Certificates and keys
You can set the public certificate and private key of the server or client in the OPC UA server and OPC UA client objects.
Certificates lifecycle
The certificates released by an application are self-signed and must be installed with the trusted certificates on the server and on the client to allow communication. The communication is interrupted when the certificate is removed from the trusted list.
Certificates and the CRLs must comply with the X.509v3 standard with DER binary coding (DER files).
For each certificate, there is a private key and Base64 ASCII encoding (a PEM file).
All of the valid security policies require the signature of certificates with the SHA-256 algorithm with RSA encryption (2048, 3072, or 4096). The two deprecated policies (Basic128Rsa15 and Basic256) require the certificate to be signed with the SHA1 algorithm with RSA encryption (1024 or 2048).
Certificates import
Certificates and keys in OPC UA
To identify the participants in a communication and to verify the authenticity and confidentiality of the exchanged messages, every OPC UA application, including client and server, must have a public certificate that is an Application Instance Interface and a public key/private key pair.
-
Private key file. Signs messages to send and decrypts received messages.
-
Public key file. Verifies signatures of the received messages and encrypts sent messages.