TDM Portal: After replacing our expired SSL Certificates, No one is able to access Portal.
search cancel

TDM Portal: After replacing our expired SSL Certificates, No one is able to access Portal.


Article ID: 189740


Updated On:


CA Test Data Manager (Data Finder / Grid Tools)


We recently replaced our expiring SSL Certificates with new certificates. Portal seemed to be working fine after importing the new certificates. We also had to apply a new TDM license activation key. After cycling the CA Test Data Manager Portal service, we can no longer access Portal, even though the service is up and running. 

We are seeing the following error:

System.Net.WebException: Unable to connect to the remote server ---> System.Net.Sockets.SocketException: A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond 127:0.0.1:443
at System.Net.Sockets.Socket.DoConnect(EndPoint endPointSnapshot, SocketAddress socketAddress)
at System.Net.ServicePoint.ConnectSocketInternal(Boolean connectFailure, Socket s4, Socket s6, Socket& socket, IPAddress& address, ConnectSocketState state, IAsyncResult asyncResult, Exception& exception)


Release : 4.6 - 4.9

Component : CA Test Data Manager Portal


Looking at the TDM Portal startup.log we see the following errors thrown by the Tomcat web server, while attempting to initialize the SSL socket:

SEVERE: Failed to initialize end point associated with ProtocolHandler ["http-nio-443"] Alias name <your Alias Name> does not identify a key entry

The error indicates that the keystore does not have a PrivateKeyEntry matching the given alias. Therefore, the certificate chain is incomplete, and you must import the private key into the keystore, and cycle the CA Test Data Manager Portal service. 


Upon investigation, we see the cert file was imported, but not the Private Key. Working with the customer's security team, we imported the Private Key into the keystore.

Please make sure that keystore file includes, private key, root and intermediate certs. If any of these things miss in keystore file, work with security team to re-issue the keystore file.

Note: After importing the complete chain, Trusted Cert and Private Key, we saw an error thrown in the TDM startup.log, indicating an invalid character in the keystore path. Looking closely at the keystore path, defined in the file, we could not find an invalid character. The error was thrown because the CERT password, and KEY password, inside the keystore, were different. To get around this issue, we had to synchronize the two passwords, using the following keytool commands:

keytool -storepasswd
keytool -keypasswd

Additional Information

TDM Portal: What steps are needed to import a Third Party Certificate for Portal