nifi-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Andy LoPresto <>
Subject Re: NIFI Secure Access ( Site to Site )
Date Wed, 13 Jul 2016 16:49:00 GMT
The message “com.sun.jersey.api.client.ClientHandlerException: PKIX path validation failed:
signature check failed” means that the application was not able to build a successful certificate
chain between the presented endpoint certificate and a trusted certificate issued by a Certificate

Is the server certificate self-signed? If so, you will need to add the certificate to the
truststore. If it is signed by a well-known CA, you can use the default JRE truststore “$JAVA_HOME/jre/lib/security/cacerts”
which provides a list of selected certificate authority public keys. The default password
is “changeit”.

If you are using a custom CA, you can follow Matt’s article he linked above. This will walk
you through step-by-step instructions on setting up your keystore and truststore.

Andy LoPresto
PGP Fingerprint: 70EC B3E5 98A6 5A3F D3C4  BACE 3C6E F65B 2F7D EF69

> On Jul 13, 2016, at 8:19 AM, Matthew Clarke <> wrote:
> Try following this procedure:
> Matt
> On Jul 13, 2016 1:31 AM, "Vinay" <> wrote:
>> Any from this forum can show some help :)
>> --
>> View this message in context:
>> Sent from the Apache NiFi Developer List mailing list archive at

View raw message