C.6 Certificate Related Issues
Review these troubleshooting tips for common certificate-related issues when working with Oracle Key Vault.
- Unable to Upload Console Certificates
Uploading console certificates fails, and an error message is displayed. - Updating to Current Certificate Issuer
While the Oracle Key Vault CA certificate rotation is in progress, the endpoint's status remains as Updating in Progress for many days. The CA certificate rotation process may be stalled if there are several endpoints in the Updating in Progress state. - Error When Configuring SSO
When configuring Single Sign On (SSO), Oracle Key Vault displays an invalid certificate error.
Parent topic: Troubleshooting Oracle Key Vault
C.6.1 Unable to Upload Console Certificates
Uploading console certificates fails, and an error message is displayed.
Example
Uploading console certificates fails with:
Error: Failed to upload certificate file. Certificate is not compatible with server.Probable Cause
Console certificates are not uploaded as platform certificates may have expired.
Solution
Parent topic: Certificate Related Issues
C.6.2 Updating to Current Certificate Issuer
While the Oracle Key Vault CA certificate rotation is in progress, the endpoint's status remains as Updating in Progress for many days. The CA certificate rotation process may be stalled if there are several endpoints in the Updating in Progress state.
Probable Cause 1
No recent activity from the endpoint.
Solution
- In the endpoint, go to
$OKV_HOME/bin, and run theokvutillist command multiple times.OKV_HOME/bin/okvutil list -v 4 - If the preceding command returns data then:
- Verify if
$OKV_HOME/sslis updated with the new certificates. A new directory is created under$OKV_HOME/sslthat containsewallet.p12. - Verify the endpoint status in the Oracle Key Vault management console.
- If the endpoint status still shows
Update in Progress, then contact Oracle support.Note:
In a multi-master cluster environment, the endpoint may not connect to the node where the new endpoint certificates are generated.
- Verify if
- If the
okvutilcommand fails with an error, re-enroll the endpoint, download and install theokvclient.jarfile. See, How to Re-Enroll an Endpoint on an Endpoint Database. - Verify if the certificate rotation proceeds.
- Check if the issue is resolved.
Probable Cause 2
The endpoint is no longer in use.
Solution
- Check if the endpoint is not in use. If so, delete or re-enroll the endpoint.
- Repeat the same action for all the inactive endpoints.
- Verify if the certificate rotation proceeds.
- Check if the issue is resolved.
Parent topic: Certificate Related Issues
C.6.3 Error When Configuring SSO
When configuring Single Sign On (SSO), Oracle Key Vault displays an invalid certificate error.
Probable Cause
An SSO provider certificate was uploaded that was signed by an Intermediate CA. Oracle Key Vault validates the provider certificate by using the openssl verify command. If the issuing chain (Intermediate and Root CA) is not present in the server’s system trust store, then the command fails, and Oracle Key Vault rejects the certificate.
Solution
- Create a file named
sso_chain.pemthat contains the Intermediate CA certificate followed by the Root CA certificate, in the correct order. - Copy the file
sso_chain.pemin the path:scp sso_chain.pem support@<OKV_IP_address>:/etc/pki/tls/cert/ - Log in to the Oracle Key Vault server as the
supportuser. - Switch to the
rootuser.su - root - Determine the certificate hash:
cd /etc/pki/tls/certsopenssl x509 -hash -noout -in sso_chain.pem - Create a symbolic link using the hash value from step 5 (ensure the path is correct):
ln -s /etc/pki/tls/certs/sso_chain.pem /etc/pki/tls/certs/<hash>.0Example:
ln -s /etc/pki/tls/certs/sso_chain.pem /etc/pki/tls/certs/3d19bb68.0 - Verify the signed provider certificate:
openssl verify /path/to/signedcert.pem - After the verification succeeds, retry the SSO configuration in Oracle Key Vault by using the signed certificate.
Parent topic: Certificate Related Issues