Hello Michael,

Those are the path of the certificates to be updated:
https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/file_paths.pm#L348-L353
Once you updated the certs, you have to restart for the web:
haproxy-portal and haproxy-admin api-frontend
and for radius:
radiusd-load_balancer' radiusd-acct radiusd-auth radiusd-eduroam
https://github.com/inverse-inc/packetfence/blob/devel/lib/pf/ssl.pm#L52-L67

Regards
Fabrice


Le lun. 19 janv. 2026 à 10:30, Michael York via PacketFence-users <
[email protected]> a écrit :

> Running a cluster of 3 version 14.1 servers.
> I am trying to automate the process of updating the Radius and admin
> certificates using the ACME protocol.
> I cannot use the Lets' Encrypt option directly. The servers are not
> directly connected to the web in anyway that would make this possible. nor
> do I want them to be.
> I have the option to use the DNS integration with cloudflare for the
> verification and use this and use that successfully on other systems.
>
> Basically looking for the correct way to inject the new certificate into
> the cluster config safely and have the services restart.
>
> Any help would be great!
>
> Thanks
>
>
> . . * Michael York *
> ICT Infrastructure Services Manager
> *Saint Ignatius' College Riverview*
> Cammeraigal Country
> 115 Tambourine Bay Road, Riverview, NSW 2066
> +61 2 9882 8513
>
>
> *As much as you can do, so much dare to do.*
>
> At Riverview, we value the wellbeing of our staff. If your enquiry has
> been received outside standard school hours, our staff may not be available
> to respond to your email. We will endeavour to respond as promptly as
> possible.
>
> Thank you for your understanding and cooperation.
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to