The SAS trust store used by Java is <SASHome>/SASSecurityCertificateFramework/1.1/cacerts/trustedcerts.jks. This output shows the certificate was issued today (Mar 4) and is a self-signed certificate: Subject: CN=mid.com, OU=Data , O=company, L=XX, ST=XX, C=GB Validity: [From: Tue Mar 04 12:45:23 GMT 2025, To: Wed Mar 07 12:45:23 GMT 2026] Issuer: CN=mid.com, OU=Data, O=company, L=XX, ST=XX, C=GB That issuing certificate (as this is self signed, being the actual certificate) needs to be in the SAS Trust Store. You can check this against trustedcerts.pem or .jks using keytool. For example: <SASHome>/SASPrivateJavaRuntimeEnvironment/9.4/jre/bin/keytool -printcert -file <SASHome>/SASSecurityCertificateFramework/1.1/cacerts/trustedcerts.pem | grep -E '(Owner:|Issuer:)' Confirm an "Owner: CN=mid.com, OU=Data, O=company, L=XX, ST=XX, C=GB" is present. Given the certificate was just issued, it's unlikely it's in the trust store already if you didn't add it. You would do so using the SAS Deployment Manager task as documented here. This must be done for every SAS Installation Directory (SASHome): Manage Certificates in the Trusted CA Bundle Using the SAS Deployment Manager https://go.documentation.sas.com/doc/en/pgmsascdc/9.4_3.5/secref/n0n1y5gwevy312n13h5bm4yf6quy.htm You may also want to confirm the certificate's "Subject Alternative Names" contains an entry for the host serving the certificate.
... View more