| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | An unexpected exception occurred when trying to create or register an mBean. |
| Action | There might be a problem with the configuration. The exception might include details. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | An unexpected error occurred during security initialization. |
| Action | This is a general error. Look for previous messages that are related to SSL initialization or to a configuration problem. Enabling SSL=all=enabled debug trace might yield additional information. |
| Explanation | The security object cannot be created from the repository. This is an internal error. The security.xml file might be corrupted or missing. |
| Action | Contact your service representative. |
| Explanation | This exception is unexpected. The cause is not immediately known. |
| Action | If the problem persists, additional information might be available if you search for the message ID on the following Web sites: WebSphere Application Server Support page: http://www.ibm.com/software/webservers/appserv/was/support/ WebSphere Application Server for z/OS Support page: http://www.ibm.com/software/webservers/appserv/zos_os390/support/ . |
| Explanation | The specified resource could not be loaded due to an exception. |
| Action | Check for a configuration problem related to the resource. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | When the server is running in FIPS mode, the IBMJCEFIPS provider should be listed in the java.security file, and positioned before the IBMJCE provider in the list. |
| Action | To ensure FIPS algorithms usage for all WebSphere Application Server process types, uncomment the IBMJCEFIPS provider in the java.security file, check that it is positioned before the IBMJCE provider in the list, and renumber the provider list in sequential order. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | An unexpected error occurred while stopping the SSL component. |
| Action | This is a general error. Look for previous messages that are related to the error or to a configuration problem. Enabling SSL=all=enabled debug trace might yield additional information. |
| Explanation | A certificate is about to expire in the keystore. |
| Action | Open the keystore and validate the expiration dates on all certificates in the keystore. Generate new certificates, if necessary. |
| Explanation | A certificate is expired in the keystore. |
| Action | Open the keystore and validate the expiration dates on all certificates in the keystore. Remove any expired certificates. |
| Explanation | The type of keystore that has been configured is not valid for the specified alias. |
| Action | Change the keystore type in the SSL configuration. |
| Explanation | There might be a problem with the syntax of the ssl.client.props file or the location of the file might not be valid. |
| Action | Review the error returned and check the syntax and location of the ssl.client.props file. |
| Explanation | A class loading error occurred loading the custom trust manager that is configured. |
| Action | Ensure the class can be found in the environment. |
| Explanation | A class loading error occurred loading the custom key manager that is configured. |
| Action | Ensure the class can be found in the environment. |
| Explanation | An error occurred during the SSL handshake. It might require a signer export/import from the target host to the client TrustStore. |
| Action | Review the extended error message from the TrustManager to determine what needs to change between the target SSL configuration and the client SSL configuration. |
| Explanation | The certificate alias specified for this SSL configuration is not in the specified KeyStore or it was found to be invalid. An expired certificate is one example of an invalid certificate. |
| Action | Either add a certificate into the KeyStore with the specified certificate alias, or replace or renew the invalid certificate with the specified certificate alias found in the client KeyStore. |
| Explanation | The certificate alias specified for this SSL configuration is not in the specified KeyStore or it was found to be invalid. An expired certificate is one example of an invalid certificate. |
| Action | Either add a certificate into the KeyStore with the specified certificate alias, or replace or renew the invalid certificate with the specified certificate alias found in the server KeyStore. |
| Explanation | There was a classloading error trying to load the HTTPS URLStreamHandler class. |
| Action | Check the SSL configuration to ensure the context provider is correct for the platform. |
| Explanation | A change was made to the security.xml file. An error occurred when the system then tried to read the changed configuration. |
| Action | Review the exception message text and verify the SSL configuration parameters are valid. |
| Explanation | JSSE URL hostname verification checks that the X509 Certificate Common Name (CN) matches the hostname it is from. This hostname verification check is being set to be disabled by default for URL connections. |
| Action | To enable default JSSE URL hostname verification, set the com.ibm.ssl.performURLHostNameVerification property to true. |
| Explanation | The handshake protocol specified is not recognized as a valid handshake protocol. |
| Action | Check the SSL configuration to ensure the correct handshake protocol is specified. |
| Explanation | The SSL context provider specified is not recognized as a valid context provider. |
| Action | Check the SSL configuration to ensure the correct SSL context provider is specified. |
| Explanation | The DefaultKeyStores between cell and node will have exchange signers with corresponding DefaultTrustStores. An error occurred during this process. |
| Action | A manual signer exchange might be required. |
| Explanation | An error occurred while creating the file-based keystore or truststore during process initialization. |
| Action | Check that the keystore or truststore settings in the ssl.client.props are current and valid. |
| Explanation | An error occurred during process startup while creating this certificate. |
| Action | Check that the default self-signed certificate property values (com.ibm.ssl.defaultCertReq*) are valid. |
| Explanation | An error occurred while creating or opening the keystore. |
| Action | Check the properties in the keystore configuration and ensure the keystore exists. |
| Explanation | An error occurred while initializing the schedule. |
| Action | Check that the properties for the scheduler are valid. Ensure the /etc directory is writable. |
| Explanation | An error occurred reading the date from the schedule file in /etc. |
| Action | Ensure the /etc directory is writable and the file has not been modified. |
| Explanation | An error occurred sending email to the specified SMTP server. |
| Action | Ensure the SMTP server specified is valid and that your company firewall policy allows sending to SMTP ports. |
| Explanation | This information concerns certificate expiration. |
| Action | You may need to manage certificates to resolve the reported problems. |
| Explanation | A problem occurred starting the expiration monitor command task. |
| Action | Try starting the expiration monitor directly to determine more information about the error. |
| Explanation | The hostname must be entered in the hostlist in the same canonical format as it appears in the serverindex.xml file. |
| Action | Edit the hostlist to convert it to the required canonical format. |
| Explanation | The server SSL signer has to be added to the client trust store. The signers can either be downloaded autonatically from the server, or provided manually during the connection attempt. |
| Action | Either run the retrieveSigners utility or enable the signer exchange prompt. |
| Explanation | When the server starts for the first time as a stand-alone application server or in a Network Deployment configuration, each server creates a keystore and truststore for the default Secure Sockets Layer (SSL) configuration. When the server creates these files, by default, it uses WebAS for the password. |
| Action | Do not use the default password in production. Change the default password for the keystore and the truststore by editing the ssl.client.props file. When you change the passwords in the ssl.client.props file, you must use the PropFilePasswordEncoder utility to re-encode the new passwords. |
| Explanation | After creating a chained or self-signed certificate, the corresponding signer certificate could not be stored in the issued certificates key store. |
| Action | Check the associated error information for the cause of the problem. |
| Explanation | An error occurred while creating a chained certificate during process startup. |
| Action | Check that the default chained certificate property values (com.ibm.ssl.defaultCertReq*) are valid and that a valid certificate exists in the root key store. |
| Explanation | There is a configuration problem with custom encryption. |
| Action | Review the exception and logs to identify and resolve the issue with custom encryption. |
| Explanation | A custom encrypted password was received, but the necessary custom algorithm required to use it is not configured. |
| Action | Configure the necessary custom algorithm. |
| Explanation | It was not possible to get the initilization status of the specified HW crypto provider. |
| Action | Ensure that the HW crypto provider is functioning and configured correctly. |
| Explanation | It was not possible to get an instance of the specified HW crypto provider. |
| Action | Ensure that the HW crypto provider is functioning and configured correctly. |
| Explanation | It was not possible to get an instance of the specified HW crypto provider for the given reasons. |
| Action | Ensure that the HW crypto provider is functioning and configured correctly. |
| Explanation | Although UseFIPS has been enabled, the FIPS-approved cryptographic algorithms cannot be used because the SSL configuration is not using a FIPS-approved JSSE Provider. |
| Action | To ensure the use of FIPS-approved cryptographic algorithms, modify the SSL configuration to use a FIPS-approved JSSE Provider. |
| Explanation | The default serverIdentity certificate does not have subject alternative name in the keyStore. The hostName verification check is skipped for serverIdentity certificates |
| Action | Open the keyStore and check the subject alternative name on all certificates in the keyStore. Use the genKey and genKeyController commands to generate new certificates to enable the hostname verification. |
| Explanation | Hostname verification must be enabled to ensure that the hostname in the URL that the client is connecting to matches the hostname in the certificate that the server sends back during the TLS/SSL communication. |
| Action | Enable hostname verification by setting the com.ibm.ssl.verifyHostname security custom property to true. |
| Explanation | The KeySet either does not have a keyGenerationClass defined, or it cannot find the keyGenerationClass, or a read-only KeyStore is associated with the KeySet, or the KeyStore does not allow the writing of secret keys. |
| Action | Modify the configuration so that a proper keyGenerationClass is configured and a KeyStore type is configured that allows the writing of secret keys. |
| Explanation | An error occurred while retrieving keys from the KeyStore for the specified KeySet. |
| Action | Check that the KeySet configuration is correct. |
| Explanation | Either the runtime could not find the key generation class configured for the KeySet or the class does not implement either com.ibm.websphere.crypto.KeyGenerator or com.ibm.websphere.crypto.KeyPairGenerator. |
| Action | Ensure the key generation class configured is specified in a location that can be found by the application server runtime environment. Check the information center for specifying custom classes so that the runtime environment can find them. |
| Explanation | The keys passed as input might not have been correctly formed or the keystore could not be accessed to store them. |
| Action | Determine the cause based on the exception, then adjust the configuration accordingly. |
| Explanation | A problem occurred while a new key reference was being created for the specified KeySetGroup. After the key reference was created in the configuration, the key was generated. One of these steps did not succeed. |
| Action | Determine the cause based on the exception, then adjust the configuration accordingly. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | There's a problem writing to the specified log file. |
| Action | Change the log file path or make sure the file specified is not in use. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | The remote keystore is not found. |
| Action | Issue -listRemoteKeyStoreNames command to get the list of names. |
| Explanation | The alias specified was not found in the truststore. |
| Action | Issue -listRemoteKeyStoreNames command to get the list of names. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | The local keystore is not found. |
| Action | Try issuing -listLocalKeyStoreNames command to get the list of names. |
| Explanation | The start date of the certificate is not valid. |
| Action | Ensure that the client clock matches up with the server clock. Otherwise, create a certificate with the proper start date. |
| Explanation | The certificate has expired. |
| Action | Replace the certificate with a valid certificate. |
| Explanation | Check the command line to ensure the specified option is correct. |
| Action | Check the usage help and retry after correcting the option. |
| Explanation | Check the command line to ensure the specified options are correct. |
| Action | Check the usage help and retry after correcting the option. |
| Explanation | There are no SSL configuration properties set. The property 'com.ibm.SSL.ConfigURL' might not be set properly, or there might have been an error parsing the SSL client configuration. |
| Action | Check the ssl.client.props file for errors and make sure 'com.ibm.SSL.ConfigURL' is set property. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | There is a problem writing to the specified log file. |
| Action | Change the log file path to the correct log file, or make sure the file specified is not in use. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | The specified option is not correct. |
| Action | Check the usage help, then retry after correcting the option. |
| Explanation | A specified option is not correct. |
| Action | Check the usage help, then retry after correcting the option. |
| Explanation | An attempt to load the custom PKI client implementation failed because the class could not be found by the classloader. |
| Action | Check that the custom class exists in the classes directory for your inatallation. |
| Explanation | An attempt to load the custom PKI client implementation did not succeed because the class is not an instance of com.ibm.ws.ssl.WSPKIClient. |
| Action | Check that the custom class implements com.ibm.ws.ssl.WSPKIClient. |
| Explanation | The certificate specified is not a personal certificate. |
| Action | Rerun the command with a personal certificate alias name. |
| Explanation | The system could not receive the certificate from the Certificate Authority (CA) because the public keys do not match. |
| Action | Rerun the command using a certificate retrieved from a Certificate Authority (CA) that was generated with the certificate request coming form this specified alias in this keystore. |
| Explanation | The local keyStore is not found. |
| Action | Check that the keyStore exists on the client and has an alias in ssl.client.props. |
| Explanation | In order to receive a certificate in a keystore the public key of the certificate must match the public key of a certificate in the keystore. |
| Action | Run the command with a certificate that has a public key that matches the public key of a certificate in the keystore. |
| Explanation | The certificate request was not processed immediately by the Certificate Authority (CA) and must be obtained out-of-band. |
| Action | Run queryCertificate to check on the status of the certificate and receive it if the request has been processed. |
| Explanation | The value provided is not of the correct type. |
| Action | Check the usage help and retry after correcting the type of the value. |
| Explanation | A proper value was not provided on the command line. |
| Action | Check the usage help, then retry after correcting the option. |
| Explanation | An error occurred while initializing the Certificate Authority (CA) implementation. |
| Action | Check the associated error message. |
| Explanation | An error occurred while attempting to create a Certificate Authority (CA) signed certificate. |
| Action | Check the associated error message. |
| Explanation | An error occurred while attempting to revoke a Certificate Authority (CA)) signed certificate. |
| Action | Check the associated error message. |
| Explanation | An error occurred while attempting to query the certificate authority (CA) for a signed certificate. |
| Action | Check the associated error message. |
| Explanation | The system is trying to write a received certificate to a read-only keystore. |
| Action | Specify a keystore that is writable. |
| Explanation | The certificate request received from the Certificate Authority (CA) could not be stored successfully in the specified keystore. The certificate has therefore been revoked and you need to retry the request to obtain a new certificate. |
| Action | Check the previous error messages related to storing the keystore, and correct the issues arising, then retry the certificate request. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | The PKCS10 certifcate request could not be created becasue of the specified error. |
| Action | Check the message logs for details. |
| Explanation | The system could not create the certificate request because the alias specified already exists in the keystore. |
| Action | Specify another alias name. |
| Explanation | The subjectDN supplied does not conform to the X500Principal standard. |
| Action | Check the subjectDN and ensure that it is in the correct form. |
| Explanation | One or more provided options were not recognized and will be ignored. |
| Action | Check the command usage and ensure the arguments supplied are correct. |
| Explanation | The custom attributes were not entered in the proper form. |
| Action | Check the usage help, then retry after correcting the custom attributes. |
| Explanation | The attribute passed to the implementation is null or not of the correct type. |
| Action | Ensure that the required attribute is passed to the implementation. |
| Explanation | The byte array of the certificate request is null. |
| Action | Check that a valid certificate request byte array is passed to the implementation. |
| Explanation | The byte array of the revocation password for this request is null. |
| Action | Check that a valid revocation password byte array is passed to the implementation. |
| Explanation | This exception is unexpected. The cause is not immediately known. |
| Action | If the problem persists, additional information might be available if you search for the message ID on the following Web sites: WebSphere Application Server Support page: http://www.ibm.com/software/webservers/appserv/was/support/ WebSphere Application Server for z/OS Support page: http://www.ibm.com/software/webservers/appserv/zos_os390/support/ . |
| Explanation | The temporary file could not be written to the file system. |
| Action | Ensure the path to the temporary file exists, is writable, and has space available. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | The specified error occurred when requesting the certificate. |
| Action | Check the log file for detailed error information. |
| Explanation | The specified error occurred when revoking the certificate. |
| Action | Check the log file for detailed error information |
| Explanation | The specified error occurred when querying the certificate. |
| Action | Check the log file for detailed error information. |
| Explanation | No valid certificate chain is available to the implementation. |
| Action | Check that a valid certificate chain is being passed to the implementation. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | A request to revoke a Certificate Authority (CA) signed certificate has been issued. |
| Action | Verify with the external Certificate Authority (CA) that the certificate has been successfully revoked. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | An error occurred adding the IBMJCEFIPS cryptographic module. Initialization of the server will continue, but SSL support may not be available. |
| Action | If the problem persists, additional information might be available if you search for the message ID on the following Web sites: WebSphere Application Server Support page: http://www.ibm.com/software/webservers/appserv/was/support/ WebSphere Application Server for z/OS Support page: http://www.ibm.com/software/webservers/appserv/zos_os390/support/ . |
| Explanation | An error was encountered while creating the default SSL configuration. |
| Action | If the problem persists, additional information might be available if you search for the message ID on the following Web sites: WebSphere Application Server Support page: http://www.ibm.com/software/webservers/appserv/was/support/ WebSphere Application Server for z/OS Support page: http://www.ibm.com/software/webservers/appserv/zos_os390/support/ . |
| Explanation | The SSL certificate does not exist and will be generated automatically. This may take a few seconds. Any services requiring SSL will not start until the SSL certificate has been generated and the configuration is ready. |
| Action | No action is required. |
| Explanation | The SSL certificate was generated in the amount of time specified. |
| Action | No action is required. |
| Explanation | The SSL certificate could not be created at the specified location. |
| Action | Ensure the location is accessible by the server process. Review the FFDC logs for additional errors that are associated with generating or loading the keys. |
| Explanation | The keystore configuration does not specify a password for the default keystore. |
| Action | Modify the default keystore configuration to specify a password. |
| Explanation | The keystore configuration does not contain all the information needed. |
| Action | Modify the keystore configuration object to contain the keystore's location and type. |
| Explanation | The keystore location references a location that does not exist. |
| Action | Change the keyStore location to a file that valid path. |
| Explanation | The keystore configuration requires a password of at least 6 characters in order to create the default keystore. |
| Action | Modify the default keystore configuration to specify a password of at least 6 characters. |
| Explanation | The keystore file does not exist or the keystore type or password is not correct so any SSL configuration that references the keystore will is not be usable. |
| Action | Fix the problem with the keystore configuration. |
| Explanation | This message is for informational purposes only. |
| Action | No action is required. |
| Explanation | The keystore file specified was modified and the runtime will start using the updated keystore file. |
| Action | No action is required. |
| Explanation | There was an error while trying to recover the key from the keystore file. There may be a problem with the key or the key password is not correct. |
| Action | Check the keystore to make sure the key entry exists and make sure the correct password is configured to access the key entry. |
| Explanation | There was an error while trying to initialize the keymanager. Unable to create an SSLContext when the private key password is not correct or when a keystore that has multiple keys with different passwords. |
| Action | Ensure the private key password is correct and the keystore does not have multiple keys with different passwords before using the keystore for SSL connections. |
| Explanation | There is something wrong with the hardware configuration preventing the keystore from being useable. If there is an SSL configuration that is referencing this keystore it will not be useable. |
| Action | Ensure that the hardware configuration file contains the required attributes, name and library. Make sure other attributes in the configuration file follow the hardware device specification. |
| Explanation | Conflicting OutboundConnection elements are defined in the server configuration. To determine the outbound SSL configuration, the server uses the first OutboundConnection element that it processes. |
| Action | Review the conflicting OutboundConnection elements in the server configuration, and remove the element that you do not need. |
| Explanation | The outboundConnection element with an asterisk (*) as the host and port is in conflict with the outboundSSLRef attribute that is configured. The server uses the SSL configuration that is specified by the outboundSSLRef attribute. |
| Action | Review the conflicting configuration and determine which configuration to use as the default SSL configuration. Remove the configuration that you do not need. |
| Explanation | SSL initialization has been attempted because the ssl feature has been loaded. The initialization could not complete, because the default SSL configuration expects a keystore element with the specified id value and a password. The keyStore element is missing, or the password is not specified. |
| Action | If SSL is not required, this message can be ignored. If SSL is required, review the configuration and either add the missing keystore, or change the default SSL configuration to use a different keystore. |
| Explanation | The default SSL configuration expects a keystore element, which does not exist. |
| Action | Review the configuration and either change the configuration to reference an existing keystore, or define the referenced keystore. |
| Explanation | The default keystore is not created because a password is not configured on the <keyStore id="defaultKeyStore"/> element, and the 'keystore_password' environment variable is not set. |
| Action | No action is required. |
| Explanation | The default keystore has been created using the 'keystore_password' environment variable. This is generated into the server.env file during server creation, or overridden in the environment the server was launched from. |
| Action | No action is required. |
| Explanation | The default keystore at the specified location and keystore type has been loaded. |
| Action | No action is required. |
| Explanation | With a minimal default keystore configuration, and with both a key.jks file and key.p12 file defined in the default keystore location, the key.jks file will be used as the default keystore. |
| Action | To make the key.p12 file the default keystore, either change the keystore configuration to specify the key.p12 location or remove the key.jks file from the configuration. To have the key.jks file as the default keystore, no changes are needed. |
| Explanation | An error occurred during the SSL handshake. It might require a signer export/import from the target host to the client TrustStore. |
| Action | Review the extended error message from the TrustManager to determine what needs to change between the target SSL configuration and the client SSL configuration. |
| Explanation | An error occurred during the SSL handshake. Host name verification is enabled and server's identity can not be verified. The host name used to access the server does not match the server certificate's Subject Alternative Name information or SubjectDN . |
| Action | When host name verification is enable the server's being accessed needs to be setup with a certificate contain the proper information needed to verify the server's identity. |
| Explanation | The default truststore did not initialize because it could not be retrieved from the trust manager. The default truststore is not used for trust. Only the configured SSL configuration is used. |
| Action | Ensure that the default truststore file exists and is accessible |
| Explanation | The certificate that is specified in the environment variable cannot be accessed and is not included in the truststore. This problem might be caused by the environment variable, the file name, or the certificate. A failure to add the certificate does not invalidate the SSL configuration, but it might cause problems with establishing trust for outbound connections. |
| Action | This problem might result from various causes. Ensure that the environment variable or file is populated with a base 64-bit certificate. |
| Explanation | The default truststore and the truststore that is configured for the SSL configuration are both used for trust. |
| Action | No action is required. |
| Explanation | The default truststore is not properly configured to establish trust. |
| Action | Review the extended error message to determine what to change in the configuration. |
| Explanation | The SSL certificate could not be updated at the specified location. |
| Action | Ensure the location is accessible by the server process. Review the FFDC logs for additional errors that are associated with generating or loading the keys. |
| Explanation | A certificate was retrieved from an environment variable in the configuration and is being added to the keystore file. |
| Action | No action is required. |
| Explanation | The protocol that is provided cannot be used. An error occurs on trying to get an SSLContext instance with the protocol value. |
| Action | Ensure that the configuration uses valid SSL/TLS protocol values for this JVM. |
| Explanation | The protocol value is not valid in a protocol list grouping. |
| Action | Ensure that the list of SSL/TLS protocols includes only values that are appropriate for a protocol list. |
| Explanation | The SSL configuration attributes has an error that prevents SSLContext creation. |
| Action | Ensure that the SSL configuration attributes are correct. Review the logs for additional errors associated with SSL configuration attributes. |
| Explanation | The specified SSL/TLS configuration contains an error that prevented it from being set as the process default SSL configuration. |
| Action | Ensure that the SSL configuration attributes are correct. Review the logs for errors that are associated with SSL configuration attributes. |
| Explanation | An error in the configuration prevented the key manager from being created. |
| Action | Ensure that the SSL configuration attributes are correct. Review the logs for errors that are associated with SSL configuration attributes. |
| Explanation | An error in the configuration prevented the key and trust managers from being created. |
| Action | Ensure that the SSL configuration attributes are correct. Review the logs for errors that are associated with SSL configuration attributes. |
| Explanation | The challenge status indicated that the authorization challenge request failed and a certificate cannot be created. |
| Action | Review the status message and error for details on the failure. |
| Explanation | The certificate authority challenge request was not validated in the configured time and a certificate cannot be created. |
| Action | Review the configured certificate authority URI. Verify that the URI can be successfully accessed by the calling server. Verify that the calling server can receive a response from the certificate authority. Review the status code. Some certificate authorities might require a longer timeout. |
| Explanation | The order status indicated that the authorization order request failed and a certificate cannot be created. |
| Action | Review the status message and error for details on the failure. |
| Explanation | The certificate authority domain certificate order request did not complete in the configured time and a certificate cannot be created. |
| Action | Review the configured certificate authority URI. Verify that the URI can be successfully accessed by the calling server. Verify that the calling server can receive a response from the certificate authority. Review the status code. Some certificate authorities might require a longer timeout. |
| Explanation | The certificate authority returned a challenge type that is currently unsupported. Verify that the certificate authority uses a type in the supported list. |
| Action | Select a certificate authority that provides a supported challenge type. |
| Explanation | The certificate authority provides terms of service. |
| Action | Review the provided terms of service. |
| Explanation | The ACME service successfully retrieved and installed a certificate from the configured certificate authority. |
| Action | No action is required. |
| Explanation | The certificate authority directory URI was not configured correctly. |
| Action | Enter a valid ACME certificate authority directory URI in the configuration. |
| Explanation | The challenge request failed and a certificate cannot be created. |
| Action | Review the error message for details on the failure. |
| Explanation | The challenge update failed and a certificate cannot be updated. |
| Action | Review the error message for details on the failure. |
| Explanation | The certificate order creation failed and a signed certificate cannot be requested. |
| Action | Review the error message for details on the failure. |
| Explanation | The certificate order was created, but signing the request failed and a signed certificate cannot be requested. |
| Action | Review the error message for details on the failure. |
| Explanation | The certificate order was created and signed, but ordering the certificate from the certificate authority failed. |
| Action | Review the error message for details on the failure. |
| Explanation | Encoding the certificate signing request failed and a signed certificate cannot be created. |
| Action | Review the error message for details on the failure. |
| Explanation | An order is completed asynchronously by the certificate authority. The ACME service received an error while checking on the status of the order. A signed certificate cannot be requested. |
| Action | Review the error message for details on the failure. |
| Explanation | An existing account was not found or another error occurred. Changes cannot be made to the account or certificate. |
| Action | Review the error message for details on the failure. Verify that the URI can be successfully accessed by the calling server. Verify that the calling server can receive a response from the certificate authority. |
| Explanation | The terms of service for the ACME certificate authority cannot be logged. |
| Action | Review the error message for details on the failure. Visit the ACME certificate authority website to review the terms of service. |
| Explanation | The user account creation request failed. |
| Action | Review the error message for details on the failure. |
| Explanation | The account was successfully created. |
| Action | No action is required. |
| Explanation | The domain key file for the certificate authority account could not be opened. This can occur if file permissions are incorrect or if the file does not exist. |
| Action | Review the error message for details on the failure. Verify that the file location is correct and the server has read file permissions. |
| Explanation | The account key file for the certificate authority account could not be opened. This can occur if file permissions are incorrect or if the file does not exist. |
| Action | Review the error message for details on the failure. Verify the file location is correct and the server has read file permissions. |
| Explanation | The domain keys could not be stored in the domain key file. This can occur if the file permissions are incorrect or the file does not exist. |
| Action | Review the error message for details on the failure. Verify the file location is correct and the server has write file permissions. |
| Explanation | The account keys could not be stored in the account key file. This can occur if the file permissions are incorrect or the file does not exist. |
| Action | Review the error message for details on the failure. Verify the file location is correct and the server has write file permissions. |
| Explanation | A certificate revoke request failed. The certificate might not be revoked and could still be in use. |
| Action | Review the error message for details on the failure. |
| Explanation | The request failed because the account key pair could not be loaded. |
| Action | Review the log for any earlier errors for details on the failure. |
| Explanation | The request failed because the account was not found. |
| Action | Review the certificate authority URI. |
| Explanation | The file path was null or empty and cannot be used for the domain and account keys. |
| Action | Provide a valid file path in the configuration. |
| Explanation | The certificate authority could not be contacted and a signed certificate cannot be requested. |
| Action | Review the error message for details on the failure. Review the configured certificate authority URI. Verify that the URI can be successfully accessed by the calling server. Verify that the calling server can receive a response from the certificate authority. |
| Explanation | The keystore could not be accessed while checking for an existing certificate. The request to fetch a new certificate will not be completed because the keystore cannot be accessed. |
| Action | Review the error message for details on the failure. Verify the file location is correct and the server has write file permissions. |
| Explanation | The ACME service received a new certificate from the certificate authority but the certificate cannot be installed locally. |
| Action | Review the error message for details on the failure. |
| Explanation | The certificate subject name must be formatted as a distinguished name as defined by RFC 2253, similar to a distinguished name that is used in an LDAP server. |
| Action | Review the error message for details on the failure. Revoke or remove the invalid certificate. |
| Explanation | The certificate is an invalid DER-encoded certificate or contains unsupported DER features. |
| Action | Review the error message for details on the failure. Revoke or remove the invalid certificate. |
| Explanation | The request to update the account failed due to the specified error. |
| Action | Review the error message for details on the failure. Verify that the account key file is for a valid account. |
| Explanation | The ACME service fetched a new certificate, but creating or initializing a keystore for storing the certificate failed. |
| Action | Review the error message for details on the failure. |
| Explanation | The certificate was successfully retrieved from the certificate authority, but it cannot be stored locally. |
| Action | Review the error message for details on the failure. Verify the keystore file location is correct and the server has write file permissions. |
| Explanation | The application used to complete a certificate request did not start in the expected time frame. If the application starts, the request proceeds. If the application does not start, the certificate request fails. |
| Action | Review the log for earlier messages or errors. Review the log for a CWWKT0016I message that includes a web application with the ''acme-challenge'' URL to indicate that the internal application started. |
| Explanation | The domains were either null or empty and cannot be used. |
| Action | Provide at least one non-null, non-empty domain in the configuration. |
| Explanation | The ACME service revoked the certificate and the certificate is no longer valid. |
| Action | No action is required. |
| Explanation | If the cn RDN value is included in the DN, it must match one of the defined domains. |
| Action | Provide either a subjectDN attribute value with a cn RDN value that matches one of the defined domains or a subjectDN attribute value that does not have the cn RDN included. |
| Explanation | If the cn RDN is defined, it must be the first RDN in the subjectDN configuration attribute. |
| Action | Provide a subjectDN attribute value that either defines the cn attribute as the first RDN, or does not contain the cn attribute. If the cn attribute is not defined, the first defined domain is used as the cn RDN value. |
| Explanation | The subjectDN attribute value contains an RDN that is not supported. |
| Action | Provide a subjectDN attribute value that does not contain unsupported RDN types. The following RDN types are supported: cn, o, ou, c, st, l. |
| Explanation | The subjectDN attribute must be a valid distinguished name. |
| Action | Provide a valid distinguished name as the subjectDN attribute value. |
| Explanation | The ACME service was not able to create an RDN from the specified value. |
| Action | Ensure the the domain included in the value is a valid RDN value. |
| Explanation | The ACME service expects all certificates in the certificate chain to be X.509 certificates. |
| Action | Ensure that all the certificates in the certificate chain are X.509 certificates and try again. |
| Explanation | The valid period on the certificate is in the future. SSL and TLS requests fail until the current date and time are within the range that is specified by the valid period on the certificate. |
| Action | Update the local time on the server if the time is incorrect. |
| Explanation | The specified revocation reason is not supported. |
| Action | Retry the request with a valid revocation reason. |
| Explanation | The ACME certificate authority returned an error during the account key pair renewal. |
| Action | Ensure that the existing account key pair is valid. Review the error message for details on the failure. |
| Explanation | The previous account key pair is no longer associated with the account and is backed up to a file. The new account key pair replaced the old account key pair file. |
| Action | No action is required. |
| Explanation | The key pair didn't renew or restore to the old key pair file. |
| Action | Manually replace the account key pair files as directed in the message. |
| Explanation | The existing account key pair file could not be backed up. |
| Action | Ensure that the directory that contains the existing account key pair file is writable. Review the error message for details on the failure. |
| Explanation | The value for the renewBeforeExpiration property was below the minimum duration to request a new certificate and is reset to the minimum renew time. This could have a negative impact on server performance. |
| Action | To avoid this warning message, set the renewBeforeExpiration property in the server configuration to a duration that is longer than the minimum renew time. To use the default setting, remove the renewBeforeExpiration property from the server configuration. |
| Explanation | The ACME service requests a new certificate based on the renewBeforeExpiration property in the server configuration and the expiration date of the certificate. If the renewBeforeExpiration property is not configured, the default value is used. |
| Action | No action is required. |
| Explanation | The SSL and TLS requests cannot complete because the certificate expired. |
| Action | Update the renewBeforeExpiration property in the server configuration to a value greater than 0 to automatically request a new certificate or use the ACME REST interface to request a new certificate. |
| Explanation | The value of the renewBeforeExpiration property was longer than the validity period of the certificate. The renewBeforeExpiration property is reset to the default value. |
| Action | To avoid this warning message, set the renewBeforeExpiration property in the server configuration to an amount that is less than the length of the validity period of the certificate. To use the default setting, remove the renewBeforeExpiration property. |
| Explanation | Frequent certificate requests can have a negative impact on server performance. The number of requests can also exceed the number allowed by the certificate authority. |
| Action | To avoid this warning message, set the renewBeforeExpiration property in the server configuration to a longer duration. To use the default setting, remove the renewBeforeExpiration property from the server configuration. |
| Explanation | The validity period is shorter than the minimum renew time. The certificate expires before a new certificate is requested. |
| Action | To avoid certificate expiration, request a certificate with a longer validity period. If the certificate authority supports a custom validity period, set the validFor property in the server configuration. |
| Explanation | The certificate revocation checker needs to build a Java certificate path validation tool to check OCSP and CRLs revocation status. |
| Action | Review the status message and error for details. |
| Explanation | Soft failures include network errors. The ACME service ignores soft errors as they might be temporary glitches. |
| Action | If this message is encountered consistently, the cause of the failure must be resolved as it might prevent proper revocation status checking. Otherwise, this warning can be safely ignored. |
| Explanation | The ACME service found that the certificate was marked revoked by either a CRL or OSCP responder. |
| Action | No action is required. |
| Explanation | The OCSP URL was not retrieved. |
| Action | Ensure that the certificate is a valid X.509 certificate. If it is not valid, request a new certificate. |
| Explanation | The CRL distribution points were not retrieved. |
| Action | Ensure that the certificate is a valid X.509 certificate. If it is not valid, request a new certificate. |
| Explanation | Certificate revocation checking requires a valid OCSP responder URL. |
| Action | Provide a valid OCSP responder URL in the server configuration. |
| Explanation | The certificate authority updated its terms of service and requires user interaction. |
| Action | Review the provided terms of service. |
| Explanation | The ACME service successfully requested a certificate. |
| Action | No action is required. |
| Explanation | The ACME service tried to renew a certificate but encountered an error. The ACME service continues to request a new certificate until a new certificate is issued. |
| Action | Review the error message for details on the failure. |
| Explanation | The ACME service tried to renew a certificate but encountered an error. The ACME service continues to request a new certificate until a new certificate is issued. SSL and TLS requests fail until a new certificate request is successful. |
| Action | Review the error message for details on the failure. |
| Explanation | When the ACME service detects that the certificate is revoked, it automatically requests a new certificate. |
| Action | No action is required. |
| Explanation | The ACME service started checking if the certificate is expiring or revoked, but failed. |
| Action | Review the error message for details on the failure. Review the certificate status using the ACME REST interface. If the certificate needs to be renewed, use the ACME REST interface to request a new certificate. |
| Explanation | The ACME service does not check for expiring or revoked certificates on an automated schedule. If the certificate expires or is revoked, SSL and TLS requests cannot complete unless the server is restarted or the REST interface is used to renew the certificate. |
| Action | No action is required. To enable automatic certificate checking, update the certCheckerSchedule property in the server configuration to a value greater than 0. |
| Explanation | The value for the certCheckerSchedule property was below the minimum duration to check for expiring or revoked certificates and is reset to the minimum schedule time. |
| Action | To avoid this warning message, set the certCheckerSchedule property in the server configuration to a duration that is longer than the minimum schedule time. To use the default setting, remove the certCheckerSchedule property from the server configuration. |
| Explanation | The value for the certCheckerErrorSchedule property was below the minimum duration to check for expiring or revoked certificates and is reset to the minimum schedule time. |
| Action | To avoid this warning message, set the certCheckerErrorSchedule property in the server configuration to a duration that is longer than the minimum schedule time. To use the default setting, remove the certCheckerErrorSchedule property from the server configuration. |
| Explanation | The ACME service was unable to access the historical ACME file. |
| Action | Ensure that the historical ACME directory has read and write permissions. |
| Explanation | The value for the accountContact property was not specified in the server configuration. |
| Action | Set the accountContact property in server configuration. |
| Explanation | The service attempts a certificate request. If an HTTP port is open, the request proceeds. If an HTTP port is not open, the certificate request fails. |
| Action | Review the log for earlier messages or errors. Review the log for CWWKO0219I messages, which lists available endpoints and ports. |