This cybersecurity video series demonstrates key product features to keep your systems safe.
Have you visited the Opto 22 video library lately? Along with product overviews and how-to videos, you'll find several developer videos.
If you've been wanting to know more about all the cybersecurity features that come with groov EPIC and groov RIO, then you'll want to see this video series that covers using self-signed certificates with your groov devices.
The goal is to ensure both trusted and encrypted connections—another way groov products deliver cybersecurity right out of the box. Watch and learn.
This series has three videos that explain the process of creating a verified connection to your groov device, using default self-signed certificates, custom self-signed certificates, or private certificate authorities. Which video you should follow depends on your own application, but the steps are the same for both groov EPIC and groov RIO.
Cybersecurity: Default Self-Signed Certificates with groov Devices
The first video describes how to use the certificate that comes pre-installed on your groov device from the factory. The video includes:
- Overview and tutorial
- How to download and install the certificate
- Using the Microsoft Management Console
- Importing and verifying the self-signed certificate
Cybersecurity: Custom Self-Signed Certificates with groov Devices
The second custom option describes how to create your own hostname and generate a brand new self-signed certificate. This video covers:
- Prerequisites
- Setting the new hostname
- Creating and downloading the certificate
- Installing the certificate
- Confirming import
- Seeing where the self-signed certificate is stored
Cybersecurity: Certificate Authorities
Finally, the third video addresses using private certificate authorities. See how to access a private CA from your company's network and use it to sign a certificate generated on a groov device. You'll learn:
- Certificate verification process
- How to view and install certificates
- Reviewing other certificate types
- Working with untrusted devices
- Changing the hostname
- Generating new certificates
- Downloading files
- Signing and uploading certificates
Thanks for watching!