Skip to main content
Sonja_Bauernfeind
Digital Support
Digital Support

header error.png

 

If you’ve just installed Qlik Sense Enterprise, then this image probably looks familiar. Alternatively, Chrome might display The site's security certificate is not trusted, while Firefox may report This Connection is Untrusted.

 

By default, Qlik Sense uses a self-signed certificate to enable HTTPS access across both the Hub (https:// YourSenseServer/hub) and the Management Console (https://YourSenseServer/qmc). But self-signed certificates cannot be validated or trusted by web browsers and tend to prompt a warning message.

 

That's alright though. All we need is the following:

  • An additional (signed) certificate.
  • A brief (5 minute) downtime of the Qlik Sense Proxy.
  • And, I suppose, this blog post for the instructions.

So, let’s get started.

What is the current certificate used for?

During the initial install, the Qlik Sense Repository Service creates a set of certificates. Their purpose is to:

  • Secure Service Communication and Service Authentication.

Qlik Sense uses certificates to authenticate its service across all nodes. See the Qlik Sense Online Help for details. In addition, other products (such as Qlik NPrinting) require these certificates to be establish a connection.

  • HTTPS enabled access for the Hub the QMC.

Note:  We will not modify, replace, or remove the originally created certificates. Doing so will break service communication.

What we’ll do instead is to add an additional one.

Certificate options, or: What type of certificate is right for me?

There are three possible types of certificates for us to use.

  • A certificate purchased from and signed by a trusted CA (Certificate Authority) such as VeriSign, Thawte, Geotrust, etc.
  • A certificate provided and signed by your own Enterprise CA (Certificate Authority).
  • And, of course, a self-signed one. Those can be created by any number of applications, such as Microsoft IIS, but is generally only recommended for test environments. More so, it has the potential side effect of teaching users to ignore browser warnings, which we do not want.

Requirements, or: What to look out for when getting your cert.

  • The certificate itself must contain a private key
  • Has an up to date valid from / valid to date range
  • Is signed by a valid and OS or browser configured Certificate Authority

When support gets questions, they are most often related to a certificate missing the private key. Always verify the certificate comes bundled with one when you install it.

It’ll look like this:

private key okay.png

As far as formats and algorithms are concerned, the following are confirmed to work with Qlik Sense:

  • Certificates that are x509 version 3
  • Use signature algorithm sha256RSA
  • Use signature hash algorithm sha256

Where to get a certificate and how to do a CSR?

The Certificate Authority you chose will have instructions for this, and if you are looking to get a self-signed one or one from your corporation's CA, then a local administrator can provide the certificate to you.

 

Either way, you are going to need to generate a Certificate Signing Request (CSR) to pass on to your CA. There are tools out there to get that done with, such as certreq from Microsoft (found here), and SSLhopper has a great article on that, which I often send to customers when they ask us about CSRs and how to do them.

Once you obtain the certificate, we'll move on to installing it and activating it in Qlik Sense. This will be done in three quick steps:

  • Import
  • Get the Thumbprint
  • Provide Thumbprint to the Proxy

Importing the Certificate

As mentioned before, we are not replacing certificates. The already existing ones will not be deleted. Doing so would break service authentication between the individual Qlik Sense services and render the system… broken.

 

Step 1:

On the Qlik Sense node running the Qlik Sense Proxy, log on with the user running the Sense services. This is important since the certificate needs to be accessible for this account.

Step 2:

If the certificate was saved in the .pfx format, then all you need to do is double click the file. Follow the prompt to import the certificate into the Personal store.

import.png

 

Longer Step 2:

If you want to import it manually or verify if it was correctly installed, then we'll need to do a little more work.

  1. Launch the Microsoft Management Console (mmc.exe) on the Proxy node
  2. In the MMC, go to File > Add / Remove Snap-in...
  3. Select Certificates and click Add
  4. Select Computer account, click Next, select Local computer and click Finish

    mmc.png

  5. In the MMC, go to Certificates (Local Computer)/Personal
  6. In the MMC, go to Actions > All Tasks > Import...
  7. Browse to the certificate file provided to you from your CA
  8. Follow the instructions on the screen to import the certificate, including the private key
  9. Verify the new certificate has been imported into Certificates (Local Computer) > Personal > Certificates and that it contains a private key
  10. Double-click the Certificate > Certification Path and confirm it shows "This certificate is OK"

    cert okay.png

 

Getting the Thumbprint

Well, since we are already in the MMC, let's open the freshly installed certificate again.

  1. Switch to the Details tab and scroll down until you find Thumbprint
  2. Mark the entire thing and copy it into, for example, Notepad.

 thumbprint get.png

 Configuring the Qlik Sense Proxy

Almost done!

  1. Open the Qlik Sense Management Console (QMC)
  2. Go to Proxies
  3. Double click the Proxy you want to use (or select and choose Edit)
  4. Enable the Security options in the Properties panel on the right
  5. Paste the certificate Thumbprint into the SSL browser certificate thumbprint text box.

Click Apply.

 

 

add thumbprint.png

The Sense Proxy will now restart. During the restart, it will be using Windows API calls to correctly bind the new certificate to its SSL ports.

 

Verification, or: How to prove the certificate was accepted.

In the web browser:

When opening the Qlik Sense Hub or QMC, the certificate will now be displayed in the browser. This may look different depending on the web browser, but in Google Chrome you can click the padlock to the left of the URL to verify what certificate is used.

checkcert.png

The information displayed needs to match the properties of the certificate you installed.

checkcert2.png

In the log files:

If you’d rather see what the Qlik Sense Proxy service is doing, then you can directly check up on that, too.

On the Proxy node, go to C:\ProgramData\Qlik\Sense\Log\Proxy\Trace and open the Security log file from just after the last start.

 

It will now print a slightly different message than before:

 

Security.Proxy.Qlik.Sense.Common.Security.Cryptography.LoggingDigester    DOMAIN\_service    Setting crypto key for log file secure signing: success

Security.Proxy.Qlik.Sense.Common.Security.Cryptography.SecretsKey    DOMAIN\_service    retrieving symmetric key from cert: success   

Security.Proxy.Qlik.Sense.Common.Security.Cryptography.CryptoKey    DOMAIN\_service    setting crypto key: success   

Security.Proxy.Qlik.Sense.Communication.Security.CertSetup    'CN=localhost' (08C871933A58E072FED7AD65E2DB6D5AD3EAF9FA) as SSL certificate presented to browser, which is a 3rd party SSL certificate  

And that's it!

There isn't much more to it in a standard Qlik Sense Enterprise installation, but if you have more questions, then maybe a few of these articles can help:

I applied my certificate and it seems to be using it correctly, but browsers are still saying the Common Name is Invalid?

ERR_CERT_COMMON_NAME_INVALID when using 3rd party certificate 

Qlik Sense keeps reverting to the default and complains it can't find a valid ssl certificate with the thumbprint.

Qlik Sense: Couldn't find a valid ssl certificate with thumbprint in Proxy logs, the third party cer... 

The certificate may not have a Private key or the service account does not have access to it.

How to: Manage Certificate Private Key 

The Qlik Sense Service account doesn't have admin privileges and the certificate is not accepted.

How to: Change the Qlik Sense Proxy certificate if the service account does not have local administr... 


I hope that this was useful 😊 Stay tuned for an upcoming post where we’ll focus on QlikView and how to enable HTTPS for its AccessPoint, and don’t forget to subscribe to this blog for more content delivered by #QlikSupport. We’ll be watching for your comments and questions and we’ll to get back to you as soon as possible. Your feedback is always appreciated.  

 

21 Comments
mountaindude
Partner Ambassador
Partner Ambassador
Also, you must install the certificate so that the user running the Sense
services can access the cert.
Confirm this by logging in as the service account you are using, then
verify that this user can see the cert.
Grab the cert thumbprint once you are viewing the cert in Windows, then
paste it into the proxy settings in the QMC (remove any spaces in the
thumbprint).

1,808 Views
korsikov
Partner - Specialist III
Partner - Specialist III

@mountaindude  If you QS service users has admin ritghts is not true. any users with admin rights can  install in Computer -personal. It's all. 

 

1,783 Views
mountaindude
Partner Ambassador
Partner Ambassador

@korsikov Quite true. Still, logging in as the service account and verifying that account can see/access the cert is an easy first check.

1,598 Views
delmak2000
Creator
Creator

Thank you all, At this point, I reached out to the server administrator to follow the link below to generate the private key and apply to the server. 

https://support.qlik.com/servlet/fileField?retURL=%2Fapex%2FQS_CaseWizardKnowledgeArticle%3FarticleI...

 

Thanks again for the responses.

Lots of appreciation.

Ayo

1,549 Views
HeshamKhja1
Partner - Creator II
Partner - Creator II

Thank you for the helpful post.

Just a question, in multi node deployment of central, failover, and multiple rims, if I have the DNS load balancing to two servers (Central & Failover), should I install the wild card certificate on these two servers, central only, or on all the nodes?

658 Views
Sonja_Bauernfeind
Digital Support
Digital Support

Hello @HeshamKhja1 

The certificate will need to be available on any proxy node on which you wish to use it. Other nodes do not require the certificate as it does not govern service communication, only web traffic.

All the best,
Sonja 

613 Views
Tanvi
Partner - Contributor
Partner - Contributor

Hi All, please help m. I m in terrible situation.

Currently I have single node qlik installation on Amazon EC2 and its in a workgroup. So, I am accessing the qmc on URL https://EC2-hostname/qmc.

My client has asked me to install ssl *.domain.com. After installation of SSL which URL should I use to access qmc? Because qmc is neither accessible over

1. https://EC2-hostname/qmc nor over

2. https://subdomain.domain.com/qmc  (I have added subdomain.domain.com in the websocket origin allow list. 

Please tell me how do I go about this. Am I missing something on the QLik side config, because my SSL installation was successful, I did see those log messages in my C:\ProgramData\Qlik\Sense\Log\Proxy\Trace.
as 'CN=subdomain.domain.com' (08C871933A58E072FED7AD65E2DB6D5AD3EAF9FA) as SSL certificate presented to browser, which is a 3rd party SSL certificate  

499 Views
Eduardo_Monteiro
Partner - Contributor III
Partner - Contributor III

A good safety measure when dealing with 3rd party certs is to enable HTTP so you don't get locked in case things go south. After checking that the SSL is working fine, you can disable it.

 

472 Views
Tanvi
Partner - Contributor
Partner - Contributor

Hi Edurdo,

Yes I had enabled http. So I am not locked out. But I need to know how do I access my qmc now (Using which url)

 

1. http://EC2-hostname/qmc nor over

2. http://subdomain.domain.com/qmc  (I have added subdomain.domain.com in the websocket origin allow list. 

Also, thumbprint of SSL is a continuous string of characters  (please refer below image) nowadays and does not include spaces as shown in docs. Does that even matter?

Tanvi_0-1701442994370.png

 

438 Views
PrashantSangle
415 Views