

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Issue while uploading FPR to SSC
I recently integrated Fortify SCA(On-premise) with VSTS and as part of ‘Run Fortify On’ task created in VSTS it uploads FPR file to SSC after scan. The upload FPR command was working file when my SSC portal is accessible through HTTP. Now I upgraded SSC portal to be accessible via HTTPS. But FPR upload is getting failed as shown below:
----------------------------------------------------------------------------------------------------------------------------
PS C:\> fortifyclient.bat uploadFPR -url https://ServerName:8443/ssc/ -user admin -f D
:\VSAgentWork\1\a\sca_artifacts\SCA_Build_1.fpr -application Web Application -applicationVersion
First Version
Enter Password:
The HPE Security Fortify SSC server could not be contacted. Please check your network connection and try again. If the
error persists, please contact your system administrator.
---------------------------------------------------------------------------------------------------------------------
SSC works fine when we access from browser. Need pointers to resolve this issue.

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
Hi Siva,
first of all, I would check the network connectivity from that host. Also try running the command with the -debug parameter.
Secondly, can you access the SSC server from Audit Workbench or the Developer Plugin on that host? Perhaps you need to import the SSL certificate from the SSC server to the keystore of Workbench?


- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
The SSL certificate that the SSC site uses needs to be loaded into the Java KeyStore that Fortify SCA uses, at the location <Fortify SCA Install Location>/jre/lib/security/cacert
You can use the java keytool which is located in the /jre/bin/ folder
keytool -keystore <KeyStore File> -importcert -alias <aliasName> -file <cert file>