TOC & Recently Viewed

Recently Viewed Topics

Create a Custom CA and Server Certificate


  1. Optionally, create a new custom CA and server certificate for the NNM server using the NNM-make-cert command. This places the certificates in the correct directories.

    When prompted for the host name, enter the DNS name or IP address of the server in the browser (eg., https://hostname:8835/ or https://ipaddress:8835/). The default certificate uses the host name.

  2. If you wish to use a CA certificate instead of the NNM generated one, make a copy of the self-signed CA certificate using the appropriate command for your OS:

    Operating System



    # cp /opt/nnm/var/nnm/ssl/cacert.pem /opt/nnm/var/nnm/ssl/ORIGcacert.pem


    copy \ProgramData\Tenable\NNM\nnm\ssl\cacert.pem C:\ProgramData\Tenable\NNM\nnm\ssl\ORIGcacert.pem


    # cp /Library/NNM/var/nnm/ssl/cacert.pem /Library/NNM/var/nnm/ssl/ORIGcacert.pem

  3. If the authentication certificates are created by a CA other than the NNM server, the CA certificate must be installed on the NNM server. Copy the organization's CA certificate to the appropriate location for your OS:

    Operating System

    File Location







  4. Once the CA is in place, restart the NNM services.

    After NNM is configured with the proper CA certificate(s), users may log in to NNM using SSL client certificates.

Copyright 2017 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.  Tenable,, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc.  All other products or services are trademarks of their respective owners.