Documentation Index
Fetch the complete documentation index at: https://docs.velatir.com/llms.txt
Use this file to discover all available pages before exploring further.
Overview
The Velatir desktop client performs TLS interception on supported AI applications. By default it uses a certificate authority issued by Velatir, which is installed into the operating system trust store at install time. Organisations that already operate an internal certificate authority can supply their own CA instead. The desktop client will use it as the local MITM authority, so existing trust stores on managed devices do not need to trust a new root.When to Use It
| Choose your own CA if you… | Use the default Velatir CA if you… |
|---|---|
| Already distribute an internal CA to managed devices | Are evaluating Velatir or running a pilot |
| Have policies that prohibit adding third-party roots to your trust store | Do not have an internal CA in place |
| Want to consolidate certificate ownership and rotation under one process | Want the simplest install path |
What to Provide
You supply a PFX (PKCS#12) bundle that contains:- The CA certificate
- The matching private key
- Any intermediate certificates required to chain to the root your devices trust
The certificate must be a CA (subject and issuer matching,
keyUsage including keyCertSign, and an appropriate basicConstraints extension). A leaf certificate signed by your CA will not work because the proxy needs to issue per-host certificates on the fly.Single-Device Setup
For evaluation on a single device, use the CLI. The host restarts automatically and re-binds to the new authority.get-config lists the active certificate fingerprint and status confirms the host is running on the new authority.
Organisation-Wide Setup
Distribute the PFX bundle the same way you distribute any sensitive configuration file, and point the desktop client at it. The recommended pattern is to deploy the bundle from your MDM platform first, then deploy the desktop client with the bundle path baked into the install command.Windows (Intune)
-
Deploy the PFX file to a known path on managed devices using an Intune file deployment policy (for example,
C:\ProgramData\Velatir\byo-ca.pfx). -
In the Velatir MSI command-line arguments, point to it:
macOS (Jamf Pro)
-
Deploy the PFX file via a Jamf file payload (for example,
/Library/Application Support/Velatir/byo-ca.pfx). -
In the API-key staging script, additionally call:
Rotating the Certificate Authority
Rotate by deploying the new PFX to the same path and redeploying the install command or rerunning theset-ca script. The host restarts automatically and re-binds to the new authority.
For lower-risk rotations:
- Stage the new CA in a small device group first.
- Confirm
velatir statusreports the new fingerprint and interactions are still flowing to the dashboard. - Expand the rollout group by group.
set-ca, in-flight interactions may produce a single failed trace at the moment of rotation. Plan rotations during low-activity periods if your AI workloads are sensitive to that.
Removing the Custom Certificate Authority
To revert to the Velatir-issued CA, run:Verification
After installing or rotating the CA, validate that supported applications still see a valid certificate chain:Next Steps
Enterprise deployment
The Intune and Jamf Pro flows that wrap bring-your-own-CA distribution.
Permissions
How the desktop client handles certificates at install time.
CLI reference
Detail on the
set-ca and get-config commands.Troubleshooting
Diagnose certificate trust issues after a rotation.