To suppress security warnings in NSP browser sessions

Purpose

The following steps describe how to prevent the repeated display of security warnings in a browser that connects to the NSP using a private-CA-signed or self-signed TLS certificate.

Note: You do not need to perform the procedure if the certificate is signed by a public root CA, which is trusted by default.

Steps
 

Perform one of the following.

  1. If you deployed TLS using the PKI server, transfer the ca.pem certificate file from the PKI server to each client host on which you want to suppress the browser warnings.

  2. If you deployed TLS using the manual method, transfer your certificate file to each client host on which you want to suppress the browser warnings.


Perform one of the following.

  1. Import the certificate to the certificate store of a client OS.

    Note: This method suppresses the display of NSP-related security warnings for all client browsers.

    Perform the appropriate procedure in the OS documentation to import the certificate; specify the certificate file as the certificate source.

    Note: Such a procedure varies by OS type and version.

  2. Import the certificate to the certificate store of a client browser.

    Perform the appropriate procedure in the browser documentation to import the certificate; specify the certificate file as the certificate source.

    Note: Such a procedure varies by browser type and version.


Open a browser session and verify that the NSP opens without the display of security warnings.

End of steps