| Explanation | SSL service is initializing the configuration. |
| Action | None. Informational only |
| Explanation | SSL service initialization completed successfully.. |
| Action | None. Informational only |
| Explanation | SSL service is starting. |
| Action | None. Informational only |
| Explanation | SSL service started. |
| Action | None. Informational only |
| Explanation | SSL service initialization failed |
| Action | None. Informational only |
| Explanation | An unexpected exception occurred when trying to create or register an mBean. |
| Action | There may be a problem with the configuration. The exception may include details. |
| Explanation | SSL service did not start. |
| Action | None. Informational only |
| Explanation | An unexpected error occurred during security initialization. |
| Action |
This is a general error. Look for previous messages that may be related to the failure or a configuration problem. Enabling SSL=all=enabled debug trace may yield additional information. |
| Explanation | Cannot create the security object from repository. Internal Error. |
| Action | The security.xml might be corrupted or missing. Contact your service representative. |
| Explanation | This exception is unexpected. The cause is not immediately known. |
| Action | If the problem persists, additional information might be available if you search for the message ID on the following Web sites: WebSphere Application Server Support page: https://ibm.biz/BdztgV WebSphere Application Server for z/OS Support page: https://ibm.biz/Bdqd4J . |
| Explanation | The specified resource could not be loaded due to an exception. |
| Action | The failure may be related to a configuration problem related to the resource. |
| Explanation | The server is running in FIPS mode, using the IBMJCEFIPS provider. |
| Action | No user action is required. |
| Explanation | When the server is running in FIPS mode the IBMJCEFIPS provider should be in the java.security file. |
| Action | The java.security file needs to be changed to include the IBMJCEFIPS provider in the provider list before the IBMJCE provider. |
| Explanation | Describes whether the SSL component"s FFDC Diagnostic module was successfully registered. |
| Action | None. Informational only. |
| Explanation | An unexpected error occurred stopping the SSL component. |
| Action |
This is a general error. Look for previous messages that may be related to the failure or a configuration problem. Enabling SSL=all=enabled debug trace may yield additional information. |
| Explanation | A certificate is about to expire in the keystore. |
| Action | Open the keystore and validate the expiration dates on all certificates in the keystore. Prepare to generate new certificates, if necessary. |
| Explanation | A certificate is expired in the keystore. |
| Action | Open the keystore and validate the expiration dates on all certificates in the keystore. Remove any expired certs. |
| Explanation | The keystore type configured is not correct. |
| Action | Change the keystore type in the SSL configuration. |
| Explanation | There may be a problem with the syntax of the ssl.client.props file or the location of the file is not valid. |
| Action | Review the error returned and check the syntax and location of the ssl.client.props file. |
| Explanation | A class loading error occurred loading the custom trust manager configured. |
| Action | Ensure the class can be found in the environment. |
| Explanation | A class loading error occurred loading the custom key manager configured. |
| Action | Ensure the class can be found in the environment. |
| Explanation | An error occurred during the SSL handshake. It may require a signer export/import from the target host to the client TrustStore. |
| Action | Review the extended error message from the TrustManager to determine what needs to change between the target SSL configuration and the client SSL configuration. |
| Explanation | The certificate alias specified for this SSL configuration is not in the specified KeyStore. |
| Action | Either add a certificate into the KeyStore with the specified certificate alias or change the specified certificate alias to match an alias found in the client KeyStore. |
| Explanation | The certificate alias specified for this SSL configuration is not in the specified KeyStore. |
| Action | Either add a certificate into the KeyStore with the specified certificate alias or change the specified certificate alias to match an alias found in the server KeyStore. |
| Explanation | There was a classloading error trying to load the HTTPS URLStreamHandler class. |
| Action | Check the SSL configuration to ensure the context provider is correct for the platform. |
| Explanation | An exception occurred reading the SSL configurations from the security.xml after a change occurred. |
| Action | Review the exception message text and verify the SSL configuration parameters are valid. |
| Explanation | Hostname verification will be disabled by default for URL connections. Hostname verification checks that the X509 Certificate Common Name (CN) matches the hostname it is from. |
| Action | To enable default JSSE URL hostname verification, set the com.ibm.ssl.performURLHostNameVerification property to true. |
| Explanation | The handshake protocol specified is not recognized as a valid handshake protocol. |
| Action | Check the SSL configuration to ensure the right handshake protocol is specified. |
| Explanation | The SSL context provider specified is not recognized as a valid context provider. |
| Action | Check the SSL configuration to ensure the correct SSL context provider is specified. |
| Explanation | The DefaultKeyStores between cell and node will have exchange signers with corresponding DefaultTrustStores. An error occurred during this process. |
| Action | A manual signer exchange may be required. |
| Explanation | An error occurred while creating the file-based keystore or truststore during process initialization. Check that the keystore or truststore settings are valid. |
| Action | Verify the keystore or truststore settings in the ssl.client.props are current. |
| Explanation | An error occurred while creating a self-signed certificate during process startup. |
| Action | Check that the default self-signed certificate property values (com.ibm.ssl.defaultCertReq*) are valid. |
| Explanation | An error occurred while creating or opening the keystore. |
| Action | Check the properties in the keystore configuration and ensure the keystore exists. |
| Explanation | An error occurred initializing the schedule. |
| Action | Check that the properties for the scheduler are valid. Ensure the /etc directory is writable. |
| Explanation | An error occurred reading the date from the schedule file in /etc. |
| Action | Ensure the /etc directory is writable or the file has not been modified. |
| Explanation | An error occured sending email to the specified SMTP server. |
| Action | Ensure the SMTP server specified is valid and that your companies firewall policy allows sending to SMTP ports. |
| Explanation | This information concerns certificate expiration. |
| Action | You may need to manage certificates to resolve the reported problems. |
| Explanation | A problem occurred starting the expiration monitor command task. |
| Action | Try starting the expiration monitor explicitly to determine more information about the error. |
| Explanation | Make sure the hostname entered is in the canonical format as it appears in serverindex.xml. |
| Action | Edit the hostlist to convert it to the proper canonical format. |
| Explanation | This message is for provides options for the client to retrieve signers needed for a successful SSL connection. |
| Action | Either run retrieveSigners or enable the signer exchange prompt to correct the problem. |
| Explanation | When the Application Server starts for the first time as a stand-alone application server or in a Network Deployment configuration, each server creates a keystore and truststore for the default Secure Sockets Layer (SSL) configuration. When the Application Server creates these files, by default, it uses WebAS for the password. Do not use the default password in production. The warning message suggests that you change the password. |
| Action | To eliminate this warning message, change the default password for the keystore and the truststore using the administrative console and also change these passwordsby editing the ssl.client.props file. When you change the passwords in the ssl.client.props file, you must use the PropFilePasswordEncoder utility to re-encode the newpasswords. |
| Explanation | After creating a chained or self signed certificate, the corresponding signer certificate could not be stored in the issued certificates key store. |
| Action | Check the associated error information for the cause of the failure. |
| Explanation | An error occurred while creating a chained certificate during process startup. |
| Action | Check that the default chained certificate property values (com.ibm.ssl.defaultCertReq*) are valid and that a valid certificate exists in the root key store. |
| Explanation | FIPS security mode is printed. |
| Action | No user action is required. |
| Explanation | An error occurred during the SSL handshake. It may require a signer export/import from the target host to the client TrustStore. |
| Action | Review the extended error message from the TrustManager to determine what needs to change between the target SSL configuration and the client SSL configuration. |
| Explanation | The java security property is already set. |
| Action | No user action is required. |
| Explanation | The java security property was already set when the WebSphere Application Server set the property. The values will be merged. |
| Action | No user action is required. |
| Explanation | The WebSphere Application server is setting the java security property to the value specified. |
| Action | No user action is required. |
| Explanation | A certificate alias that contains whitespace may cause compatibility issues. |
| Action | Remove the whitespace from the certificate alias to avoid possible certificate operation issue. |
| Explanation | The component that subscribes to the SSL configuration changes is notified. |
| Action | No user action is required. |
| Explanation | The SSL configuration is refreshed when initialization completes. |
| Action | No user action is required. |
| Explanation | The SSL configuration is refreshed. |
| Action | No user action is required. |
| Explanation | The scheduler for the security component is initializing. |
| Action | No user action is required. |
| Explanation | The scheduler read the security configuration and is ready to start scheduled tasks. |
| Action | No user action is required. |
| Explanation | The scheduler is starting a scheduled task. |
| Action | No user action is required. |
| Explanation | The scheduled task is finished. |
| Action | No user action is required. |
| Explanation | The keymanager failed to initialize due to an error with the personal certificate in the keystore. |
| Action | Check the keystore personal certificate entries don"t have passwords different from the keystore password. |
| Explanation | The host name of the system used to access the server must be included in the subject alternative name information in the certificate. |
| Action | Generate new certificates with the correct host names included in the subject alternative name information. Alternatively, if appropriate for your system configuration, hostName verification can be disabled by setting the security custom property com.ibm.ssl.verifyHostname to false. You can also skip the hostname verification checks for specific host names by using the security custom property com.ibm.ssl.skipHostnameVerificationForHosts. |
| Explanation | Hostname verification must be enabled to ensure that the hostname in the URL that the client is connecting to matches the hostname in the certificate that the server sends back during the TLS/SSL communication. |
| Action | Enable hostname verification by setting the com.ibm.ssl.verifyHostname security custom property to true. |
| Explanation | IBM Java version 8.0.8.30 or later to is required support FIPS 140-3. |
| Action | Upgrade IBM Java to version 8.0.8.30 or later to support FIPS 140-3. |
| Explanation | The KeySet either does not have a keyGenerationClass defined, it cannot find the keyGenerationClass, or a read-only KeyStore is associated with the KeySet, or the KeyStore does not allow the writing of secret keys. |
| Action | Modify the configuration so that a proper keyGenerationClass is configured and a KeyStore type is configured which allows the writing of secret keys. |
| Explanation | An error occurred while retrieving keys from the KeyStore for the specified KeySet. |
| Action | Check that the KeySet configuration is correct. |
| Explanation | Either the runtime could not find the key generation class configured for the KeySet or the class does not either implement com.ibm.websphere.crypto.KeyGenerator or com.ibm.websphere.crypto.KeyPairGenerator. |
| Action | Ensure the key generation class configured is specified in a location that can be found by the WebSphere runtime. Check the information center for specifying custom classes so that runtime can find them. |
| Explanation | The keys passed as input may not have been correctly formed or the keystore could not be accessed to store them. |
| Action | Attempt to determine the cause based on the exception and adjust the configuration accordingly. |
| Explanation | A problem occurred while a new key reference was created for the specified KeySetGroup. After the key reference was created in the configuration, the key was generated. One of these steps failed. |
| Action | Attempt to determine the cause based on the exception and adjust the configuration as needed. |
| Explanation | Usage information on the parameters for executing this script. |
| Action | None. |
| Explanation | Indicates trace mode is on. |
| Action | None. |
| Explanation | There"s a problem writing to the specified logfile. |
| Action | Change the logfile path or make sure the file specified is not in use. |
| Explanation | Indicates where the mode is being logged. |
| Action | None. |
| Explanation | The remote truststore is not found. |
| Action | Try issuing -listRemoteKeyStoreNames command to get the list of names. |
| Explanation | The alias specified was not found in the truststore. |
| Action | Try issuing -listRemoteKeyStoreNames command to get the list of names. |
| Explanation | Indicates a list of the remote keystores. |
| Action | None. |
| Explanation | Indicates a list of the local keystores. |
| Action | None. |
| Explanation | Indicates the signer being added to the local keystore. |
| Action | None. |
| Explanation | Indicates no signers needed to be added to the local keystore. |
| Action | None. |
| Explanation | The local truststore is not found. |
| Action | Try issuing -listLocalKeyStoreNames command to get the list of names. |
| Explanation | The start date of the certificate is not valid. |
| Action | Ensure that the client"s clock matches up with the server"s clock. Otherwise, create a certificate with the proper start date. |
| Explanation | The certificate has expired. |
| Action | Replace the certificate with a valid certificate. |
| Explanation | Check the command line to ensure the specified option is correct. |
| Action | Check the usage help and retry after correcting the option. |
| Explanation | Check the command line to ensure the specified options are correct. |
| Action | Check the usage help and retry after correcting the option. |
| Explanation | There are no SSL configuration properties set. The property "com.ibm.SSL.ConfigURL" may not be set properly or there may have been an error parsing the SSL client configuration. |
| Action | Check the ssl.client.props file for errors and make sure "com.ibm.SSL.ConfigURL" is set property. |
| Explanation | There is no security object. The security.xml file might be corrupt. |
| Action | Check the security.xml file for errors. |
| Explanation | At least one SSL configuration supports weak handshake protocols. |
| Action | It is recommended to configure with stronger handshake protocols. |
| Explanation | At least one SSL configuration enables SSL_TLSv2, which contains a weak SSL handshake protocol that is disabled in the future. |
| Action | Configure with a stronger handshake protocols. |
| Explanation | Usage information on the parameters for executing this script. |
| Action | None. |
| Explanation | Indicates that trace mode is on. |
| Action | None. |
| Explanation | Indicates an error writing to the specified logfile. |
| Action | Change the logfile path or to the correct logfile or make sure the file specified is not in use. |
| Explanation | Indicates where the mode is being logged. |
| Action | None. |
| Explanation | Check the command line to ensure the options are correct. |
| Action | Check the usage help and retry after correcting the option. |
| Explanation | Check the command line to ensure the options are correct. |
| Action | Check the usage help and retry after correcting the option. |
| Explanation | An attempt to load the custom PKI client implementation failed because the class could not be found by the classloader. |
| Action | Check that the custom class exists in your installation"s classes directory. |
| Explanation | An attempt to load the custom PKI client implementation failed because the class is not an instance of com.ibm.ws.ssl.WSPKIClient. |
| Action | Check that the custom class implements com.ibm.ws.ssl.WSPKIClient. |
| Explanation | The certificate specified is not a personal certificate. |
| Action | Rerun the command with a personal certificate alias name. |
| Explanation | Unable to receive the certificate from the Certificate Authority (CA) because public keys do not match. |
| Action | Rerun the command using a certificate retrieved from a Certificate Authority (CA) that was generated with the certificate request coming form this specified alias in this keystore. |
| Explanation | The local keyStore is not found. |
| Action | Check that the keyStore exists on the client and has an alias in ssl.client.props. |
| Explanation | In order to receive a certificate in a key store the public key of the certificate must match the public key of a certificate in the key store. |
| Action | Run the command with a certificate that has a public key that matches the public key of a certificate in the key store. |
| Explanation | The certificate request was not processed immediately by the Certificate Authority (CA) and mst be obtained out-of-band. |
| Action | Run queryCertificate to check on the status of the certificate and receive it if the request has been processed. |
| Explanation | The value provided is not the correct type. |
| Action | Check the usage help and retry after correcting the type of the value. |
| Explanation | A proper value was not provided on the command line. |
| Action | Check the usage help and retry after correcting the option. |
| Explanation | An error occurred while initializing the Certificate Authority (CA) implementation. |
| Action | Check the associated error message. |
| Explanation | An error occurred while attempting to create a Certificate Authority (CA) signed certificate. |
| Action | Check the associated error message. |
| Explanation | An error occurred while attempting to revoke a Certificate Authority (CA)) signed certificate. |
| Action | Check the assoicated error message. |
| Explanation | An error occurred while attempting to query the certificate authority (CA) for a signed certificate. |
| Action | Check the associated error message. |
| Explanation | Unable to receive the certificate because the keystore specified is read-only. |
| Action | Specify a keystore that is writable. |
| Explanation | The certificate request received from the Certificate Authority (CA) was unable to be stored successfully in the specified keystore. The certifcate will be revoked and a retry of the request is necessary to obtain a new certificate. |
| Action | Check the previous failure messages related to storing the keystore and correct the issue(s) before retrying the certificate request. |
| Explanation | None |
| Action | None |
| Explanation | None |
| Action | None |
| Explanation | The PKCS10 certifcate request could not be created |
| Action | Check the message logs for details |
| Explanation | Unable create the certificate request because the alias specified alrady exists in the keystore. |
| Action | Specify another alias name. |
| Explanation | The subjectDN supplied is incorrect and does not conform to the X500Principal standard. |
| Action | Check the subjectDN and ensure that it is in the correct form. |
| Explanation | An option provided was not recognized and will be ignored. |
| Action | Check the command usage an ensure the argument supplied is correct. |
| Explanation | The custom attributes were not entered in the proper form. |
| Action | Check the usage help and retry after correcting the value specified. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | The attribute passed to the implementation is null or of the incorrect type. |
| Action | Ensure that the required attribute is passed to the implementation. |
| Explanation | The byte array of the certificate request is null. |
| Action | Check that a valid certificate request byte array is passed to the implementation. |
| Explanation | The byte array of the revocation password for this request is null. |
| Action | Check that a valid revocation password byte array is passed to the implementation. |
| Explanation | An unexpected error has occured. |
| Action | Contact IBM support. |
| Explanation | The temporary file could not be written to the filesystem. |
| Action | Ensure the path to the temporary file exists, is writable and has space available. |
| Explanation | Requesting a Certificate Authority (CA) signed certificate. |
| Action | None. Informational only |
| Explanation | An unexpected error occurred requesting the certificate. |
| Action | Check the log file for detailed error information. |
| Explanation | An error occurred revoking the certificate. |
| Action | Check the log file for detailed error information |
| Explanation | An unexpected error occurred querying the certificate. |
| Action | Check the log file for detailed error information. |
| Explanation | The certificate chain is null. |
| Action | Check that a valid certificate chain is passed to the implementation. |
| Explanation | Revoking a Certificate Authority (CA)) signed certificate. |
| Action | None. Informational only. |
| Explanation | Action not supported. |
| Action | None. Informational only. |
| Explanation | A request to revoke a Certificate Authority (CA) signed certificate has been issued. |
| Action | Verify with the external Certificate Authority (CA) that the certificate has been successfully revoked. |
| Explanation | A signed certificate was received from the Certificate Authority (CA). |
| Action | None. Informational only. |
| Explanation | The Administration service is unavailable. |
| Action | If running the operation in local mode, run operation in Connected mode. |
| Explanation | Parameter passed into the method was null." |
| Action | Rerun the command using a valid parameter. |
| Explanation | The specified object does not exist within the management scope. |
| Action | Rerun the command with a valid object name. |
| Explanation | The specified object already exist. Unable to create another one. |
| Action | Create the object with a unique name. |
| Explanation | Either a provider/algorithm or a keyManagerClass should be specified not both. |
| Action | Rerun the command specifying either a provider/algorithm or a keyManagerClass. |
| Explanation | The supplied management scope is not in the correct format or contains information that is not valid. |
| Action | Rerun the command with a valid management scope name. |
| Explanation | The key store provided is not within the same scope as the key set. |
| Action | Rerun the command with a key store that is within the key set"s management scope. |
| Explanation | The supplied key set object name does not exist. |
| Action | Rerun the command with a valid key set object. |
| Explanation | The supplied management scope type is not valid. |
| Action | Rerun the command with a valid management scope type. Valid types include cell, nodegroup, node, cluster, server, and endpoint. |
| Explanation | The supplied management scope does not match the management scope type that was specified. |
| Action | Rerun the command with correct management scope type that matches the supplied management scope. |
| Explanation | The management scope name supplied already exists in the security configuration. |
| Action | Rerun the command with a unique management scope name that does not already exist. |
| Explanation | Supplied SSL type is not valid. |
| Action | Rerun the command with a valid SSL type - SSSL or JSSE. |
| Explanation | Supplied SSL security level is not valid. |
| Action | Rerun the command with one of the following valid SSL security levels: HIGH, MEDIUM, LOW, or CUSTOM. |
| Explanation | The supplied SSL/TLS protocol value is not valid. |
| Action | Rerun the command with an SSL/TLS protocol value from the list of valid values. |
| Explanation | The supplied trust manager object name is not valid. |
| Action | Rerun the command with a valid trust manager object name. |
| Explanation | The supplied SSL configuration direction is not valid. |
| Action | Rerun the command with a valid SSL configuration direction, inbound or outbound. |
| Explanation | The SSL configuration group already exists. |
| Action | Rerun the command with a unique SSL configuration group name. |
| Explanation | The specified SSL Configuration needs to be in the same management scope as the SSL configuration group being created. |
| Action | Rerun the command with an SSL configuration that is in the same management scope as the SSL configuration group being created. |
| Explanation | The specified certificate alias is not found in the SSL configuration. |
| Action | Rerun the command with a certificate alias that can be found in the configuration. |
| Explanation | The specified key alias already exists in the key set. |
| Action | Rerun the command with a key alias that does not already exist in the key set. |
| Explanation | The password and verify password supplied do not match. |
| Action | Rurun the command again a password that matches the verify password. |
| Explanation | The specified key store file already exists |
| Action | Rerun the command specifying a key store file that does not already exist. |
| Explanation | The specified object already exists, it cannot be created again. |
| Action | Rerun the command with a unique name that does not already exist. |
| Explanation | The specified schedule frequency is not a positive integer. |
| Action | Rerun the command using positive integer for the schedule frequency. |
| Explanation | The supplied minute value did not fall within the minute range. |
| Action | Rerun the command with a minute value between 0 and 59. |
| Explanation | The supplied day of week value is out of range. |
| Action | Rerun the command with a day of week value between 1 and 7. |
| Explanation | The hour value is out of range. |
| Action | Rerun the command with a hour value between 0 and 23. |
| Explanation | The next start date is set to a date in the past. It needs to be set to a date in the future. |
| Action | Rerun the command with a next start date set to a date in the future. |
| Explanation | Unable to create a wsCertExpMonitor entry because one already exists. Only one is allowed in the security.xml file at a time. |
| Action | Delete the existing wsCertExpMonitor entry and create a new one if a different wsCertExpMonitor is desired. |
| Explanation | Valid days parameter is out of range. It should be between 1 and 7300 days. |
| Action | Rerun the command with a valid days value between 1 and 7300. |
| Explanation | Unable to delete the trust manager because it is still referenced by other objects. |
| Action | Make sure the trust manager is not referenced by other objects before deleting it. |
| Explanation | Unable to add the certificate to the key store because the key store already contains a certificate with the given alias. |
| Action | Rerun the command using a unique alias name for the certificate. |
| Explanation | The object is not in the management scope. |
| Action | Rerun the command using the correct management scope. |
| Explanation | Unable to delete the key set because it is still referenced by other objects. |
| Action | Make sure the key set is not referenced by other objects before deleting it. |
| Explanation | Unable to generate keys since there is no key generator class configured. |
| Action | Configure a key generator class for the key set so that keys can be generated. |
| Explanation | One of the objects supplied as input is not a valid key set object. |
| Action | Rerun the command making sure the key set object name supplied is valid. |
| Explanation | Unable to delete the management scope because it is still referenced by other objects. |
| Action | Make sure the management scope is not referenced by other objects before deleting it. |
| Explanation | Unable to modify the descriptive property without the correct object parent information. |
| Action | Rerun the command with a valid parent data type value. |
| Explanation | Unable to modify the descriptive property without the correct class name. |
| Action | Rerun the command with a valid class name value. |
| Explanation | Unable to modify the descriptive property without the correct descriptive property name. |
| Action | Rerun the command with a correct descriptive property name value. |
| Explanation | Unable to modify the correct descriptive property without the correct descriptive property type. |
| Action | Rerun the command with a correct descriptive property type value. |
| Explanation | Information about when the certificate will expire. |
| Action | none. |
| Explanation | Information about when the certificate will expire. |
| Action | none. |
| Explanation | Information that the certificate is replaced. |
| Action | none. |
| Explanation | Information that the certificate is replaced. |
| Action | none. |
| Explanation | Information that the certificate is deleted. |
| Action | none. |
| Explanation | Information that the certificate is deleted. |
| Action | none. |
| Explanation | Information about certificate expiration. |
| Action | none. |
| Explanation | Information about action taken during certificate expiration monitoring. |
| Action | none. |
| Explanation | Unable to perform operation on the specified alias because it does not exist in the key store. |
| Action | Rerun the command using a certificate alias that exists for the key store. |
| Explanation | Unable to perform operation on the specified alias because it is not a certificate request. |
| Action | Rerun the command using a certificate request. |
| Explanation | Unable to perform operation because the certificate file does not exist. |
| Action | Rerun the command using a valid certificate file. |
| Explanation | Unable to perform operation because a key for the alias specified does not exist. |
| Action | Rerun the command using a valid certificate alias the contains a key. |
| Explanation | Unable to receive the certificate from the certificate authority because public keys do not match. |
| Action | Rerun the command using a certificate retrieved from a certificate authority that was generated with the certificate request coming form this specified alias in this key store. |
| Explanation | Unable to receive the certificate from the certificate authority because public keys do not match. |
| Action | Rerun the command using a certificate retrieved from a certificate authority that was generated with the certificate request coming form this specified alias in this key store. |
| Explanation | The key store file did not verify. The file may not exist or the key file type or password is not correct. |
| Action | Rerun the command with a key store that exists and check that the key file type and password are valid. |
| Explanation | The SSL Configuration must be within the Dynamic SSL Configuration Selection management scope. |
| Action | Rerun the command with a SSL Configuration that is within the same management scope of the Dynamic SSL Configuration Selection management scope. |
| Explanation | The key store being created is a hardware key store and a hardware crypto key store type must be specified. |
| Action | Rerun the command with a valid hardware crypto key store type. |
| Explanation | Only a positive integer can be used for a hardware slot number. |
| Action | Rerun the command using a positive integer for a hardware slot number. |
| Explanation | Only a positive number can be used for next start date. |
| Action | Rerun the command using a positive number for next state date. |
| Explanation | The signer certificate was not retrieved, verify the hostname and port are correct. |
| Action | Rerun the command after verifying the hostname is valid and the port is a secure port. |
| Explanation | In order to receive a certificate in a key store the public key of the certificate must match the public key of a certificate in the key store. |
| Action | Rerun the command with a certificate that has a public key that matches the public key of a certificate in the key store. |
| Explanation | When creating a key store object with an existing key store file the file or keyring must exist and a valid password and key store type must be supplied. |
| Action | Make sure the key store file or keyring exists with a valid password and key store type. Then rerun the command. |
| Explanation | When creating a key store used for hardware acceleration the configuration file must exist. |
| Action | Make sure the key store acceleration configuration file exists and rerun the command. |
| Explanation | When creating a key store that is not file based the file path specified must exist. |
| Action | Make sure the file specified exists and rerun the command. |
| Explanation | The certificate specified is not a personal certificate. |
| Action | Rerun the command with a personal certificate alias name. |
| Explanation | There is already a property by the specified name in the SSL Configuration. |
| Action | Rerun the command with a property that does not already exist in the SSL Configuration. |
| Explanation | The value is not the type specified. |
| Action | Rerun the command making sure the value matches the type supplied. |
| Explanation | Remotely managed key stores can only be done on a deployment manager. |
| Action | Only locally manage key stores can be managed on a base application server. |
| Explanation | Key stores that are read only or key stores that are not file based cannot be changed. |
| Action | Unable to perform password change operation on read only key store or key store that is not file based. |
| Explanation | The key store file did not verify. The file may not exist or the key file type or password is not correct. |
| Action | Rerun the command with a key store that exists and check the key file type and password. |
| Explanation | The alias is either not in the key store or it is not a personal certificate in the key store. |
| Action | Rerun the command with a personal certificate that is located in the key store. |
| Explanation | When creating a hardware key store object the file in the path specified should already exist. |
| Action | Rerun the command with a specifying a file that already exists. |
| Explanation | The two alias values supplied are the same. The alias values must be different. |
| Action | Rerun the command by specifying different alias values. |
| Explanation | The value is not a valid configuration object name. |
| Action | Rerun the command with a valid configuration object name. |
| Explanation | The task is missing a parameter required to run. |
| Action | Rerun the command with the correct parameters and values. |
| Explanation | The task is missing parameters required to run. |
| Action | Rerun the command with the correct parameters and values. |
| Explanation | Unable to perform operation on the specified alias because it does not exist in the key store. |
| Action | Rerun the command using a certificate alias that exists in the key store. |
| Explanation | Information about when the certificate expired. |
| Action | none. |
| Explanation | Information about when the certificate expired. |
| Action | none. |
| Explanation | Information parameter is not formatted correctly. It should be in the "protocol,host,port" format. |
| Action | Rerun the command with correct format for the Dynamic SSL configuration selection information parameter. |
| Explanation | The specified alias does not exist. |
| Action | Rerun the command with a valid alias name. |
| Explanation | The time out value range should be between 1 and 86400. |
| Action | Rerun the command with a valid time out range between 1 and 86400. |
| Explanation | When the sendEmail option value is true, a list of e-mail addresses must be provided. |
| Action | Specify a list of e-mail addresses if sendEmail option is set to true and then re-run the command. |
| Explanation | When you specify the "emailFormat" option the valid values include "html" or "text". |
| Action | Specify "html" or "text" for the e-mail format and re-run the command.. |
| Explanation | When you request a new certificate, the minimum Distinguished Name (DN) information is required. |
| Action | Specify a value with the certificateCommonName parameter and re-run the command.. |
| Explanation | The Certificate Authority client is still referenced by one or more certificates. |
| Action | First, remove all of the certificates that reference the Certificate Authority (CA) client. Then, remove the CA client. |
| Explanation | To revoke a certificate, the certificate must have a reference object in the security configuration. |
| Action | Only revoke certificates that are CA certificates and have a reference object in the security configuration. |
| Explanation | The certificate must exist for it to be revoked. |
| Action | Run the revoke certificate task on an existing Certificate Authority (CA) certificate. |
| Explanation | The certificate request must exist to request a certificate from a Certificate Authority (CA). |
| Action | Run the certificate request task with a predefined certificate request or have the command create a request. |
| Explanation | A certificate request already exists and information was provided to create a new request. |
| Action | Rerun the command using the existing certificate request or use a new unique alias with DN information. |
| Explanation | The certificate status needs to be in the PENDING state to make a request to the Certificate Authority (CA) to complete the certificate. |
| Action | Run the command on certificates in the PENDING state. |
| Explanation | The keystore file does not exist, but it must exist. |
| Action | The command needs to run with an existing keystore file. |
| Explanation | A valid key storetype must be provided to load the keystore. The specified key storetype is not valid for this configuration. |
| Action | Run the command with a valid keystore type for this configuration. |
| Explanation | An error occurred when the Application Server attempted to load the keystore. Verify the password and make sure the correct keystore type is provided for the keystore. |
| Action | Run the command with all the correct information needed to load the key store. |
| Explanation | The specified alias name either does not exist in the key store or it is not a personal certificate. |
| Action | Run the command using a personal certificate alias that exists in the keystore. |
| Explanation | The parameter value is not a positive integer. |
| Action | Run the command using a positive integer. |
| Explanation | To modify the keystore reference in the key store object, provide a location, type and password. |
| Action | Run the command with the keyStoreLocation, keyStoreType, and keyStorePassword parameters. |
| Explanation | The keystore is marked as read-only access. The Application Server cannot perform any operation that will write to the keystore file. |
| Action | "Only run the command on a keystore that is not marked read-only. |
| Explanation | The specified port value is not valid. |
| Action | Run the command using a valid port number. |
| Explanation | A certificate can be used to sign other certificates only if the basic constraint flag on the certificate is set to true. |
| Action | Ensure that the specified certificate is a certificate authority (CA) certificate, it exists, and it was created in the default root keystore. Only self-signed certificates that are created in the default root keystore have the basic contraint flag set to true. |
| Explanation | CA certificates must be deleted and re-requested manually using the administrative tasks. |
| Action | To obtain a new CA certificate, manually delete the old certificate and manually request a new certificiate from the certificate authority. |
| Explanation | Certificates that are not issued by the product cannot be renewed. The certificate must be renewed manually. |
| Action | To obtain a new certificate that was not issued by a node in the product, the old certificate must be manually deleted. A new certificate must be manually requested from the external source from which it first originated. |
| Explanation | This message is for informational purposes only. |
| Action | none. |
| Explanation | The root certificate, which was originally used to sign the certificate, does not exist. The certificate might have been deleted from the keystore. |
| Action | Check the deleted keystore to ensure that the certificate was not accidentally deleted. If the certificate is in the deleted keystore, you can restore it using an import or export command. |
| Explanation | The task should either work with another keystore object or work with an unmanaged keystore. However, the task cannot work both approaches. |
| Action | Specify either a keystore object name or a key file path name and run the command. |
| Explanation | he specified keystore must contain at least one personal certificate.. |
| Action | The last personal certificate cannot be removed from the keystore. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | The specified usage value is not valid. |
| Action | Run the command with a valid usage value. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required.. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | The SAF keyring location is not valid. Specify the location in the following form: safkeyring://USERID/KeyringName or safkeyring:///KeyringName. |
| Action | Modify the keystore location parameter to point to a valid location. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | The task is missing a required parameter. |
| Action | Specify the correct parameter and value and rerun the command. |
| Explanation | The administrative agent and the job manager have separate security configurations. The security enablement status must match before federation continues and security is properly applied. |
| Action | Ensure the enablement status for the two profiles match. |
| Explanation | The administrative agent and the job manager have separate security configurations. The security enablement status must match before federation continues and security is properly applied. |
| Action | Ensure that the enablement status for the two profiles match. |
| Explanation | The administrative agent and base profile have separate security configurations. The security enablement status must match before federation continues and security is properly applied. |
| Action | Ensure that the enablement status for the two profiles match. |
| Explanation | The administraive agent and base profile have separate security configurations. The security enablement status must match before federation continues and security is properly applied. |
| Action | Ensure that the enablement status for the two profiles match. |
| Explanation | The keystore must be marked read-only access. The Application Server cannot perform any operation that will write to the keystore location. |
| Action | Run the command on a keystore with a keyring location qualified with a valid RACF user. |
| Explanation | The keystore specified is already enabled as a writable keyring. |
| Action | Ensure the keystore is not already enabled as a writable keyring before running the command. |
| Explanation | A valid replacement option needs to be specified. |
| Action | Specify a valid replacement option value and rerun the command. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | An error occurred when the Application Server attempted to create the keystore. |
| Action | Verify that the type, password, and file or key ring location are correct. Rerun the command with the correct parameters and values. |
| Explanation | To import or export certificates from an audit keystore, the user must have the required auditor role authority. |
| Action | Ensure that the acting user has the proper role authority. |
| Explanation | The deployment manager and the job manager have separate security configurations. The security enablement status must match before federation continues and security is properly applied. |
| Action | Ensure that the enablement status for the two profiles match. |
| Explanation | The deployment manager and the job manager have separate security configurations. The security enablement status must match before federation continues and security is properly applied. |
| Action | Ensure that the enablement status for the two profiles match. |
| Explanation | There is a failure to connect with the job manager. Make sure the job manager is running. This could be due to security being enabled on the job manager but not on the server registering with it or due to a incorrect username, password, port number, or hostname. |
| Action | Ensure the job manager is running, the enablement status for the two profiles match, and that the user, password, port number, and hostname information is correct. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | You cannot register a node or deployment manager with a job manager that is at an earlier version. |
| Action | Upgrade the job manager to be the same level or higher than the node you are trying to register, and repeat the registration process. |
| Explanation | The personal certificate specified does not exist in the keystore. |
| Action | Ensure the certificate exists and is a personal certificate. |
| Explanation | The configuration service is not available the task is unable to execute. |
| Action | Ensure the task is running on a process where configuration service is available. |
| Explanation | Keystore names must be unique within the same management scope. |
| Action | Ensure the keystore has a unique name within the management scope. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | Upgrade SDK and restart the server |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | Invalid FipsLevel is entered. |
| Action | Enter valid FipsLevel. |
| Explanation | Invalid SuiteB Level is entered. |
| Action | Enter valid SuiteB Level. |
| Explanation | Invalid protocol is entered. |
| Action | Enter valid protocol. |
| Explanation | Invalid signatureAlgorithm is entered. |
| Action | Enter valid signatureAlgorithm. |
| Explanation | Invalid key size is entered. |
| Action | Enter valid key size. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | Ensure all certificates are compliant with the required FIPS level prior to enabling FIPS. |
| Explanation | The fipsLevel and suiteBLevel parameters cannot be specified at the same time when enabling a security standard. |
| Action | Specify either fipsLevel or suiteBLevel. |
| Explanation | Either the fipsLevel or the suiteBLevel parameters must be specified when enabling a security standard. |
| Action | Specify either fipsLevel or suiteBLevel. |
| Explanation | The cipher that suiteBLevel=192 uses requires JDK unrestricted policy. |
| Action | Download JDK unrestricted policy files and place them in JDK directory. |
| Explanation | The signature algorithm provided by the user is not valid. The user must use a value from the list provided. |
| Action | Enter a signature algorithm from the list provided. |
| Explanation | The action provided by the user is not valid. The user must must use a value from the list provided. |
| Action | Enter an action from the list provided. |
| Explanation | The InternalFileRepository messageDigestAlgorithm must use PBKDF2WithHmacSHA512 to be compliant with FIPS 140-3. |
| Action | Update the messageDigestAlgorithm to PBKDF2WithHmacSHA512 to be compliant with FIPS 140-3. Then, save the primary administrative user credentials so that the password is hashed with the PBKDF2WithHmacSHA512 algorithm. All user passwords in the InternalFileRepository must be hashed with the PBKDF2WithHmacSHA512 algorithm. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | Unable to query InternalFileRepository. |
| Action | Unable to query InternalFileRepository. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | The InternalFileRepository messageDigestAlgorithm must use the PBKDF2WithHmacSHA512 algorithm to be compliant with FIPS 140-3. |
| Action | Update the messageDigestAlgorithm to the PBKDF2WithHmacSHA512 algorithm to be compliant with FIPS 140-3. Then, save all user credentials within the repository so that their passwords are hashed with the PBKDF2WithHmacSHA512 algorithm. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | The JSSE will select a personal certificate if the SSL configuration does not specify the certificate to use. |
| Action | The user must specify a client and server certificate that is used in the SSL configuration. |
| Explanation | A certificate request looks like a personal certificate to the JSSE. The JSSE will select a personal certificate if the SSL configuration does not specify the certificate to use. |
| Action | The user must specify a client and server certificate that is used in the SSL configuration so that the JSSE does not select the certificate request. |
| Explanation | The admintask command did not complete due to an unexpected error. |
| Action | Review the log file for the detailed error message and take an appropriate action. |
| Explanation | The admintask command did not complete due to an unexpected error. The unsaved files were discarded to avoid saving files that might contain incorrect values. |
| Action | Review the log file for the detailed error message and take an appropriate action. |
| Explanation | The specified file was not created because the file already exists. If Advanced Encryption Standard (AES) password encryption is enabled, the enablement created either the passwordUtil.properties file or the aesKey.jceks file. |
| Action | Make sure that the file is safe to delete, delete the file, and then retry the operation. |
| Explanation | The null location might be due to a configuration error. |
| Action | Correct any errors in the log file, which varies based on your environment. Then use the -clientPropsLocation parameter to set the path name of the properties file. |
| Explanation | The value of the defaultAlgoirithm parameter is not valid. |
| Action | Specify one of the valid values for the parameter. |
| Explanation | The passwords in the configuration file could not be updated due to an error. The updated but unsaved files in the workspace were discarded to avoid saving the files that contain incorrect values. |
| Action | Review the error message for the detailed information and correct the problem. |
| Explanation | The password could not be encrypted because an error occurred during encrypting of the passwords in the configuration. The updated but unsaved files were discarded to avoid saving files that might contain incorrect values. |
| Action | Review the log files for detailed error information and correct the problem. |
| Explanation | An error was reported while decrypting the passwords in the configuration. The unsaved files were discarded to avoid saving the files which might contain incorrect values. |
| Action | Review log files for the detailed error information and correct the problem. |
| Explanation | The PasswordUtil class could not be initialized due to an error. The updated but unsaved configuration files were discarded to avoid saving files that might contain incorrect values. |
| Action | Review the log files for the detailed error information and correct the problem. |
| Explanation | The specified file does not exist. The file, if it existed, would be a configuration file or a keystore file. |
| Action | Ensure that the location of the file is correct, and then retry the operation. |
| Explanation | The PasswordUtil class did not accept the value for the defaultAlgorithm parameter, possibly due to a configuration issue. The updated but unsaved files were discarded to avoid saving files that might contain incorrect values. |
| Action | Review the log files for the detailed error information and correct the problem. |
| Explanation | The specified EncryptionKeyManager class was not found because it was not in the class path. |
| Action | Put the specified class file in the directory that is in the class path. |
| Explanation | The value of the aesCurrentAlias parameter does not match the value of the aesAlias parameter. These two values must be the same so that the keystore file can be created. |
| Action | Make sure that values of the both aesCurrentAlias parameter and the aesAlias parameter are the same. |
| Explanation | The specified value of the aesCurrentAlias parameter was not found in the keystore file. This value is the alias name. |
| Action | Make sure that the alias name exists in the specified keystore file, or the custom EncryptionKeyManager class if this class is set. |
| Explanation | The specified value of the aesAlias parameter matches a value already in the keystore file. This specified value is the alias name. The alias name on the aesAlias parameter must be different from an alias name in the keystore file. |
| Action | Make sure that the alias name on the aesAlias parameter is not used in the specified keystore file. |
| Explanation | The specified value of the aesAlias parameter is the alias name and was not found in the keystore file. |
| Action | Make sure that the alias name exists in the specified keystore file. |
| Explanation | The deleteEncryptionKey command and the regenEncryptionKey command are disabled when the custom EncryptionKeyManager class is used. You must use other means to delete the encryption key or to replace the encryption key. |
| Action | To replace the encryption key, use the modifyPasswordEncryption command. To delete the key, contact the owner of the custom EncryptionKeyManager class for the instructions. |
| Explanation | The regenEncryptionKey command is used to create a new encryption key. However, the command cannot be processed because the AES encryption is not set as the default encryption. |
| Action | Set AES encryption as the default encryption. |
| Explanation | The specified value of the aesAlias parameter is set as the current alias in the properties file. The corresponding key was not removed from the keystore. |
| Action | Make sure that the alias is not set as the current alias in the properties file. Use the regenPasswordEncryptionKey command or the modifyPasswordEncryption command to change the current alias. |
| Explanation | To remove a key from a keystore file, the keystore file must have at least two keys in it. |
| Action | Make sure that the keystore file contains two or more keys before you attempt to remove a key. Use the listPasswordEncryptionKeys command to list the aliases of the keys in the keystore file. |
| Explanation | Enabling AES encryption failed because at least one node does not support AES encryption in the cell. A node might not support AES encryption because the node might contain an older release of the product that does not support AES encryption. |
| Action | Make sure that all the nodes in the cell support AES encryption. If a node does not support the encryption, either migrate the node to a product version that supports the encryption, or remove the node from the cell. |
| Explanation | The operation did not complete because the cell name was not set. |
| Action | Set the cell name. For the client environment, set the JVM system property of local.cell to a valid cell name. |
| Explanation | The operation did not complete because the profile name was not set. |
| Action | Set the JVM system property of user.install.root to a valid cell name. |
| Explanation | The specified path name on the clientPropsLocation parameter does not exist or is not a directory. |
| Action | Make sure that the directory on the clientPropsLocation parameter exists. |
| Explanation | The path name, which is specified by the parameter, is not the absolute path name. |
| Action | Make sure that the value is the absolute path name. |
| Explanation | When the updatePws parameter is set to false, the deleteAesFiles parameter must be set to false. |
| Action | Make sure that the value of the deleteAesFiles parameter is set to false. |
| Explanation | The specified value of the aesAlias parameter is associated with a key in the kesytore file and is used for encrypting the password in the configuration file. Because of the association, the key could not be deleted from the keystore file. |
| Action | Move the AES association from the existing key to another key by generating another key in the keystore file. Use the regenPasswordEncryptionKey command or the modifyPasswordEncryption command to encrypt the passwords onto a different key. Since the passwords are no longer associated with the existing key, delete the existing key. |
| Explanation | Passwords can only be updated when the clientPropsLocation parameter of the passwordUtil.properties file is set as the default. |
| Action | No action is required. |
| Explanation | The passwords in the configuration directory are only updated when the clientPropsLocation parameter of the passwordUtil.properties file is set as the default. |
| Action | Make sure that the clientPropsLocation parameter is only set to the default. |
| Explanation | The key cannot be deleted because the passwords in the config directory are encrypted by the key. |
| Action | Set the deleteOldKey parameter to false when the updatePwd parameter is set to false. Alternatively, set the updatePwd parameter to true. Then delete the key. |
| Explanation | The node being federated does not suppport AES password encryption. If you want to use AES password encryption, then both the node and the deployment manager must be at a version of the product that supports AES password encryption, although they do not have to be at the same version of the product. |
| Action | Upgrade the node to a version of the product that supports AES password encryption prior to federating the node. Alternatively, in the deployment manager, disable AES password encryption and encode the passwords by xor encoding in the config directory. |
| Explanation | The certificate expiration monitor started as scheduled. |
| Action | No action is required. |
| Explanation | The SSL configuration refreshes when the certificate expiration monitor finishes checking the certificates in the keystores. |
| Action | No action is required. |
| Explanation | The changes made by the certificate expiration monitor are saved to the configuration workspace. |
| Action | No action is required. |
| Explanation | If the certificate is updated, the SSL configuration refreshes. |
| Action | No action is required. |
| Explanation | The personal certificate is still referenced by other configurations. To avoid corrupting these configurations, references to the personal certificate must be removed before the personal certificate is deleted. |
| Action | Make sure that references to the personal certificate are removed from all configurations before the certificate is deleted. |
| Explanation | To create a certificate, you must provide a valid key usage value. |
| Action | Provide one or more values from the list of valid key usage values. |
| Explanation | To create a certificate, you must provide a valid extended key usage value. |
| Action | Provide one or more values from the list of valid extended key usages. |
| Explanation | When you specify a certificate alias to generate a new certificate, you must provide a keystore name for the certificate that you want to replace. |
| Action | Specify a certificate alias that provides the name of the keystore file where the certificate that you want to replace is located. |
| Explanation | You cannot create a certificate with a new signatureAlgorithm parameter value unless the certificate is a self-signed. Chained certificates inherit the signatureAlgorithm parameter value from the certificate that signs them. |
| Action | Specify the signatureAlgorithm parameter only when you generate and replace self-signed certificates. |
| Explanation | The key set group is still in use by the LTPA authentication mechansim and can not be removed. |
| Action | Ensure the LTPA authentication mechanism is not actively using the key set group prior to removing. |
| Explanation | The DNS name value in a Subject Alternative Name extension cannot start with a digit and must contain only letters, digits, hyphens, and periods. |
| Action | Specify a DNS name value that does not start with a digit and contains only of letters, digits, hyphens, and periods. |
| Explanation | A certificate request cannot be created when the certificate request file path has spaces in it. |
| Action | Specify a certificate request file path that does not contain spaces and create the certificate request. |
| Explanation | When you specify a subjectDN parameter to generate a new certificate, you must provide the keystore name, and certificate alias parameters of the certificate you want to replace. |
| Action | Specify the keystore name and certificate alias parameters when trying to generate a certificate with a new subjectDN. |
| Explanation | All nodes within the cell must be version 8.5.5.28 or later to support FIPS 140-3. |
| Action | Upgrade all nodes to version 8.5.5.28 or later to support FIPS 140-3. |
| Explanation | IBM Java version 8.0.8.30 or later to is required support FIPS 140-3. |
| Action | Upgrade IBM Java to version 8.0.8.39 or later to support FIPS 140-3. |