From 5c71911e7b1da4192a3d6ee994b15180f1fc8928 Mon Sep 17 00:00:00 2001 From: Torsten Date: Sat, 15 Apr 2017 20:25:21 +0200 Subject: [PATCH] Update CA import link in xmlConfigFile.md (#207) The URL for the CA import was wrong. --- doc/xmlConfigFile.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/doc/xmlConfigFile.md b/doc/xmlConfigFile.md index 9fded9f..fd9aea3 100644 --- a/doc/xmlConfigFile.md +++ b/doc/xmlConfigFile.md @@ -158,7 +158,7 @@ For servers requiring authentication some parameters must be specified depending The parameter “unsecureAuth” is only effective when the transfer protocol is HTTP - unencrypted data transfer. This is a security vulnerability because the credentials are send in clear text! For a SSPI authentication this is not relevant because the authentication tokens are encrypted. -For target servers using the HTTPS transfer protocol it is necessary, that the CA which issued the server certificate is trusted by the client. This is normally the situation when the server ist located in the Internet. When an organisation is using a self issued CA for the intranet this probably is not the case. In this case it is necessary to import the CA to the Certificate MMC of the Windows client. Have a look to the instructions on this [site](https://msdn.microsoft.com/de-de/library/system.net.credentialcache.defaultcredentials(v=vs.85).aspx). The self issued CA must be imported to the Trusted Root Certification Authorities for the computer. +For target servers using the HTTPS transfer protocol it is necessary, that the CA which issued the server certificate is trusted by the client. This is normally the situation when the server ist located in the Internet. When an organisation is using a self issued CA for the intranet this probably is not the case. In this case it is necessary to import the CA to the Certificate MMC of the Windows client. Have a look to the instructions on this [site](https://technet.microsoft.com/en-us/library/cc754841.aspx). The self issued CA must be imported to the Trusted Root Certification Authorities for the computer. By default, the `download` command does not fail the service startup if the operation fails (e.g. `from` is not available). In order to force the download failure in such case, it is possible to specify the `failOnError` boolean attribute.