When opening the NetVault WebUI in a web browser, you might encounter a certificate warning similar to the one shown below. This typically occurs when the browser doesn't trust the SSL certificate presented by the NetVault server.
In this example, the certificate was replaced using a Microsoft Enterprise CA. (A certificate generated with OpenSSL will also suffice.)
To generate a certificate (CRT) and private key file (KEY) using Active Directory Certificate Services (AD CS) on a Windows Server 2022 Domain Controller, follow these steps:
certsrv.msc
.certlm.msc
for the local machine.To retrieve the full CN (Common Name) of the NetVault Server, the following PowerShell command should be run:
Get-ADComputer -Identity JHOOPER-NVSERVER | select-object DistinguishedName
NOTE: The value JHOOPER-NVSERVER
is used as an example in the Identity
parameter, this value should be replaced with the NetVault Server name for which the certificate is being requested. The Identity
parameter is responsible for uniquely identifying the computer object in Active Directory. When used, the Get-ADComputer
cmdlet retrieves the Distinguished Name (DN) of the specified computer object, which is necessary for the certificate request.
The Active Directory module for Windows PowerShell should be installed by issuing the following command:
Get-WindowsFeature -Name RSAT-AD-PowerShell
If the module is available but not loaded into the current PowerShell session, it should be imported using this command:
Import-Module ActiveDirectory
Alternatively, if not installed, the following command should be used to install it:
Install-WindowsFeature -Name "RSAT-AD-PowerShell"
Under Alternative Name, DNS should be chosen, and the hostname, "localhost," along with the server’s IP address and loopback address, should be entered.
CN=JHOOPER-NVSERVER,CN=Computers,DC=sandbox,DC=local
openssl pkcs12 -in yourfile.pfx -nocerts -out server.key -nodes
openssl pkcs12 -in yourfile.pfx -clcerts -nokeys -out server.crt
server.crt
and server.key
, have been created.server.crt
and server.key
should be replaced in the NetVault Server, located at C:\Program Files\Quest\NetVault\etc
for Windows or /usr/netvault/etc
for Linux.© ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center