clean up LAN docs

This commit is contained in:
Matt Hill
2021-03-08 20:26:21 -07:00
parent 65ea39dcdc
commit c8137db6b7

View File

@@ -8,19 +8,9 @@ Operating Systems
MacOS
-----
1. In the Setup App, select your claimed Embassy to view the setup results. Navigate to the "Tor" menu item and copy the Tor address. It is safe to message this address to yourself so that you can paste it in a browser.
2. Navigate to a :ref:`Tor enabled browser <connecting>`.
3. Your browser might display a warning screen. You can typically navigate to *Advanced > Accept the risk and continue*.
4. Allow the page to load with your Tor address over HTTP. Using HTTPS is less performant and unnecessary because Tor v3 is self authenticating.
5. Login to Ambassador UI with the master password you created in the Setup App.
6. Navigate to the “Embassy” tab in the menu.
7. Find the section entitled “Connect over LAN”.
1. Visit your Embassy at its Tor Address.
2. Navigate to --> Embassy --> Connect Over LAN
.. figure:: /_static/images/embassy_lan_setup.png
:width: 90%
@@ -28,7 +18,7 @@ MacOS
Select the "Connect over LAN" menu item
8. Select the "Root Certificate Authority" sub menu. This will prompt a download to save the certificate file to your machine.
3. Select the "Root Certificate Authority" sub menu. This will prompt a download to save the certificate file to your machine.
.. figure:: /_static/images/secure_lan_setup_page.png
:width: 90%
@@ -36,7 +26,7 @@ MacOS
Select the "Root Certificate Authority" sub menu
9. Select the option to open your key with Keychain Access. If you choose to save file, double click on it once downloaded.
4. Select the option to open your key with Keychain Access. If you choose to save file, double click on it once downloaded.
.. figure:: /_static/images/secure_lan_setup_prompt.png
:width: 90%
@@ -44,7 +34,7 @@ MacOS
Open with "Keychain Access" and select "OK"
10. Enter your computer password when prompted. It will be imported into your computers keychain.
5. Enter your computer password when prompted. It will be imported into your computers keychain.
.. figure:: /_static/images/ssl/macos/certificate_untrusted.png
:width: 90%
@@ -54,11 +44,11 @@ MacOS
If the keychain console did not open, press "Command + spacebar" and type “Keychain Access”, and hit enter to open it.
11. Navigate to the "System" tab and find the certificate entitled “Embassy Local Root CA”.
6. Navigate to the "System" tab and find the certificate entitled “Embassy Local Root CA”.
12. Double click on this certificate. A second window will pop up.
7. Double click on this certificate. A second window will pop up.
13. Open the “Trust” dropdown and select “Always Trust” from the dropdown next to “when using this certificate”.
8. Open the “Trust” dropdown and select “Always Trust” from the dropdown next to “when using this certificate”.
.. figure:: /_static/images/ssl/macos/always_trust.png
:width: 90%
@@ -66,9 +56,9 @@ If the keychain console did not open, press "Command + spacebar" and type “Key
Select "Always trust" under SSL dropdown for Embassy Local CA
14. Close this window and enter your password to apply the settings.
9. Close this window and enter your password to apply the settings.
15. The “Embassy Local Root CA” cert will now read “This certificate is marked as trusted for all users” in Keychain Access.
10. The “Embassy Local Root CA” cert will now read “This certificate is marked as trusted for all users” in Keychain Access.
.. figure:: /_static/images/ssl/macos/certificate_trusted.png
:width: 90%
@@ -76,24 +66,16 @@ If the keychain console did not open, press "Command + spacebar" and type “Key
Trusted Embassy Local CA certificate
16. Navigate to your desired browser to import this certificate and follow the steps for :ref:`supported browsers <browsers>`.
11. Open to your favorite browser to import this certificate and follow the steps for :ref:`supported browsers <browsers>`.
Windows
-------
1. In the Setup App, select your claimed Embassy to view the setup results. Navigate to the "Tor" menu item and copy the Tor address. It is safe to message this address to yourself so that you can paste it in a browser.
1. Install `Bonjour Print Services <https://support.apple.com/kb/DL999>`_ on your Windows machine. This is necessary in order to visit .local addresses on Windows.
2. Navigate to a :ref:`Tor enabled browser <connecting>`.
3. Your browser might display a warning screen. You can typically navigate to *Advanced > Accept the risk and continue*.
4. Allow the page to load with your Tor address over HTTP. Using HTTPS is less performant and unnecessary because Tor v3 is self authenticating.
5. Login to Ambassador UI with the master password you created in the Setup App.
6. Navigate to the “Embassy” tab in the menu.
7. Find the section entitled “Connect over LAN”.
1. Visit your Embassy at its Tor Address.
2. Navigate to --> Embassy --> Connect Over LAN
.. figure:: /_static/images/embassy_lan_setup.png
:width: 90%
@@ -101,7 +83,7 @@ Windows
Select the "Connect over LAN" menu item
8. Select the "Root Certificate Authority" sub menu. This will prompt a download to save the certificate file to your machine.
3. Select the "Root Certificate Authority" sub menu. This will prompt a download to save the certificate file to your machine.
.. figure:: /_static/images/secure_lan_setup_page.png
:width: 90%
@@ -109,7 +91,7 @@ Windows
Select the "Root Certificate Authority" sub menu download icon
9. Select the option to save the *Embassy Local CA.crt* file.
4. Select the option to save the *Embassy Local CA.crt* file.
.. figure:: /_static/images/ssl/windows/windows_download_cert.png
:width: 90%
@@ -117,9 +99,9 @@ Windows
"Save file" when Opening Embassy Local CA.crt
10. On your computer, right-click the “Start” menu and select “Run”.
5. On your computer, right-click the “Start” menu and select “Run”.
11. Type in “mmc” and click “OK”. When prompted on the “User Account Control” window, select “Yes” to allow this program to run.
6. Type in “mmc” and click “OK”. When prompted on the “User Account Control” window, select “Yes” to allow this program to run.
.. figure:: /_static/images/ssl/windows/1_windows_mmc.png
:width: 90%
@@ -127,7 +109,7 @@ Windows
Access the Windows Management Console
12. When the Management Console opens, navigate to *File > Add/Remove Snap-in*.
7. When the Management Console opens, navigate to *File > Add/Remove Snap-in*.
.. figure:: /_static/images/ssl/windows/2_windows_console_root.png
:width: 90%
@@ -135,7 +117,7 @@ Windows
Add Snap-in from Console Root
13. Select “Certificates” in the left side menu, then “Add”. This will open another window.
8. Select “Certificates” in the left side menu, then “Add”. This will open another window.
.. figure:: /_static/images/ssl/windows/3_windows_add_certificates.png
:width: 90%
@@ -143,9 +125,9 @@ Windows
Add Certificates to selected snap-ins
14. Select “Computer account” and click “Next. Leave defaulted options on the next screen and click “Finish”.
9. Select “Computer account” and click “Next. Leave defaulted options on the next screen and click “Finish”.
15. When you return to the “Add or Remove Snap-ins” page, ensure “Certificates (Local Computer)” exists under “Console Root” in the “Selected snap-ins” section, then click “OK”.
10. When you return to the “Add or Remove Snap-ins” page, ensure “Certificates (Local Computer)” exists under “Console Root” in the “Selected snap-ins” section, then click “OK”.
.. figure:: /_static/images/ssl/windows/4_windows_selected_snapin.png
:width: 90%
@@ -153,7 +135,7 @@ Windows
Certificates (Local Computer) is selected as snap-in
16. In the left hand menu of the Management Console, navigate to Certificates (Local Computer) > Trusted Root Certification Authorities > Certificates.
11. In the left hand menu of the Management Console, navigate to Certificates (Local Computer) > Trusted Root Certification Authorities > Certificates.
.. figure:: /_static/images/ssl/windows/5_windows_trusted_certificate_menu.png
:width: 90%
@@ -161,7 +143,7 @@ Windows
Access Certificates in Management Console
17. Right click on “Certificates”, then navigate to *All Tasks > Import*.
12. Right click on “Certificates”, then navigate to *All Tasks > Import*.
.. figure:: /_static/images/ssl/windows/6_windows_import_cert.png
:width: 90%
@@ -169,7 +151,7 @@ Windows
Select "Import" from Certificates sub-menu
18. Click “Next” on the first page of the Certificate Import Wizard, then browse to the location where you saved the downloaded certificate and click “Open”.
13. Click “Next” on the first page of the Certificate Import Wizard, then browse to the location where you saved the downloaded certificate and click “Open”.
.. figure:: /_static/images/ssl/windows/7_windows_import_cert_wizard.png
:width: 90%
@@ -177,11 +159,11 @@ Windows
Add downloaded certificate int he Certificate Import Wizard
19. On the “Certificate Store” window, ensure that it says “Trusted Root Certificate Authorities” and click “Next”.
14. On the “Certificate Store” window, ensure that it says “Trusted Root Certificate Authorities” and click “Next”.
20. Select “OK” when the import is successful.
15. Select “OK” when the import is successful.
21. Verify the Embassy Local Root CA certificate is in the “Certificates” folder.
16. Verify the Embassy Local Root CA certificate is in the “Certificates” folder.
.. figure:: /_static/images/ssl/windows/8_windows_successful_cert_install.png
:width: 90%
@@ -189,9 +171,9 @@ Windows
Embassy Local Root CA imported into Certificate folder
22. You can save the settings to the console if desired or cancel.
17. You can save the settings to the console if desired or cancel.
23. Navigate to your desired browser to import this certificate and follow the steps for :ref:`supported browsers <browsers>`.
18. Open to your favorite browser to import this certificate and follow the steps for :ref:`supported browsers <browsers>`.
Linux
-----