IBM E02HRLL-G Administration Guide - Page 184

VCBaseException in the SystemOut.log, Reporting file size for documents greater than 2 GB

Page 184 highlights

The validity status of the certificate can be found in the WebSphere Partner Gateway Console. The WebSphere Partner Gateway Console displays the validity period of certificates on the Certificate List page. The validity period is shown in red if the certificate is expired. If the CA certificate is expired, obtain a new certificate from the CA that issued the certificate. This new CA certificate should be uploaded in WebSphere Partner Gateway Console. Note: If the uploaded certificate is a self signed certificate for Server authentication and has expired, then the certificate is disabled in the WebSphere Partner Gateway Console. VCBaseException in the SystemOut.log When there is an exception while configuring the hub using the console, the Console log shows the exception also as part of logging information. For example, if you try to create an interaction that already exists, you will receive the VCBaseException in the SystemOut.log file. This exception is acceptable as part of Logging. Reporting file size for documents greater than 2 GB When a document is greater than 2 GB in size, WebSphere Partner Gateway might show the file length as 0 KB in the document viewer. This is because of a maximum limit for the database datatype. SSL handshake fails because no certificate received This problem occurs during the SSLHandShake between a partner and WebSphere Partner Gateway when you are sending to a partner using SSL with Client Authentication. If the partner does not send the list of certifying authority certificates, the SSL client in WebSphere Partner Gateway does not send the client certificate. This causes the handshake failure. To resolve the handshake failure, you modify the java.security file in WebSphere Application Server installations. This file is located in the \java\jre\lib\security directory. Note: For UNIX systems, use the forward slash ( / ) instead of the back slash ( \ ). The default order of providers in the java.security file is as follows: security.provider.1=com.ibm.crypto.provider.IBMJCE security.provider.2=com.ibm.jsse.IBMJSSEProvider security.provider.3=com.ibm.jsse2.IBMJSSEProvider2 security.provider.4=com.ibm.security.jgss.IBMJGSSProvider security.provider.5=com.ibm.security.cert.IBMCertPath #security.provider.6=com.ibm.crypto.pkcs11.provider.IBMPKCS11 In the java.security file, place the IBMJSSE2 provider before the IBMJSSE provider as shown in the following example. Note: If you implement a WebSphere Application Server fix pack after reordering the java.security file, your change is overwritten and the file must be reordered again. 178 IBM WebSphere Partner Gateway Enterprise and Advanced Editions: Administration Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268

The validity status of the certificate can be found in the WebSphere Partner
Gateway Console. The WebSphere Partner Gateway Console displays the validity
period of certificates on the Certificate List page. The validity period is shown in
red if the certificate is expired.
If the CA certificate is expired, obtain a new certificate from the CA that issued the
certificate. This new CA certificate should be uploaded in WebSphere Partner
Gateway Console.
Note:
If the uploaded certificate is a self signed certificate for Server authentication
and has expired, then the certificate is disabled in the WebSphere Partner Gateway
Console.
VCBaseException in the SystemOut.log
When there is an exception while configuring the hub using the console, the
Console log shows the exception also as part of logging information. For example,
if you try to create an interaction that already exists, you will receive the
VCBaseException in the
SystemOut.log
file. This exception is acceptable as part of
Logging.
Reporting file size for documents greater than 2 GB
When a document is greater than 2 GB in size, WebSphere Partner Gateway might
show the file length as 0 KB in the document viewer. This is because of a
maximum limit for the database datatype.
SSL handshake fails because no certificate received
This problem occurs during the SSLHandShake between a partner and WebSphere
Partner Gateway when you are sending to a partner using SSL with Client
Authentication. If the partner does not send the list of certifying authority
certificates, the SSL client in WebSphere Partner Gateway does not send the client
certificate. This causes the handshake failure.
To resolve the handshake failure, you modify the
java.security
file in WebSphere
Application Server installations. This file is located in the
<
WAS installation
directory
>\java\jre\lib\security
directory.
Note:
For UNIX systems, use the forward slash ( / ) instead of the back slash
( \ ).
The default order of providers in the
java.security
file is as follows:
security.provider.1=com.ibm.crypto.provider.IBMJCE
security.provider.2=com.ibm.jsse.IBMJSSEProvider
security.provider.3=com.ibm.jsse2.IBMJSSEProvider2
security.provider.4=com.ibm.security.jgss.IBMJGSSProvider
security.provider.5=com.ibm.security.cert.IBMCertPath
#security.provider.6=com.ibm.crypto.pkcs11.provider.IBMPKCS11
In the
java.security
file, place the IBMJSSE2 provider before the IBMJSSE
provider as shown in the following example.
Note:
If you implement a WebSphere Application Server fix pack after reordering
the
java.security
file, your change is overwritten and the file must be reordered
again.
178
IBM WebSphere Partner Gateway Enterprise and Advanced Editions: Administration Guide