'Host name configured is not listed in subject alternative names of certificate' and 'LDAP_CERT_HOSTNAME_MISMATCH_MSG_SHORT' errors testing/running AD/LDAP Collectors in RSA Identity Governance & Lifecycle
Originally Published: 2020-09-04
Article Number
Applies To
RSA Version/Condition: 7.2.0
Issue
Host name configured is not listed in subject alternative names of certificate.Use Skip Certificate validation or fix the certificate to include hostname.
The following warning message is logged to the aveksaServer.log file ($AVEKSA_HOME/wildfly/standalone/log/aveksaServer.log) when using the Test button:
09/04/2020 14:54:43.522 WARN (default task-19)
[com.aveksa.gui.pages.admin.collector.utils.CollectorUtilsLDAP$1]
problem testing connection in LDAP collector
com.aveksa.common.ConfigException: LDAP_CERT_HOSTNAME_MISMATCH_MSG_SHORT
If one of the migrated collectors performs a collection run, the following error is logged to the aveksaServer.log file ($AVEKSA_HOME/wildfly/standalone/log/aveksaServer.log):
09/04/2020 15:27:57.919 ERROR (ApplyChangesPerformQueryThread-164)
[com.aveksa.server.agent.message.ExceptionMessage]
com.aveksa.common.ConfigException: LDAP_CERT_HOSTNAME_MISMATCH_MSG_SHORT
Please refer to RSA Knowledge Base Article 000030327 -- Artifacts to gather in RSA Identity Governance & Lifecycle to find the location of the aveksaServer.log file for your specific deployment, if you are on a WildFly cluster or a non-WildFly platform. The aveksaServer.log may also be downloaded from the RSA Identity Governance & Lifecycle user interface (Admin > System > Server Nodes tab > under Logs.)
Cause
This issue occurs because the validation of the trusted certificate is case sensitive instead of being case insensitive. It occurs when a valid certificate is used and the hostname matches the Subject Alternative Name (SAN) of the certificate except for the case. For example, one hostname might be in all uppercase and the other all lowercase or one hostname could be mixed case but not the other, etc.
Resolution
The fix will change the behavior of the certificate validation check against the Subject Alternative Name (SAN) attribute in the certificate to ensure it is not case sensitive as per RFC 2549.
Workaround
- Change the value of the Host setting in the Collector to match the mixed case value of the Subject Alternative Name (SAN) attribute in the certificate exactly.
- Disable (untoggle) the Use SSL setting in the Collector (not advisable in Production)
- Enable (toggle) the Skip Certificate Validation in the Collector (not advisable in Production)
Notes
Note that if the certificate is invalid because it does not match the hostname for reasons other than case sensitivity, this same error will occur.
Related Articles
How to 'Trust' the RSA Authentication Manager Security Console Self-Signed Root CA certificate and prevent Cert warnings. 726Number of Views How to create and configure certificates for HTTPS access when using intermediate CA certs in RSA Identity Governance & Li… 1.01KNumber of Views How to replace the RSA Authentication Manager self signed console certificate with a signed certificate from Microsoft Act… 1.57KNumber of Views The RSA Identity Governance & Lifecycle AD Collector and AD ADC authentication source fail to establish a TLS 1.2 SSL conn… 619Number of Views How to Update the Root (Server) and Client Certificates in RSA Identity Governance & Lifecycle 2.15KNumber of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?