CONNECTED(00000003)
depth=0 CN = test.domain.com
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 CN = test.domain.com
verify error:num=21:unable to verify the first certificate
verify return:1
---
Certificate chain
0 s:/CN=test.domain.com
i:/DC=com/DC=domain/DC=test/CN=test
-----BEGIN CERTIFICATE-----
SOME HASH VALUE
-----END CERTIFICATE-----
---
Server certificate
subject=/CN=test.domain.com
issuer=/DC=com/DC=domain/DC=test/CN=test
---
No client certificate CA names sent
Client Certificate Types: RSA sign, DSA sign, ECDSA sign
Requested Signature Algorithms: RSA+SHA256:RSA+SHA384:RSA+SHA1:ECDSA+SHA256:ECDS A+SHA384:ECDSA+SHA1:DSA+SHA1:RSA+SHA512:ECDSA+SHA512
Shared Requested Signature Algorithms: RSA+SHA256:RSA+SHA384:RSA+SHA1:ECDSA+SHA2 56:ECDSA+SHA384:ECDSA+SHA1:DSA+SHA1:RSA+SHA512:ECDSA+SHA512
Peer signing digest: SHA1
Server Temp Key: X25519, 253 bits
---
...
Verification
Check the System Archive logs for any errors like below:
Failed startup connection to LDAP server [ldaps://test.domain.com:636] using Bind User [TEST\Administrator] err=[simple bind failed: test.domain.com:636]
ERRATTA
If the java keystore needs the certificate to be in PEM format for import, you will need to convert the certificate from the DER format to PEM using this command:
openssl x509 -inform der -in certificate.cer -out certificate.pem
|