Skip to main content
arrow_back Back to Changelog
minor

v1.5.6: Certificate Store, Easier HTTPS Changes, and Safer Certificate Rollovers

Version 1.5.6 adds Certificate Store, integration certificate assignment, safer default HTTPS selection, and automatic recovery after certificate changes.

Version 1.5.6 improves how operators manage HTTPS and integration certificates.

✨ New Features

Certificate Store

  • One place for certificate work: HTTPS, OPC UA trust, and integration certificates are managed from a single screen.
  • Clear certificate detail: Operators can see expiry, type, private-key status, usage, and profile references before applying a certificate.
  • Starter certificate on first setup: New environments can come up with an automatically generated self-signed certificate until a production certificate is imported.

Certificate Store detail view
Certificate Store detail view

Integration certificate assignment

  • Cleaner assignment flow: AWS IoT Core, MQTT, Sparkplug B, and OPC UA use certificates selected from the UI.
  • Less manual editing: Proxus resolves the runtime material automatically.
  • Cleaner profile forms: Internal runtime-only fields stay out of normal editing flows.

OPC UA trust management

  • Trusted and rejected certificate actions: Operators can manage trust decisions directly from the Certificate Store.
  • Visible trust usage: Certificate detail pages show whether a certificate is used by client or trusted-server profiles.

🔧 Improvements

Safer default HTTPS selection

  • Private key check before activation: A certificate without a private key can no longer be used as the default HTTPS certificate.
  • Single active default: Proxus keeps only one active default certificate.
  • Clearer titles: Certificate tabs and detail headers now prefer shorter, more readable names.

Certificate Store list view
Certificate Store list view

Better Cloudflare readiness

  • Proper PEM + key import flow: Cloudflare Origin Certificates can now be imported together with their private key and used for platform HTTPS.
  • Safer guidance for Full (strict): Public certificates without private keys are stored correctly but rejected for HTTPS server mode.

Automatic recovery after certificate changes

  • UI recovery on restart: When the active UI HTTPS certificate changes, Proxus rotates the Data Protection key ring automatically.
  • Edge recovery on restart: The same protection now applies on the edge/runtime side.
  • Archived legacy keys: Older protected key files are archived during certificate rollover instead of blocking startup.

📌 Operational Notes

  • Changing the default HTTPS certificate is expected to invalidate existing sessions and cookies.
  • Restart the affected service after setting a new default HTTPS certificate.
  • For Cloudflare Full (strict), import both the certificate and the private key.

Proxus v1.5.6

Released on April 15, 2026