The requested article is not available. Either it doesn't apply to this version of the product or the relevant information is organized differently in this version of the docs. You can search, browse, or go back to the other version.
Configure CA certificate with Windows host plug-in services
-
PDF of this doc site
-
Protect Microsoft SQL Server databases
-
Protect SAP HANA databases
-
Protect IBM Db2
-
Protect PostgreSQL
-

Collection of separate PDF docs
Creating your file...
This may take a few minutes. Thanks for your patience.
Your file is ready
You should configure the CA certificate with Windows host plug-in services to activate the installed digital certificate.
Perform the following steps on the SnapCenter Server and all the plug-in hosts where CA certificates are already deployed.
Steps
-
Remove the existing certificate binding with SMCore default port 8145, by running the following command:
> netsh http delete sslcert ipport=0.0.0.0:_<SMCore Port>
For example:
> netsh http delete sslcert ipport=0.0.0.0:8145
-
Bind the newly installed certificate with the Windows host plug-in services, by running the following commands:
> $cert = “_<certificate thumbprint>_” > $guid = [guid]::NewGuid().ToString("B") > netsh http add sslcert ipport=0.0.0.0: _<SMCore Port>_ certhash=$cert appid="$guid"
For example:
> $cert = “a909502dd82ae41433e6f83886b00d4277a32a7b” > $guid = [guid]::NewGuid().ToString("B") > netsh http add sslcert ipport=0.0.0.0: _<SMCore Port>_ certhash=$cert appid="$guid"