Scenario: Intermediate Certificate Authority (CA) certificates need to be imported into DLP for connecting to Active Directory.
WARNING [com.vontu.manager.admin.directoryconnection.DirectoryConnectionManager] Test Directory Connection Failed:
Root exception is javax.net.ssl.SSLHandshakeException:
sun.security.validator.ValidatorException:
PKIX path building failed:
sun.security.provider.certpath.SunCertPathBuilderException:
unable to find valid certification path to requested target
DLP 15.8, 16.x
1. Certificate chain imported into tomcat .keystore instead of the Java CACerts keystore.
The Active Directory certificate chain uses the cacerts file instead of the .keystore file.
2. Only LDAP server certificate and no whole certificate chain is imported into the Java CACerts keystore.
1. Certificate chain imported into tomcat .keystore instead of the Java CACerts keystore.
The Active Directory certificate chain uses the cacerts file instead of the .keystore file.
Certificates used for Active Directory Connections are added to the cacerts keystore located in <java installed dir>\lib\security folder.
If you are not sure where or which version of java is being used by DLP then use the following steps to verify.
Below are a summary of steps to resolve the issue. For more information, refer to the on-line help page; Importing SSL certificates to Enforce or Discover servers.
2. Only LDAP server certificate and no whole certificate chain is imported into the Java CACerts keystore.
Proceed with importing LDAP Certificate and remaining Root Certificate Authority (Root CA) and Intermediate Certificate Authority (Intermediate CA) with the method above, to have whole certificate chain in CACerts.