Your certificate trust issue requires proper configuration across all three areas for SAP cloud integration.
SSL Certificate Chain:
The incomplete certificate chain error indicates missing certificates. You need the complete chain from SAP:
- SAP server certificate (CN=sap.ourcompany.local)
- Intermediate CA certificate(s)
- Root CA certificate
Export these from your SAP server. If using Windows, export as Base64-encoded X.509 (.cer). Combine them into a single chain file:
-----BEGIN CERTIFICATE-----
[SAP server cert]
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
[Intermediate CA cert]
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
[Root CA cert]
-----END CERTIFICATE-----
Verify the chain is complete using OpenSSL before uploading.
Custom CA Trust:
For Aras cloud connector, custom CA certificates must be added to the cloud platform’s trust store. The process depends on your cloud provider:
For Aras managed cloud:
- Navigate to Administration > Cloud Connector > Security Settings
- Upload your CA certificate chain file
- Specify certificate type: “Trusted CA Certificates”
- Apply and restart the connector service
The cloud connector uses a separate trust store from the main Aras instance. This is why your on-premise configuration doesn’t carry over. You must explicitly configure the connector’s trust store.
Alternatively, use the Cloud Connector API:
POST /api/connector/certificates
Content-Type: multipart/form-data
certificate: [certificate-chain-file]
type: trusted-ca
Cloud Connector Configuration:
Update your SAP integration connector settings to use the custom CA:
In connector configuration file or admin UI:
ssl.enabled=true
ssl.verify.mode=full
ssl.ca.cert.path=/config/custom-ca-chain.pem
ssl.hostname.verification=true
Critical: Set ssl.verify.mode=full to validate the entire certificate chain. Some guides suggest disabling verification for testing - never do this in production.
For SAP-specific configuration, ensure the connector is using the correct protocol version:
ssl.protocol=TLSv1.2
ssl.cipher.suites=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
SAP systems often require specific TLS versions and cipher suites. Verify your SAP system’s SSL requirements.
If your SAP system requires mutual TLS (client certificate authentication), you’ll also need to configure the client certificate:
ssl.client.cert.path=/config/client-cert.pem
ssl.client.key.path=/config/client-key.pem
After uploading certificates, test the connection with verbose SSL logging enabled:
ssl.debug.logging=true
This will show the exact point of certificate validation failure if issues persist.
One common gotcha: cloud connectors often cache SSL sessions. After updating certificates, you must restart the connector service, not just reload configuration. In some cloud deployments, this requires a support ticket.
Verify your uploaded certificates are actually being used by checking the connector logs. Look for messages like “Loaded custom CA certificates: 3 certificates” confirming all chain certificates were loaded.
If you’re still seeing trust errors after proper configuration, check if your internal CA uses certificate revocation lists (CRLs) or OCSP. The cloud connector might not be able to reach your internal CRL endpoints, causing validation failures. You may need to configure CRL endpoints accessible from the cloud or disable CRL checking for this specific integration.