You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/feature-management-experimentation/20-sdks-and-infrastructure/server-side-sdks/java-sdk.md
+33-3Lines changed: 33 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1748,7 +1748,7 @@ To fix this issue, you have two options:
1748
1748
1. Upgrade your JDK to version 1.7 or above. These versions include support for the stronger ciphers by default.
1749
1749
1. If upgrading is not an option, install the Java Cryptography Extension (JCE) provided by your JVM vendor for Java 6 to enable support for high-strength ciphers.
1750
1750
1751
-
### Exception: PKIX path building failed — unable to find valid certification path to requested target
1751
+
### Exception: PKIX path building failed
1752
1752
1753
1753
When initializing the Java SDK `SplitFactory` object, you may see the following error:
1754
1754
@@ -1763,7 +1763,7 @@ unable to find valid certification path to requested target
1763
1763
1764
1764
This indicates that Java could not verify the SSL certificate from Split.io, preventing a secure connection between the SDK and Harness FME servers.
1765
1765
1766
-
Manually install the Split.io certificates into your JVM’s trust store:
1766
+
Manually install Split.io's certificates into your JVM’s trust store:
1767
1767
1768
1768
1. Download the certificates for both `sdk.split.io` and `events.split.io`:
1769
1769
@@ -1772,11 +1772,41 @@ Manually install the Split.io certificates into your JVM’s trust store:
Harness FME relies on Split.io's managed certificates for secure SDK communication. When Split.io rotates or renews its certificates, your application should continue working if:
1787
+
1788
+
* Your JVM's default trust store already contains the required certificate authorities (most modern JDKs do).
1789
+
* Or, you've installed the intermediate/root certificates instead of the short-lived leaf certificates.
1790
+
1791
+
However, if you manually imported specific leaf certificates, you'll need to repeat the steps above when Split.io updates them. To avoid manual updates, consider updating your JDK to the latest version so its default trust store includes up-to-date CAs.
0 commit comments