These certificates are used to make secure syslog protocol requests to Devo. You can use any of the certificate types that are generated when you create a new set to authorize your requests.
Learn more about sending data directly to Devo using the syslog protocol and other methods in this section.
These are all the certificate types that you can generate in this area:
Certificate and Private key
Certificates and private keys represent both parts of a certificate, the former being the private key to the certificate and the latter being the signed certificate.
Click Certificate and Private key in a row of certificates to download the corresponding
A Java KeyStore (JKS) is a security certificate used for instance in TLS encryption.
Click JKS in a row of certificates to download the corresponding
BKS is a keystore format provided by the popular third-party Java cryptographic library provider BouncyCastle. It is a keystore similar to the JKS.
Click BKS in a row of certificates to download the corresponding
PKCS12 (also known as PKCS#12 or PFX) is a binary format for storing a certificate chain and private key in a single, encryptable file. It is a keystore similar to the JKS.
Click PKCS12 in a row of certificates to download the corresponding
- To download the Certificate Authority certificates, click Chain CA.
- To generate a new set of certificates, click New Certificate. A new set of certificates will be generated and will appear as a new row in the table.
- You can add tags to specific sets of certificates to filter them easily in case you have a lot of rows in the table. To do it, click the Tags column in the row where you want to add the tag, enter a keyword in the field that appears and click the + button.
- To delete a set of certificates, place the cursor on the required row to highlight it and an ellipsis icon will appear at the end of the row. Click it and select Delete.
Note that some of the certificates you have generated may appear as Valid but deprecated in the list. Due to security reasons, the platform now offers certificates with stronger encryption. Old certificates will not be invalidated, but we strongly recommend removing them and generating new ones. However, please make sure you don't remove a certificate before being sure that you are not using it.