Welcome to your Pi-Kit

Great news — you’re already on your Pi-Kit and it’s responding.

You’re on HTTP — trust the CA or continue to HTTPS.

Everything stays on your local network. Let’s move you to the secure (HTTPS) dashboard so you can manage Pi-Kit safely.

Why switch to HTTPS?

If you see a warning

This warning is expected the first time. It’s safe for your own Pi on your own network.

Install the Pi-Kit CA (recommended, one-time)

This removes future warnings for the Pi-Kit dashboard.

Download Pi-Kit CA

SHA256: 6bc217c340e502ef20117bd4dc35e05f9f16c562cc3a236d3831a9947caddb97

Windows

Run mmc → Add/Remove Snap-in → Certificates (Computer) → Trusted Root CAs → Import pikit-ca.crt.

macOS

Double-click pikit-ca.crt → Always Trust.

Linux

Arch-based: curl -s http://pikit.local/assets/pikit-ca.crt -o /tmp/pikit-ca.crt && sudo install -m644 /tmp/pikit-ca.crt /etc/ca-certificates/trust-source/anchors/ && sudo trust extract-compat

Debian/Ubuntu: curl -s http://pikit.local/assets/pikit-ca.crt -o /tmp/pikit-ca.crt && sudo cp /tmp/pikit-ca.crt /usr/local/share/ca-certificates/pikit-ca.crt && sudo update-ca-certificates

Fedora/RHEL: curl -s http://pikit.local/assets/pikit-ca.crt -o /tmp/pikit-ca.crt && sudo cp /tmp/pikit-ca.crt /etc/pki/ca-trust/source/anchors/pikit-ca.crt && sudo update-ca-trust

BSD (FreeBSD / OpenBSD) fetch -o /tmp/pikit-ca.crt http://pikit.local/assets/pikit-ca.crt && sudo install -m644 /tmp/pikit-ca.crt /usr/local/share/certs/pikit-ca.crt && sudo certctl rehash

Use your phone

Scan to open http://pikit.local

\"QR\n
\n
\n*** End Patch

Once trusted, this page will auto-forward you to the secure dashboard.

If the hostname ever fails, try http://<pi-ip>/ (or https://<pi-ip>/ — your browser will show the same warning to bypass).