Once the Bridge Agent is installed and running, you can log in to manage its configurations and services. To do this:
In Qntrl, navigate to (Settings) >> Advanced >> Bridge and click Bridge.
Hover over the preferred bridge name, then click on the action menu, and select Open Agent.
This redirects you to the Bridge Agent login page in your browser.
First-time users must sign up by providing a Username, Password, and Confirm Password to create your login credentials. After registration, you can log in using the same username and password.
The Bridge Agent interface provides a centralized view of all services and modules connected to your Bridge.
The left pane displays all available Services and their associated modules.
When the Bridge Agent is installed, the Core service and its default modules are added automatically.
Selecting a service opens three functional sections:
Messages
Logs
Configurations
Click any task within a module to view its task-level messages and configurations.
Refer to the Service Section below for detailed explanations.
The connection status of the Bridge Agent is displayed at the top-right corner of the page.
Located at the bottom of the left pane:
Logs – View global Bridge logs.
Settings – Manage all administrative and security-related configurations for the Bridge. Refer to the Bridge Agent Settings section below for more information.
Logout – Sign out of the Bridge Agent
Each service contains three main sections: Messages, Logs, and Configurations.
Displays the list of messages executed under that service.
You can filter messages by their execution status using the All Messages dropdown.
Click an ID to open its detailed view, which includes Payload (the request sent to Bridge) and Response (the result returned after execution).

Displays configuration widgets for both System Modules and Custom Modules under the selected service. You can review and manage all configuration parameters from this section to ensure the Bridge is properly set up for your workflows.
Click the logs icon at the bottom of the left pane to view overall Bridge logs, separate from service-level logs.
This page allows you to:
View consolidated logs generated by the entire Bridge.
Download global logs for investigation or debugging.
Track Bridge-level issues outside individual services.
View key details about your Bridge installation.
Configuration:
Org Name – Name of the organization connected to the Bridge.
Bridge Name – Shows the registered Bridge name.
Installation Directory – Indicates the local installation path.
Version Details – Displays the installed Bridge version.
Use this option to change your Bridge Agent login password.
Click Reset Password.
Enter your Current Password and New Password.
Click Save to update the password.
1. Basic
2. API
3. JDBC
4.OAuth
5. SSH (Secure Shell)
Enables secure connections to UNIX and Linux devices using the SSH protocol with password or key-based authentication.
Key-based authentication uses a cryptographic key pair, a public key shared openly for encryption and verification, and a secret private key for decryption and signing. The data encrypted with the public key can only be decrypted with its corresponding private key.
6. PowerShell
Used for secure connections with Windows machines by executing Powershell commands.
Fields:
User Name: Username on the Windows machine.
Password: Password associated with the machine for script execution.
7. Active Directory
8. NTLM
Before creating a connection, ensure you have:
Registered your application in Qntrl.
Obtained a Client ID and Client Secret to initiate authorization.
Select Connection and click New Connection.
Connection Name: Enter the connection name.
Type: Choose the connection type
Zoho – For Zoho Services.
Others – For external applications.
Grant Type: Select the OAuth method used to obtain access tokens for this connection.
For Zoho connections
Authorization Code (default)
For Other connections
Authorization Code
Client Credentials
Click on the connection ID to open the connection details page. You can perform the following actions:
Status: View the current status of the connection in the Status field.
Edit: Update the configuration as needed. After making changes, click Save.
Revoke: Use the Revoke button at the bottom of the page to invalidate the connection when it is no longer required.
In the list view, hover over the connection name to reveal the Delete option. Click Delete to permanently remove the connection.
When registering your application:
Click the + icon beside Client ID in the Connection setup.
Log in to your Zoho developer console.
By default, Server-based Application is selected as the client type.
Enter the following details:
Client Name (only “_” and “&” special characters allowed)
Homepage URL
Authorized Redirect URI (copy this from Bridge Agent)
Click Create to receive your Client ID and Client Secret.
Paste these values into your bridge connection setup.
By default, Bridge runs on HTTP (port 8500).
You can enable HTTPS to secure communication between the Bridge and Qntrl.
Before enabling HTTPS for the Bridge, ensure that the following requirements are met:
OpenSSL Version Requirement
Qntrl Bridge currently requires OpenSSL 1.x. To enable HTTPS, ensure that OpenSSL 1.x is installed on the Bridge host computer.
If OpenSSL 3.x or any other version is installed, follow the steps below to install OpenSSL 1.x.
Install OpenSSL 1.x (Linux)
Download the OpenSSL 1.x source archive using the following command: wget https://www.openssl.org/source/openssl-1.1.1w.tar.gz
Extract the downloaded archive: tar -xvzf openssl-1.1.1w.tar.gz
Navigate to the extracted directory: cd openssl-1.1.1w
Configure the installation directory for the OpenSSL(e.g., /opt/openssl-1.1.1w): ./config --prefix=/opt/openssl-1.1.1w
Ensure the GCC compiler is installed. If not, update the system and install GCC: sudo apt update && sudo apt install gcc
Build OpenSSL: make
Install OpenSSL: sudo make install
Verify the OpenSSL installation: /opt/openssl-1.1.1w/bin/openssl version
Add the following lines to your .bashrc file to update environment variables:
export LD_LIBRARY_PATH=/opt/openssl-1.1.1w/lib:$LD_LIBRARY_PATH
export openssl=/opt/openssl-1.1.1w/bin/openssl

Once HTTPS is enabled for the Bridge, you can remove these lines from .bashrc.
For Windows:
Download OpenSSL 1.x for Windows, from a trusted source like this link.
Extract the downloaded ZIP file into a folder and install.
Set the OpenSSL 1.x version as default in the environment path.
To generate configuration files manually or create SSL certificates, refer to the Sample to Create Configuration Files and Generate Certificates section for detailed examples.
Keystore Configuration
Select Enable HTTPS.
Root Certificate: Upload root certificate issued by a trusted CA.
Private Key: Upload your server’s private key file used to sign the CSR and secure connections. Learn more about private keys.
Intermediate Certificate: Links root and server certificates.
Server Certificate: Certificate issued to your Bridge host. Enabling HTTPS is mandatory if a server certificate is uploaded.
Click Save Keystore.
The bridge will restart in HTTPS mode automatically.
Truststore Configuration
The Truststore is used for all outbound calls from the Bridge.
Bridge truststore aliases: Click Add and upload certificates that your bridge must trust, for example, if the Bridge accesses private network APIs using a server certificate not signed by a CA, upload that certificate to this trust store to allow the bridge to connect.
1. Create a Configuration File
Create a file with the following sample content and save it as <name.conf>.
[req] distinguished_name = req_distinguished_name req_extensions = req_ext prompt = no [req_distinguished_name] C = {Your country code} ST = {Your state} L = {Your city} O = {Your organisation} OU = {Your org unit} CN = {Your bridge domain} [req_ext] subjectAltName = @alt_names [alt_names] DNS.1 = {Your bridge domain}
This file contains the details for the certificates.
2. Create a Private Key
Execute the following command in the terminal:
openssl genrsa -out {bridge_domain}.key 2048
This command will create a .key file, which has to be uploaded in the Private Key field.
3. Create a CSR (Certificate Signing Request)
Execute the following command to create a .csr file. You will need this to obtain the server certificate from your Certificate Authority.
openssl req -new -key {bridge_domain}.key -out {bridge_domain}.csr -config cert.conf
4. For Testing: Create a Self-Signed Server Certificate
Execute the following command to create a server certificate for testing purposes.
openssl req -key {bridge_domain}.key -new -x509 -days 365 -out {bridge_domain}.crt -config cert.conf
This will create a server certificate for testing purposes.
You are currently viewing the help articles of Qntrl 3.0. If you are still using our older version and require guidance with it, Click here.