Fix Niagara 4 Certificate and SSL Errors

Niagara / TridiumNiagara 4SSLcertificateWorkbench
April 8, 2026|8 min read

Niagara 4 certificate errors occur when the platform's self-signed SSL certificate expires, the station's IP address changes, or a version upgrade invalidates existing keystores. The fix depends on the root cause: regenerate the certificate using Niagara's CertManagement tool or the platform daemon's security command, update the certificate's Subject Alternative Name (SAN) to match the new IP, or rebuild the keystore after a major version migration.

Common Niagara 4 Certificate Error Messages

Technicians encounter these certificate errors in Workbench, the web UI, or platform daemon logs. Knowing the exact error message narrows the diagnosis:

Cause 1: Expired Certificates

Niagara stations generate self-signed SSL certificates during initial commissioning. These certificates have a fixed validity period—typically 365 days on Niagara 4.4 and earlier, and up to 3 years on 4.7+. When the certificate expires, Workbench connections over foxs (port 4911) and HTTPS web UI connections (port 443 or custom) begin failing with CertificateExpiredException errors.

The station itself continues running. Points update, schedules fire, and BACnet communication remains unaffected because those protocols do not depend on the station's SSL certificate. But you lose the ability to connect via Workbench or the web dashboard until the certificate is renewed.

How to Diagnose

  1. Open Workbench and attempt to connect to the station. If you see a certificate warning dialog, click View Certificate to check the expiration date in the Valid To field.
  2. Alternatively, open a browser and navigate to https://<station-ip>:443. Click the padlock icon and inspect the certificate details. An expired certificate shows a Not After date in the past.
  3. On the station's file system, check the keystore directly:
    # Check certificate expiration from the station's command line
    cd /opt/niagara/niagara-4.x.x.x/security
    keytool -list -v -keystore server.keystore -storepass <password>
    
    # Look for the "Valid from" and "until" dates in the output
    # Example output:
    # Valid from: Mon Jan 15 10:30:00 EST 2024 until: Tue Jan 14 10:30:00 EST 2025

How to Fix

Regenerate the station's certificate from Workbench (if you can still connect with a warning bypass) or from the station's local console:

# Option 1: From Workbench (if connection is possible with warning bypass)
# Navigate to: Platform > Certificate Management
# Click "Generate New Certificate"
# Set validity period (recommend 3 years / 1095 days)
# Restart the station after generation

# Option 2: From the station's local shell
# Stop the station first
/opt/niagara/niagara-4.x.x.x/bin/niagarad stop

# Use the Niagara security tool to regenerate
/opt/niagara/niagara-4.x.x.x/bin/niagarad security -certgen

# Restart the station
/opt/niagara/niagara-4.x.x.x/bin/niagarad start

On a JACE controller, the paths differ slightly. The Niagara installation lives under /niagara rather than /opt/niagara, and the keystore is typically at /niagara/security/server.keystore.

Cause 2: IP Address Change

When a Niagara station's certificate is generated, the station's current IP address and hostname are embedded in the certificate's Subject Alternative Name (SAN) field. If the station's IP changes—due to a DHCP reassignment, network reconfiguration, or physical relocation—the SAN no longer matches the IP that Workbench uses to connect. The result is a hostname mismatch error even though the certificate itself has not expired.

This is one of the most common certificate issues in the field. A technician changes the station's IP in the platform configuration, reboots, and then cannot reconnect via Workbench because the old IP is baked into the certificate.

How to Fix

  1. If you can still connect using the old IP (before it's decommissioned), regenerate the certificate from Workbench first, then change the IP.
  2. If the IP has already changed and Workbench refuses to connect, use the station's local console or SSH access:
    # SSH into the station or use a local console/keyboard
    # Navigate to the Niagara installation directory
    
    # On a supervisor (Linux/Windows):
    cd /opt/niagara/niagara-4.x.x.x
    
    # Regenerate the certificate with the new IP in the SAN
    bin/niagarad security -certgen
    
    # The tool will detect the current network interfaces and
    # include the new IP address in the SAN field automatically
    
    # Restart the station
    bin/niagarad restart
  3. After regeneration, you may need to accept the new certificate in Workbench. Open the connection, review the certificate details to confirm the new IP appears in the SAN, and click Trust This Certificate.

To prevent this issue on stations with dynamic addressing, assign a static IP before commissioning. If you must use DHCP, configure a DHCP reservation so the address stays consistent.

Cause 3: Version Upgrade Issues

Major version upgrades—particularly from Niagara 4.4 to 4.7, or from 4.7 to 4.10+—can break certificate trust chains in several ways:

How to Fix After an Upgrade

# Step 1: Check if the keystore format is the issue
# Navigate to the security directory
cd /opt/niagara/niagara-4.x.x.x/security

# Check the keystore type
keytool -list -keystore server.keystore
# If it prompts for a keystore type or throws an error about
# "Invalid keystore format", the keystore needs migration

# Step 2: Migrate JKS to PKCS12 (if applicable)
keytool -importkeystore \
  -srckeystore server.keystore \
  -srcstoretype JKS \
  -destkeystore server.p12 \
  -deststoretype PKCS12 \
  -srcstorepass <password> \
  -deststorepass <password>

# Step 3: Back up the old keystore and replace
cp server.keystore server.keystore.bak
mv server.p12 server.keystore

# Step 4: Or simply regenerate (simplest approach)
# This creates a fresh certificate in the correct format
/opt/niagara/niagara-4.x.x.x/bin/niagarad security -certgen

# Step 5: Restart the station
/opt/niagara/niagara-4.x.x.x/bin/niagarad restart

If you are upgrading multiple stations, regenerating certificates is almost always faster than migrating keystores. Plan certificate regeneration as a standard step in your upgrade checklist.

Platform Daemon Certificate Errors

The platform daemon (niagarad) manages station lifecycle, remote connections, and software provisioning. It maintains its own certificate and keystore, separate from the station's certificate. When the platform daemon's certificate fails, the station cannot start, and you see errors like Platform daemon failed to start in the system logs.

Symptoms

Platform Daemon Fix

# Check platform daemon logs for the specific error
# Linux:
cat /opt/niagara/niagara-4.x.x.x/var/log/niagarad.log | tail -50

# Windows:
type "C:\Niagara\niagara-4.x.x.x\var\log\niagarad.log"

# Common fix: regenerate the platform daemon's certificate
# Stop any running instance first
/opt/niagara/niagara-4.x.x.x/bin/niagarad stop

# Delete the corrupted platform keystore
# Back it up first
cp /opt/niagara/niagara-4.x.x.x/security/platform.keystore \
   /opt/niagara/niagara-4.x.x.x/security/platform.keystore.bak

rm /opt/niagara/niagara-4.x.x.x/security/platform.keystore

# Restart the daemon - it will generate a new keystore on startup
/opt/niagara/niagara-4.x.x.x/bin/niagarad start

# Verify the daemon is running
/opt/niagara/niagara-4.x.x.x/bin/niagarad status

On JACE controllers, the platform daemon keystore is at /niagara/security/platform.keystore. The same delete-and-regenerate approach works. If the JACE has no local console access, you may need to remove the SD card, delete the keystore file from a laptop, and reinsert the card.

After regenerating the platform daemon certificate, any Workbench instance that previously trusted the old daemon certificate will need to re-accept the new one on first connection.

Regenerating Niagara Certificates: Step-by-Step

This section consolidates the complete certificate regeneration procedure with all relevant file paths for both supervisors and JACE controllers.

Supervisor (Linux)

# 1. Stop the station
/opt/niagara/niagara-4.x.x.x/bin/niagarad stop

# 2. Back up existing keystores
cd /opt/niagara/niagara-4.x.x.x/security
cp server.keystore server.keystore.bak.$(date +%Y%m%d)
cp platform.keystore platform.keystore.bak.$(date +%Y%m%d)

# 3. Regenerate station certificate
/opt/niagara/niagara-4.x.x.x/bin/niagarad security -certgen

# 4. Verify the new certificate
keytool -list -v -keystore server.keystore -storepass <password> | grep -A2 "Valid from"

# 5. Start the station
/opt/niagara/niagara-4.x.x.x/bin/niagarad start

# 6. Confirm station is running
/opt/niagara/niagara-4.x.x.x/bin/niagarad status

Supervisor (Windows)

REM 1. Stop the Niagara service
net stop NiagaraDaemon

REM 2. Back up existing keystores
cd C:\Niagara\niagara-4.x.x.x\security
copy server.keystore server.keystore.bak
copy platform.keystore platform.keystore.bak

REM 3. Regenerate station certificate
C:\Niagara\niagara-4.x.x.x\bin\niagarad.exe security -certgen

REM 4. Start the Niagara service
net start NiagaraDaemon

JACE 8000

# 1. SSH into the JACE (default port 22)
ssh admin@<jace-ip>

# 2. Stop the station
/niagara/bin/niagarad stop

# 3. Back up existing keystores
cd /niagara/security
cp server.keystore server.keystore.bak
cp platform.keystore platform.keystore.bak

# 4. Regenerate certificate
/niagara/bin/niagarad security -certgen

# 5. Start the station
/niagara/bin/niagarad start

# Alternative: If SSH is unavailable, use the JACE's local
# web-based Platform Administration page at:
# https://<jace-ip>:3011/admin
# Navigate to Certificate Management to regenerate

Workbench Client-Side Trust Store

After regenerating certificates on the station, Workbench may still refuse to connect because it remembers the old certificate. Clear the client-side trust store:

# Workbench trust store location:
# Windows: C:\Users\<username>\Niagara4\security\truststore.jks
# Linux:   ~/niagara/security/truststore.jks
# macOS:   ~/niagara/security/truststore.jks

# Option 1: Delete the trust store (Workbench will re-prompt for all stations)
rm ~/niagara/security/truststore.jks

# Option 2: Remove a specific certificate from the trust store
keytool -delete -alias <station-alias> -keystore ~/niagara/security/truststore.jks

Common Niagara Certificate Mistakes

Platform and Version Compatibility

Certificate handling varies across Niagara versions and hardware platforms. The following table summarizes key differences:

Niagara VersionDefault Keystore FormatDefault TLSCert ValidityNotes
Niagara 4.0–4.4JKSTLS 1.0/1.1/1.21 yearAllows bypass of certificate warnings; no SAN enforcement
Niagara 4.6–4.7PKCS12TLS 1.23 yearsTLS 1.0/1.1 disabled; SAN validation enforced; keystore migration required from 4.4
Niagara 4.8–4.10PKCS12TLS 1.2/1.33 yearsTLS 1.3 support added; stronger cipher suites; certificate pinning option
Niagara 4.12+PKCS12TLS 1.2/1.33 yearsEnhanced CertManagement UI; automated renewal reminders in newer builds

Hardware platform differences:

ControllerSecurity DirectoryConsole AccessNotes
JACE 8000/niagara/security/SSH, Platform Admin (port 3011)ARM-based; cert regeneration takes 30–60 seconds due to slower key generation
JACE 9000/niagara/security/SSH, Platform Admin (port 3011)Faster key generation than JACE 8000; supports Niagara 4.10+
Supervisor (Linux)/opt/niagara/niagara-4.x.x.x/security/SSH, local consoleFull keytool access; easiest platform for cert troubleshooting
Supervisor (Windows)C:\Niagara\niagara-4.x.x.x\security\RDP, local consoleRun commands from Niagara Command Prompt (not standard cmd)
Web Supervisor (cloud)Vendor-managedVaries by hosting providerCertificate typically managed by the hosting provider; contact support if expired

Sources and Attribution

The technical guidance in this entry is informed by the following sources:

Niagara 4SSLcertificateWorkbenchplatform daemon

Was this article helpful?

Related Articles

Need to do this remotely? SiteConduit replaces VPN configuration with one-click encrypted sessions. No port forwarding, no certificate management. Join the waitlist.

SC

SiteConduit Technical Team

Idea Networks Inc.

SiteConduit builds managed remote access for building automation. Our knowledge base is maintained by BAS professionals with hands-on experience deploying and troubleshooting BACnet, Niagara, Modbus, and Facility Explorer systems.