OATI's Mission is to address and produce innovative solutions to the
challenges facing the energy industry in a deregulated environment.

 

webCARES Support Frequently Asked Questions

Renewal of the webCARES Root and Issuing CA certificates FAQ's

I am an End User. How do I install the webCARES Root and Issuing CA certificates into my Internet Explorer browser?

I am an Administrator. How do I install the webCARES Root and Issuing CA certificates into my Microsoft web server or application?

Why are the webCARES Root and Issuing CA certificates not already installed in my browser?

We do not use your certificates. Do we still need to install the new webCARES Root and Issuing CA certificates?

What does the HTTP 403 error I am getting mean?

I am an End User and am getting the message "Client Certificate is untrusted or corrupt"?

I am an Administrator or developer and am getting the message "Client Certificate is untrusted or corrupt"?

My application uses Java. How do I install your new webCARES Root and Issuing CA certificates so that my Java application will work?

I am an End User. How do I install the webCARES Root and Issuing CA certificates into my Firefox 2.0 browser?


I am an End User. How do I install the webCARES Root and Issuing CA certificates into my browser?

You do not need to worry about installing these certificates as they will be included in the file created when your webCARES Security Officer selects "Include all certificates in the certification path (if possible)" during the normal renewal, export, and installation of your certificate.

Note: If you are an End User and are missing these certificates you can install both of them into your browser once using the OATIpkiChain2.p7b file. This file can NOT be used to install certificates for applications, programs, etc.

  End Users: Installing the Root & Issuing Certificates

       Download http://www.oaticerts.com/repository/OATIpkiChain2.p7b

       Right click on file and choose “Install Certificate”

       Click “Next”

       Choose “Automatically select the certificate store based on the type of certificate”

Note: This makes the certificates available to all applications run by the currently logged in Windows user (“i.e. Internet Explorer”)

       Choose “Next”, “Finish”, “OK” (to Security Warning) and “OK”

.

Back to top

I am an Administrator. How do I install the webCARES Root and Issuing CA certificates into my Microsoft web server or application?

  Services & Applications: Installing the Root certificate

       Download http://www.oaticerts.com/repository/OATICA2.crt

       Right click on file and choose “Install Certificate”

       Click “Next”

       Choose “Place all certificates in the following store”

       Click “Browse” & check “Show physical stores”

       Select “Trusted Root Certification Authorities”

       Select “Local Computer”

Note: This makes the certificate available to all services and applications even if no Windows user is logged in (i.e. IIS, .Net, custom programs, etc.)

       Click “OK”, “Next”, “Finish”, and “OK”

  Services & Applications: Installing the Issuing certificate

      Download  http://www.oaticerts.com/repository/OATIIA2.crt

       Right click on file and choose “Install Certificate”

       Click “Next”

       Choose “Place all certificates in the following store”

       Click “Browse” & check “Show physical stores”

       Select “Intermediate Certification Authorities”

       Select “Local Computer”

Note: This makes the certificate available to all services and applications even if no Windows user is logged in (i.e. IIS, .Net, custom programs, etc.)

       Click “OK”, “Next”, “Finish”, and “OK”.

Why are the webCARES Root and Issuing CA certificates not already installed in my browser?

"CA" stands for "Certificate Authority" and CA certificates are used by Certificate Authorities to prove (via a Digital Signature) that the end user certificates they issue are indeed issued from them. There are generally two kinds of CA certificates, Public and Industry. Public CA certificates are used by the general public and as such come preinstalled into most browsers. Industry CA certificates typically have items unique to a specific industry or industry standard (i.e. validity period, key usages, issuance policies, etc.) which prevents them from being preinstalled into a browser. This means end users who wish to use certificates issued from an Industry CA must first manually install its CA certificates.

Back to top

We do not use your certificates. Do we still need to install the new webCARES Root and Issuing CA certificates?

Yes. If you have a web site, web service, or application which accepts OATI webCARES certificates as part of the login, authentication, or authorization process then you must install these certificates. If the certificates are NOT installed, an incomplete Certificate Trust List (CTL) will be sent to your users browser (or application) and they will be unable to choose the correct certificate when prompted. (i.e. the browser's "Client Authentication" list of certificates will not show any certificates issued from the new CA certificates or an application will give a "certificate untrusted or corrupt" message).

Back to top

What does the HTTP 403 error I am getting mean?

When you are getting a HTTP 403 error immediately after choosing a client certificate or visiting a web site which uses SSL/TLS (i.e. starts with https://) it typically means you have not correctly installed the new webCARES Root and/or Issuing CA certificates. To confirm exactly what the error means please turn OFF "friendly" error messages.

Display information on “HTTP 403” errors

     If you are seeing an error displayed in the browser similar to the one below, the first step is to uncheck (disable) the Microsoft Internet Explorer “Show friendly HTTP error messages” and try again.

    Internet Explorer>Tools>Internet Options>Advanced Tab>Browsing Section> uncheck “Show friendly HTTP error messages”> OK

    Close and re-open Internet Explorer and try browsing to the web site again.

Back to top

I am an End User and am getting the message "Client Certificate is untrusted or corrupt"?

If you are seeing an error displayed in the browser similar to the one below, the first step is to make sure the new webCARES Root and Issuing CA certificates are installed and present in the correct certificate stores (folders) and try again.

IMPORTANT: These troubleshooting steps are for an End User who is experiencing this issue. If a similar error is found in an application or programs log file, or given in the browser while testing the application, please see the FAQ "I am an Administrator or developer and am getting the message "Client Certificate is untrusted or corrupt"?
.

     Step 1: Confirm the OATI webCARES Issuing CA certificate is present.

     Internet Explorer>Tools>Internet Options>Content Tab>Certificates Button>Intermediate Certification Authorities Tab.

     Confirm OATI WebCARES Issuing CA is present. If not present click the "Import…" button and import the certificate downloaded from http://www.oaticerts.com/repository/OATIIA2.crt

     Delete the OATI webCARES Root CA certificate if it is present in this store. Note: The OATI webCARES Root CA should only be in the Trusted Root Certification Authorities certificate store (folder).

       Step 2: Confirm the OATI webCARES Root CA certificate is present.

     Internet Explorer>Tools>Internet Options>Content Tab>Certificates Button>Trusted Root Certification Authorities Tab.

     Confirm OATI WebCARES Root CA is present. If not present click the "Import…" button and import the certificate downloaded from http://www.oaticerts.com/repository/OATICA2.crt

     Delete the OATI webCARES Issuing CA certificate if it is present in this store. Note: The OATI webCARES Issuing CA certificate should only be in the Intermediate Certification Authorities certificate store (folder).

     Step 3: If steps 1 and 2 fail to fix the issue please reinstall the webCARES Root CA certificate and OATI webCARES Issuing CA certificate. Even if these certificates are displayed there are times when the link between the certificate and the corresponding keys can be broken. Reinstalling the certificate will reestablish this link. Please see the appropriate FAQ "How do I install the webCARES Root and Issuing CA certificates into my browser?" for instructions on reinstalling the webCARES Root and Issuing CA certificates.

     Step 4: If steps 1, 2, and 3 fail to fix the issue please reboot the machine.

.

Back to top

I am an Administrator or developer and am getting the message "Client Certificate is untrusted or corrupt"?

If you are seeing an error displayed in an application log file similar to "Client certificate is untrusted or corrupt" the first step is to make sure the new CA certificates are present in the correct certificate stores (folders) and try again.

IMPORTANT: You must be a Windows Administrator to complete these steps.

     Step 1: Confirm the OATI webCARES Issuing CA and OATI webCARES Root CA certificates are present.

     Start Button>Run>MMC>OK button>this opens a blank Microsoft Management Console.

     File>Add/Remove Snap-in>Add Button>Choose Certificates Snap-in>Add Button>Computer Account>Next>Local Computer>Finish>Close>OK

     Click the plus (“+”) sign to expand the Certificates (Local Computer)>Expand the Intermediate Certification Authorities store>Select the Certificates store (folder).

     Confirm OATI WebCARES Issuing CA is present. If not present right click on the Certificates folder and choose Import to import the certificate downloaded from http://www.oaticerts.com/repository/OATIIA2.crt

     Delete the OATI Root CA certificate if it is present in this store. Note: The OATI webCARES Root CA should only be in the Trusted Root Certification Authorities certificate store (folder).

       Step 2: Confirm the OATI webCARES Root CA certificate is present.

     From the same Microsoft Management Console opened in the previous step…

     Click the plus (“+”) sign to expand Certificates (Local Computer)>Expand the Trusted Root Certification Authorities store>Select the Certificates store.

     Confirm the OATI WebCARES Root CA is present. If not present right click on the Certificates folder and choose Import to import the certificate downloaded from http://www.oaticerts.com/repository/OATICA2.crt

     Delete the OATI webCARES Issuing CA certificate if it is present in this store. Note: The OATI webCARES Issuing CA certificate should only be in the Intermediate Certification Authorities certificate store (folder).

     Step 3: If steps 1 and 2 fail to solve the issue please reinstall the OATI webCARES Root CA certificate and OATI webCARES Issuing CA certificate. Even if these certificates are displayed there are times when the link between the certificate and the corresponding keys can be broken. Reinstalling the certificate will reestablish this link. Please see the FAQ "How do I install the webCARES Root and Issuing CA certificates into my Microsoft web server or application?" for instructions on reinstalling the webCARES Root and Issuing CA certificates.

     Step 4: If steps 1, 2, and 3 fail to fix the issue please reboot the machine

 

Back to top

My application uses Java. How do I install your new webCARES Root and Issuing CA certificates so that my Java application will work?

•      Step 1. Download the new OATI webCARES Root CA certificate (http://www.oaticerts.com/repository/OATICA2.crt) and save it to your Java bin directory (i.e. C:\Program Files\Java\<JAVA HOME>\bin\OATICA2.cer)

•     Step 2. Add the new Root CA file downloaded in step 1 to your Java keystore

Note: Your Java Keystore name and password will be different then what is used in this example.

C:\Program Files\Java\jre1.5.0_10\bin>keytool -import -trustcacerts -alias OATIroot2038 -file OATICA2.cer -keystore cacerts

Enter keystore password:  123456

Owner: CN=OATI WebCARES Root CA, O=Open Access Technology International Inc, L=Minneapolis, ST=MN, C=US

Issuer: CN=OATI WebCARES Root CA, O=Open Access Technology International Inc, L=Minneapolis, ST=MN, C=US

Serial number: 25762066a7560874f9004bfa1c82841

Valid from: Tue Jun 03 14:28:31 CDT 2008 until: Thu Jun 03 14:36:00 CDT 2038

Certificate fingerprints:

         MD5:  70:0C:AA:D0:49:E7:7B:0B:EB:93:77:FA:57:1D:19:73

         SHA1: 4B:6B:D2:D3:88:4E:46:C8:0C:E2:B9:62:BC:59:8C:D9:D5:D8:40:13

Trust this certificate? [no]:  y

Certificate was added to keystore

•     Step 3. Download the new OATI webCARES Issuing CA certificate (http://www.oaticerts.com/repository/OATIIA2.crt) and save it to your Java bin directory (i.e. C:\Program Files\Java\<JAVA HOME>\bin\ OATIIA2.cer) 

•     Step 4. Add the new Issuing CA file to your Java keystore

Note: You MUST add new Root CA certificate first (see steps 1 and 2 above) and run keytool.exe from default install directory. (i.e. C:\Program Files\Java\j2re1.5.0\bin)

Note: Your Java Keystore name and password will be different then what is used in this example.

C:\Program Files\Java\jre1.5.0_10\bin>keytool -import -trustcacerts -alias OATIissuing2023 -file OATIIA2.cer -keystore cacerts

Enter keystore password:  123456

Certificate was added to keystore

•     Step 5. Confirm the new webCARES Root and CA Certificates are present in the Keystore:

Note: Your Java Keystore name and password will be different then what is used in this example and you may have a different number of entries. Please confirm you have the "oatiroot2038" and "oatiissuing2023" entries.

C:\Program Files\Java\jre1.5.0_10\bin>keytool -list -keystore cacerts

Enter keystore password:  123456

Keystore type: jks

Keystore provider: SUN

Your keystore contains 7 entries

oatiroot2038, Jul 7, 2008, trustedCertEntry,

Certificate fingerprint (MD5): 70:0C:AA:D0:49:E7:7B:0B:EB:93:77:FA:57:1D:19:73

oatiroot2009test, Mar 27, 2008, trustedCertEntry,

Certificate fingerprint (MD5): F7:B8:75:A6:3A:EF:A7:E2:5C:42:AC:FB:79:42:C3:EA

oatiroot2009, Mar 27, 2008, trustedCertEntry,

Certificate fingerprint (MD5): F7:B8:75:A6:3A:EF:A7:E2:5C:42:AC:FB:79:42:C3:EA

oatiintermediate2008, Mar 27, 2008, trustedCertEntry,

Certificate fingerprint (MD5): 27:EF:D1:CB:94:39:3A:C2:0B:AB:F8:B1:AB:CF:82:89

oatiissuing2023, Jul 7, 2008, trustedCertEntry,

Certificate fingerprint (MD5): D7:17:3A:7E:A8:04:DA:3E:A4:99:99:B9:20:60:06:A3

oatiissuing2009, Mar 27, 2008, trustedCertEntry,

Certificate fingerprint (MD5): 56:EB:B3:06:6A:20:B5:B1:05:84:DE:32:3A:11:D7:1B

oatiissuing2008, Mar 27, 2008, trustedCertEntry,

Certificate fingerprint (MD5): A9:D9:F4:6B:EC:17:D2:59:F4:A6:E0:CB:49:99:E0:F9

.

Back to top

I am an End User. How do I install the webCARES Root and Issuing CA certificates into my Firefox 2.0 browser?

•   From the Tools Menu>Options>Advanced section>Encryption tab>View Certificates button>Authorities tab

•   Click the Import button>find and open the OATI webCARES Root CA file (OATICA2.cer) downloaded from http://www.oaticerts.com/repository/OATICA2.crt

•   Select each check box to trust the "OATI webCARES Root CA" for identifying web sites, email users, and software developers and click OK.

•   Click the Import button>find and open the OATI webCARES Issuing CA certificate file (OATIIA2.cer) downloaded from http://www.oaticerts.com/repository/OATIIA2.crt

•   Select each check box to trust the "OATI webCARES Issuing CA" for identifying web sites, email users, and software developers and click OK.

•   Verify the OATI webCARES Issuing CA and OATI webCARES Root CA are installed under the Open Access Technology International heading.

Back to top