Data Domain: Web UI Inaccessible Due to Expired https Certificate

Summary: When the https or "ca trusted-ca" certificate expires on a Data Domain, it causes issues when trying to access the web UI. Generating a new certificate resolves the issue.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms

  • You may see 404 HTTP errors or other Apache web service when the certificate expires:
    http certficate UI error
  • Other errors may be seen such as resource unavailable.
  • In general, the UI is inaccessible.
  • Issue also presents as user login failure on the UI.

Cause

When the HTTPS or CA certificate expires on a Data Domain, it causes issues with the Apache web server. It brings the UI down and makes it inaccessible.

Resolution

Note: If the CA certificate is expired, you will require sysadmin credentials for any Data Domain or PowerProtect DD Management Center that previously established trust with this DD. Ensure that the credentials are available before attempting this procedure.


If this Data Domain is in an Integrated Data Protection Appliance or Cyber Recovery vault configuration, consider how those systems monitor the Data Domain using certificates. Support may be required when a certificate expires and then a new certificate is added.

This is not a concern for Data Domains in a DLm solution as the DLm does not require or use HTTP or HTTPS access to communicate with the Data Domain. Certificate updates on the Data Domain may be performed without interruption of the DLm tape mount processing.

  1. Check if the HTTPS or CA, or both certificates are expired:
sysadmin@DD6400# adminaccess certificate show
Subject                                              Type            Application   Valid From                 Valid Until                Fingerprint
--------------------------------------------------   -------------   -----------   ------------------------   ------------------------   -----------------------------------------------------------
DD6400.ddsupport                                     host            https         Thu Sep 11 22:30:27 2025   Sun Oct 11 22:30:27 2026   30:89:8A:9D:BD:67:75:DC:D8:98:84:C6:CD:8F:9F:21:34:24:1B:87
DD6400.ddsupport                                     ca              trusted-ca    Tue Oct 08 07:42:22 2024   Mon Oct 07 07:42:22 2030 81:5B:70:A8:36:02:02:FD:55:13:DA:7C:38:BC:FF:1B:EA:92:3E:96

The https host cert will be valid for 1 year and the CA cert will be valid for 6 years.

  1. If they are not expired, the UI may be down due to the below issues:

    1. If the certificate is old enough, it won't meet the new cert security standards and the GUI won't come up. We need to generate a new cert as in proceeding steps.
    2. Data Domain: After upgrading to DDOS or DDMC 7.1.x or later, the UI cannot be accessed anymore

    3. Data Domain: After upgrading to DDOS or DDMC 6.2.1.90, 7.2.0.95 or 7.7.2.x or later, the UI cannot be accessed anymore
  2. If the CA certificate is expired, check the trusts which are established:
sysadmin@DD6400# adminaccess trust show
Subject                   Type         Valid From                 Valid Until                Fingerprint
-----------------------   ----------   ------------------------   ------------------------   -----------------------------------------------------------
DD6400.ddsupport          trusted-ca   Tue Oct 08 07:42:22 2024   Mon Oct 07 07:42:22 2030   81:5B:70:A8:36:02:02:FD:55:13:DA:7C:38:BC:FF:1B:EA:92:3E:96
DDMCLAB-2.201             trusted-ca   Mon Jul 08 03:02:34 2024   Sun Jul 07 03:02:34 2030   E8:C1:79:5B:B4:2A:02:3A:55:4A:9A:52:AB:FC:D2:01:E7:7A:6C:CA
CorkDDMC.localdomain      trusted-ca   Tue Aug 06 04:29:41 2024   Mon Aug 05 04:29:41 2030   4B:29:2B:D3:DB:3E:62:16:98:D1:6C:36:4C:DF:2F:94:3C:A1:A8:27
DD6900-2.ddsupport.emea   trusted-ca   Sat Feb 03 20:49:25 2024   Fri Feb 01 20:49:25 2030   DC:95:CC:4A:F4:AC:58:58:5E:19:2D:05:F3:99:D9:86:14:32:7F:88
DD9900-HA-P0.ddsupport    trusted-ca   Sat Oct 05 05:08:35 2024   Fri Oct 04 05:08:35 2030   38:FD:E8:B6:C6:2F:30:42:17:93:73:F5:AE:25:3D:53:3E:F5:5C:C4
-----------------------   ----------   ------------------------   ------------------------   -----------------------------------------------------------

You see the certificate for the current Data Domain (by its hostname) and certificates of other Data Domains or PowerProtect DD Management Center. If those trusts must be reestablished, a user requires the sysadmin passwords for any Data Domains or Data Domain Management Centers in the trust pair to reestablish after generating a new CA cert. Some trusts might be stale from old replication contexts and do not require being added back.

  1. Check if the HTTPS cert is a self-signed certificate or if the user signs it with a Certificate Authority (CA):
# adminaccess certificate show imported-host application https

If this command returns anything, the user signs the certificate externally with a CA. Otherwise, if there is no imported host certificate, the certificate is self-signed.

Even if the imported cert is valid and not expired, if the self-signed cert is expired, you must renew it as in the next couple steps. A Self-signed host certificate is also used internally for DD UI to communicate with the SMS service internally. 
 

IMPORTANT NOTE: The self-signed host and CA certs are required to be on the system even if they are not in use, you cannot delete or remove the self-signed certificates in case the system must fall back to them. This is by design.

 

  1. If the HTTPS certificate is signed externally, generate a new Certificate Signing Request (CSR). The user passes this to their CA for signing and imports the signed certificate back into the Data Domain. Follow the article Data Domain: How to Generate a Certificate Signing Request and Use Externally Signed Certificates.
    1. DDOS supports one host certificate for HTTPS. If the system is using a host certificate including self-signed and the user wants to use a different host certificate, delete the current certificate before adding the new certificate.

      Steps:

      1. Log out from the browser session before deleting an HTTPS host certificate. 
      2. Run CLI Command to delete the certificate
        adminaccess certificate delete imported-host-application https
  2. If the CA certificate is expired, regenerate a new HTTPS and CA cert with this command:
# adminaccess certificate generate self-signed-cert regenerate-ca

Notice that after the generation, the valid starting date for the HTTPS cert is one month in the past and the CA cert is one year in the past, this is by design.
The https host cert will be valid for 1 year and the CA cert will be valid for 6 years.

Then go to step 8 to restart UI services.
  1. If the certificate is self-signed and only the HTTPS cert is expired, regenerate a new HTTPS cert with:
# adminaccess certificate generate self-signed-cert

Notice that after the generation, the valid starting date for the HTTPS cert is one month in the past and it will be valid for 1 year which is by design.

  1. If the CA certificate was regenerated, a user must reestablish any trust required. The PowerProtect DD Management Center requires trust for monitoring and when replication is configured using the UI. If so, a user must establish a trust for that to work.
  2. For any Data Domains or Data Domain Management Centers that need trust, run this command to delete the old trust and then reestablish trust with using the new certificate on the current Data Domain (This asks for the sysadmin password on the other Data Domains or Data Domain Management Centers. Ensure that a user has all Data Domains or Data Domain Management Centers or delete the trust for any Data Domains or Data Domain Management Centers that are decommissioned without adding them back. Use the command without the type mutual when doing this.
# adminaccess trust del host <hostname of other DD/DDMC> type mutual

Then run this command to establish a new trust:

# adminaccess trust add host <hostname of other DD/DDMC> type mutual

For the above example, run the add and del for ALL the other Data Domains or Data Domain Management Centers in turn.

# adminaccess trust del host sc-dd2500-2.lss.emc.com type mutual
# adminaccess trust add host sc-dd2500-2.lss.emc.com type mutual

If a user must not add the trust back, because the Data Domain is decommissioned:

# adminaccess trust del host dd690.dssupport.emea
  1. Once the trust is reestablished if needed, restart the UI services:
# adminaccess disable http
# adminaccess disable https
# adminaccess enable https
# adminaccess enable http

Note: Starting with version 8.3 and above, HTTP is disabled by default. It is not required to enable it if it is not used.
HTTPS is the preferred and secure method for accessing the UI.

  1. The user interface should be accessible now.

 

How to restart HTTP or HTTPS services when the UI is unavailable - Dell Data Domain.

Duration: 00:03:17 (hh:mm:ss)
When available, closed caption (subtitles) language settings can be chosen using the CC icon on this video player.

You can also view this video on YouTube.This hyperlink is taking you to a website outside of Dell Technologies.

Affected Products

Data Domain
Article Properties
Article Number: 000198864
Article Type: Solution
Last Modified: 01 Dec 2025
Version:  20
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.