This is being displayed because this certificate is unknown to the system as of now. This is resolved by importing the certificate from the C:\Program Files\BMC Software\Client Management\Master\bin\certs\auth\
_CHECKSUM_\BCM.crt. More information here:
Client Management: How to identify the certificate authority trusted by the master1- Windows:
Method A: Manual Certificate Import
- Open the folder C:\Program Files\BMC Software\Client Management\Master\bin\certs\auth\<checksum>\BCM.crt. More information here: Client Management: How to identify the certificate authority trusted by the master
- Right click on the certificate and select "Install Certificate"
- Choose Local Machine in the import dialog and select NEXT
- Choose Place all Certification in the following store then browse and select -> Trusted Root Certification Authorities.
- Close then reopen the browser and browse to the agent web interface
- Make sure the error is not displayed anymore
More information on using the certificate import wizard is available from Microsoft, and for the purposes of this article, steps 5 through 9 from
this TechNet blog post can be followed.
Method B: Using MMC snap-in
- Run the following command line: "mmc"
- Add snap-ins from File > Add/Remove Snap-in > Certificates > Local computer and Users
- Go to Certificates > Trusted Root Certification Authority > certificates > Right click > All Tasks > Imports > From C:/Program Files/BMC Software/Client Management/Client /bin/certs/auth
- Click on Data Modified (Choose latest date folder) and choose the .crt file to import. Click Yes.
- Run gpupdate /force as an administrator
- Close then reopen the browser and browse to the agent web interface
- Make sure the error is not displayed anymore
Method C: GPO
The best method, if a domain is available, is to distribute certificates to computers through a GPO.
- Make sure that the Active directory does have Active Directory Certificate Services installed.
- Click Start, point to Administrative Tools, and then click Group Policy Management.
- Then:
- Find an existing Group Policy object (GPO) or create a new GPO to contain the certificate settings. Ensure that the GPO is associated with the domain, site, or organizational unit (OU) where the appropriate user and computer accounts reside.
- Right-click the GPO, and then click Edit.
- In the console tree, open Computer Configuration\Policies\Windows Settings\Security Settings\Public Key Policies, right-click Trusted Root Certification Authorities, and then click Import.
- On the Welcome to the Certificate Import Wizard page, click Next.
- On the File to Import page, type the path to the appropriate certificate files (for example, our bcm file From C:\Program Files\BMC Software\Client Management\Master\bin\certs\auth\<checksum>\BCM.crt.The correct cert to import may vary and should be verified by reviewing the definition of CertsAuth= in the \Master\config\mtxagent.ini file. More information here: How to identify the authorities trusted by the master
- On the Certificate Store page, click Place all certificates in the following store, and then click Next.
- On the Completing the Certificate Import Wizard page, verify that the information provided is accurate, and then click Finish.
- Run gpupdate /force as an administrator
- Close then reopen the browser and browse to the agent web interface
- Make sure the error is not displayed anymore
Method D: Through a package:
D1 - Windows
This method can be used if the devices are not in a domain:
- create a package on a windows based package factory
- add the .crt to the package
- in the tab "Configuration" set:
- Overwrite: Yes Yes No Yes
- Destination: set the path to copy the .cert to first
- do not set anything else
- publish the package
- create an operational rule
- add the package to it
- add the step "Execute Program" and set it to run the following command line:
certutil -addstore Root _PATH_TO_CERT_.crt
Where _PATH_TO_CERT_.crt must be replaced by the path to which the crt has been copied by the package, e.g C:/temp/bcm.crt, as per set into the Destination field of the package for this example.
- assign the operational rule to a test device
- Close then reopen the browser and browse to the agent web interface
- Make sure the error is not displayed anymore
D2 - linux
- create a package on a mac os based package factory
- follow the exact same steps than in D1 but the part on the command line
- set the command line in the step "Execute Program" to:
security add-trusted-cert -d -r trustRoot -k "/Library/Keychains/System.keychain" "CertFile.crt"