# Incus UI Final Setup - Certificate Fixed ## Status: ✅ COMPLETED ### ✅ Certificate Updated - **New Certificate**: Generated for incus.nsntr.id - **Valid Domains**: incus.nsntr.id, nsntr.id, localhost - **Valid IPs**: 127.0.0.1, 148.251.14.221, ::1 ### 🌐 Access Information - **URL**: https://incus.nsntr.id - **Backend**: 148.251.14.221:8443 - **Certificate**: Self-signed (need to add to browser) ### 🔧 Browser Setup Instructions #### For Arc Browser (macOS): 1. **Download Certificate**: ```bash # From your local machine, download the certificate scp root@148.251.14.221:/var/lib/incus/server.crt incus-server.crt ``` 2. **Install Certificate**: - Open **Keychain Access** on macOS - Go to **System** keychain - Drag `incus-server.crt` to the keychain - Double-click the certificate → **Trust** → **Always Trust** 3. **Access Incus UI**: - Open https://incus.nsntr.id in Arc browser - Should now work without certificate errors #### For Chrome/Firefox: 1. **Download certificate** (same as above) 2. **Chrome**: Settings → Privacy and Security → Security → Manage Certificates → Import 3. **Firefox**: Settings → Privacy & Security → Certificates → View Certificates → Import ### 🔐 Authentication - **Method**: TLS Client Certificate (if configured) - **Alternative**: Direct access to Incus API ### 📡 Traefik Configuration ```yaml tcp: routers: incus-tcp-router: rule: "HostSNI(`incus.nsntr.id`)" service: incus-tcp-service entryPoints: - websecure tls: passthrough: true services: incus-tcp-service: loadBalancer: servers: - address: "148.251.14.221:8443" ``` ### 🎯 Next Steps 1. Download and install certificate in browser 2. Access https://incus.nsntr.id 3. Should work without certificate warnings --- **Date**: $(date) **Status**: Ready for browser certificate installation **Certificate**: Valid for incus.nsntr.id domain