I configured my NTS so it can be reached through HTTPS. In our company we use our own certificate signed by our own ROOT authorities. So when i check the connection from NeoLoad i get that error:
sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at com.neotys.nl.controller.at.c(at.java:366)
at com.neotys.nl.gui.h.h.c.a(c.java:82)
at com.neotys.nl.gui.h.h.c.doInBackground(c.java:63)
at javax.swing.SwingWorker$1.call(SwingWorker.java:295)
at java.util.concurrent.FutureTask.run(FutureTask.java:266)
at javax.swing.SwingWorker.run(SwingWorker.java:334)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
at java.lang.Thread.run(Thread.java:745)
I know it's due to our certificate but how can i tell NeoLoad to trust it?
When you check the connection the JRE embedded in NeoLoad is checking if the certification chain is valid. the JRE embeds the well known ROOT authorities and yours is unkown. That's why the certification chain is not valid. That means that your certificate is self-signed.
To workaround that issue you need to either import the certificate used by your NTS server and/or your ROOT authorities certificate.
This is the procedure: