt: Windows Console Root
|
||||
|
||||
@@ -52,7 +52,7 @@ Unfortunately, Windows does not have mDNS support built-in, which is necessary i
|
||||
|
||||
#. Select “Certificates” in the left side menu, then “Add”. This will open another window.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/3_windows_add_certificates.svg
|
||||
.. figure:: /_static/images/ssl/windows/3_windows_add_certificates.png
|
||||
:width: 90%
|
||||
:alt: Add Certificates
|
||||
|
||||
@@ -62,7 +62,7 @@ Unfortunately, Windows does not have mDNS support built-in, which is necessary i
|
||||
|
||||
#. When you return to the “Add or Remove Snap-ins” page, ensure “Certificates (Local Computer)” exists under “Console Root” in the “Selected snap-ins” section, then click “OK”.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/4_windows_selected_snapin.svg
|
||||
.. figure:: /_static/images/ssl/windows/4_windows_selected_snapin.png
|
||||
:width: 90%
|
||||
:alt: Snap-in Selected
|
||||
|
||||
@@ -70,7 +70,7 @@ Unfortunately, Windows does not have mDNS support built-in, which is necessary i
|
||||
|
||||
#. In the left hand menu of the Management Console, navigate to Certificates (Local Computer) > Trusted Root Certification Authorities > Certificates.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/5_windows_trusted_certificate_menu.svg
|
||||
.. figure:: /_static/images/ssl/windows/5_windows_trusted_certificate_menu.png
|
||||
:width: 90%
|
||||
:alt: Certificates in Management Console
|
||||
|
||||
@@ -78,7 +78,7 @@ Unfortunately, Windows does not have mDNS support built-in, which is necessary i
|
||||
|
||||
#. Right click on “Certificates”, then navigate to *All Tasks > Import*.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/6_windows_import_cert.svg
|
||||
.. figure:: /_static/images/ssl/windows/6_windows_import_cert.png
|
||||
:width: 90%
|
||||
:alt: Import certificate
|
||||
|
||||
@@ -86,7 +86,7 @@ Unfortunately, Windows does not have mDNS support built-in, which is necessary i
|
||||
|
||||
#. Click “Next” on the first page of the Certificate Import Wizard, then browse to the location where you saved the downloaded certificate and click “Open”.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/7_windows_import_cert_wizard.svg
|
||||
.. figure:: /_static/images/ssl/windows/7_windows_import_cert_wizard.png
|
||||
:width: 90%
|
||||
:alt: Import cert wizard
|
||||
|
||||
@@ -98,7 +98,7 @@ Unfortunately, Windows does not have mDNS support built-in, which is necessary i
|
||||
|
||||
#. Verify the Embassy Local Root CA certificate is in the “Certificates” folder.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/8_windows_successful_cert_install.svg
|
||||
.. figure:: /_static/images/ssl/windows/8_windows_successful_cert_install.png
|
||||
:width: 90%
|
||||
:alt: Successful cert install
|
||||
|
||||
|
||||
Reference in New Issue
Block a user