logoalt Hacker News

cpachyesterday at 1:13 PM0 repliesview on HN

There are quite many solutions. For very funky systems, you can use a cert tied to a private CA. Then you can control the cert lifetimes. Or place them behind a reverse proxy that is easier to control.