When opening the NetVault WebUI in a web browser, you might encounter a certificate warning similar to the one shown below. This typically occurs when the browser doesn't trust the SSL certificate presented by the NetVault server.

In this example, the certificate was replaced using a Microsoft Enterprise CA. (A certificate generated with OpenSSL will also suffice.)
To generate a certificate (CRT) and private key file (KEY) using Active Directory Certificate Services (AD CS) on a Windows Server 2022 Domain Controller, follow these steps:
certsrv.msc.


certlm.msc for the local machine.
To retrieve the full CN (Common Name) of the NetVault Server, the following PowerShell command should be run:
Get-ADComputer -Identity JHOOPER-NVSERVER | select-object DistinguishedName
NOTE: The value JHOOPER-NVSERVER is used as an example in the Identity parameter, this value should be replaced with the NetVault Server name for which the certificate is being requested. The Identity parameter is responsible for uniquely identifying the computer object in Active Directory. When used, the Get-ADComputer cmdlet retrieves the Distinguished Name (DN) of the specified computer object, which is necessary for the certificate request.
The Active Directory module for Windows PowerShell should be installed by issuing the following command:
Get-WindowsFeature -Name RSAT-AD-PowerShell
If the module is available but not loaded into the current PowerShell session, it should be imported using this command:
Import-Module ActiveDirectory
Alternatively, if not installed, the following command should be used to install it:
Install-WindowsFeature -Name "RSAT-AD-PowerShell"
Under Alternative Name, DNS should be chosen, and the hostname, "localhost," along with the server’s IP address and loopback address, should be entered.
CN=JHOOPER-NVSERVER,CN=Computers,DC=sandbox,DC=local
openssl pkcs12 -in yourfile.pfx -nocerts -out server.key -nodes
openssl pkcs12 -in yourfile.pfx -clcerts -nokeys -out server.crt
server.crt and server.key, have been created.server.crt and server.key should be replaced in the NetVault Server, located at C:\Program Files\Quest\NetVault\etc for Windows or /usr/netvault/etc for Linux.