<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Generated root certificate is not a valid CA certificate in Management &amp; Governance</title>
    <link>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1612953#M14380</link>
    <description>&lt;P&gt;It appears that the internal CA root certificate (subject: CN=&lt;EM&gt;server-name&lt;/EM&gt;-CA, which is used for internal authentication even if a different certificate is used for port 443) is not a valid CA, because it lacks the CA flag (the X509v3 Basic Constraints extension). It's obviously possible to install as a trusted root CA in Windows' certificate store, but other software refuses to recognize certificates signed by it as valid, even if you tell such software to trust it.&lt;/P&gt;&lt;P&gt;Is this a known bug? Is it possible to replace the root certificate with a manually constructed one? Will Qlik Sense use it as long as it has the right subject and the private key is available or if the thumbprint is updated in some obscure place (more obscure than the thumbprint for the public web interface certificate)? Or has it even been fixed recently (but certificates will still have to be replaced in that case)?&lt;/P&gt;</description>
    <pubDate>Sat, 16 Nov 2024 04:57:28 GMT</pubDate>
    <dc:creator>millnet-maho</dc:creator>
    <dc:date>2024-11-16T04:57:28Z</dc:date>
    <item>
      <title>Generated root certificate is not a valid CA certificate</title>
      <link>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1612953#M14380</link>
      <description>&lt;P&gt;It appears that the internal CA root certificate (subject: CN=&lt;EM&gt;server-name&lt;/EM&gt;-CA, which is used for internal authentication even if a different certificate is used for port 443) is not a valid CA, because it lacks the CA flag (the X509v3 Basic Constraints extension). It's obviously possible to install as a trusted root CA in Windows' certificate store, but other software refuses to recognize certificates signed by it as valid, even if you tell such software to trust it.&lt;/P&gt;&lt;P&gt;Is this a known bug? Is it possible to replace the root certificate with a manually constructed one? Will Qlik Sense use it as long as it has the right subject and the private key is available or if the thumbprint is updated in some obscure place (more obscure than the thumbprint for the public web interface certificate)? Or has it even been fixed recently (but certificates will still have to be replaced in that case)?&lt;/P&gt;</description>
      <pubDate>Sat, 16 Nov 2024 04:57:28 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1612953#M14380</guid>
      <dc:creator>millnet-maho</dc:creator>
      <dc:date>2024-11-16T04:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: Generated root certificate is not a valid CA certificate</title>
      <link>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1613065#M14383</link>
      <description>&lt;P&gt;When Qlik Sense is installed, self-sighed certificate is created on server. &lt;BR /&gt;This certificate, however, is not trusted on any other devices other than the server itself.&lt;/P&gt;
&lt;P&gt;You can add a trusted certificate for purposes where a trust is required. (ref link)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://help.qlik.com/en-US/sense/February2019/Subsystems/ManagementConsole/Content/Sense_QMC/change-proxy-certificate.htm" target="_blank" rel="noopener"&gt;https://help.qlik.com/en-US/sense/February2019/Subsystems/ManagementConsole/Content/Sense_QMC/change-proxy-certificate.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;NOTE: removing, replacing, or altering the certificates that are installed with Qlik Sense generally results in effectively disabling the product (until the certificates are restored or recreated the same).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;EDL&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2019 21:39:44 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1613065#M14383</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2019-08-15T21:39:44Z</dc:date>
    </item>
    <item>
      <title>Re: Generated root certificate is not a valid CA certificate</title>
      <link>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1613188#M14387</link>
      <description>&lt;P&gt;That was not what I asked. I'd appreciate it if you'd read the question again. The certificate does not have the CA flag set and is therefore worthless as a CA certificate in the eyes of e.g. OpenSSL. That is a bug even if Windows accepts certificates without the CA flag as CA certificates.&lt;/P&gt;&lt;P&gt;"Third-party certificates are bound to the &lt;SPAN class="CommonComponentsQPSName"&gt;Qlik Sense Proxy Service&lt;/SPAN&gt; HTTPS port (443). Communication via the API&amp;nbsp;port (4243) always uses the &lt;SPAN class="CommonComponentsQlik Sense"&gt;Qlik Sense&lt;/SPAN&gt; server certificate." Just to be clear, I'm talking about the server certificate, or rather the root certificate that signs the server certificate.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2019 09:40:29 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1613188#M14387</guid>
      <dc:creator>millnet-maho</dc:creator>
      <dc:date>2019-08-16T09:40:29Z</dc:date>
    </item>
    <item>
      <title>Re: Generated root certificate is not a valid CA certificate</title>
      <link>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1619877#M14554</link>
      <description>&lt;P&gt;The answer was that it is a known bug, fixed in the June 2019 Patch 1 release, although it's listed as part of the June 2019 initial release.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Sep 2019 07:51:47 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1619877#M14554</guid>
      <dc:creator>millnet-maho</dc:creator>
      <dc:date>2019-09-04T07:51:47Z</dc:date>
    </item>
    <item>
      <title>Re: Generated root certificate is not a valid CA certificate</title>
      <link>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1620042#M14557</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/14243"&gt;@millnet-maho&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;To further clarify, are you referring to the below entry in the Qlik Sense June 2019 Release Notes?&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Qlik Sense self-signed root certificate missing basic constraint CA:true&lt;/STRONG&gt;&lt;BR /&gt;&lt;EM&gt;Jira issue ID: QLIK-95021&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Description: "X509v3 Basic Constraints: critical CA:TRUE" extension has been added to root.pem certificate.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Can be disabled via "Certificates.SelfSignedRoot.BasicConstraintsCA" setting in Repository.exe.config file.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;If yes, this issue is addressed in the Qlik Support article "&lt;A href="https://support.qlik.com/articles/000075724" target="_self"&gt;Qlik Sense: The certificate authority certificate does not contain the attribute “CA:True” and appears as invalid.&lt;/A&gt;".&amp;nbsp;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Sep 2019 12:56:43 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1620042#M14557</guid>
      <dc:creator>Chip_Matejowsky</dc:creator>
      <dc:date>2019-09-04T12:56:43Z</dc:date>
    </item>
    <item>
      <title>Re: Generated root certificate is not a valid CA certificate</title>
      <link>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1620097#M14562</link>
      <description>&lt;P&gt;Yes, exactly.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Sep 2019 13:54:18 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1620097#M14562</guid>
      <dc:creator>millnet-maho</dc:creator>
      <dc:date>2019-09-04T13:54:18Z</dc:date>
    </item>
    <item>
      <title>Re: Generated root certificate is not a valid CA certificate</title>
      <link>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1671493#M15533</link>
      <description>&lt;P&gt;Were you able to successfully resolve this issue? I'm having the same issue. I did everything including&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Upgrading QlikSense from April 2018 to November 2019&lt;/LI&gt;&lt;LI&gt;Deleting and recreating the&amp;nbsp; &lt;A title="Qliksense certificates" href="https://support.qlik.com/articles/Basic/How-to-recreate-or-just-delete-certificates-in-Qlik-Sense" target="_self"&gt;Qliksense certificates&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Setting this "Certificates.SelfSignedRoot.BasicConstraintsCA" to false in Repository.exe.config, restart all the service and generate new certificates&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN&gt;No success. We call the Qliksense server from Tomcat. I'm getting the same error.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path validation failed: sun.security.validator.ValidatorException: TrustAnchor with subject "CN=XXXXXXXXXX-CA" is not a CA certificate&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Did you follow step #3? If yes, did that certificate has "-CA" in the Issuer name?&amp;nbsp; I don't know what changed recently that could started this problem. Everything was working fine. And all of sudden this issue started popping up. We are using chrome&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 01 Feb 2020 03:07:12 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1671493#M15533</guid>
      <dc:creator>rajeshmuthu</dc:creator>
      <dc:date>2020-02-01T03:07:12Z</dc:date>
    </item>
    <item>
      <title>Re: Generated root certificate is not a valid CA certificate</title>
      <link>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1679507#M15649</link>
      <description>&lt;P&gt;Hi even I am getting the error all of a sudden for a ticket solution call from&amp;nbsp;&lt;SPAN&gt;jboss.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;javax.net.ssl.SSLHandshakeException: PKIX path validation failed: sun.security.validator.ValidatorException: TrustAnchor with subject "CN=xxxxxxxxxx.ae-CA" is not a CA certificate.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Am not sure if this has got anything to do with Java version, as it was working good.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 14:34:18 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1679507#M15649</guid>
      <dc:creator>fabdulazeez</dc:creator>
      <dc:date>2020-02-26T14:34:18Z</dc:date>
    </item>
    <item>
      <title>Re: Generated root certificate is not a valid CA certificate</title>
      <link>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1679511#M15650</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please refer to this.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://support.qlik.com/articles/000075724" target="_blank"&gt;https://support.qlik.com/articles/000075724&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Eddie&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 14:42:22 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1679511#M15650</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2020-02-26T14:42:22Z</dc:date>
    </item>
    <item>
      <title>Re: Generated root certificate is not a valid CA certificate</title>
      <link>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1679515#M15651</link>
      <description>&lt;P&gt;Thank @Anonymous&amp;nbsp;. I have gone through the document.&lt;/P&gt;&lt;P&gt;Why would&amp;nbsp; this impact all of a sudden. I need to justify my action before proceeding for a upgrade. We are running February 2019 release and all of a sudden the ticketing solution stopped working with this error. Nothing was changed from Qlik environment.&lt;/P&gt;&lt;P&gt;Can you please help me understand.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 16:26:41 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1679515#M15651</guid>
      <dc:creator>fabdulazeez</dc:creator>
      <dc:date>2020-02-26T16:26:41Z</dc:date>
    </item>
    <item>
      <title>Re: Generated root certificate is not a valid CA certificate</title>
      <link>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1679632#M15653</link>
      <description>&lt;P&gt;As you can see. The Fix for this is in&amp;nbsp; recent release (June 2019) but the problem can occur as far back as the releases in 2017. The reasons I've found vary. For example, a recent client reported they upgrade their JDK from 1.7 to 1.8. Then this popped up. There may be other reasons as well but we do not document them.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Eddie&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 20:32:21 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Generated-root-certificate-is-not-a-valid-CA-certificate/m-p/1679632#M15653</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2020-02-26T20:32:21Z</dc:date>
    </item>
  </channel>
</rss>

