From b0601b794e37208f5ba14bea642bf3fa9b241dfb Mon Sep 17 00:00:00 2001 From: Judah Schwartz Date: Tue, 5 Sep 2023 12:25:38 +0300 Subject: [PATCH] Update trust-custom-certificates.md --- content-repo/extra-docs/articles/trust-custom-certificates.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content-repo/extra-docs/articles/trust-custom-certificates.md b/content-repo/extra-docs/articles/trust-custom-certificates.md index d379e2e02..26f8957b8 100644 --- a/content-repo/extra-docs/articles/trust-custom-certificates.md +++ b/content-repo/extra-docs/articles/trust-custom-certificates.md @@ -4,7 +4,7 @@ title: Configure Server and Integrations to Trust Custom Certificates description: Setup the Server and JS/Native Integrations to Trust Custom Certificates. --- -Server initiated communication (for example, downloading a pack from the marketplace), Javascript integrations, and native integrations use the built-in set of CA-Signed certificates of the host machine to validate TLS communication. If you are using an engine, the engine also uses CA-Signed certificates. You can add custom trusted certificates to the host built-in set. (In addition, you will need to [configure Python Docker integrations to trust custom certificates](https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-1/cortex-xsoar-admin/docker/configure-python-docker-integrations-to-trust-custom-certificates.html).) +Server initiated communication (for example, downloading a pack from the marketplace), Javascript integrations, and native integrations use the built-in set of CA-Signed certificates of the host machine to validate TLS communication. If you are using an engine, the engine also uses CA-Signed certificates. You can add custom trusted certificates to the host built-in set. (In addition, you will need to [configure Python Docker integrations to trust custom certificates](https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-9/cortex-xsoar-admin/docker/configure-python-docker-integrations-to-trust-custom-certificates.html).) 1. Add the certificate to the machine’s trusted ROOT CA Bundle. The location of the CA Bundle depends on the version of the operating system and the operating configuration.