As part of our debug hunt, yesterday, I had the occasion to try to get our 
internal Root CA into the CAS server keystore, so it could call back proxy apps 
over SSL. However, no matter where I stashed that Root CA cert, my tests kept 
coming up with ssl handshake/pkix errors.

I may have a clue about how I messed this up, but are there any helpful hints 
for the general case?

On May 7, 2010, at 7:52 AM, Marvin Addison wrote:

>> Despite having a root CA for the target nodes installed in the keychain, the 
>> central Java keystore in /Library/Java/Home/lib/security/cacerts and the 
>> keystore explicitly named in the tomcat server.xml
> 
> Spin this off to a separate thread.  I have some helpful hints.
> 
> M
> 
> -- 
> You are currently subscribed to [email protected] as: 
> [email protected]
> To unsubscribe, change settings or access archives, see 
> http://www.ja-sig.org/wiki/display/JSG/cas-dev


-- 
You are currently subscribed to [email protected] as: 
[email protected]
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-dev

Reply via email to