search cancel

Howto enabled debugging of SSL connections from the proxy-engine to the backend server in CA Access Gateway (formerly CA Secure Proxy Server)


Article ID: 42115


Updated On:


CA Single Sign On Secure Proxy Server (SiteMinder) CA Single Sign On SOA Security Manager (SiteMinder) CA Single Sign-On



The CA Access Gateway (formerly CA Secure Proxy Server) is used as a reverse proxy to connect users via the SPS to backend servers.  The connections from SPS to the backend servers will often be over SSL (ie accessed using HTTPS:).    This article shows how to enable"all" logging so that problems can be identified and resolved.


There can be a number of issues establishing a SSL connection from proxy-engine to the backend, there are some restrictions on the level of cryptographic that java is able to use; there can be different levels of SSL/TLS version supported by the backend server; and there can be issues with the trust path for the backend server certificates.  


all (windows, linux, solaris)


Java provides a handy setting that will log detail of the SSL handshake and transferred data  into stdout by adding the parameter to the java runtime startup. 


Enable the debug SSL in SPS  

For SPS the files to apply that debug setting are : 

Windows : proxy-engine/conf/

Unix  : proxy-engine/

And we need to add the parameter to the java startup command as pictured below for each environment.


<Please see attached file for image>


Notes: Please make sure you edit the correct one for your environment; Both will need a restart to effect and for Windows you will need stop the proxy-engine service before it will allow you to save the .properties file)

The proxy-engine service needs to be restarted for the setting to take effect. 


Review the SSL trace details in the nohup log

Once the service is restarted trace information for any SSL connection from the proxy-engine to the backend is written to the timestamped nohup*.out file.

In the following we can see details of the SSL ClientHello message send to the backend server. 

<Please see attached file for image>


Particular details to look for in the logs are:

  • The TLS versions and acceptable cipher suites send from the proxy-engine to the backend in the SSL ClientHello message
  • The cipher suite chosen by the backend server in the returned SSL ServerHello message.
  • The details of the backend server's X.509 certificate also in the SSL ServerHello message
  • Details for tracing the trust certificate chain for the backend server's certificate, as provided in the SSL ServerHello and the locally loaded CA Certificates.
  • The encrpytion and digest for the first message send from the proxy-engine to the backend server after the handshake (A failure at this point can indicate that the java JVM has export limited cryptography settings - see java unlimited jurisdiction policy files note at the end )


Additional Information:


Java SE Debugging SSL/TLS Connections

Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files 8 Download

Details about SSL/TLS



Component: SMSPS


1558721769485000042115_sktwi1f5rjvs16w7c.png get_app
1558721767218000042115_sktwi1f5rjvs16w7b.png get_app