In order to simplify and streamline applying HTTPS/SSL to DX NetOps Network Flow Analysis and Application Delivery Analysis, the DX NetOps Support team wrote the ApplyHTTPS tool. The tool features multiple options to help get DX NetOps NFA or Application Delivery Analysis secured. You can download the ApplyHTTPS.zip file from this document. Please review the options below and see the additional notes for troubleshooting.
Latest Version: ApplyHTTPS 25.4.6 (March 30, 2026)
Release Notes:
**ApplyHTTPS 25.4.6 will now check if you want OData/RIB/SOAP HTTPS turned on in line while running HTTPS options.
**ApplyHTTPS 25.4.6 will prompt you for a destination KEYSTORE password now and ask if you want to obfuscate the password (recomended).
**ApplyHTTPS 25.4.6 no longer support ADA or NFA 22.2.3 and prior to eliminate the need for legacy .NET 4.5 compatibility. If you require ApplyHTTPS 25.4.5 (Legacy Build) for ADA or NFA 9.3.8 - 22.2.3 support), please open a support ticket.
**ApplyHTTPS 25.4.2 now signed on ApplyHTTPS 25.4.2+.
**ApplyHTTPS 24.3.13, there is some new features to help manage currently used certificate and keystores such as the ability to press enter and automatically pick up (path, alias, and password) the current keystore in Option 4 to allow a new CSR to be easily created to renew your NFA certificate. Also for Option 5 if you press enter it will automatically read in the current keystore and allow you to easily provide the returned certificate path to complete the request and update the keystore. Also Option 6 is introduced and can be used you create self-signed certificates for any server (not just the NFA server).
**ApplyHTTPS 23.3.2+ you will have to provide a friendly DNS name / FQDN when prompted. This name you provide MUST be found in the certificate's Common Name or Subject Alternative Name**
Please edit the parameters.config file included with the package if you wish to use non default options for IIS port, OData port, Jetty SSO port, and to disable the SOAP HTTPS option (not recomended).
If you need help generating a signed certificate without the use of this tool, please see: NFA HTTPS: How to generate and apply signed certificates
DX NetOps Network Flow Analysis 22.3.4 - 25.4.6
To minimize the time it takes to manually set up HTTPS for IIS, Jetty SSO, Jetty RIB, OData, and SOAP Internal Services on DX Network Flow Analysis and provide an easy method to work with signed or self-signed certificates outside of NFA.
Overview
ApplyHTTPS is a command-line utility that configures HTTPS and HTTP settings for DX NetOps NFA versions 22.2.3 through 25.4.6. It manages SSL certificates, Jetty SSO/RIB configurations, IIS bindings, Apache Tomcat, keystores, Java truststores, and database settings.
Requirements:
Startup
On launch, the tool:
All activity is logged to ApplyHTTPS<date>.log in the working directory.
Main Menu
Option 1: Setup HTTPS
Presents a sub-menu with four methods to apply an SSL certificate:
Common Steps (all sub-options)
After the certificate is selected/created, the tool will:
Sub-option 1: Use a PFX File
Use this when you have a PKCS12 certificate file (.pfx or .p12).
Prompts:
What it does:
Sub-option 2: Use an IIS Installed Certificate
Use this when the certificate is already installed in a Windows certificate store.
Prompts:
1: Personal Store
2: WebHosting Store
R: Return
Q: Quit
What it does:
Sub-option 3: Create and Use a Self-Signed Certificate
Use this to generate a new self-signed certificate for testing or internal use.
Prompts:
What it does:
Note: For remote browsers to trust the self-signed certificate, the .cer file must be imported into each user's Trusted Root Certification Authorities store.
Sub-option 4: Post-Upgrade / Automatic Re-apply Certificate
Use this after upgrading NFA to re-apply the previously used certificate without re-entering passwords.
Prompts: None for the certificate itself. The tool automatically:
What it does:
Option 2: Setup HTTP
Reverts NFA from HTTPS to HTTP mode.
Prompts: None — runs automatically.
What it does:
Option 3: Import Certificate for LDAPS / SMTPS / Certificate Authority
Imports one or more public certificates into both the Windows Trusted Root store and the Java truststore. Use this for LDAPS, SMTPS, or Certificate Authority trust chains.
Prompts:
What it does:
Option 4: Renew Certificate or Create a New CSR and Keystore
Creates a Certificate Signing Request (CSR) for submission to a Certificate Authority.
Two paths depending on whether an existing keystore is detected:
Path A: Renew Existing (press enter when prompted for password)
Available for users running NFA 24.3.13+
Prompts:
What it does:
Path B: Create New Keystore and CSR (enter a password)
Prompts:
What it does:
Output: The path to the generated .csr file to provide to your Certificate Authority for signing.
Option 5: Complete a Signed Certificate Request
Imports a signed certificate (received from your CA) back into the keystore that generated the CSR.
Two paths:
Path A: Import into current NFA keystore (press enter)
Available for users running NFA 24.3.13+
Available when NFAPasswdObsUtil.jar exists. Automatically reads the current keystore path and password from the SSO config.
Prompts:
What it does:
Path B: Import into a specified keystore file
Prompts:
What it does:
Option 6: Create a Self-Signed Certificate for a Different Server
Creates a self-signed certificate and keystore for use on another server (not applied to NFA).
Prompts:
Output: Creates a .pfx keystore and .cer certificate file in <NFA Install Dir>\certs\ApplyHTTPS\<CN>\.
Option 7: Obfuscate All Existing Passwords
Obfuscates all plain text keystore passwords across NFA configuration files.
Prompts: None — runs automatically.
Prerequisites: NFA must be in HTTPS mode. If NFA is set to HTTP, the tool will display:
Cannot obfuscate passwords when NFA is set to HTTP. Please apply HTTPS first.
What it does:
Customizable Ports (Not Recomended)
Default Parameters.config file alongside the executable with key=value pairs:
Key | Default | Description |
iis.https.port | 443 | IIS HTTPS port |
sso.https.port | 8443 | SSO Jetty HTTPS port |
iis.http.port | 80 | IIS HTTP port |
odata.port | 8681 | OData service port |