- RSA Governance & Lifecycle 8.0.0
1. RSA Identity Governance & Lifecycle Collector fails during collection or fails during test connection with the following error message in the aveksaserver.log file.
08/31/2023 08:45:29.967 ERROR (Thread-412 (ActiveMQ-client-global-threads)) [com.aveksa.server.utils.NodeMessageBroker] Exception while getting test data from collector com.aveksa.server.runtime.ServerException: com.aveksa.common.DataReadException: com.aveksa.client.genericrest.GenericRestException: CONNECTION_FAILED_WITHOUT_CODE javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target. Caused by com.aveksa.client.genericrest.GenericRestException: CONNECTION_FAILED_WITHOUT_CODE javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target.
2. RSA Identity Governance & Lifecycle AFX Connector fails during execution or fails during test connection with the following error message in the AFX log connector log file.
2022-09-26 14:20:15.327 [ERROR] org.mule.transport.ldapx.LdapxConnector:361 - LDAPException: Connection lost waiting for results from corp.myserver.com:636 (91) Connect Error javax.net.ssl.SSLHandshakeException: PKIX path building failed: java.security.cert.CertPathBuilderException: Could not build a validated path. LDAPException: Connection lost waiting for results from corp.myservercom:636 (91) Connect Error javax.net.ssl.SSLHandshakeException: PKIX path building failed: java.security.cert.CertPathBuilderException: Could not build a validated path. at com.novell.ldap.Connection$ReaderThread.run(Unknown Source) at java.lang.Thread.run(Thread.java:750) Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: java.security.cert.CertPathBuilderException: Could not build a validated path. at sun.security.ssl.Alert.createSSLException(Alert.java:131) at sun.security.ssl.TransportContext.fatal(TransportContext.java:324)
The trusted CA Certificate (or trusted CA Certificate chain) is not trusted specifically in the RSA Governance & Lifecycle keystore.
RSA Governance & Lifecyle will attempt to validate the CA Certificate of any certificates used for SSL communication. This error message is generated if the certificate cannot be validated by building a full path from the certificate up to a valid root CA certificate.
Java contains a base list of common public CA certificates. If your Collector or Connector is hosted on a server whose SSL certificate is signed by one of the common public CA venders, you will not see this error and will not have to trust the CA certificate explicitly.
If your endpoint is signed by a private CA this error indicates you must explicitly import the trusted CA certificate or CA chain.
This issue and the resolution is outlined in the "Deploying Remote Collection Agent and Provisioning Service" guide in the troubleshooting section. Refer to that guide for current information for your product and version.
The information is repeated in this KB article and is accurate at the time of authoring.
To remediate this issue explicitly trust the third party CA certificate in RSA Governance & Lifecycle.
Navigate to Files tab under the Admin/User Interface menu and select SSL Certificates. Click the Upload button to upload your CA certificate in *.pem *.cer or *.crt format.
For Local Aveksa Agents and Local AFX servers the certificate is valid immediately and no additional steps are required.
For Remote Aveksa Agents or Remote AFX servers you will have to perform the following additional steps.
Aveksa trusted certificates are installed automatically when a new Remote Aveksa Agent or Remote AFX Server is deployed.
- If you have not already deployed your Remote Aveksa Agent or Remote AFX Server simply deploy these servers and the trusted certificates will be usable immediately.
- If you have already deployed your Remote Aveksa Agent or Remote AFX Server you may undeploy your existing servers and deploy new instances following the guidance for "deploying" in the "Deploying Remote Collection Agent and Provisioning Service" Guide.
- Alternately if you have already deployed your Remote Aveksa Agent or Remote AFX Server and you do not want to redploy you can follow the guidance in the "Troubleshooting" section of the "Deploying Remote Collection Agent and Provisioning Service" guide for how to manually upload new keystore and configuration files to your existing instances.
Related Articles
AFX Connector test capability fails with java.lang.NoClassDefFoundError in RSA Governance & Lifecycle 264Number of Views AFX test connector settings button times out and the test connector capabilities work or the test connector capabilities f… 383Number of Views RSA enVision Software Supported Upgrade Paths 35Number of Views "ORA-06575: Package or function ROLE_MANAGEMENT_PKG is in an invalid state" after patching to 7.5.2 P08 in RSA Governance … 36Number of Views 'javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path' error when testing a RESTful W… 323Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Release Notes for RSA Authentication Manager 8.8 RSA announces End of Life EOL dates for RSA MyAccessLive Service RSA Authentication Manager 8.9 Administrator's Guide