Start of change

Encryption Facility considerations when changing Java release levels

IBM Java Technology Edition, Version 7 Release 1 and earlier allowed for the creation of and the use of X.509 certificates with a null distinguished name (DN). X.509 certificates with a null DN are invalid because they are essentially certificates with no identity and may not be accepted by other products. While it is unlikely that you would be using an X.509 certificate with a null DN, it is possible. Because IBM Java Technology Edition, Version 8 and later no longer supports X.509 certificates with a null DN, Java keystores will not load and are unusable if they contain a null DN. Therefore, X.509 certificates with a null DN must be removed prior to migrating to IBM Java Technology Edition, Version 8 or later.

Before migrating to IBM Java Technology Edition, Version 8 or later, use Encryption Facility's list commands (-pA or -pK) to determine if you have any X.509 certificates with a null DN and then use Encryption Facility's delete commands (-xA or -xK) to remove them.

If you migrate to IBM Java Technology Edition, Version 8 or later before removing all X.509 certificates with a null DN, you will need to remove these with other tooling (for example, Java keytool) or migrate back to your previous IBM Java level and use Encryption Facility's delete commands (-xA or -xK) to remove them.

With the latest level of service, Encryption Facility checks for and does not allow the creation of a X.509 certificate with a null DN.

Note: IBM Java keystores created with IBM Java Technology Edition, Version 7 or later cannot be accessed by IBM Java Technology Edition, Version 6.0.1 or earlier due to stronger encryption. Once you have migrated to IBM Java Technology Edition, Version 7 or later, it is not recommended that you migrate to a prior IBM Java version.

For more information, see http://www-01.ibm.com/support/docview.wss?uid=isg3T1022007.

Note: Before deleting an X.509 certificate, ensure that you do not have data encrypted using the public key within it. Data encrypted using the public key must be decrypted and then encrypted using another public key before you delete the X.509 certificate and its public key.
End of change