mirror of
https://github.com/Start9Labs/documentation.git
synced 2026-03-26 10:21:53 +00:00
clean up LAN docs
This commit is contained in:
@@ -8,19 +8,9 @@ Operating Systems
|
||||
MacOS
|
||||
-----
|
||||
|
||||
1. In the Setup App, select your claimed Embassy to view the setup results. Navigate to the "Tor" menu item and copy the Tor address. It is safe to message this address to yourself so that you can paste it in a browser.
|
||||
|
||||
2. Navigate to a :ref:`Tor enabled browser <connecting>`.
|
||||
|
||||
3. Your browser might display a warning screen. You can typically navigate to *Advanced > Accept the risk and continue*.
|
||||
|
||||
4. Allow the page to load with your Tor address over HTTP. Using HTTPS is less performant and unnecessary because Tor v3 is self authenticating.
|
||||
|
||||
5. Login to Ambassador UI with the master password you created in the Setup App.
|
||||
|
||||
6. Navigate to the “Embassy” tab in the menu.
|
||||
|
||||
7. Find the section entitled “Connect over LAN”.
|
||||
1. Visit your Embassy at its Tor Address.
|
||||
|
||||
2. Navigate to --> Embassy --> Connect Over LAN
|
||||
|
||||
.. figure:: /_static/images/embassy_lan_setup.png
|
||||
:width: 90%
|
||||
@@ -28,7 +18,7 @@ MacOS
|
||||
|
||||
Select the "Connect over LAN" menu item
|
||||
|
||||
8. Select the "Root Certificate Authority" sub menu. This will prompt a download to save the certificate file to your machine.
|
||||
3. Select the "Root Certificate Authority" sub menu. This will prompt a download to save the certificate file to your machine.
|
||||
|
||||
.. figure:: /_static/images/secure_lan_setup_page.png
|
||||
:width: 90%
|
||||
@@ -36,7 +26,7 @@ MacOS
|
||||
|
||||
Select the "Root Certificate Authority" sub menu
|
||||
|
||||
9. Select the option to open your key with Keychain Access. If you choose to save file, double click on it once downloaded.
|
||||
4. Select the option to open your key with Keychain Access. If you choose to save file, double click on it once downloaded.
|
||||
|
||||
.. figure:: /_static/images/secure_lan_setup_prompt.png
|
||||
:width: 90%
|
||||
@@ -44,7 +34,7 @@ MacOS
|
||||
|
||||
Open with "Keychain Access" and select "OK"
|
||||
|
||||
10. Enter your computer password when prompted. It will be imported into your computer’s keychain.
|
||||
5. Enter your computer password when prompted. It will be imported into your computer’s keychain.
|
||||
|
||||
.. figure:: /_static/images/ssl/macos/certificate_untrusted.png
|
||||
:width: 90%
|
||||
@@ -54,11 +44,11 @@ MacOS
|
||||
|
||||
If the keychain console did not open, press "Command + spacebar" and type “Keychain Access”, and hit enter to open it.
|
||||
|
||||
11. Navigate to the "System" tab and find the certificate entitled “Embassy Local Root CA”.
|
||||
6. Navigate to the "System" tab and find the certificate entitled “Embassy Local Root CA”.
|
||||
|
||||
12. Double click on this certificate. A second window will pop up.
|
||||
7. Double click on this certificate. A second window will pop up.
|
||||
|
||||
13. Open the “Trust” dropdown and select “Always Trust” from the dropdown next to “when using this certificate”.
|
||||
8. Open the “Trust” dropdown and select “Always Trust” from the dropdown next to “when using this certificate”.
|
||||
|
||||
.. figure:: /_static/images/ssl/macos/always_trust.png
|
||||
:width: 90%
|
||||
@@ -66,9 +56,9 @@ If the keychain console did not open, press "Command + spacebar" and type “Key
|
||||
|
||||
Select "Always trust" under SSL dropdown for Embassy Local CA
|
||||
|
||||
14. Close this window and enter your password to apply the settings.
|
||||
9. Close this window and enter your password to apply the settings.
|
||||
|
||||
15. The “Embassy Local Root CA” cert will now read “This certificate is marked as trusted for all users” in Keychain Access.
|
||||
10. The “Embassy Local Root CA” cert will now read “This certificate is marked as trusted for all users” in Keychain Access.
|
||||
|
||||
.. figure:: /_static/images/ssl/macos/certificate_trusted.png
|
||||
:width: 90%
|
||||
@@ -76,24 +66,16 @@ If the keychain console did not open, press "Command + spacebar" and type “Key
|
||||
|
||||
Trusted Embassy Local CA certificate
|
||||
|
||||
16. Navigate to your desired browser to import this certificate and follow the steps for :ref:`supported browsers <browsers>`.
|
||||
11. Open to your favorite browser to import this certificate and follow the steps for :ref:`supported browsers <browsers>`.
|
||||
|
||||
Windows
|
||||
-------
|
||||
|
||||
1. In the Setup App, select your claimed Embassy to view the setup results. Navigate to the "Tor" menu item and copy the Tor address. It is safe to message this address to yourself so that you can paste it in a browser.
|
||||
1. Install `Bonjour Print Services <https://support.apple.com/kb/DL999>`_ on your Windows machine. This is necessary in order to visit .local addresses on Windows.
|
||||
|
||||
2. Navigate to a :ref:`Tor enabled browser <connecting>`.
|
||||
|
||||
3. Your browser might display a warning screen. You can typically navigate to *Advanced > Accept the risk and continue*.
|
||||
|
||||
4. Allow the page to load with your Tor address over HTTP. Using HTTPS is less performant and unnecessary because Tor v3 is self authenticating.
|
||||
|
||||
5. Login to Ambassador UI with the master password you created in the Setup App.
|
||||
|
||||
6. Navigate to the “Embassy” tab in the menu.
|
||||
|
||||
7. Find the section entitled “Connect over LAN”.
|
||||
1. Visit your Embassy at its Tor Address.
|
||||
|
||||
2. Navigate to --> Embassy --> Connect Over LAN
|
||||
|
||||
.. figure:: /_static/images/embassy_lan_setup.png
|
||||
:width: 90%
|
||||
@@ -101,7 +83,7 @@ Windows
|
||||
|
||||
Select the "Connect over LAN" menu item
|
||||
|
||||
8. Select the "Root Certificate Authority" sub menu. This will prompt a download to save the certificate file to your machine.
|
||||
3. Select the "Root Certificate Authority" sub menu. This will prompt a download to save the certificate file to your machine.
|
||||
|
||||
.. figure:: /_static/images/secure_lan_setup_page.png
|
||||
:width: 90%
|
||||
@@ -109,7 +91,7 @@ Windows
|
||||
|
||||
Select the "Root Certificate Authority" sub menu download icon
|
||||
|
||||
9. Select the option to save the *Embassy Local CA.crt* file.
|
||||
4. Select the option to save the *Embassy Local CA.crt* file.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/windows_download_cert.png
|
||||
:width: 90%
|
||||
@@ -117,9 +99,9 @@ Windows
|
||||
|
||||
"Save file" when Opening Embassy Local CA.crt
|
||||
|
||||
10. On your computer, right-click the “Start” menu and select “Run”.
|
||||
5. On your computer, right-click the “Start” menu and select “Run”.
|
||||
|
||||
11. Type in “mmc” and click “OK”. When prompted on the “User Account Control” window, select “Yes” to allow this program to run.
|
||||
6. Type in “mmc” and click “OK”. When prompted on the “User Account Control” window, select “Yes” to allow this program to run.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/1_windows_mmc.png
|
||||
:width: 90%
|
||||
@@ -127,7 +109,7 @@ Windows
|
||||
|
||||
Access the Windows Management Console
|
||||
|
||||
12. When the Management Console opens, navigate to *File > Add/Remove Snap-in*.
|
||||
7. When the Management Console opens, navigate to *File > Add/Remove Snap-in*.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/2_windows_console_root.png
|
||||
:width: 90%
|
||||
@@ -135,7 +117,7 @@ Windows
|
||||
|
||||
Add Snap-in from Console Root
|
||||
|
||||
13. Select “Certificates” in the left side menu, then “Add”. This will open another window.
|
||||
8. Select “Certificates” in the left side menu, then “Add”. This will open another window.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/3_windows_add_certificates.png
|
||||
:width: 90%
|
||||
@@ -143,9 +125,9 @@ Windows
|
||||
|
||||
Add Certificates to selected snap-ins
|
||||
|
||||
14. Select “Computer account” and click “Next. Leave defaulted options on the next screen and click “Finish”.
|
||||
9. Select “Computer account” and click “Next. Leave defaulted options on the next screen and click “Finish”.
|
||||
|
||||
15. When you return to the “Add or Remove Snap-ins” page, ensure “Certificates (Local Computer)” exists under “Console Root” in the “Selected snap-ins” section, then click “OK”.
|
||||
10. When you return to the “Add or Remove Snap-ins” page, ensure “Certificates (Local Computer)” exists under “Console Root” in the “Selected snap-ins” section, then click “OK”.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/4_windows_selected_snapin.png
|
||||
:width: 90%
|
||||
@@ -153,7 +135,7 @@ Windows
|
||||
|
||||
Certificates (Local Computer) is selected as snap-in
|
||||
|
||||
16. In the left hand menu of the Management Console, navigate to Certificates (Local Computer) > Trusted Root Certification Authorities > Certificates.
|
||||
11. In the left hand menu of the Management Console, navigate to Certificates (Local Computer) > Trusted Root Certification Authorities > Certificates.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/5_windows_trusted_certificate_menu.png
|
||||
:width: 90%
|
||||
@@ -161,7 +143,7 @@ Windows
|
||||
|
||||
Access Certificates in Management Console
|
||||
|
||||
17. Right click on “Certificates”, then navigate to *All Tasks > Import*.
|
||||
12. Right click on “Certificates”, then navigate to *All Tasks > Import*.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/6_windows_import_cert.png
|
||||
:width: 90%
|
||||
@@ -169,7 +151,7 @@ Windows
|
||||
|
||||
Select "Import" from Certificates sub-menu
|
||||
|
||||
18. Click “Next” on the first page of the Certificate Import Wizard, then browse to the location where you saved the downloaded certificate and click “Open”.
|
||||
13. Click “Next” on the first page of the Certificate Import Wizard, then browse to the location where you saved the downloaded certificate and click “Open”.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/7_windows_import_cert_wizard.png
|
||||
:width: 90%
|
||||
@@ -177,11 +159,11 @@ Windows
|
||||
|
||||
Add downloaded certificate int he Certificate Import Wizard
|
||||
|
||||
19. On the “Certificate Store” window, ensure that it says “Trusted Root Certificate Authorities” and click “Next”.
|
||||
14. On the “Certificate Store” window, ensure that it says “Trusted Root Certificate Authorities” and click “Next”.
|
||||
|
||||
20. Select “OK” when the import is successful.
|
||||
15. Select “OK” when the import is successful.
|
||||
|
||||
21. Verify the Embassy Local Root CA certificate is in the “Certificates” folder.
|
||||
16. Verify the Embassy Local Root CA certificate is in the “Certificates” folder.
|
||||
|
||||
.. figure:: /_static/images/ssl/windows/8_windows_successful_cert_install.png
|
||||
:width: 90%
|
||||
@@ -189,9 +171,9 @@ Windows
|
||||
|
||||
Embassy Local Root CA imported into Certificate folder
|
||||
|
||||
22. You can save the settings to the console if desired or cancel.
|
||||
17. You can save the settings to the console if desired or cancel.
|
||||
|
||||
23. Navigate to your desired browser to import this certificate and follow the steps for :ref:`supported browsers <browsers>`.
|
||||
18. Open to your favorite browser to import this certificate and follow the steps for :ref:`supported browsers <browsers>`.
|
||||
|
||||
Linux
|
||||
-----
|
||||
|
||||
Reference in New Issue
Block a user