To suppress security warnings in NSP browser sessions
Purpose
The following steps describe how to prevent the repeated display of security warnings in a browser that connects to the NSP using a private-CA-signed or self-signed TLS certificate.
Note: You do not need to perform the procedure if the certificate is signed by a public root CA, which is trusted by default.
Steps
1 |
Transfer the NSP ca.pem certificate file to each client host on which you want to suppress the browser warnings |
2 |
Perform one of the following.
|
3 |
Open a browser session and verify that the NSP opens without the display of security warnings. End of steps |