Skip to content

Generate Trusted Root Certification Authority

In order to decrypt, inspect and re-encrypt HTTPS certificates of the origin servers the proxy needs to be configured with Root Certification Authority certificate and private key (we will call it Root CA for short further).

The Certification Authority part in the Root CA term means it is possible to sign the child site certificates with the private key. The Root part means the certificate is self-signed and must be explicitly trusted by the client. See this Wikipedia article for more information.

How to Generate the Root CA

You must always generate your own certificate/private key. There are various methods to do that.

Important / Danger

By default, there are sample Root CA certificate and private key included with the application which can be found in C:\ProgramData\Diladele\WebProxy\N.N\etc folder. We do not recommend using these files for HTTPS inspection because they are part of the installer and available to everyone. Trusting them will pose serious security risk!

Using Admin UI / Automatically

In order to generate the new Root CA certificate and private key, open Admin UI / Proxy Settings menu and select the HTTPS Decryption / Root Certificate page as indicated on the following screenshots.

Proxy  Settings

HTTPS Inspection Settings

When you click on Generate button a Certificate Generation Wizard will be started. Be sure to read and understand informational text on all pages of the wizard before clicking Next.

Certificate Generation Wizard Page 1

On the next page you can fill in the organizational details to be included into the generated certificate. To fill in the default values click Set Defaults button.

Certificate Generation Wizard Page 2

Finally, fill in the Common Name certificate attribute. If you click the Detect button below the Common Name will be set to Web Proxy string.

Certificate Generation Wizard Page 3

Click Next to actually generate it. A new self-signed Root CA certificate and private key will be generated and saved into C:\ProgramData\Diladele\WebProxy\N.N\etc\myca.pem and C:\ProgramData\Diladele\WebProxy\N.N\etc\myca.der files. See below for the description of what those files actually are and how they are used.

Using OpenSSL / Manually

You can also use the OpenSSL binary to generate the Root CA certificate and private key by running the following command on any Linux machine.

$ openssl req -new -newkey rsa:2048 -sha256 \
    -days 3650 -nodes -x509 -keyout myca.pem -out myca.pem

The generated myca.pem now needs to be imported into the Admin UI by clicking the Import button as indicated on the following screenshot.

Import Root CA

Re-use Root CA of Web Safety

If you are also using our Linux based Web Safety filter and have trusted Root CA from it you can directly use it in Web Filtering Proxy too. See this article for more information. Just import the myca.pem file into the Admin UI as indicated on the earlier step.

Root CA Files Explained

The generated or imported certificate and private key of the Root CA are stored as myca.pem and myca.der files in C:\ProgramData\Diladele\WebProxy\N.N\etc folder.


This file contains both the Root CA certificate and Root CA public key in PEM format appended together. This file shall be kept secret and should not be publicly available.


This file contains the public Root CA certificate that needs to be installed in your browsers to make them trust the proxy. See the next article how to do that.

Generated myca.pem and myca.der files