Acronis Backup & Recovery 10 components use Secure Sockets Layer (SSL) certificates for secure authentication.
SSL certificates for the components can be one of the two types:
All Acronis components installed on a machine, when acting as a server application, use an SSL certificate called the server certificate.
In Windows, the certificate path and the server certificate’s file name are specified in the registry key
For self-signed certificates, the certificate thumbprint (also known as fingerprint or hash) is used for future host identification: if a client has previously connected to a server by using a self-signed certificate and tries to establish connection again, the server checks whether the certificate’s thumbprint is the same as the one used before.
On machines running Windows, if the certificate location contains no server certificate, a self-signed server certificate is automatically generated and installed during the installation of any Acronis component except Acronis Backup & Recovery 10 Management Console.
If the machine is renamed after its self-signed certificate was generated, the certificate cannot be used and you will need to generate a new one.
To generate a new self-signed certificate
You have the option to use trusted third-party certificates or certificates created by your organization’s CA as an alternative to self-signed certificates, by using Acronis Certificate Command-line Utility.
To install a third-party certificate