Invalid login issue with the URL https://DNS:8443 in browser after self-signed certificate update with company certfifcate #5473
Replies: 4 comments 9 replies
-
Mirth Connect expects the keypair to be stored in the alias Can you show the contents of your keystore? Use Please also show which certificate Did you also update your |
Beta Was this translation helpful? Give feedback.
-
How to using KeyStore Explorer (KSE) You will need:
Download the JKS file from your appdata directory, it is called Using Import Key Pair in KSE, import your cert and private key and set the password to the same value as Save the jks after editing in KSE I would check the cert in a browser first, it should look like: |
Beta Was this translation helpful? Give feedback.
-
Got it to work, the CA that issued the cert is not a public CA it's internal. Thus had to add the CA to the Java cacerts
|
Beta Was this translation helpful? Give feedback.
-
Hi All, Our issue has been resolved. Thanks for all your support. In our case also, its cert issue. We took new certs and replaced thus issue has been resolved. |
Beta Was this translation helpful? Give feedback.
-
Hi Team,
We are using Mirth connect in our organisation. We have one issue while updating the mirth self-signed certificate to a certfifcate from our CA.
After updating the certificate, the login console from the browser with the url https://DNS:8443 showing invalid credentials. But if we revert the cert with self-signed we are able to properly logging in.
Could you please help us whether we are missing any step when updating the self-signed certs with our company's certs? or Please provide some solution to the above issue.
Beta Was this translation helpful? Give feedback.
All reactions