Supplementary note as to the LDAP query responder: Some of our exchange partners had to delete their senderldapCache\cache files and restart PHINMS to get the current (new) certificate for message encryption in place on the date my old certificate expired.
Also, for those not knowing the trick: PHINMS doesn't independently check the message encryption certificate expiration date. So if you state the expiration date for an expiring certificate is later than it expires in fact, in the PHINMS console's secondary certificate entry, PHINMS will continue to decrypt incoming messages using the old cert (as a secondary key) until its PHINMS-recorded expiry. This furnishes some leeway to laggard exchange partners in substituting the new message encryption cert for an expired one. (A practical consideration, rather than the ideal state of affairs: better to fudge the expiration and get the data, than have the data delayed and manually re-sent.) This also alleviated a prior problem with LDAP query responses on the changeover date, where Symantec left the old, technically expired cert in place as primary for that day and put the new one as secondary, meaning that LDAP-sourced message encryption came in with the old encryption instead of the new that day. If PHINMS "expired" the secondary cert as of its actual expiration date and time, those changeover-day, old-cert messages would not decrypt.
Edward A. Schneider
Information Technology Specialist/Middleware Administration | Application Data Services Unit
Minnesota IT Services | Partnering with Minnesota Department of Health
625 North Robert St.
St. Paul, Minnesota 55164-0975
O:
651/201-4047
Information Technology for Minnesota Government |
mn.gov/mnit
-----Original Message-----
From:
phi...@googlegroups.com <
phi...@googlegroups.com> On Behalf Of Loyall, David
Sent: Tuesday, March 26, 2019 9:50 AM
To:
phi...@googlegroups.com
Subject: SDN replacement?