By default, Octopus will use a 100-year, self-signed certificate for Octopus - Tentacle communication. It is unlikely you will need to follow this process outside of extenuating circumstances. If you are looking to update your SSL certificate for the Octopus web portal, please see Updating the SSL Certificate of an existing web portal binding. If in doubt, please reach out our support team.
Octopus uses self-signed certificates to securely communicate between Tentacles and the Octopus Server. Prior to Octopus 3.14, the certificates were SHA1, and following the shattered exploit, the certificate generation was upgraded to SHA256.
This guide walks through the process of regenerating certificates to use the new algorithm. This is useful for upgrading from SHA1 to SHA256, and if you want to rotate certificates.
For more information on why Octopus uses self-signed certificates, please see the blog post Why Octopus uses self-signed certificates.
You can view the algorithm used by the Server certificate on the Configuration ➜ Thumbprint page. If the algorithm contains sha1
, we recommend regenerating your certificate.
Updating an existing Octopus Server or Tentacle It’s important to consider the impact of updating an existing Octopus Server or Tentacle as changes are required to ensure each component trusts the other. If there is a mismatch between the certificate and the expected thumbprint, communication between the components will not be possible and must be resolved manually. Read the information below carefully.
Configuring Octopus Server to use a new certificate
At a high level, changing the certificate on an Octopus Server involves the following steps:
- Backup your existing certificate.
- Generate a new certificate to a file.
- Make the Tentacles trust the new certificate.
- Replace the certificate on the Octopus Server.
- Remove the old trusted certificate from the Tentacles.
At present, this process is more manual than we would prefer, and we are aiming to improve this process over time.
- Backup your existing certificate by executing the following statement at an elevated command-line on the server, from the directory where Octopus Deploy is installed (
C:\Program Files\Octopus Deploy\Octopus
by default):
Windows
Octopus.Server.exe export-certificate --instance OctopusServer --export-pfx="C:\PathToCertificate\oldcert.pfx" --pfx-password MySecretPassword
Linux
./Octopus.Server export-certificate --instance OctopusServer --export-pfx="/tmp/oldcert.pfx" --pfx-password MySecretPassword
This will display output similar to the following:
Checking the Octopus Master Key has been configured.
...
Exporting certificate...
The certificate has been written to C:\PathToCertificate\oldcert.pfx.
Save this certificate and the specified password somewhere secure.
If you see a warning message about The X509 certificate CN=Octopus Portal was loaded but the private key was not loaded.
, you are most likely not running with elevated permissions.
- Execute the following statement at a command-line on the same server:
Windows
Octopus.Server.exe new-certificate --instance OctopusServer --export-pfx="C:\PathToCertificate\newcert.pfx" --pfx-password MySecretPassword
Linux
./Octopus.Server new-certificate --instance OctopusServer --export-pfx="/tmp/newcert.pfx" --pfx-password MySecretPassword
This will display output similar to the following:
Checking the Octopus Master Key has been configured.
...
Generating certificate...
The Octopus Server currently uses a certificate with thumbprint:
1111111111111111111111111111111111111111
A new certificate has been generated with thumbprint:
1234567890123456789012345678901234567890
The new certificate has been written to C:\PathToCertificate\newcert.pfx.
Take a note of the thumbprint of the new certificate (1234567890123456789012345678901234567890
in the output above). We will use this thumbprint when we update the Tentacles to trust the new certificate.
- The next step is to update all of the Tentacles to trust the new certificate. At present, this functionality is not exposed in the UI; it has to be done via the command-line.
On each Tentacle machine, execute the following command to trust the thumbprint of the newly-created certificate in the directory that the Tentacle agent is installed (C:\Program Files\OctopusDeploy\Tentacle\
by default):
Windows
Tentacle.exe configure --trust="1234567890123456789012345678901234567890"
Linux
./Tentacle configure --trust="1234567890123456789012345678901234567890"
This will display output similar to the following:
Adding 1 trusted Octopus Servers
These changes require a restart of the Tentacle.
You will need to restart each Tentacle at this point:
Windows
tentacle.exe service --restart
Linux
./Tentacle service --restart
- Now that the Tentacles all trust the new certificate, we can update the Octopus Server certificate to the new one we created earlier. In the command prompt on the Octopus Server run:
Windows
Octopus.Server.exe import-certificate --instance OctopusServer --from-file="C:\PathToCertificate\newcert.pfx" --pfx-password MySecretPassword
Octopus.Server.exe service --instance OctopusServer --restart
Linux
./Octopus.Server import-certificate --instance OctopusServer --from-file="/tmp/newcert.pfx" --pfx-password MySecretPassword
./Octopus.Server service --instance OctopusServer --restart
This will display something like the following:
Importing the certificate stored in PFX file in C:\PathToCertificate\newcert.pfx using the provided password...
Checking the Octopus Master Key has been configured.
...
The certificate CN=Octopus Portal was updated; old thumbprint = 1111111111111111111111111111111111111111, new thumbprint = 1234567890123456789012345678901234567890
Certificate imported successfully.
These changes require a restart of the Octopus Server.
-
Run a healthcheck on the associated Tentacles and confirm they are all healthy.
-
Now we are trusting the new certificate, we can now stop the Tentacles trusting the old certificate. On each of the Tentacle machines run:
Windows
C:\Program Files\OctopusDeploy\Tentacle\Tentacle.exe configure --instance Tentacle --remove-trust <oldthumbprint>
C:\Program Files\OctopusDeploy\Tentacle\Tentacle.exe service --instance Tentacle --restart
Linux
./Tentacle configure --instance Tentacle --remove-trust <oldthumbprint>
./Tentacle service --instance Tentacle --restart
-
Run a healthcheck, and confirm all Tentacles are healthy.
-
Confirm on the Configuration ➜ Thumbprint page that the new certificate is using the
sha256
algorithm.
Configuring a Tentacle to use a new certificate
- To update the certificate that is used by a Tentacle, run the following commands on the Tentacle machine:
Windows
C:\Program Files\OctopusDeploy\Tentacle\Tentacle.exe new-certificate
C:\Program Files\OctopusDeploy\Tentacle\Tentacle.exe service --restart
Linux
./Tentacle new-certificate
./Tentacle service --restart
- After this is generated on the Tentacle, it can be updated on the Octopus Server. Navigate to Infrastructure ➜ Deployment Targets and update the Thumbprint for the updated target.
Help us continuously improve
Please let us know if you have any feedback about this page.
Page updated on Sunday, January 1, 2023