OBIEE 11g When OBIEE Analytics URL is Accessed Using SSL Error: "'java.io.IOException: Identity certificate has expired:.." (Doc ID 2191044.1)

Last updated on FEBRUARY 16, 2017

Applies to:

Business Intelligence Server Enterprise Edition - Version 11.1.1.7.0 and later
Information in this document applies to any platform.

Symptoms

On 11.1.1.7.x version of Oracle Business Intelligence Enterprise Edition (OBIEE) Analytics, on configuring it with SSL, the below scenario is noticed:

=============

java.io.IOException: Identity certificate has expired: [
[
  Version: V3
  Subject: CN=lon.reporting.navitaire.com, OU=it, O=accenture llc, L=minneapolis, ST=minnesota, C=us
  Signature Algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

  Key: Sun RSA public key, 2048 bits
  modulus: 238256526672960771425290518611326617299052176088855546530548840642557704542

 :

 :
=============

 

==============

BST> <Alert> <Security> <MHSBPHEAP100> <AdminServer> <[STANDBY] ExecuteThread: '2' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <78d2fd2cc33b2872:38e2dd60:1579e58a77e:-8000-0000000000000008> <1475830509481> <BEA-090152> <Demo trusted CA certificate is being used in production mode: [ [ Version: V3 Subject: CN=CACERT, OU=FOR TESTING ONLY, O=MyOrganization, L=MyTown, ST=MyState, C=US Signature Algorithm: MD5withRSA, OID = 1.2.840.113549.1.1.4

Key: Sun RSA public key, 512 bits modulus: 9550192877869244258838480703390456015046425375252278279190673063544122510925482179963329236052146047356415957587628011282484772458983977898996276815440753 public exponent: 65537 Validity: [From: Thu Mar 21 20:12:27 GMT 2002, To: Tue Mar 22 20:12:27 GMT 2022] Issuer: CN=CACERT, OU=FOR TESTING ONLY, O=MyOrganization, L=MyTown, ST=MyState, C=US SerialNumber: [ 33f10648 fcde0deb 4199921f d64537f4]

Certificate Extensions: 1 [1]: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ Key_CertSign ]

] Algorithm: [MD5withRSA] Signature: 0000: 9D 26 4C 29 C8 91 C3 A7 06 C3 24 6F AE B4 F8 82 .&L)......$o.... 0010: 80 4D AA CB 7C 79 46 84 81 C4 66 95 F4 1E D8 C4 .M...yF...f..... 0020: E9 B7 D9 7C E2 23 33 A4 B7 21 E0 AA 54 2B 4A FF .....#3..!..T+J. 0030: CB 21 20 88 81 21 DB AC 90 54 D8 7D 79 63 23 3C .! ..!...T..yc#<

] The system is vulnerable to security attacks, since it trusts certificates signed by the demo trusted CA.> ####<Oct 7, 2016 9:55:09 AM BST> <Notice> <Security> <MHSBPHEAP100> <AdminServer> <[STANDBY] ExecuteThread: '2' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <78d2fd2cc33b2872:38e2dd60:1579e58a77e:-8000-0000000000000008> <1475830509512> <BEA-090898> <Ignoring the trusted CA certificate "CN=COMODO RSA Certification Authority,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GB". The loading of the trusted certificate list raised a certificate parsing exception PKIX: Unsupported OID in the AlgorithmIdentifier object: 1.2.840.113549.1.1.12.

==============

Changes

 OBIEE was configured with SSL.

Cause

Sign In with your My Oracle Support account

Don't have a My Oracle Support account? Click to get started

My Oracle Support provides customers with access to over a
Million Knowledge Articles and hundreds of Community platforms