Skip to main content

SSL / TLS Certificates

Stratora serves all traffic over HTTPS. On a fresh install, a self-signed certificate is generated automatically — zero configuration required. From there, you can upgrade to a trusted certificate via Let's Encrypt automation or manual upload.


Default Self-Signed Certificate

During installation, Stratora generates a self-signed certificate so HTTPS works immediately:

  • Algorithm: ECDSA P-256
  • Subject: Stratora Self-Signed
  • SANs: localhost, the server hostname, and any configured external URL
  • TLS versions: TLS 1.2 and TLS 1.3

The self-signed certificate is suitable for initial setup and internal use. Browsers will show a certificate warning because it isn't signed by a trusted certificate authority.


Let's Encrypt (Automated Certificates)

Stratora includes a bundled ACME client (win-acme) for automated certificate issuance and renewal from Let's Encrypt.

Navigate to Administration → SSL / TLS Certificates to configure.

HTTP-01 Challenge

The simplest method — Let's Encrypt verifies domain ownership by placing a file on your web server.

Requirements:

  • Port 80 must be reachable from the internet
  • The domain's DNS must point to your Stratora server

To issue a certificate:

  1. Enter your domain name and email address
  2. Click Issue Certificate
  3. Stratora handles the challenge automatically — the certificate is deployed within seconds

DNS-01 Challenge

For servers that aren't publicly accessible on port 80, or for wildcard certificates. Let's Encrypt verifies domain ownership via a DNS TXT record.

Manual DNS-01

A two-step process for any DNS provider:

  1. Click Start Challenge — Stratora generates the required TXT record details
  2. Create the _acme-challenge TXT record at your DNS provider
  3. Click Complete Challenge — Stratora verifies the record and issues the certificate
info

Manual DNS-01 certificates must be renewed manually since the DNS record step requires human intervention. For automated renewal, use a supported DNS provider below.

Automated DNS-01

For fully automated issuance and renewal, configure one of the supported DNS providers. Stratora creates and removes DNS records automatically via the provider's API.

Supported DNS providers:

ProviderCredentials Required
CloudflareAPI Token (with Zone:DNS:Edit permission)
AWS Route 53Access Key ID, Secret Access Key, and optionally a Hosted Zone ID
GoDaddyAPI Key and API Secret
NamecheapAPI User, API Key, and Client IP (must be whitelisted in Namecheap dashboard)

To set up automated DNS-01:

  1. Navigate to the DNS Providers section
  2. Click Add Provider and select your DNS service
  3. Enter the domain and API credentials
  4. Use Test Connection to verify — Stratora creates a temporary TXT record, confirms it resolves, and removes it
  5. Activate the provider
  6. Click Issue Certificate

DNS provider credentials are encrypted at rest with AES-256-GCM.


Automatic Renewal

Stratora configures a Windows Scheduled Task to check for certificate expiry and renew automatically.

DetailValue
Task nameStratora Certificate Renewal
ScheduleDaily at 3:00 AM
Renewal threshold30 days before expiration

When the task runs, it checks if the current certificate expires within 30 days. If so, it re-issues the certificate using the same method that was used originally (HTTP-01 or automated DNS-01).

You can enable or disable automatic renewal from the SSL / TLS settings page.


Manual Certificate Upload

If you manage certificates externally (purchased from a CA, issued by an internal PKI, etc.), you can upload them directly.

Navigate to Administration → SSL / TLS Certificates and click Upload Certificate.

PEM Format

Upload separate files:

FileDescription
Certificate (.crt, .pem)Your server certificate
Private Key (.key, .pem)The corresponding private key
Chain (optional)Intermediate CA certificates

Supported key types: RSA (PKCS#1), ECDSA, and PKCS#8.

PKCS12 / PFX Format

Upload a single .pfx or .p12 file containing the certificate and private key. Enter the passphrase if the file is password-protected.

Validation

Before applying a certificate, Stratora validates:

  • Key match — the certificate and private key correspond to each other
  • Expiration — the certificate is not expired or not-yet-valid
  • Chain verification — if a chain is provided, the full trust chain is verified
  • Expiry warning — alerts you if the certificate expires within 30 days

If validation fails, the upload is rejected and the current certificate remains in place. If the web server configuration test fails after deployment, Stratora automatically rolls back to the previous certificate.


Certificate Status

The SSL / TLS settings page displays the current certificate details:

FieldDescription
SubjectCertificate common name
IssuerWho issued the certificate
Valid From / ToCertificate validity period
Days Until ExpiryCountdown with color-coded indicator (green > 30 days, yellow 8–30 days, red ≤ 7 days)
SANsSubject Alternative Names (domains and IPs covered)
Self-SignedWhether the certificate is self-signed
ChainWhether intermediate certificates are present
SHA-256 FingerprintCertificate fingerprint for verification

Security Headers

Stratora's web server is configured with security headers enabled by default:

HeaderValue
Strict-Transport-Securitymax-age=31536000; includeSubDomains
X-Frame-OptionsDENY
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Referrer-Policystrict-origin-when-cross-origin
Content-Security-Policyupgrade-insecure-requests