{"id":31268,"date":"2024-08-30T18:05:42","date_gmt":"2024-08-30T15:05:42","guid":{"rendered":"https:\/\/trueconf.com/blog\/?p=31268"},"modified":"2025-10-17T16:31:03","modified_gmt":"2025-10-17T13:31:03","slug":"how-to-fix-https-connection-if-the-certificate-is-broken","status":"publish","type":"post","link":"https:\/\/trueconf.com/blog\/knowledge-base\/how-to-fix-https-connection-if-the-certificate-is-broken","title":{"rendered":"How to fix HTTPS connection if the certificate is broken"},"content":{"rendered":"<p class=\"primary-medium-text ui-mb-sm-1\">One may accidentally break HTTPS connection as a result of incorrect server configuration. If users rely mostly on client applications, broken HTTPS connection will have practically no effect on your infrastructure, but it will create certain inconveniences:<\/p>\n<ul class=\"ui-list ui-list--medium\" style=\"margin-bottom: 18px;\">\n<li class=\"ui-list__item ui-list__item--disc\">The server control panel, personal area, and conference scheduler will not be accessible in all client applications.<\/li>\n<li class=\"ui-list__item ui-list__item--disc\">Conference participation via WebRTC (from browsers) will not be available.<\/li>\n<li class=\"ui-list__item ui-list__item--disc\">The scripts that involve TrueConf Server API will no longer run.<\/li>\n<\/ul>\n<h2 id=\"http_broke\" class=\"h4--main h4--thick black-text ui-mb-xs-3 ui-mt-md-1\">Why HTTPS connection may be broken<\/h2>\n<p class=\"primary-medium-text ui-mb-sm-1\">The most probable causes:<\/p>\n<ul class=\"ui-list ui-list--medium\" style=\"margin-bottom: 18px;\">\n<li class=\"ui-list__item ui-list__item--num\">When TrueConf Server was migrated from one machine to another, HTTPS connection could be broken, if the administrator forgot to move some of the required files. In this case, <b>authorization<\/b> in the control panel will be <b>unavailable<\/b>.<\/li>\n<li class=\"ui-list__item ui-list__item--num\">When the external name of the server was changed, one could forget to sign a certificate. In this case, the guest page will be unavailable and the browser will display the following error: <code>NET::ERR_CERT_AUTHORITY_INVALID<\/code>.<\/li>\n<li class=\"ui-list__item ui-list__item--num\">Your organization uses the certificates signed by a local certification authority. If certificate configuration is not correct, HTTPS connection may not work and the browser will display this error: <code>ERR_SSL_KEY_USAGE_INCOMPATIBLE<\/code>.<\/li>\n<\/ul>\n<h2 id=\"general_solution\" class=\"h4--main h4--thick black-text ui-mb-xs-3 ui-mt-md-1\">General solution<\/h2>\n<p class=\"primary-medium-text ui-mb-sm-1\">Regardless of the specific cause, there is a general solution to this approach. To fix this issue, you need to move the <b><em>correct certificate<\/em><\/b> and its private key to the target machine or sign a new certificate if it is possible. The articles below show how to get a free TLS certificate.<\/p>\n<ul class=\"ui-list ui-list--medium\" style=\"margin-bottom: 18px;\">\n<li class=\"ui-list__item ui-list__item--disc\"><a href=\"https:\/\/trueconf.com\/blog\/knowledge-base\/how-to-create-a-lets-encrypt-certificate-on-windows.html\" target=\"_blank\" rel=\"noopener\">How to create a \u201cLet\u2019s Encrypt\u201d certificate on Windows<\/a><\/li>\n<li class=\"ui-list__item ui-list__item--disc\"><a href=\"https:\/\/trueconf.com\/blog\/knowledge-base\/how-to-create-a-lets-encrypt-certificate-on-linux.html\" target=\"_blank\" rel=\"noopener\">How to create a \u201cLet\u2019s Encrypt\u201d certificate on Linux<\/a><\/li>\n<\/ul>\n<p class=\"primary-medium-text ui-mb-sm-1\">If your server is installed on the OS that supports GUI, take these steps:<\/p>\n<ul class=\"ui-list ui-list--medium\" style=\"margin-bottom: 18px;\">\n<li class=\"ui-list__item ui-list__item--num\">Get direct access to the OS or access it with the help of RDP, xRDP or VNC (of course, this type of access has to be configured in advance).<\/li>\n<li class=\"ui-list__item ui-list__item--num\">Go to the <code>localhost<\/code> address from the default browser.<\/li>\n<li class=\"ui-list__item ui-list__item--num\">On the guest page, click the <strong>Administrator login<\/strong> button.<\/li>\n<li class=\"ui-list__item ui-list__item--num\">In HTTPS settings, upload the correct certificate and its private key.<\/li>\n<\/ul>\n<h2 id=\"no_acces_localhost\" class=\"h4--main h4--thick black-text ui-mb-xs-3 ui-mt-md-1\">No access from localhost \/ OS without GUI<\/h2>\n<p class=\"primary-medium-text ui-mb-sm-1\">In most cases, the security department of any organization insists that password-free access to the control panel from <code>localhost<\/code> should be closed. In this case and if you installed the server on the OS without GUI, follow the instruction below.:<\/p>\n<p>To solve this problem, we will move the files to the target machine with the help of SSH. However, at first, you will need to name these files in the correct way:<\/p>\n<ul class=\"ui-list ui-list--medium\" style=\"margin-bottom: 18px;\">\n<li class=\"ui-list__item ui-list__item--disc\">Certificate \u2014 <b>custom.crt<\/b><\/li>\n<li class=\"ui-list__item ui-list__item--disc\">Key \u2014 <b>custom.key<\/b><\/li>\n<\/ul>\n<h3 id=\"move_cert_from_win_to_win\" class=\"h5--main h5--thick black-text ui-mb-xs-3 ui-mt-md-1\">How to move certificates from Windows to Windows<\/h3>\n<ul class=\"ui-list ui-list--medium\" style=\"margin-bottom: 18px;\">\n<li class=\"ui-list__item ui-list__item--num\">Run <b>PowerShell<\/b> as the administrator.<\/li>\n<li class=\"ui-list__item ui-list__item--num\">Go to the folder with the certificate and key:\n<pre class=\"lang:ps decode:true\">cd \/targer-dir\/<\/pre>\n<\/li>\n<li class=\"ui-list__item ui-list__item--num\">Due to the peculiarities of how paths are interpreted on Windows, we will use SFTP instead of SCP to move files. Connect to the target machine:\n<pre class=\"lang:ps decode:true\">sftp admin@10.110.2.242<\/pre>\n<\/li>\n<li class=\"ui-list__item ui-list__item--num\">Go to the folder with HTTPS settings:\n<pre class=\"lang:ps decode:true\">cd 'C:\/Program Files\/TrueConf Server\/httpconf\/ssl\/'<\/pre>\n<\/li>\n<li class=\"ui-list__item ui-list__item--num\">Move the two files with the command:\n<pre class=\"lang:ps decode:true\">put custom.crt\r\nput custom.key<\/pre>\n<\/li>\n<\/ul>\n<h3 id=\"move_cert_from_linux_to_linux\" class=\"h5--main h5--thick black-text ui-mb-xs-3 ui-mt-md-1\">How to move the certificates from Linux to Linux<\/h3>\n<ul class=\"ui-list ui-list--medium\" style=\"margin-bottom: 18px;\">\n<li class=\"ui-list__item ui-list__item--num\">Open the terminal.<\/li>\n<li class=\"ui-list__item ui-list__item--num\">Go to the folder with the certificate and key:\n<pre class=\"lang:default decode:true \">cd \/targer-dir\/<\/pre>\n<\/li>\n<li class=\"ui-list__item ui-list__item--num\">Use SCP to move the certificate and key to the target machine, in the folder with HTTPS settings:\n<pre class=\"lang:default decode:true \">scp custom.crt custom.key admin@10.110.2.242:\/opt\/trueconf\/server\/etc\/webmanager\/ssl\/<\/pre>\n<\/li>\n<li class=\"ui-list__item ui-list__item--num\">Next, connect to the target machine via SSH and run the commands below to set the read rights for the moved files and set trueconf as the owner:\n<pre class=\"lang:default decode:true \">sudo chmod 400 \/opt\/trueconf\/server\/etc\/webmanager\/ssl\/custom.crt \/opt\/trueconf\/server\/etc\/webmanager\/ssl\/custom.key\r\nsudo chown trueconf \/opt\/trueconf\/server\/etc\/webmanager\/ssl\/custom.crt \/opt\/trueconf\/server\/etc\/webmanager\/ssl\/custom.key<\/pre>\n<\/li>\n<\/ul>\n<h2 id=\"backup\" class=\"h4--main h4--thick black-text ui-mb-xs-3 ui-mt-md-1\">Backup solution<\/h2>\n<p class=\"primary-medium-text ui-mb-sm-1\">If you do not have a new certificate, you will need to disable the use of HTTPS.<\/p>\n<h3 id=\"windows\" class=\"h5--main h5--thick black-text ui-mb-xs-3 ui-mt-md-1\">Windows<\/h3>\n<ul class=\"ui-list ui-list--medium\" style=\"margin-bottom: 18px;\">\n<li class=\"ui-list__item ui-list__item--num\">Delete files:\n<pre class=\"lang:default decode:true \">C:\\Program Files\\TrueConf Server\\httpconf\\opt\\listen.conf\r\nC:\\Program Files\\TrueConf Server\\httpconf\\opt\\config.ssl<\/pre>\n<\/li>\n<li class=\"ui-list__item ui-list__item--num\">Restart the <strong>TrueConf Web Manager<\/strong> service.<\/li>\n<\/ul>\n<h3 id=\"linux\" class=\"h5--main h5--thick black-text ui-mb-xs-3 ui-mt-md-1\">Linux<\/h3>\n<ul class=\"ui-list ui-list--medium\" style=\"margin-bottom: 18px;\">\n<li class=\"ui-list__item ui-list__item--num\">Delete files:\n<pre class=\"lang:default decode:true \">\/opt\/trueconf\/server\/etc\/webmanager\/opt\/listen.conf\r\n\/opt\/trueconf\/server\/etc\/webmanager\/opt\/config.ssl<\/pre>\n<\/li>\n<li class=\"ui-list__item ui-list__item--num\">Restart the <strong>trueconf-web<\/strong> service.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>One may accidentally break HTTPS connection as a result of incorrect server configuration. If users rely mostly on client applications, broken HTTPS connection will have practically no effect on your infrastructure, but it will create certain inconveniences: The server control panel, personal area, and conference scheduler will not be accessible in all client applications. Conference [&hellip;]<\/p>\n","protected":false},"author":55,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[260],"tags":[231,186],"class_list":["post-31268","post","type-post","status-publish","format-standard","hentry","category-knowledge-base","tag-troubleshooting","tag-administration","wpautop"],"_links":{"self":[{"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/posts\/31268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/comments?post=31268"}],"version-history":[{"count":7,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/posts\/31268\/revisions"}],"predecessor-version":[{"id":39866,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/posts\/31268\/revisions\/39866"}],"wp:attachment":[{"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/media?parent=31268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/categories?post=31268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trueconf.com/blog\/wp-json\/wp\/v2\/tags?post=31268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}