Skip to content

TLS Certificates

All flexFS server components communicate over TLS by default. On first startup, each server automatically generates a self-signed certificate if no certificate is found.

When a server starts and does not find an existing certificate and key at its configured paths, it generates a self-signed certificate with the following properties:

PropertyValue
Key typeECDSA P-256
SubjectCN=flexfs, O=Paradigm4, Inc., L=Boston, ST=Massachusetts, C=US
DNS SANslocalhost
IP SANs127.0.0.1, ::1
Validity100 years (876,000 hours)
Key usageDigital Signature, Key Encipherment
Extended key usageServer Authentication
Serial number128-bit random (per RFC 5280)
File permissions0600 (owner read/write only)

Auto-generated certificates are suitable for development and internal deployments where all clients trust the server. For production deployments accessible over the internet, use custom certificates issued by a trusted CA.

To use your own TLS certificates, provide the cert and key files via command-line flags on the server:

Terminal window
meta.flexfs start --sslCert /path/to/cert.pem --sslKey /path/to/key.pem
Terminal window
proxy.flexfs start --sslCert /path/to/cert.pem --sslKey /path/to/key.pem
Terminal window
admin.flexfs start --sslCert /path/to/cert.pem --sslKey /path/to/key.pem

Each server stores its auto-generated certificate and key under the flexFS home folder:

ServerDefault cert pathDefault key path
meta.flexfs~/.flexfs/ssl/cert~/.flexfs/ssl/key
proxy.flexfs~/.flexfs/ssl/cert~/.flexfs/ssl/key
admin.flexfs~/.flexfs/ssl/cert~/.flexfs/ssl/key

All three servers share the same default certificate paths. When using --sslCert and --sslKey, the server reads from the specified paths instead.

TLS can be disabled on individual components. Common reasons include placing flexFS behind a reverse proxy (e.g., nginx) or load balancer that handles SSL termination, or for testing in trusted internal networks:

ComponentFlag
meta.flexfs--noSSL
proxy.flexfs--noSSL
admin.flexfs--noSSL

Mount clients trust self-signed certificates by default (TLS verification is skipped for flexFS server connections). This simplifies deployment with auto-generated certificates.

To rotate certificates:

  1. Replace the certificate and key files at the configured paths.
  2. Restart the server process. The new certificate will be loaded on startup.

Connected clients will reconnect and accept the new certificate automatically.