Setup Global using Transport Security with certificate Authentication (https)
- Last UpdatedNov 27, 2025
- 4 minute read
Note:
For message security the existing procedures should be followed for setting up certificates.
Certificates
When communications happen between two locations, for example, a hub and a satellite. When the hub sends a request and satellite sends some data back, the hub acts as a client (sending) and satellite as service (listening) and vice versa. To run Global using https, two certificates per location are needed. A service certificate when the location demon acts as a service (listening) and one client certificate when that location acts as a client (sending).
The certificates should be procured only from a trusted Certificate Authority (CA) (Self signed certificates can't be used for https)
To request a certificate from internal CA first generate a base 64 encoded public key of the certificate. This can be done using Internet Information Service (IIS), open IIS and double click Server Certificates.

-
From the Server Certificates window, select Create Certificate Request.

The Request Certificate window is displayed.

-
Populate the Distinguished Name Properties pane of the Request Certificate window as follows:
Common Name: For Service Certificate AVEVA strongly recommend that the common name should be the daemon machine name.
Note:
If you have to give a different common name (for example the machines IP address or <machine>.<domain>.com) the base address expected and used by global needs to be edited in the "baseAddress" Value of globalwcfclient.config and admindwcf.exe.config files in global installation folder and globalwcfclient.config file of Administration, Global, E3d etc. This will represent a considerable effort as these files exist on each users machine.
Note:
Client Certificate common name can be ANY text except machine name as it was already used for service certificate-
Organization: Company/organization name (AVEVA Solutions Ltd for example)
-
Organizational Unit: Business unit name
-
State: Geographic state (Cambridgeshire for example)
-
City/Location: Geographic city (Cambridge for example)
-
Country: Geographic country (GB for example this is governed by a list of valid two letter codes)
-
-
Click Next
-
Populate the Cryptographic Service Provider Properties pane of the Request Certificate window as follows;
-
Select Microsoft RSA SChannel Cryptographic Provider
-
Select 2048
Note:
Use a key size of 2048 (anything smaller will be rejected) -
Click Next
-
From the File Name pane of the Request Certificate window, enter a name and save the .cer file then click Finish.

Note:
This creates a .cer file ready for the CA to produce the certificate.
Certificate Binding
Once the service certificate is installed it needs to be bound with ip address and port number. This needs to be done by executing the netsh command in command prompt with administrator privilege.
First check if any certificate is already bound to the ip address and port number to be used. Open command prompt in administrator mode and type netsh http show sslcert, to display the list of any existing certificates and bindings.
Delete an existing certificate binding
To delete an existing certificate binding execute netsh http delete sslcert ipport=0.0.0.0:8009
0.0.0.0 represents ip address and translates to machine name, 8009 is the port number
we to be cleared for use as an https communication.

Add a certificate binding
To add a certificate binding execute netsh http add sslcert ipport=0.0.0.0:<port> certhash=<certificate thumbprint> appid={0e1409bd-eee7-4bcd-a52e-8c6c78569e2f}

Certificate Thumbprint
To get the certificate's thumbprint, navigate to the certificate installed in Personal folder in MMC and click Details. Scroll to the bottom to find the certificate’s thumbprint value.

The appid parameter is a GUID that can be used to identify the owning application.
Note:
Any random guide can be provided which works well. For example: netsh http add sslcert
ipport=0.0.0.0:8009 certhash=8b89057c9a63374b3ef2fa263200fb83c64ca105 appid={0e1409bd-eee7-4bcd-a52e-8c6c78569e2f}

Note:
For more information about configuring certificate with ports from Microsoft, refer
to Configure a Port with an SSL Certicate - WCF