Plugin Connectivity

Connectivity to Rubrik from Cloud Director

Self Signed Certificates

Currently, using the Nginx guide, will auto-generate some self-signed certificates. If these are not replaced with valid certificates, connectivity to Rubrik from Cloud Director will encounter net::ERR_CERT_AUTHORITY_INVALID errors. This is Chrome's protection when using self-signed certificates to ensure that you trust the website you are visiting.

In order to confirm and validate this is the issue, during manual authentication, or page load, you will need to open the Chrome Console and see if the messages being displayed refer to the Certificate. follow the steps below to view the console and validate these errors

  • Right Click within the Chrome Window in any open space

  • Select Inspect

  • Select the Console Tab

  • Check for net::ERR_CERT_AUTHORITY_INVALID

Certificate Resolution

There are a few solutions in order to resolve this issue.

Accept the Certificate

In chrome you can choose to accept the self-signed certificate as valid, however, this is temporary for the current browser session. Follow these steps to accept the certificate:

  • Open a new Chrome Tab

  • Enter the address of the Proxy Server e.g. https://rubrik-proxy.rubrik.com

  • Upon opening the page there will be a chrome error shown

  • Select Advanced

  • Select Proceed to rubrik-proxy.rubrik.com

  • Return to the Cloud Director Plugin and Authenticate again to confirm the issue is gone

Install Valid Certificates

Installing Valid certificates removes all errors allowing the user to proceed unhindered. This requires the having a valid crt and key certificate file which can be updated on the nginx proxy. Refer the to Quick Start for Nginx Proxy section Using Signed Certificates:

pageNginx Reverse Proxy

Install the Self-Signed Certificate on the client

This is the least favorable option as this requires installing the certificate on any clients needing to use the vCloud Director plugin. We will need to take the crt file from the Nginx server and install this onto the client machine as a trusted certificate. The certificate can be found here:

/etc/tls/crt/STAR_wildcard.crt

Last updated