📄
N2WS Backup & Recovery User Guide 4.3.0
  • 1 Introduction to N2WS
  • 2 Installing and Upgrading N2WS
  • 3 Start Using N2WS
  • 4 Defining Backup Policies with N2WS
  • 5 Consistent Backup with N2WS
  • 6 Windows Instances Backup with N2WS
  • 7 Linux/Unix Instances Backup with N2WS
  • 8 Using Elastic File System (EFS) with N2WS
  • 9 Additional N2WS Backup Topics
  • 10 Performing Recovery with N2WS
  • 11 Disaster Recovery with N2WS
  • 12 Cross-Account DR, Backup, and Recovery with N2WS
  • 13 File-Level Recovery with N2WS
  • 14 Tag-based Backup Management with N2WS
  • 15 N2WS Resource Control
  • 16 Security Concerns and Best Practices with N2WS
  • 17 Alerts, Notifications, and Reporting with N2WS
  • 18 N2WS User Management
  • 19 N2WS IdP Integration
  • 20 Configuring N2WS with CloudFormation
  • 21 Managing Snapshots with Lifecycle Policies with N2WS
  • 22 Configuring Workers with N2WS
  • 23 Capturing and Cloning in Network Environments with N2WS
  • 24 Orchestrating Recovery Scenarios with N2WS
  • 25 Monitoring Costs and Savings with N2WS
  • 26 Using N2WS with Azure
  • Appendix A Recommended Configuration for Copy to S3 with N2WS
  • Appendix B Agents Configuration Format with N2WS
  • Appendix C Time Zones with N2WS
  • Appendix D Datadog Integration with N2WS
  • Appendix E Splunk Integration Support with N2WS
  • Appendix F - Resetting Root Password or MFA in N2WS
  • Appendix G - Securing Default Certificates on N2WS Server
Powered by GitBook
On this page

Appendix G - Securing Default Certificates on N2WS Server

PreviousAppendix F - Resetting Root Password or MFA in N2WS

Last updated 2 days ago

None of the following procedures should be attempted when Backups/DR/Cleaning/S3 Copy are running. Linux Knowledge is required.

The N2WS server comes with a default self-signed HTTPS certificate that will show as ‘Not Secure’ in the browser. You can secure the certificate and reach the UI by either:

  • Selecting the Advanced button in the ‘Your connection is not private” message, or

  • Adding an exception to the browser. See the Appendix B screenshot in the N2WS Quick Start Guide at

If you purchased an HTTPS certificate from a certificate authority, you can replace the default certificate with the new one as follows:

  1. Connect to the N2WS instance over SSH.

  2. Use ‘sudo’ to reach the certificate folder, keeping the ownership and permissions of the files (‘cp’).

  3. Go to /opt/n2wsoftware/cert

cd /opt/n2wsoftwar/cert

4. In the folder, replace cpm_server.crt and cpm_server.key with new files having the same names.

5. If you are using MobaXterm, you can drag/drop files to the SSH session, and then copy the files to the correct folder.

6. After replacing the files, restart Apache: sudo service apache2 restart

For full details, see

To test the certificate before deploying to production:

The user can launch a new N2WS trial instance to see if the new certificate works there.

If there are any issues, you can restore/recreate the original default certificate as follows:

Only perform these steps if you know how to use SSH and Linux commands.

  1. Connect to the N2WS instance over SSH using a tool such as PuTTY or MobaXterm.

  2. Use ‘sudo’ to reach the certificate folder, keeping the ownership and permissions of the files: sudo su

  3. Go to /opt/n2wsoftware/cert:

cd /opt/n2wsoftwar/cert

4. Move the existing .crt and .key files to a new name:

mv cpm_server.crt backup_cpm_server.crt
mv cpm_server.key backup_cpm_server.key

5. Stop/Start the instance.

For full details, see

https://docs.n2ws.com/quick-start/appendix-b-adding-exception-for-default-browser
https://support.n2ws.com/portal/en/kb/articles/how-to-change-the-certificate-and-key-used-by-cpm
https://support.n2ws.com/portal/en/kb/articles/how-to-restore-recreate-the-default-server-certificate