PKIX path validation failed: java.security.cert.CertPathValidatorException: signature check failed

PKIX path validation failed: java.security.cert.CertPathValidatorException: signature check failed

PKIX path validation failed: java.security.cert.CertPathValidatorException: signature check failed

The SSL handshake exception will occur if cas server to cas client (jar files will behave as client) communication is not happened, First check the network things like communication between both servers, firewall and port blocking, if every thing is good then this problem is because of SSL certificate, make sure to use the same certificate in both CAS server and client(Spring security app) applications.

As i cant comment yet, ill just extend to @Kamals answer. I was learning through the same book, but i was using Tomcat as a difference, so i cant really give you the same answer as ive never used Jetty:
As he said, your SSL is not working as it should. The certificate is not being accepted by your browser and/or server, so it cant authenticate, and thus, SSL handshake gets rejected. You need to be sure that youve added the certificate CAS.crt to your JVM cacerts, as he explains on the book(198-199), and check if its correctly there . And then you need to add the jetty-ssl.keystore to Jetty, with the password that you used, so that it can used to make the right connection. Also, you need to be positively sure that its written localhost as the cn name, as it wont work otherwise. This would change depending on your enviroment(production, testing, just learning…), but this is the necessary for making it work as the book described.
Hope that im not too off here, but i hope it helped.

PKIX path validation failed: java.security.cert.CertPathValidatorException: signature check failed

I have faced this issue and found that SSL certificate was expired.
After replacing expired SSL certificate by latest certificate the issue was resolved.

Related posts on java :

Leave a Reply

Your email address will not be published.