If the proxy server uses TLS encryption to handle connection requests, you will need to
    add the proxy's root CA certificate to your host's store of trusted certificates. This is
    because proxy servers typically sign their server certificate with their own root certificate.
    Therefore, any connection attempts will fail until the Cloudera Data Science Workbench host
    trusts the proxy's root CA certificate. If you do not have access to your proxy's root
    certificate, contact your Network / IT administrator.
    To enable trust, perform the following steps on the master and
      worker hosts.
    - 
        Copy the proxy's root certificate to the trusted CA certificate store
            (ca-trust) on the Cloudera Data Science Workbench host.
          cp /tmp/<proxy-root-certificate>.crt /etc/pki/ca-trust/source/anchors/
 
 
- 
        Use the following command to rebuild the trusted certificate store. 
        
      
- 
        If you will be using custom engine images that will be pulled from a Docker repository,
          add the proxy's root certificates to a directory under
            /etc/docker/certs.d.For example, if your Docker repository is at
            docker.repository.mycompany.com, create the following directory
          structure:
 
          /etc/docker/certs.d
|-- docker.repository.mycompany.com          # Directory named after Docker repository 
    |-- <proxy-root-certificate>.crt         # Docker-related root CA certificates 
 
 This step is not required with the standard engine images because they are included in
          the Cloudera Data Science Workbench RPM.  
- 
        Re-initialize Cloudera Data Science Workbench to have this change go into effect.