The certificate rotation resulted in outage to the third party service provider
The vendor updated/changed server certificate causing the gateway to fail SSL handshake validating the updated certificate. This was resolved by updating the certificate but since the server certificate rotates out often what other options are there to handle this situation
Gateway ALL versions
Working as designed. The gateway default trust is 0 trust (NO TRUST). In order to trust/establish SSL connection a valid certificate needs to be imported and trusted by the gateway
Options:
OR
IntermediateCA or RootCA - these typically have a longer expiration and rotate out less often. NOTE this trust between the intermediate OR RootCA when added changes gateway from ZERO Trust to trusting all certificates created by this chain:
Default SSL Certificate chain
ClusterWideProperty io.httpsHostVerify default set to true the are scenarios covered in KB KB261134 article for different scenarios