CWPKI

CWPKI0532E: Invalid input parameter."
CWPKI0600E: {0} does not exist within management scope {1}.
CWPKI0601E: {0} in the management scope {1} already exists.
CWPKI0603E: Specify either provider/algorithm or keyManagerClass.
CWPKI0604E: The following management scope is not valid: {0}
CWPKI0605E: Key store is not within Key set management scope.
CWPKI0606E: The following is not a valid key set object name: {0}
CWPKI0607E: The following management scope type is not valid: {0}
CWPKI0608E: Management scope {0} is not of type {1}.
CWPKI0609E: Management scope {0} already exists.
CWPKI0610E: SSL type is not valid. Should be SSSL or JSSE.
CWPKI0611E: SSL security level is not valid. Should be HIGH, MEDIUM, LOW, or CUSTOM.
CWPKI0612E: SSL protocol is not valid. Should be SSL_TLS, SSL, SSLv2, SSLv3, TLS, or TLSv1.
CWPKI0613E: The following trust manager object name is not valid: {0}
CWPKI0614E: Direction is not valid. Should be inbound or outbound.
CWPKI0615E: SSL configuration group {0} in direction {1} and management scope {2} already exists.
CWPKI0616E: SSL Configuration {0} is not with in the same management scope as the SSL configuration group.
CWPKI0617E: Certificate {0} is not in SSL configuration {1}.
CWPKI0618E: Key alias {0} already exist in key set {1}.
CWPKI0619E: Passwords do not match.
CWPKI0620E: Key store file {0} already exists.
CWPKI0621E: {0} already exists.
CWPKI0622E: Schedule frequency is not a positive integer.
CWPKI0623E: Minute value is out of range. It should be between 0 and 59.
CWPKI0624E: Day of the week value is out of range. It should be between 1 and 7.
CWPKI0625E: Hour value is out of range. It should be between 0 and 23.
CWPKI0626E: Next start date is not set to a date the future.
CWPKI0627E: Only one wsCertExpMonitor entry is allowed in the security.xml file.
CWPKI0628E: Valid days parameter is out of range. It should be between 1 and 7300 days.
CWPKI0629E: Trust manager is still referenced by: {0}
CWPKI0630E: Alias "{0}" already exists in key store "{1}".
CWPKI0633E: {0} is not within management scope {1}.
CWPKI0634E: Key set is still referenced by: {0}
CWPKI0635E: Cannot generate keys since the key generator class is not configured.
CWPKI0636E: Invalid key set object name input: {0}.
CWPKI0637E: Management scope is still referenced by: {0}.
CWPKI0638E: The data type of the parent is empty or blank.
CWPKI0639E: The class name of the parent is empty or blank.
CWPKI0640E: The name of the descriptive property is empty or blank.
CWPKI0641E: The type of the descriptive property is empty or blank.
CWPKI0642I: Signer certificate alias "{0}" in KeyStore "{1}" will expire on {2}.
CWPKI0643I: Personal certificate alias "{0}" in KeyStore "{1}" will expire on {2}.
CWPKI0644I: Signer certificate alias "{0}" in KeyStore "{1}" was REPLACED.
CWPKI0645I: Personal certificate alias "{0}" in KeyStore "{1}" was REPLACED.
CWPKI0646I: Signer certificate alias "{0}" was DELETED from KeyStore "{1}".
CWPKI0647I: Personal certificate alias "{0}" was DELETED from KeyStore "{1}".
CWPKI0648I: Expiration Report (certificates expiring within "{0}" days).
CWPKI0649I: Action Taken (auto-replace: "{0}", delete old keys:"{1}").
CWPKI0650E: Signer certificate alias "{0}" does not exist in key store "{1}".
CWPKI0651E: Certificate alias "{0}" is not a certificate request.
CWPKI0652E: Certificate file "{0}" does not exist.
CWPKI0653E: Failed to retrieve key for alias "{0}" from the key store.
CWPKI0654E: Public key from certificate alias "{0}" and the public key from the certificate authority do not match.
CWPKI0655E: Certificate alias "{0}" does not exist in key store "{1}".
CWPKI0656E: Creating a read only key store object. File "{0}" should already exist, check the key store password and key store type.
CWPKI0657E: The SSL Configuration management scope is not within the Dynamic SSL Configuration Selection management scope.
CWPKI0658E: Key store types for hardware devices must be "{0}".
CWPKI0659E: Hardware slot number is not a positive integer.
CWPKI0660E: The next start date must be a positive number.
CWPKI0661E: Unable to get certificate signer information from hostname "{0}" and port "{1}". Verify hostname and port are correct.
CWPKI0662E: Certificate with a public key matching the public key in the certificate from the Certificate Authority is not found in key store "{0}".
CWPKI0663E: Key store file {0} did not verify, make sure the file or keyring exists, check key store type and password.
CWPKI0664E: Cryptographic operations configuration file "{0}" does not exist.
CWPKI0665E: File "{0}" does not exist. If the key store is not file based then the path specified must exist.
CWPKI0666E: Certificate "{0}" is not a personal certificate.
CWPKI0667E: Property named "{0}" already exists in the SSL Configuration.
CWPKI0668E: "{0}" is not of the type "{1}".
CWPKI0669E: Key stores and certificates can not be remotely managed from a base application server.
CWPKI0670E: Unable to change the key store password. The key store is either a read only key store or it is not a file based key store.
CWPKI0671E: Key store did not verify. Make sure the file exists, check the key file type and password.
CWPKI0672E: Alias "{0}" is not a personal certificate in key store "{1}".
CWPKI0673E: Creating a read only key store object. File "{0}" should already exist.
CWPKI0674E: "{0}" and "{1}" values must specify different aliases.
CWPKI0675E: "{0}" is an invalid configuration object name.
CWPKI0676E: The "{0}" parameter is required for System SSL (SSSL) SSL configuration types.
CWPKI0677E: The "{1}" and "{1}" parameters are required for JSSE SSL configuration types.
CWPKI0678E: Certificate request alias "{0}" does not exist in key store "{1}".
CWPKI0679I: Signer certificate alias "{0}" in KeyStore "{1}" expired on {2}.
CWPKI0680I: Personal certificate alias "{0}" in KeyStore "{1}" expired on {2}.
CWPKI0681E: Dynamic SSL configuration selection information parameter is not in the correct format. It should be in the format 'protocol,host,port'.
CWPKI0682E: {0} does not exist.
CWPKI0683E: V3 time out range is between 1 and 86400.
CWPKI0684E: The sendEmail value is true. However, the Application Server cannot locate an e-mail list.
CWPKI0685E: When the "emailFormat" option is specified valid values include "html" or "text".
CWPKI0686E: The Application Server cannot locate a certificateCommonName value, which is required to request a certificate and not use an existing certificate request.
CWPKI0687E: The {0} Certificate Authority (CA) client is still referenced by: {1}.
CWPKI0688E: The {0} alias is not recognized as a Certificate Authority (CA) certificate.
CWPKI0689E: Because the {0} certificate does not exist, it cannot be revoked.
CWPKI0690E: The {0} certificate request does not exist. The Application Server is unable to request a certificate.
CWPKI0691E: The {0} certificate request already exists. The Distinguished Name (DN) information was provided to create a new certificate request. For an existing certificate, do not provide the certificate common name that is needed for a new certificate.
CWPKI0692E: The certificate reference is in the {0} state. The certificate needs to be in the PENDING state to query the Certificate Authority (CA) for a completed certificate.
CWPKI0693E: The {0} keystore file does not exist.
CWPKI0694E: The {0} value is not a valid keystore type.
CWPKI0695E: The Application Server cannot load the {0} keystore file. Make sure that the keystore password is valid and make sure the type matches the keystore file.
CWPKI0696E: The {0} certificate alias either does not exist or is not a personal certificate.
CWPKI0697E: The {0} parameter value must be a positive integer.
CWPKI0698E: The keyStoreLocation, keyStoreType, and keyStorePassword values must be specified to change the keystore file information in the configuration.
CWPKI0699E: The {0} keystore is marked as a read-only access. The Application Server cannot write data to this keystore file.
CWPKI0700E: The {0} port number is not valid for the Certificate Authority (CA) server port.
CWPKI0701E: The certificate that is specified as the {0} alias cannot sign other certificates because it does not enforce basic constraints.
CWPKI0702E: The certificate that is specified as the {0} alias is a certificate authority (CA) certificate, which must be renewed manually.
CWPKI0703E: The certificate, which is specified as the {0} alias, was not issued by the product and cannot be renewed.
CWPKI0704I: The personal certificate with the {0} alias in the {1} keystore has been RENEWED.
CWPKI0705E: The root certificate, which is used to sign the certificate with the {0} serial number, cannot be found in the {1} keystore.
CWPKI0706E: The Application Server has encountered both a keystore object name or a key file path.
CWPKI0707E: The Application Server cannot remove the last certificate from the {0} keystore.
CWPKI0708I: The {0} certificate is in the COMPLETE state.
CWPKI0709I: The {0} certificate is in the PENDING state.
CWPKI0710E: The keystore usage type is not valid.
CWPKI0711I: The "{0}" signer certificate alias has been ADDED to the "{1}" keystore.
CWPKI0712I: The "{0}" personal certificate alias has been ADDED to the "{1}" keystore.
CWPKI0713E: The {0} location for the System Authorization Facility (SAF) key ring is not valid.
CWPKI0714I: The certificate expiration monitor has recently run and discovered that the certificates, which are listed in associated messages, will be replaced within the next {0} days. This replacement is based on the configured policy to automatically replace expiring self-signed certificates {1} days prior to expiration. This notification informs you that problems might arise when the certificates are automatically replaced.
CWPKI0715I: In some cases, automatically replacing certificates can cause outages for Web server plug-ins operating on unmanaged nodes. In such a situation, the plug-in will be unable to contact the application servers over HTTPS because it will be using signers for certificates that have been replaced by the automatic replacement process. To prevent what may be a serious outage you should act before the scheduled replacement date and replace the expiring certificates and update the plug-in kdb to use the new signers.
CWPKI0716I:      The new alias for the "{0}" certificate is: "{1}".
CWPKI0717I: The "{0}" root certificate alias in the "{1}" keystore has been REPLACED".
CWPKI0718I: The "{0}" personal certificate alias in the "{1}" keystore has been RENEWED with a new root certificate.
CWPKI0719I: The {0} personal certificate in the "{1}" keystore is due to expire on {2} and might be replaced after the {3} threshold date.
CWPKI0720I: The {0} signer certificate in the "{1}" keystore is due to expire on {2} and might be replaced after the {3} threshold date.
CWPKI0721E: Both the {0} and {1} parameters must be specified.
CWPKI0722E: The administrative agent has administrative security enabled, but the job manager has administrative security disabled. Ensure that these attributes match prior to federation.
CWPKI0723E: The administrative agent has administrative security disabled, but the job manager has administrative security enabled. Ensure that these attributes match prior to federation.
CWPKI0724E: The administrative agent has administrative security enabled, but the base profile has administrative security disabled. Ensure that these attributes match prior to federation.
CWPKI0725E: The administrative agent has administrative security disabled, but the base profile has administrative security enabled. Ensure that these attributes match prior to federation.
CWPKI0726E: The keystore location is not qualified with a user and must be marked as a read-only keystore. The Application Server cannot write to this keystore location.
CWPKI0727E: Keystore {0} has already been enabled as a writable keyring.
CWPKI0728E: The valid replacement options are: ALL_CERTIFICATES, DEFAULT_CERTIFICATES, or KEYSTORE_CERTIFICATES
CWPKI0729I: The {0} self-signed certificate in {1} has been converted to a chained certificate.
CWPKI0730E: The Application Server cannot create the {0} keystore. The extended message is: {1}
CWPKI0731E: To import or export certificates from an audit keystore, the user must have the required auditor role authority.
CWPKI0732E: The deployment manager has administrative security enabled, but the job manager has administrative security disabled. Ensure that these attributes match prior to federation.
CWPKI0733E: The deployment manager has administrative security disabled, but the job manager has administrative security enabled. Ensure that these attributes match prior to federation.
CWPKI0734E: Could not connect to the job manager. Ensure the job manager is running. If the job manager is running, this may be due to a security enablement mismatch with the job manager or due to a incorrect username, password, port number, or hostname. Exception: {0}"
CWPKI0735I: All certificates were searched and no expiration issues were found.
CWPKI0736I: The server's ssl configuration has been converted. For client commands to access the newly converted server you will need to edit the soap.client.props files for the nodes. The com.ibm.ssl.keyStore, com.ibm.ws.trustStore, com.ibm.ssl.keyStorePassword, com.ibm.ssl.trustStorePassword, and com.ibm.ssl.contextProvider will need to be removed. The com.ibm.ssl.alias property will need to be set to the default ssl configuration alias in the ssl.client.props file.
CWPKI0737E: The job manager and the node attempting to register to the job manager are at different product versions. The job manager version must be equal to or greater than the node version. Registration is not allowed.
CWPKI0738E: The {0} personal certificate does not exist in the {1} keystore.
CWPKI0739E: Configuration service is not available, unable to execute the {0} command.
CWPKI0740E: Keystore name must be unique within the same management scope. A keystore with the name {0} already exists within the same management scope.
CWPKI0741I: The "{0}" certificate in the "{1}" keystore is signed with a certificate that is expired. The certificate with the serial number {2} in the certificate chain is expired.
CWPKI0742I: The "{0}" certificate in the "{1}" keystore is signed with a certificate that will expire soon. The certificate with the serial number {2} in the certificate chain will expire on {3}.


Terms and conditions for information centers | Feedback

Last updated: June 12, 2013 12:15 PM EDT
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=phil&product=was-nd-mp&topic=com.ibm.ws.ssl.resources.sslCommandTask.dita
File name: com.ibm.ws.ssl.resources.sslCommandTask.html