Hi,
For reference, the MQ Appliance includes a certificate monitor that can be configured to generate log events when certificates have expired, or are due to expire within a configurable number of days. Prior to MQ 9.2 the appliance certificate monitor only supports certificates used for system configuration, such as the web UI, but from the MQ 9.2 firmware the certificate monitor also logs alerts for certificates in queue manager key repositories.
- [0x8060034b] Certificate 'mycert' for queue manager 'QM1' expired at '2020-03-31T15:40:08Z'
- [0x8060034c] Certificate 'mycert' for queue manager 'QM1' is about to expire at '2020-03-31T15:40:08Z'
See
https://www.ibm.com/support/knowledgecenter/SS5K6E_9.2.0/com.ibm.mqa.doc/security/se00290_.htmWhen developing your own scripts you might find the
runmqakm -cert -list command (
listcert on the appliance) useful, which has a
-expiry [days] option that can be used to report similar information. If you set the timezone (e.g. TZ environment variable on Linux/UNIX) to UTC before running the command then this should also help you parse the expiry dates by avoiding daylight savings time adjustments.
------------------------------
Jamie Squibb
------------------------------
Original Message:
Sent: Tue January 26, 2021 09:55 AM
From: Tim Zielke
Subject: Building a Certificate Expiry Report for MQ
If you would have interest in how to build a certificate expiry report for your MQ client and queue manager certificates and also improve your TLS authentication, you may find the following blog post helpful.
https://community.ibm.com/community/user/middleware/blogs/tim-zielke1/2020/04/25/using-serialnumber-with-tls-authentication-in-ibm
------------------------------
Tim Zielke
------------------------------