Check trusted Root CAs

Following instruction on this page you can test if your client can trust certificate presented by our servers.

On the host that runs your service run the next command:

curl -o /dev/null -s -vvv https://my.patientsknowbest.com

Expected success output

* Trying 35.246.122.93:443... * Connected to my.patientsknowbest.com (35.246.122.93:443) port 443 (#0) ... * Connection #0 to host my.patientsknowbest.com left intact

Connection #0 to host my.patientsknowbest.com left intact indicates that the OS trusts the root CA we used to issue our server certificate.

TIP: Version of your integration engine running on the given host might not trust the root CA we picked.

Expected failure output

* Trying 2606:4700:10::6816:1cac:443... * Connected to my.patientsknowbest.com (35.246.122.93:443) port 443 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * CAfile: /etc/ssl/certs/ca-certificates.crt * CApath: /etc/ssl/certs * TLSv1.0 (OUT), TLS header, Certificate Status (22): * TLSv1.3 (OUT), TLS handshake, Client hello (1): * TLSv1.2 (IN), TLS header, Certificate Status (22): * TLSv1.3 (IN), TLS handshake, Server hello (2): * TLSv1.2 (IN), TLS header, Finished (20): * TLSv1.2 (IN), TLS header, Supplemental data (23): * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): * TLSv1.3 (IN), TLS handshake, Certificate (11): * TLSv1.2 (OUT), TLS header, Unknown (21): * TLSv1.3 (OUT), TLS alert, unknown CA (560): * SSL certificate problem: unable to get local issuer certificate * Closing connection 0 curl: (60) SSL certificate problem: unable to get local issuer certificate More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above.