×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
1. Did you import the CA certificate as a trusted root, that signed your new wild card?
2. You will need to import the same CA into your Client Access database as trusted root.
Use IBM Key management on your PC. The default CA password is ca400. In the drop down, select: Signer Certificates.
Path to default Key Database is c:\Users\Public\Documents\IBM\Client Access\cwbssldf.kdb
Chris Bipes
Director of Information Services
CrossCheck, Inc.
-----Original Message-----
From: MIDRANGE-L <midrange-l-bounces@xxxxxxxxxxxx> On Behalf Of Steinmetz, Paul
Sent: Friday, April 13, 2018 11:46 AM
To: 'Midrange Systems Technical Discussion' <midrange-l@xxxxxxxxxxxx>
Subject: CWBC01050 - The IBM i server application certficate is not trusted. - Client Access error after new wild card certificate installed
CWBC01050 - The IBM i server application certficate is not trusted. - Client Access error after new wild card certificate installed
I'm receiving this error from Client Access since installing new wild card certificate in DCM.
When I had this error previously, there were 3 files that had to be updated on the PCs.
C:\Users\Public\Documents\IBM\Client Access.
CWBSSLDF.kdb
CWBSSLDF.sth
CWBSSLJAVACA.jck
I'm not locating the document/process that I used to create the above files.
I'm thinking it was the IBM Key Management Utility on the PC, but I can't be certain.
All IBM sites/links currently not working.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact
[javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.