Create a Custom CA and Server Certificate

To create a custom CA and server certificate:

  1. Optionally, create a new custom CA and server certificate for the Tenable Nessus Network Monitor server using the NNM-make-cert command. This places the certificates in the correct directories.

  2. When prompted for the host name, type the DNS name or IP address of the server in the browser (eg., https://hostname:8835/ or https://ipaddress:8835/). The default certificate uses the host name.

  3. If you wish to use a CA certificate instead of the Tenable Nessus Network Monitor generated one, make a copy of the self-signed CA certificate using the appropriate command for your OS:

    Operating System

    Command

    Linux

    # cp /opt/nnm/var/nnm/ssl/cacert.pem /opt/nnm/var/nnm/ssl/ORIGcacert.pem

    Windows

    copy \ProgramData\Tenable\NNM\nnm\ssl\cacert.pem C:\ProgramData\Tenable\NNM\nnm\ssl\ORIGcacert.pem

    macOS

    # cp /Library/NNM/var/nnm/ssl/cacert.pem /Library/NNM/var/nnm/ssl/ORIGcacert.pem

  4. If the authentication certificates are created by a CA other than the Tenable Nessus Network Monitor server, the CA certificate must be installed on the Tenable Nessus Network Monitor server. Copy the organization's CA certificate to the appropriate location for your OS:

    Operating System

    File Location

    Linux

    /opt/nnm/var/nnm/ssl/cacert.pem

    Windows

    C:\ProgramData\Tenable\NNM\nnm\ssl\cacert.pem

    macOS

    /Library/NNM/var/nnm/ssl/cacert.pem

  5. Once the CA is in place, restart the Tenable Nessus Network Monitor services.

  6. After Tenable Nessus Network Monitor is configured with the proper CA certificate(s), users may log in to Tenable Nessus Network Monitor using SSL client certificates.