Skip to main content
We are redesigning the NetApp Knowledge Base site to make it easier to use and navigate. The new and improved site will be available the first week of October. Check out our video or read this KB article to know more about changes you’ll see on the site.
NetApp Knowledge Base

How does ONTAP send an AutoSupport using HTTPS?

Last Updated:

Applies to

  • ONTAP 9
  • Clustered Data ONTAP 8.3
  • Data ONTAP 8 7-mode
  • AutoSupport
  • Transport HTTPS


When ONTAP sends an AutoSupport via the HTTPS protocol it is acting as an HTTPS client.  

  • Here’s a diagram of the basic steps that occur when an HTTPS client attempts to establish encrypted communication with the server.

The major components are:

  • Client is the system that initiates the communication and desires an encrypted communication channel.  In this case, the autosupport subsystem on Data ONTAP storage controller is the client.
  • Server is the system that provides services that can be communicated over an encrypted communication channel.
AutoSupport Server URL Description   Support URL for HTTP/S PUT Support URL for HTTP/HTTPS

Used for AutoSupport OnDemand requests
  • Server Keystore, which resides on the server, contains a copy of the CA signed server public certificate file and private key file.  Only the server public certificate is shown .
    • The server public certificate contains the server’s public key as well as the Certificate Authority (CA) public key chain of the CA(s) that have signed the server certificate.
  • TrustStore, which resides on the client, contains a list the public keys of all of the CAs we trust.  
    • The cacert.pem file is where Data ONTAP store the public keys of all of the CAs that is trusted by the Autosupport https client and is used during certificate validation.

Here is how the encrypted channel is established

  1. The https client connects to the server and requests encrypted communication channel.
  2. The server responds back with the CA signed server certificate.  The signed certificate contains the server’s public key, and the public key chain of the CA(s) which signed the certificate.
  3. The client checks the CA chain in received server certificate and then verifies that CA can be trusted by checking the client’s TrustStore.  In Data ONTAP, there is a setting that can be set to bypass this step.
    a) If CA is trusted, certificate exchange continues in step #4.
    b) If CA is not trusted, then the client rejects the certificate and terminates the connection.
  4. Diffie-Hellman (DH) key exchange and encrypted handshake takes place to mutually determine the encrypted algorithm that is used for the session
  5. After encrypted handshake is complete, encrypted communication begins between client and server.



******************************************************* *******************************************************