Skip to main content Skip to footer

Search Crosser Knowledge Base

Securing HTTP and MQTT endpoints on the Crosser Node

Did you know that you can secure the HTTP and MQTT endpoints of your Crosser Node to protect data communication? By default, these endpoints operate without encryption or authentication, but you can configure them to use TLS encryption and authentication mechanisms.

For testing purposes, you can create a self-signed certificate using tools like OpenSSL. Once generated, this certificate should be registered on client devices and the host file updated to map edgenode.local to 127.0.0.1. The Node's configuration files, such as httpconfiguration.json and mqttconfiguration.json, can then be adjusted to utilize the certificate for secure communication.

The certificate must be stored in ./data/certificates (relative to the Node's installation directory); if the folder does not exist, create it manually. Additionally, ensure that the CertificatePassword matches the password used when generating the certificate. For production environments, it's recommended to use certificates from trusted Certificate Authorities to maintain security and protect data flows.

For more detailed information, click here

About the author

Syed Gillani | Support & Post Sales Manager

Syed is the Support & Post Sales Manager at Crosser, bringing over 13 years of experience in support and pre-sales. Passionate about helping people find solutions, Syed enjoys sharing tips and tricks to make technology more accessible and improve daily workflows.