c NiagaraNetwork enabled. See Enabling the NiagaraNetwork.
c Supervisor set up as controller client. See Confirming client/server relationships.
c Server certificate(s) created on each platform/station. If needed, a separate server certificate created for each communication protocol: foxs, https, and platformtls created. See Creating a server certificate.
c CSR(s) generated on each platform/station. See Creating a CSR.
c CSR(s) signed by the root CA or intermediate certificate’s private key. See Signing a certificate.
c Signed server certificate(s) imported back into the platform/station User Key Store. See Importing the signed certificate back into the User Key Store.
c Certificate(s) .pem files deleted.
c If using a third-party CA, the existence of the third-party’s root CA certificate in the platform/station’s System Trust Store confirmed.
c If serving as the CA, company’s root CA certificate imported into the platform/station’s User Trust Store either one at a time, or using a provisioning job. See Manually importing a certificate into a User Trust Store and Installing a certificate.
c Confirmed platform (Niagarad) enabled and correct certificate assigned. See Configuring secure platform communication.
c Secure FoxService confirmed (the default) and Foxs Cert selected. For the specific procedure, see Configuring secure station communication.
c Secure WebService confirmed (the default) and Https Cert selected. For the specific procedure, see Configuring secure station communication.