{
"Kestrel": {
"Endpoints": {
"Httpx": {
"Url": "http://192.168.0.99:2222"
}
}
},
"Logging": {
"LogLevel": {
"Default": "Debug",
"Microsoft.AspNetCore": "Warning"
}
},
"AllowedHosts": "*"
}
The only interesting line is the one beginning with "Url":
Here, you should enter the IP Address under which your PC is
addressable in your local LAN. If you don't know it, the "ipconfig" command , entered on a Windows command prompt,
will tell you. Like so:
http://192.168.0.99:2222
qirxConsole.config
.
C:\Users\<your user name>\AppData\Local\qrixConsole
qirxConsole
directory, you will find the file qirxConsole.config
. Now you need to open
this file in a text editor like notepad or notepad++. I select notepad++, as it nicely shows the xml structure of the file (after having
selected the menu "Language, XML").
Key
field, instead of "Invalid"
, please enter your license key, like "ABCDE-FGHIK-123XY-LMNOP"
.
The "MachineCode" entry is not necessary.
qirxRemote.exe
again.
Please repeat Step 4 again. The Server console should show you the following:
qirxConsole.config
any more, nor edit fancy .json
files nor start twice to avoid startup errors.
OwnCertificateHandling.txt
.
It contains some commands, to be entered on a Windows command-line, which create your private certificate which is then
used by the browsers.
https://learn.microsoft.com/en-us/dotnet/core/tools/dotnet-dev-certs
# check if own cert is present, if not, create one
# usually, this command is the only one needed
dotnet dev-certs https
# remove
dotnet dev-certs https --clean
#import pfx file#
dotnet dev-certs https --clean --import ./certificate.pfx -p
#Check if a trusted development certificate is present on the local machine.
dotnet dev-certs https --check --trust
# Create a certificate, trust it, and export it to a PFX file.
dotnet dev-certs https -ep ./certificate.pfx -p --trust
# Create a certificate, trust it, and export it to a PEM file including the private key:
dotnet dev-certs https -ep ./certificate.crt -p --trust --format PEM