Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There are quite many solutions. For very funky systems, you can use a cert tied to a private CA. Then you can control the cert lifetimes. Or place them behind a reverse proxy that is easier to control.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: