The message “com.sun.jersey.api.client.ClientHandlerException: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path validation failed: java.security.cert.CertPathValidatorException: signature check failed” means that the application was not able to build a successful certificate chain between the presented endpoint certificate and a trusted certificate issued by a Certificate Authority.
Is the server certificate self-signed? If so, you will need to add the certificate to the truststore. If it is signed by a well-known CA, you can use the default JRE truststore “$JAVA_HOME/jre/lib/security/cacerts” which provides a list of selected certificate authority public keys. The default password is “changeit”. If you are using a custom CA, you can follow Matt’s article he linked above. This will walk you through step-by-step instructions on setting up your keystore and truststore. Andy LoPresto [email protected] [email protected] PGP Fingerprint: 70EC B3E5 98A6 5A3F D3C4 BACE 3C6E F65B 2F7D EF69 > On Jul 13, 2016, at 8:19 AM, Matthew Clarke <[email protected]> wrote: > > Try following this procedure: > https://community.hortonworks.com/content/kbentry/17293/how-to-create-user-generated-keys-for-securing-nif.html > > Matt > On Jul 13, 2016 1:31 AM, "Vinay" <[email protected]> wrote: > >> Any from this forum can show some help :) >> >> >> >> -- >> View this message in context: >> http://apache-nifi-developer-list.39713.n7.nabble.com/NIFI-Secure-Access-Site-to-Site-tp12735p12785.html >> Sent from the Apache NiFi Developer List mailing list archive at >> Nabble.com. >>
signature.asc
Description: Message signed with OpenPGP using GPGMail
