Setup Operations Center UI¶
Certificate Based Authentication¶
After installing Operations Center, you can access the Operations Center UI in
your web browser by accessing https://<operations-center-ip>:8443 (replace
<operations-center-ip> with the actual IP address or host name of your
Operations Center instance).
Without further configuration, you will see a screen like this:

To set up certificate-based authentication for the Operations Center UI, follow these steps:
Generate Client Certificate:
If you don’t already have a client certificate, the simplest way to generate one is by using
incus remote generate-certificate, which will create a new client key and certificate pair for you. This is stored in your Incus client configuration directory (usually~/.config/incus).Get the fingerprint of the (existing or generated) certificate using:
openssl x509 -noout -fingerprint -sha256 -in ~/.config/incus/client.crt
Add Certificate to Operations Center:
Add the fingerprint of the client certificate to the list of trusted TLS client certificate fingerprints using the Operations Center CLI:
operations-center system security edit
This will open your default text editor. Add the fingerprint under the
trusted_tls_client_cert_fingerprintssection, for example:trusted_tls_client_cert_fingerprints: - E7:1A:68:E0:B7:1A:5F:C0:A3:38:36:C0:AE:E0:6F:AD:4A:23:53:18:9D:8A:09:D4:95:14:1F:94:82:5C:A2:01
Convert Certificate to PKCS#12/PFX Format:
For import of the client certificate into your browser, you have to convert the client certificate to PKCS#12/PFX format. This can be done using OpenSSL as follows:
openssl pkcs12 -export -in ~/.config/incus/client.crt -inkey ~/.config/incus/client.key -out ~/.config/incus/client.pfx -name "Client Certificate"
OpenSSL will prompt you to set a password for the PKCS#12 file.
Import Certificate into Browser:
The next step is to import the generated PKCS#12/PFX file into your web browser. The process varies depending on the browser you are using:
Paste this link into the address bar:
about:preferences#privacy
Scroll down to the certificates section and click the View Certificates button.
In the popup click
Your certificatesand thenImport.Select the
.pfxfile generated. Enter your password, or leave the field empty if you have not set one.
Paste into the address bar:
chrome://settings/certificates
Click the
Importbutton and select the.pfxfile you generated. Enter your password, or leave the field empty if you have not set one.
Paste into the address bar:
chrome://settings/security
Scroll down to the
Advanced settingsand clickManage device certificatesThis opens a certificate management dialog. Click
Import...thenNextSelect the
.pfxfile you generated. Enter your password, or leave the field empty if you have not set one.Click
Next.Select
Automatically select the certificate storeand clickNext, then clickFinish.
Paste into the address bar:
edge://settings/security
Scroll down to the
Securitysection and clickManage CertificatesThis opens a certificate management dialog. Click
Import...thenNextSelect the
.pfxfile you generated. Enter your password, or leave the field empty if you have not set one.Click
Next.Select
Automatically select the certificate storeand clickNext, then clickFinish.
Note
The certificate must be protected by password. An empty password will fail to be imported on MacOS.
Start the Keychain Access app on your Mac, select the login Keychain.
Drag the
.pfxfile onto the Keychain Access app.If you are asked to provide a name and password, type the name and password for an administrator user on this computer.
Access Operations Center UI:
Open your web browser and navigate to the Operations Center UI URL. When prompted, select the imported client certificate to authenticate.
Congratulations! You should now be logged into the Operations Center UI.
