Try this, Rob:

1. Save the cert Including the BEGIN CERTIFICATE line and the END
CERTIFICATE line to a file server.crt
2. openssl x509 -in server.crt -noout -text | grep Issuer
3. Look at output and see who the CA Issuer(s) is/are.
4. See if you have such a cert in your CA Cert Store in DCIM ... if not
then goto next step.
5. (Possibly) download the indicated CA cert (its URI will be in the
output of the command in step 2) and install it in DCIM.


On Mon, Sep 16, 2019 at 7:00 PM Rob Berendt <rob@xxxxxxxxx> wrote:

We're transmitting the more critical data through other techniques, like
more traditional EDI. This is the ASN's. Customer is a little forgiving
on this.


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.