<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Qlik Sense Enterprise on Windows and Chrome 58+ SSL Certificates warnings: Your connection is not private in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-and-Chrome-58-SSL-Certificates/ta-p/1715946</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Google Chrome 58 and higher displays a “Your connection is not private” warning when accessing Qlik Sense Hub or QMC.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The same issue might also be seen for other non-Qlik-related HTTPS URLs. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="your connection is not private.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/54529iA3858308DA2CB682/image-size/large?v=v2&amp;amp;px=999" role="button" title="your connection is not private.png" alt="your connection is not private.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;Qlik Sense Enterprise on Windows&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Resolution&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;The issue can be resolved differently depending on the Qlik Sense version and the certificate authority in use. A temporary solution can be to ignore the browser warning or to use another browser. Permanent solutions depend on the current version of Qlik Sense.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;3&lt;SUP&gt;rd&lt;/SUP&gt; party certificates&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Qlik Sense sites that use 3&lt;SUP&gt;rd&lt;/SUP&gt; party certificates, have to be updated by acquiring an updated certificate from the certificate provider. Please consult local IT team for more guidance on how to apply a certificate update.&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Qlik Sense Standard self-signed certificates&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Certificates self-signed by Qlik Sense do not contain the “Subject Alternative Name” attribute. A possible solution is to configure Google Chrome to allow certificates issued by local trust anchors that are missing the subjectAlternativeName, which can be done by setting &lt;EM&gt;HKEY_CURRENT_USER\Software\Policies\Google\Chrome\ EnableCommonNameFallbackForLocalAnchors= dword :1&lt;/EM&gt; in the Windows Registry.&lt;/P&gt;
&lt;BLOCKQUOTE class="quote"&gt;Changes to the Windows registry can lead to severe system problems if not applied accurately.&lt;/BLOCKQUOTE&gt;
&lt;P&gt;See attached .reg file as a reference to applying &lt;EM&gt;EnableCommonNameFallbackForLocalAnchors&lt;/EM&gt; in the Windows registry.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;Cause&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;This issue is caused by Google Chrome 58 (and later) requiring the “Subject Alternative Name” attribute, including the “DNS Name” value. See Google Chrome issues 308330 as reference.&lt;BR /&gt;&lt;A href="https://bugs.chromium.org/p/chromium/issues/detail?id=308330" target="_blank" rel="noopener" data-cke-saved-href="https://bugs.chromium.org/p/chromium/issues/detail?id=308330"&gt;https://bugs.chromium.org/p/chromium/issues/detail?id=308330&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;RFC6125 (&lt;/SPAN&gt;&lt;A href="https://tools.ietf.org/html/rfc6125" target="_blank" rel="noopener" data-cke-saved-href="https://tools.ietf.org/html/rfc6125"&gt;&lt;SPAN&gt;https://tools.ietf.org/html/rfc6125&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;) definition of “&lt;/SPAN&gt;Subject Alternative Name&lt;SPAN&gt;”;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; If a subjectAltName extension of type dNSName is present, that MUST&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; be used as the identity. Otherwise, the (most specific) Common Name&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; field in the Subject field of the certificate MUST be used. Although&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; the use of the Common Name is existing practice, it is deprecated and&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; Certification Authorities are encouraged to use the dNSName instead.&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;This is an example of a certificate that will work without issue in Chrome 58 or higher. Note the highlighted portions:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="google chrome compatible certificates.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/54528i25B10527DDD6508C/image-size/large?v=v2&amp;amp;px=999" role="button" title="google chrome compatible certificates.png" alt="google chrome compatible certificates.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorSonja_Bauernfeind_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 10 Apr 2026 10:26:20 GMT</pubDate>
    <dc:creator>Andre_Sostizzo</dc:creator>
    <dc:date>2026-04-10T10:26:20Z</dc:date>
    <item>
      <title>Qlik Sense Enterprise on Windows and Chrome 58+ SSL Certificates warnings: Your connection is not private</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-and-Chrome-58-SSL-Certificates/ta-p/1715946</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Google Chrome 58 and higher displays a “Your connection is not private” warning when accessing Qlik Sense Hub or QMC.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The same issue might also be seen for other non-Qlik-related HTTPS URLs. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="your connection is not private.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/54529iA3858308DA2CB682/image-size/large?v=v2&amp;amp;px=999" role="button" title="your connection is not private.png" alt="your connection is not private.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;Qlik Sense Enterprise on Windows&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Resolution&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;The issue can be resolved differently depending on the Qlik Sense version and the certificate authority in use. A temporary solution can be to ignore the browser warning or to use another browser. Permanent solutions depend on the current version of Qlik Sense.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;3&lt;SUP&gt;rd&lt;/SUP&gt; party certificates&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Qlik Sense sites that use 3&lt;SUP&gt;rd&lt;/SUP&gt; party certificates, have to be updated by acquiring an updated certificate from the certificate provider. Please consult local IT team for more guidance on how to apply a certificate update.&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Qlik Sense Standard self-signed certificates&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Certificates self-signed by Qlik Sense do not contain the “Subject Alternative Name” attribute. A possible solution is to configure Google Chrome to allow certificates issued by local trust anchors that are missing the subjectAlternativeName, which can be done by setting &lt;EM&gt;HKEY_CURRENT_USER\Software\Policies\Google\Chrome\ EnableCommonNameFallbackForLocalAnchors= dword :1&lt;/EM&gt; in the Windows Registry.&lt;/P&gt;
&lt;BLOCKQUOTE class="quote"&gt;Changes to the Windows registry can lead to severe system problems if not applied accurately.&lt;/BLOCKQUOTE&gt;
&lt;P&gt;See attached .reg file as a reference to applying &lt;EM&gt;EnableCommonNameFallbackForLocalAnchors&lt;/EM&gt; in the Windows registry.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;Cause&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;This issue is caused by Google Chrome 58 (and later) requiring the “Subject Alternative Name” attribute, including the “DNS Name” value. See Google Chrome issues 308330 as reference.&lt;BR /&gt;&lt;A href="https://bugs.chromium.org/p/chromium/issues/detail?id=308330" target="_blank" rel="noopener" data-cke-saved-href="https://bugs.chromium.org/p/chromium/issues/detail?id=308330"&gt;https://bugs.chromium.org/p/chromium/issues/detail?id=308330&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;RFC6125 (&lt;/SPAN&gt;&lt;A href="https://tools.ietf.org/html/rfc6125" target="_blank" rel="noopener" data-cke-saved-href="https://tools.ietf.org/html/rfc6125"&gt;&lt;SPAN&gt;https://tools.ietf.org/html/rfc6125&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;) definition of “&lt;/SPAN&gt;Subject Alternative Name&lt;SPAN&gt;”;&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; If a subjectAltName extension of type dNSName is present, that MUST&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; be used as the identity. Otherwise, the (most specific) Common Name&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; field in the Subject field of the certificate MUST be used. Although&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; the use of the Common Name is existing practice, it is deprecated and&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; Certification Authorities are encouraged to use the dNSName instead.&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;This is an example of a certificate that will work without issue in Chrome 58 or higher. Note the highlighted portions:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="google chrome compatible certificates.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/54528i25B10527DDD6508C/image-size/large?v=v2&amp;amp;px=999" role="button" title="google chrome compatible certificates.png" alt="google chrome compatible certificates.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorSonja_Bauernfeind_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2026 10:26:20 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-Enterprise-on-Windows-and-Chrome-58-SSL-Certificates/ta-p/1715946</guid>
      <dc:creator>Andre_Sostizzo</dc:creator>
      <dc:date>2026-04-10T10:26:20Z</dc:date>
    </item>
  </channel>
</rss>

