Submit a ticketCall us

WebinarUpcoming Webinar: Know What’s Changed – with NEW Server Configuration Monitor

Change management in IT is critical. But, even with a good change management process, changes are too often not correctly tracked, if at all. The configuration of your servers and applications is a key factor in their performance, availability, and security. Many incidents can be tracked back to an authorized (and sometimes unauthorized) configuration change, whether to a system file, configuration file, or Windows® Registry entry. Join SolarWinds VP of product management Brandon Shopp to discover how the new SolarWinds® Server Configuration Monitor is designed to help you.

Register now.

Home > Success Center > Virtualization Manager (VMAN) > VMAN - Knowledgebase Articles > Accept a self-signed certificate for untrusted connections

Accept a self-signed certificate for untrusted connections

Updated: 3-29-2017


This article provides references and information for installing or adding certificates to your browser when connecting to VMAN over a secure connection, and how to handle self-signed certificates that trigger an Untrusted Connection error.

The resolutions provided are from 3rd party companies, with links to documentation.


  • All Mozilla Firefox versions
  • All Internet Explorer versions
  • All Google Chrome versions

Errors and Solutions

Mozilla Firefox

Error: This Connection is Untrusted

Resolution: Refer to Bypassing the warning under "This Connection is Untrusted" error message appears - What to do.

(©1998–2017, available at, obtained on March 2nd, 2017.)

Internet Explorer

Error: There is a problem with this website's security certificate.

Resolution: Follow the instructions in Installing a Self-Signed Certificate as a Trusted Root CA  in Windows Vista.

(© 2017 Microsoft Corporation, available at, obtained on March 2nd, 2017.)

Google Chrome

Error: The site's security certificate is not trusted!


  1. When the error occurs, click Proceed Anyway.
  2. In the address bar, click the lock icon to view the site information.
  3. On the Connections tab, click Certificate Information.
  4. On the Details tab, click Copy to File…
  5. Click Next.
  6. Select DER encoded binary X.509 (.CER), and click Next.
  7. Enter a file name. By default Chrome saves the certificate in a hidden file in \Users\username\AppData\Local\Google\Chrome\Applications\... 
  8. If you do not want to make hidden files visible, browse to a different location to save the certificate.
  9. Click Next.
  10. Check the location of the certificate, and click Finish.
  11. Add the exported certificate to Trusted Root Certification Authorities.

    Both Chrome and Internet Explorer use the Trusted Root Certification Authorities store when verifying certificates. If you have performed the steps to install the certificate for either Internet Explorer or Chrome, you do not have to perform the same steps again to use either browser.

Last modified