Web-based Management 2:
Security - Certificate management

Valid from firmware release 2025.0 - for earlier firmware see WBM - Certificate authentication

Security iconPlease note the guidelines in our PLCnext Technology ‑ Security Info Center.
For developing secure-by-design, IEC 62443‑2 compliant applications with PLCnext Technology, get a good grasp of the concepts used in the Security context.

The Certificate management page is used to manage certificates for secure controller communication. You need some background knowledge on the terms that are used in this context and the data to provide with the certificate. 

For a thorough explanation of the certificate-based authentication, read the Certificates section in the Industrial Security Guideline of the PLCnext Technology ‑ Security Info Center.

General management of stores

Trusted certificates and revocation lists of possible communication partners are displayed on the TRUST STORES tab. 
Your own certificates are displayed on the IDENTITY STORES tab. 

The sections are ordered alphabetically by their names.

Naming of stores

Use only the following characters when naming TRUST STORES and IDENTITY STORES:

  • letters [a - z] [A - Z]
  • numbers [0 - 9]
  • hyphen [ - ]
  • underscore [ _

They can be used with the interfaces for TLS communication, e.g., TLS_SOCKET block in IEC 61131‑3, or TlsSocket class in C++ or C#. Note: The naming is case-sensitive!

Location of stores

For information about the location of certificates on the controller's file system, refer to Directories of the firmware components.

Trust Stores

A certificate to add to a Trust Store consists of the certificate itself, and optionally a certificate revocation list (CRL) that is checked for evaluation. Therefore, each Trust Store has a complete set of folders.

On devices of the first generation of PLCnext Control devices, such as AXC F x152RFC 4072S:

  • /opt/plcnext/Security/TrustStores/<name>/trusted – The directory contains CA certificates that are trusted.
  • /opt/plcnext/Security/TrustStores/<name>/trusted/crl – The directory contains files with CRLs for the CA certificates.
  • /opt/plcnext/Security/TrustStores/<name>/issuer – The directory contains CA certificates that are not automatically trusted but that are necessary for creating a certificate chain.
  • /opt/plcnext/Security/TrustStores/<name>/issuer/crl – The directory contains files with CRLs for issuer certificates.

On Secure-by-default devices launched 2025 or newer, such as VPLCNEXT CONTROL 1000 (same purpose as above):

  • /opt/plcnext/config/System/security/TrustStores/<name>/trusted
  • /opt/plcnext/config/System/security/TrustStores/<name>/trusted/crl
  • /opt/plcnext/config/System/security/TrustStores/<name>/issuer
  • /opt/plcnext/config/System/security/TrustStores/<name>/issuer/crl

By default, these entries are already set up as Trust Stores in a PLCnext Control device:

  • Code Signing (Upload the certificate used to sign the PLCnext Engineer project here if this feature has been enabled in the SecurityProject integrity WBM 2 page. ) 
  • Empty (reserved for internal processes; therefore this entry cannot be edited or deleted via the WBM 2)
  • OPC UA-configurable
  • Phoenix Contact Device Root
  • Proficloud (reserved for Proficloud services)

For a thorough explanation of the certificate-based authentication, read the Certificates section in the Industrial Security Guideline of the PLCnext Technology ‑ Security Info Center.

These are the steps to manage Trust Stores:

  • Check if the default stores suit your purpose; if necessary,  add,   remove, or  edit a Trust Store.

These are the steps to provide certificates and/or certificate revocation lists (CRLs):

  • Click the  button to open the regarding Trust Store section; there you can  add,   remove, or  view a certificate and/or CRL.
  • To  add a certificate and/or CRL, choose the type in the dialog box:
    You can either upload a certificate as a .pem file (Base64 format), or paste the content of the certificate as a text string in PEM Base64 format.

Identity Stores

On the IDENTITY STORES tab, you can create and manage different Identity Stores. 

By default, these entries are set up as IDENTITY STORES:

  • IDevID (reserved for internal processes; therefore this entry cannot be edited or deleted via the WBM 2)
  • HTTPS-self-signed
  • OPC UA-self-signed
  • Proficloud (reserved for Proficloud services)

Each Identity Store usually contains an RSA key pair and the corresponding key certificate. As an option, you can add further issuer certificates to an Identity Store. The IDevID and OPC UA-self-signed Identity Stores are part of the system and supplied with the controller. 

For a thorough explanation of the certificate-based authentication and, read the Certificates section in the Industrial Security Guideline of the PLCnext Technology ‑ Security Info Center.

Read more about Pre-shared keys (PSK) and private/public key pairs in the Keys section of the Industrial Security Guideline in the PLCnext Technology ‑ Security Info Center.

These are the steps to manage Identity Stores:

  • Check if the default stores suit your purpose; if necessary,  add,   remove, or  edit an Identity Store.

These are the steps to provide certificates and/or key pairs:

  • Click the  button to open the regarding Identity Store section; there you can and   view,  download, or  edit a certificate and/or key pair.
  • To  edit a  Certificate in the dialog box, choose the source in the dialog box:
    • If you choose to enter a certificate, you can either upload it as a .pem file (Base64 format), or paste the content of the certificate as a text string in PEM Base64 format.
    • If you choose to generate a certificate signing request (CSR), you are downloading the generated file to request an X.509 certificate from a certificate authority (CA).
  • To  edit a  Key Pair in the dialog box, choose the source in the dialog box:
    You can either upload a key pair as text or file, or choose a suitable encryption method to generate a new key pair, that is added to that Identity Store.

Note: If a hardware-protected key pair has been generated, then an additional private key named tpmkey.pem is present that links the certificate to this specific device.

Downloading public keys or key certificates

You can download the content of the public key of a key pair as a .pem file that is to be used on the corresponding Trust Store of a communication partner:

  • If a key pair is available, you can download it as a .csr file.
  • If a key certificate is available, you can download it as a .crt file.

 

 


• Published/reviewed: 2025-05-28  ✿  Revision 079 •