SMP/E to download Broadcom maintenance getting GIM69221W or GIM69181S
search cancel

SMP/E to download Broadcom maintenance getting GIM69221W or GIM69181S

book

Article ID: 140769

calendar_today

Updated On:

Products

ACF2 ACF2 - DB2 Option ACF2 for zVM ACF2 - z/OS ACF2 - MISC

Issue/Introduction

Certificates used for Broadcom SMP/E product maintenance downloads are valid for one year. Client will get SMP/E warning message:
"GIM69221W  CERTIFICATE ACF2 SMPE CERT WILL EXPIRE WITHIN 30 DAYS" prior to the certificates expiration date
    or a
"GIM69181S ** RECEIVE PROCESSING HAS FAILED. THE CLIENT CERTIFICATE HAS EXPIRED."

 

 

Environment

Release : 16.0

Component : CA ACF2 for z/OS

Resolution

Clients can Go to the Broadcom Support Online Certificate site:https://eapi.broadcom.com/receiveorder/getSignedCert. If not signed users will be prompted for CSO credentials. Log in with a valid CSO email and password.

Once the new user certificate is obtained, the following can be done:

  • Upload the User and Digicert Certificate Authority (CA) certificate as text data to your z/OS system in RECFM=VB and LRECL>=84 ASCII format.
    Note: When uploading the certificates to z/OS be sure the appropriate “WRAP” parameter is specified  so that the data is wrapped to the next record if no new line character is encountered before the logical  record length of the receiving file is reached.

    For example the Windows Command Prompt can be used to FTP the user certificate from a Windows PC to z/OS. 


    Use the following sample FTP commands to avoid truncation:
     
             FTP host.name
             User (host.name:(none)): user001
             331 Send password please.
             Password: xxxxxxxx
             ASCII  QUOTE SITE WRAP LRECL=84 RECFM=VB
             PUT ca-receive-order.cer 'User.mvs.dataset.name' (REPLACE
             quit

  • REMOVE the certificate that will be expiring from the KEYRING

            SET PROFILE(USER) DIV(KEYRING)
            REMOVE CERTDATA(user1.cert) KEYRING(user1.ring)
     
  • If you are going to INSERT the new certificate with the same certificate certdata record name, EXPORT the certificate that is about to expire as backup. After successful EXPORT DELETE the certificate.

            SET PROFILE(USER) DIV(CERTDATA)
            EXPORT user1.cert DSN('user1.cert.backup')
            DELETE user1.cert

  • INSERT the new user certificate. On the INSERT be sure to specify the same LABEL name as the previous user certificate.

          SET PROFILE(USER) DIV(CERTDATA)
          INSERT user1.cert DSN('User.mvs.dataset.name') LABEL(user1.cert.label)
     
  • Connect the new certificate to the KEYRING.

         SET PROFILE(USER) DIV(KEYRING)
         CONNECT CERTDATA(user1.cert) KEYRING(user1.ring)