•
For the authentication between the different components (ActiveShuttle, VMS, FMS) in total 3 key
pairs along with their signed CA certificate are required.
•
The encryption between these components works using a Diffie Hellman key file.
•
Software versions below v1.2.x also need the CA's certificate revocation list along with the CA
certificate.
•
Authentication of the server and the encryption of the network traffic between the server and the web
browser/client also requires an additional key pair which is valid for the URL/IP of the AMS (see
section
Intersystem communication certificates – AMS
3.4.1 Intersystem communication certificates
Certificate Names
Common names
Notice!
•
Deprecated - only valid for ActiveShuttle versions <v1.2.x
•
For ActiveShuttle version v1.2.0 and higher e.g. the VehicleManagement certificate can be
reused.
ActiveShuttle
VehicleManagement
FleetManagement
Certificate for getting the support report from an
ActiveShuttle or VMS
3 Common Certificate Names
Subject Alternative Name
It is recommended that the Subject Alternative Name include the IP address of the loopback device
(IPv4:127.0.0.1 IPv6: ::1) and the DNS name
File names
Notice!
•
Deprecated - only valid for ActiveShuttle versions <v1.2.x
•
The file name of the revocation list must be "ca.crl" (not evaluated from RCU/VMS Version
1.2)
RA91390962 AB-V1.3.3, en
Certificate).
Common Name certificate
"BoschRexrothActiveShuttle"
"BoschRexrothVehicleManagement"
"BoschRexrothFleetManagement"
"BoschRexroth..."
. Including subdomains is also possible.
"localhost"
Requirements | ILS, ActiveShuttle | 23
Need help?
Do you have a question about the rexroth ActiveShuttle and is the answer not in the manual?