Naming convention

The User Key Store, User Trust Store, and System Trust Store form the heart of the configuration. Certificates look a lot alike, and the various default self-signed certificates are named identically. While developing a naming convention is not a requirement (the system will function just fine if the certificates are called “cert1,” “cert2,” etc.), a consistent naming scheme can make the process much easier to follow.

Consider using the Alias of each certificate to identify the certificate’s purpose. Certificate aliases might include:

  • The words "root," "intermediate," “server,” “client,” “code-signing”
  • The geographic location of the remote controllers protected by the certificate
  • The host name of the server
  • The IP address of the server