As part of our debug hunt, yesterday, I had the occasion to try to get our internal Root CA into the CAS server keystore, so it could call back proxy apps over SSL. However, no matter where I stashed that Root CA cert, my tests kept coming up with ssl handshake/pkix errors.
I may have a clue about how I messed this up, but are there any helpful hints for the general case? On May 7, 2010, at 7:52 AM, Marvin Addison wrote: >> Despite having a root CA for the target nodes installed in the keychain, the >> central Java keystore in /Library/Java/Home/lib/security/cacerts and the >> keystore explicitly named in the tomcat server.xml > > Spin this off to a separate thread. I have some helpful hints. > > M > > -- > You are currently subscribed to [email protected] as: > [email protected] > To unsubscribe, change settings or access archives, see > http://www.ja-sig.org/wiki/display/JSG/cas-dev -- You are currently subscribed to [email protected] as: [email protected] To unsubscribe, change settings or access archives, see http://www.ja-sig.org/wiki/display/JSG/cas-dev
