Getting Started
Ddboost Users
Alerts Notifylists
Cloud Profiles
Cloud Unit
Data Movement Policy
Data Movement
Data Movement Stats Files
Data Movement Stats Mtrees
Data Movement Stats Recall
Managed Files
Filesys Block Storage
Mtrees Id Rlfiles
Mtrees Id Stats
Mtrees Id Stats Capacity
Mtree Id Stats Compressions
Network Host Name Reset
Network Host Name
Network Domain Name Reset
Network Domain Name
Network Search Domain Reset
Network Search Domain
Network Dns Server Reset
Network Dns Server
Network Gateway Reset
Network Gateway
Network Gateway Static Ipv4
Network Gateway Static Ipv6
Network Interface
Network Interface Physical
Network Interface Vlan
Network Interface Alias
Network Nic
Cifs Shares
Ddboost Clients
Ddboost Storage Units
Nfs Exports
Nfs Exports Id Clients
Nfs Exports Id Referrals
Vdisk Devgrps
Vdisk Devices
Vdisk Pools
Vdisk Stimgs
Services Asup
Services Asup Reset
Services License Server
Services Log
Mdtags Services
Services Ntp
Tenant Units
Stats Capacity
Comp Measurements Support Check
Comp Measurements
Stats File Replications
Filesys Stats
Stats Performances Mtrees
Stats Systems File Replications
Storage Disks
Support Bundles
System Repl
System Space
Users Id Pre Check
Sso Registration
Filesys Object Store
Filesys Object Stores Aws
Cifs Auth

Certificate for REST APIs

PowerProtect DD System provides a self-signed certificate by default. The self-signed certificate is not trusted by external systems (by default) and may block you from using the REST APIs because of security warnings from the HTTP client. This tutorial introduces two ways to resolve this issue.

Trust the PowerProtect DD system certificate (recommended)

Trust the PowerProtect DD system root CA

The PowerProtect DD system root CA can be found here on the DD system:


Most HTTP clients have their own trusted CA management. Follow the guidelines for those clients to install the PowerProtect DD system root CA into the corresponding trusted area.

The PowerProtect DD system CA can be located here:

/etc/ssl/certs/<DD hostname>.pem

If you are using the client URL (cURL) command line, you can specify your own CA certification path with the --cacert option. For example:

curl --cacert /etc/ssl/certs/<DD hostname>.pem \
     --request POST \
     --url https://<DD-SYSTEM-IP/FQDN>:3009/rest/v1.0/auth \
     --header 'content-type: application/json' \
     --data '{"username":"<your-user-name>","password":"<your-password>"}'

Ingore the certificate not trusted warning (nonproduction activities only)

Most HTTP clients provide an option to turn off SSL certificate verification.

To log in to the system, you can use this cURL command:

curl --request POST \
  --url https://<DD-SYSTEM-IP/FQDN>:3009/rest/v1.0/auth \
  --header 'content-type: application/json' \
  --data '{"username":"<your-user-name>","password":"<your-password>"}'

If you have not trusted the PowerProtect DD system root CA, you are blocked by the following response from cURL:

curl: (60) SSL certificate problem: self signed certificate in certificate chain.

More details here:

curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above.

For nonproduction activities such as test and debug, you can use the -k option to bypass the certificate verification.

curl -k --request POST \
  --url https://<DD-SYSTEM-IP/FQDN>:3009/rest/v1.0/auth \
  --header 'content-type: application/json' \
  --data '{"username":"<your-user-name>","password":"<your-password>"}'

The response is OK.

CAUTION: Ignoring the certificate is risky because it enables man-in-the-middle attacks that can sniff your traffic (in this case, the password). Ensure that you use this method only in a safe network environment.