Securing StifleR operations with SSL
Introduction
This document provides guidance on how to secure StifleR communications with SSL.
Securing StifleR is straightforward, but as with anything involving Microsoft Security and Certificates, you need to get it exactly right or it just won’t play ball.
This document provides details around security configuration and describes the process of setting up a certificate for self-hosting SignalR, the communication platform upon which StifleR is built.
What exactly do we need to secure?
There are two components that must be secured:
SignalR Endpoint Communications - the StifleR Server service that the clients communicate with (default port 1414).
StifleR Web API - the WebAPI service that the Dashboard connects to (default port 9000).
Last updated

