HP SmartStream 3D Command Center 3.2 installation and troubleshooting guide
Technical Newsletter | HP SmartStream 3D Command Center 3.2 installation and troubleshooting guide 
22 
Configure Command Center to support SSL Bump for traffic inspection 
You need to add to the public certificate from the SSL inspector that generates the ad-hoc certificates for all sites and 
swaps them from the original ones. Once you add this certificate to the Command Center Server, it will start to trust the 
traffic from the SSL inspector. 
Open the local computer certificate console (certlm.msc) and check if the public certificate of the device performing the 
SSL inspection is already added to the Trusted Root Certification Authorities folder. If not, please add it. 
 If already added, export the certificate as Base-64 and save the file. 
 Move the exported certificate to user-certificates in the Application directory, see full path: 
C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\HP\3DSSCC\user-certificates 
Restart the server. Once the Command Center server processes start again, it will load this certificate, and the traffic from 
the SSL/TLS inspector will be trusted as if it was untampered. 










