I trying to setup a secure connection between Tulip and Highbyte & Node Red. I have a key/cert pair provided by IT but it only provides a corporate cert, it is not “chained” back to a root CA.
It’s interesting that insecure connections are allowed, but not self-signed certs or ones that can’t be tracked back to a root CA.
Is this intentional? Is there a work around?
Not clear what is connecting to what Are you writing from nodered into Highbyte?
I have the cert loaded to both Node Red and Highbyte (separate use cases).
The problem is that Tulip will not use the cert IT provided because it doesn’t chain all the way down to a root CA, and yet it does allow insecure connections.
Self-signed certs are not ideal, but refusing to use them while allowing insecure connections seems inconsistent.
Where exactly are you loading the certificate? And what method are you using to make the connection?
The cert is loaded into Node Red and Highbyte.
The problem is when I create the connector for the connector function, the Test fails with either self-signed-certificat, or with the IT cert,
unable to verify the first certificate.