Replace an expired certificate in a wallet

Enterprise manager 11.1.1.2.
We have two wallets under Identity and access oid1 and oid2 (Access OID and check the connection between OID - AD). Recently our signing authority on AD changed making the wallets inaccessible.
How can I update oid2 wallet to create a new certificate and get it signed by our new signing authority? I tried to create a new oid wallet but after restarting wls. I can't access the wallet and Mbeans & Quartz scheduler are down.
thanks

I believe that Sun's JSSE doesn't check certificate expiries while IBM's does. But don't quote me ;-)

Similar Messages

  • How to replace an expiring self-signed certificate?

    Well, I've successfully (I THINK) replaced two of the three certificates that are expiring.
    First off - 90% of what's in the Security manual concerning certificates is useless to this issue. I don't want to know how the watch is made - I just want to tell time! In fact there is a GLARING typo on Page 167 of the Snow Leopard Server Security Configuration Manual showing a screenshot of the Certificate Assistant in Server Admin that is just plain wrong!
    It's clear there is no way to RENEW the certificate. You have to delete the old one and replace it with a new certificate.
    The issue I have is that with all the services using the certificate, I don't know what the impact to the end-users is going to be when I delete that expiring certificate.
    It appears that a certificate is created automatically when the OS is installed, although I installed the OS Server on a virtual machine and I didn't see where it got created, nor was I given any input during the creation (like extending the expiration date).
    I don't know whether those certificates are critical to the running of the OS or not, but I went through the process of creating a new certificate in Server Admin. I deleted the expiring certificate. Because the two servers on which the expiring certificate was deleted does not have any services running that require a certificate (such as SSL on my mail server), nothing bad seems to have happened or been impacted negatively.
    I did, however, name the new certificate the exact same thing as the old certificate and tried to make sure that the parameters of the new certificate were at least as extensive as the old certificate. You can look at the details of the old certficate to see what they were.
    Here's the "critical" area of the certificate that was "auto-created" on my virtual server. (It's the same as the one on my "real" server.
    http://screencast.com/t/zlVyR2Hsc
    Note the "Public Key Info" for "Key Usage": Encrypt, Verify, Derive. Note the "Key Usage" Extension is marked CRITICAL and it's usage is "Digital Signature, Data Encipherment, Key Cert Sign". Extended Key Usage is also critical and it's purpose is Server Authentication.
    Here's a screenshot of the default certificate that's created if you create a new self-signed certificate in Server Admin:
    http://screencast.com/t/54c2BUJuXO2
    Note the differences between the two certificates. It LOOKS to me like the second certificate would be more expansive than the default issued at OS Install? Although I don't really care about Apple iChat Encryption.
    Be aware that creating certificates starts to populate your server Keychain.
    http://screencast.com/t/JjLb4YkAM
    It appears that when you start to delete certificates, it leaves behind private keys.
    http://screencast.com/t/XD9zO3n16z
    If you delete these keys you get a message warning you about the end of the world if you delete private keys. I'm sorry if your world melts around you, but I'm going to delete them from my Keychain.
    OK, now I'm going to try to create a certificate that is similar to the one that is created at start-up.
    In Server Admin, highlight your server on the sidebar and click the "Certificates" tab in the icon bar.
    Click the "+" button under your existing certificate and select "Create a Certificate Identity". (This is how I created the default certificate we just got through looking at except I clicked through all the defaults.)
    Bypass "Introduction".
    In the "Create Your Certificate" window I set the "Name" as exactly the same as the name of the expiring certificate. I'm HOPING when I do this for my email server, I won't have to go into the services using the certificate and select the new one. On the other hand, naming it the same as the old one could screw things up - I guess I'll know when I do it later this week.
    The "Certificate Type" defaults to "SSL Server" and I think this is OK since that's what I'll be using this certificate for.
    You HAVE to check the "Let me override defaults" if you want to, for example, extend the expiry period. So that's what I want to do, so I checked it.
    In the next window you set the Serial Number and Validity Period. Don't try typing "9999" (for an infinite certificate) in the "Validity Period" field. Won't work - but you CAN type in 1826 (5 years) - that works - Go Figure!??? You can type in a bigger number than that but I thought 5 years was good for me.
    The next part (Key Usage Extension) is where it gets sticky. OF COURSE there is NO DOCUMENTATION on what these parameters mean of how to select what to choose.
    (OK here's what one of the "explanations" says: "Select this when the certificate's public key is used for encrypting a key for any purpose. Key encipherment is used for key transport and key wrapping (or key management), blah, blah, blah, blah, blah blah!") I'm sure that's a clear as day to you rocket scientists out there, but for idiot teachers like me - it's meaningless.
    Pant, pant...
    The next window asks for an email address and location information - this appears to be optional.
    Key Pair Information window is OK w/ 2048 bits and RSA Algorithm - that appears to be the same as the original certificate.
    Key Usage Extension window
    Here's where it gets interesting...
    I brought up the screenshot of the OS Install created certificate to guide me through these next couple of windows.
    Since the expiring cert had "Digital Signature, Data Encipherment, Key Cert Sign" I selected "Signature, Data Encipherment and Certificate Signing".
    Extended Key Usage Extension...
    Hoo Boy...Well, this is critical. But under "Capabilities" it lists ANY then more stuff. Wouldn't you THINK that "ANY" would include the other stuff? Apparently not..."Learn More"?
    Sorry, folks, I just HAVE to show you the help for this window...
    +*The Extended Key Usage Extension (EKU) is much like the Key Usage Extension (KUE), except that EKU values are defined in terms of "purpose" (for example, signing OCSP responses, identifying an SSL client, and so on.), and are easily extensible.  EKU is defined with object identifiers called OIDs.  If the EKU extension is omitted, all operations are potentially valid.*+
    KILL ME NOW!!!
    OK (holding my nose) here I go...Well, I need SSL Server Authentication (I THINK), I guess the other stuff that's checked is OK. So...click "Continue".
    Basic Constraints Extension...
    Well, there is no mention of that on the original certificate, so leave it unchecked.
    Subject Alternate Name Extension...
    Nothing about that in the original certificate, so I'm going to UNCHECK that box (is your world melting yet?)
    DONE!!!! Let's see what the heck we got!
    http://screencast.com/t/QgU86suCiQH
    Well, I don't know about you but that looks pretty close for Jazz?
    I got some extra crap in there but the stuff from the original cert is all there.
    Think we're OK??
    Out with the old certificate (delete).
    Oh oh - extra private key - but which is the extra one? Well, I guess I'll just keep it.
    http://screencast.com/t/bydMfhXcBFDH
    Oh yeah...one more thing in KeyChain Access...
    See the red "X" on the certificate? You can get rid of that by double clicking on the certificate and expanding the "Trust" link.
    http://screencast.com/t/GdZfxBkHrea
    Select "Always Trust".
    I don't know if that does anything other than get rid of the Red "X", but it looks nice. There seem to be plenty of certificates in the Keychain which aren't trusted so maybe it's unnecessary.
    I've done this on both my file server and my "test" server. So far...no problems. Thursday I'll go through this for my Mail server which uses SSL. I'm thinking I should keep the name the same and not replace the certificates in the iCal and Mail service which use it and see what happens. If worse comes to worse, I may need to recreate the certificate with a different name and select the new certificate in the two services that use it.
    Look...I don't know if this helps anyone, but at least I'm trying to figure this idiocy out. At least if I screw up you can see where it was and, hopefully, avoid it yourself.
    If you want to see my rant on Apple's worthless documentation, it's here.
    http://discussions.apple.com/thread.jspa?threadID=2613095&tstart=0

    to add to countryschool and john orban's experiences:
    using the + Create a Certificate Identity button in Server Admin is the same thing as running KeyChain Access and selecting Certificate Assistant from the app menu, and choosing Create a Certificate. Note that you don't need to create a Certificate Authority first.
    in the second "extended key usage extension" dialog box, i UN-checked Any, PKINIT Server Authentication, and iChat Encryption. this produced the closest match to the server's default self-installed certificate.
    when updating trust settings in Keychain Access, the best match to the original cert are custom settings - set Always Trust for only SSL and X.509 Basic Policy.
    supposedly you can use Replace With Signed or Renewed certificate button from Server Admin and avoid needing to re-assign to services. however i was unable to get this to work because my new cert didn't match the private key of the old. for those interested in going further, i did figure out the following which might be helpful:
    you can't drag and drop a cert from Keychain Access or Cert Manager. you need the actual PEM file. supposedly you can hold down the option button while dragging, but this didn't work for me. however you can view the certificates directly in etc/certificates. but that folder is hidden by default. a useful shortcut is to use Finder / Go To Folder, and type in "/private/etc/certificates"
    now, on my system the modification date was the same for old and new certificates. why? because it seems to be set by when you last viewed them. so how do you know which is which? answer: compare file name to SHA1 Fingerprint at bottom of certificate details.
    after you delete the old certificate, it will disappear in Keychain Access from "System" keychains. however in "login" keychains the old one will still be there but the new one won't. it seems to make sense to delete the old one from here and add the new one. somebody tell me if this is a bad idea. the + button does not work easily for this, you need to drag and drop from the etc/certificates folder.
    lastly, the "common name" field is the server/host name the client will try to match to. you can use wildcard for this, e.g. *.example.com. if you need to, you can use the Subject Alternate Name to provide an alternative name to match to, in which case the common name field will be ignored, which is why by default the dNSName alternate field defaults to the common name. more info here: http://www.digicert.com/subject-alternative-name-compatibility.htm.
    maybe that's hopeful to somebody. but i stopped there since things seem to be working.
    last note, which you probably know already - if you don't want to bother installing the certificate in your client computers and phones, you can select Details when the first trust warning pops up and select Always Trust.
    now, we'll see how everything works once people start really using it...

  • What's the process to replace an SSL certificate

    I have to replace an expiring SSL certificate in this server and can't recall the procedure. I have the new cert, and intermediate CA, but can't remember what utilities to use to replace the old with the new.

    The image replace works perfectly with a masked image intact,  only if the two images dimensions are the same.
    However, doing the following gets you 95% of the way with just a final tweak of the mask:
    select the image on the slide
    Format > Copy Animation
    then replace image
    Format > Paste Animation
    Format > Image > Edit Mask

  • How to remove Expired Certificate in Certification Authority

    So the base certificate at a client site running Server Standard 2012 R2 expired.
    I went in and did a renewal, which created a new certificate, but the old expired cert still shows in the list and is still being handed out by the CA.
    Certificates #1 & #2 are the renewed cert's, Cert #0 is expired, why did it not get replaced during the renewal process?
    How do I remove the expired Certificate?  The CA is still using it and handing out expired cert's, this is preventing people from connecting to the secure Corporate WiFi environment because the NAP server is now rejecting access due to an expired certificate.
    Before I renewed and changed the certificates in the NAP server to point to the new reviewed cert, I was getting this event log entry when a user tried to connect to the Secure Corporate WiFi:
    Event ID 6273, Reason Code 262, The supplied message is incomplete.  The signature was not verified.
    After I changed to the Certificates in the NAP server to point to the renewed cert's, I get this error, still not able to connect to WiFi:
    Event ID 6273, Reason Code 265, The certificate chain was issued by an authority that is not trusted.
    How do I go about cleaning out that Expired Certificate in the CA, I removed it from the computer cert list using the Certificates snap in and connecting to the local computer.  I then stopped and restarted both the CA and NAP services.  Still
    no change.  I need to get the CA cleaned up and trusted again.
    Any help would be greatly appreciated.
    Curt Winter
    Microsoft Certified Professional

    Ok the NAP server is now working properly, the Expired Certificates are clean up and we are back in working order.
    Here is a review of what I did to get the issue resolved:
    1) First thing was to remove the old SBS server entries that where causing the workstation to try and renew their certs with the old server.  To do this I ran ADSIEdit expanded the
    CN=Configuration | CN=Services | CN=Public Key Services.  I then went through every folder and every entry under Public Key Services looking for and removing or updating entries pointing to the old SBS. I then made sure authenticated
    users had read permissions on CN=Enrollment Services.
    2) Ensure the CA is an Enterprise CA, I ran certutil -cainfo
    to ensure it showed as Enterprise Root CA.
    3) I then went back into ADSIEdit expanded
    CN=Configuration | CN=Services | Public Key Services | CN=Enrollment Services. Right click the CA in the right pane and ensure
    flags is set to 10.
    4) Ensure the CA is trusted, launch PKIView, right click on
    Enterprise PKI and select Manage AD Containers click on the Enrollment Services Tab, the status should show as OK.
    5) I then copied that Certificate to a file and ran certutil -verify on the file to check for any additional errors.
    6) I then opened CertSrv.msc on the CA, right click on the name of the CA and select properties, click on the Security tab and ensure Authenticated Users have the
    Request Certificates permission.
    7) I then ran certutil -deleterow 3/11/2015 Cert to remove all the certs that had expired before 3/11/2015.
    At this point the workstations started to get new cert's all the cert renewal errors in the client event logs stopped
    8) I then went back into the NAP server and select the correct certificate fin the EAP Properties and Smart Card properties.
    9) I then updated the domain 802.11X policy ensuring all the EAP properties had the correct certificate listed.
    At this point computers where again connecting to the Secure WiFi through the NAP server.  I hope this may help someone in the future.
    Curt Winter
    Certified Microsoft Professional
    Curt Winter

  • Portal show expired certificate after re-generating

    Our portal server SSL certificate has expired and users were prompting for Warning screen for this expired cert. After follow the instructions for how to re-generate Server SSL cert per instructions from the link -> http://help.sap.com/saphelp_nw04/helpdata/en/f1/2de3be0382df45a398d3f9fb86a36a/frameset.htm
    We managed to update the certs "ok". However, in some section of portal, we're still received the expired certificate warnings. Is there something we need to do more to resolve this issue (eg. restarts some services?)
    Below are additional information:
    - SAP J2EE 6.40
    Appreciate if your assistance.
    Andy.

    I don't see how it is possible for the portal to be serving two certs (one valid, one expired), assuming you replaced the cert on each dispatcher node (i.e., more than one J2EE box).
    Maybe it's a browser cache that's trying to use an old cert. Clear the browser cache and retest?

  • LDAP stopped / renew & expired certificate

    I replaced expiring certificates with new ones, and removed the old ones a couple of weeks ago.
    However, on the date of the old expiring certificates, email accounts are not responding and I am unable to authenticate in my Workgroup Manager, apparently because the LDAP server is stopped. I surmise that the LDAP server is stopped because of the change of certificate.
    I have deselected and reselected the new certificate in the Open Directory server with reboots to no avail.
    Can anyone point me to how to get the system (or LDAP/Open Directory) to honor the new certificates correctly?
    The old certificates are expired, and were removed. The new certificates (self-signed) appear good.
    TIA!
    -jason

    I was able to get everything working again by following this thread:
    http://discussions.info.apple.com/message.jspa?messageID=12566235
    It is frustrating that documentation around the use & renewal of certificates in OS X Server is lacking.

  • ISE 1.2 / WLC 5508 EAP-TLS expired certificate error, but wireless still working

    Hi I have a customer that we've deployed ISE 1.2 and WLC 5508s at.  Customer is using EAP-TLS with and everything appears to setup properly.  Users are able to login to the network and authenticate, however, frequently, I'm getting the following error in ISE authentication logs:
    12516 EAP-TLS failed SSL/TLS handshake because of an expired certificate in the client certificates chain
    OpenSSL messages are:
    SSL alert: code=Ox22D=557 : source=local ; type=fatal : message="X509
    certificate ex pi red"'
    4 727850450.3616:error.140890B2: SS L
    rOYbne s: SSL 3_  G ET _CL IE NT  _CE RT IF ICAT E:no ce rtific ate
    relurned: s3_ srvr.c: 272 0
    I'm not sure if this is cosmetic or if this is something that I should be tracking down.  System isn't in full production yet, but every client seems to be working and there is no expired cert in the chain.  Any ideas what to check?

    Hello Dino,
      thanks very much for your reply.
      The client uses a machine-certificate, the PKI is not a microsoft one, but a third party PKI.   The certificate is fresh and valid, the root-cert is installed and checked to be validated against it for the login.
    Clock is correct too. The same setup works flawlessly in Windows 7 and XP.
    EKU is set on the certificate (1.3.6.1.5.5.7.3.2)
    I suspect the cert-setup itself, but don't get a clue where this might stuck...
    Björn

  • Anyconnect VPN - Expired certificate causing Java error

    Hello,
    Since April 4th 2015 Java has been blocking the process of installing AnyConnect via web-deployment (see attached screenshot). It indicates there is an expired certificate with these details:
    Issuer CN=VeriSign Class 3 Code Signing 2010 CA,
    OU=Terms of use at https://www.verisign.com/rpa (c)10,
    OU=VeriSign Trust Network,
    O="VeriSign, Inc.",
    C=US
    Validity [From: Wed Jan 02 19:00:00 EST 2013,
    To: Sat Apr 04 19:59:59 EDT 2015] <-----------------------------
    Subject CN="Cisco Systems, Inc.", <-----------------------------
    OU=Digital ID Class 3 - Microsoft Software Validation v2,
    O="Cisco Systems, Inc.",
    L=Boxborough,
    ST=Massachusetts,
    C=US
    This certificate is not seen when entering 'show crypto ca cert' on the ASA -- it is NOT our certificate, as it is issued to "Cisco Systems, Inc", and it has clearly expired.
    We are running the ASA software 9.1.6 and this behavior happens (at least) with the three latest versions of Java.
    Is anyone else having this issue? Is there anything that can be done (server-side) to resolve this?
    Thanks in advance...

    I think it is possible to use same digital certificate. You can specify whether you want users to authenticate using AAA with a username and password or using a digital certificate (or both). When you configure certificate-only authentication, users can connect with digital certificate and are not required to provide a user ID and password.

  • 5800 XM "Expired Certificate" error message

    For people who own a Nokia 5800 XM, the error message of "Expired Certificate" when downloading applications onto the device will be mean you cannot load on new apps, which can be frustrating.
    Firstly you should try to update the firmware on your phone by 1 of 3 ways.
    Using FOTA (Firmware Over The Air). Another thread of mine will explain this in detail. You can find it here.
    Downloading Nokia Software Updater(NSU) and connecting your 5800 to the computer using a data cable.
    Taking the handset to a Nokia Care point if you do not want to try the above 2 options.
    **NOTE: Always be sure to make a back up of your personal details that are held on the phone as updating firmware will most likely delete any data left on the phone.
    If you have used FOTA or NSU to update your firmware, or there is no new update available then doing the following will work and will allow you to install new applications without the expired certificate error message.
    With the phone switched on, press the power button key once.
    Scroll down to and select "Remove E: Memory Card". 
    Select Yes to remove the memory card.
    Press OK and remove memory card from phone.
    Press the Dialler on the main screen.
    Type *#7370#
    Enter security code. Default is 12345 unless it has been changed.
    The phone will reset, wait for this to complete and power back on.
    Select your country and type in the correct time and date.
    Wait for the phone to complete its configurations, you may receive "My Nokia" or tutorial messages.
    Power off phone.
    Insert the memory card.
    Power on the phone.
    Wait for the phone to install any pre-loaded content from the memory card
    Phone is ready to install applications, without "Expired Certificate" error message.
    I have done the above myself and downloaded the PDF reader from the "Download" application from within the handset and it installed with no error after these steps.
    I hope this helps.
    My posts are my opinion and in no way the direct views of Nokia.
    If my posts are helpful, please give me some KUDOS using the green star on the left.

    try to sign your app(s) through Opda site.
    If you want to thank someone, just click on the blue star at the bottom of their post

  • E61i - Expired Certificate

    I bought my device 1 year ago, and installed on it several applications, like Splash ID, Profimail and other ones. Two days ago I updated the device, with update I lost everything but phone is working normally.
    The problem is with all programs that I had license and now I cannot install them, always appear the message: Expired Certificate.
    Yesterday I wanted to install FontMagnifier (recommended by Nokia), I donwnloaded the last version of application and I have the last firmware from Nokia, but not possible to install it.
    How Can I solve the problem with certificates? It will be a problem for every software?
    The applications are not so old, some of them with a few months of life.
    Help, please. Thanks in advance.

    Hi alesailor
    Try changing date on your device back a year and see if will now install, then change date back afterwards. It is irritating when software developers don't renew the Symbian license.
    Happy to have helped forum in a small way with a Support Ratio = 37.0

  • Problem with revocked/expiring certificate

    certificate has been revocked 15 days before the expiration (do not know the reason)
    now i can not install any more the app to one of my devices and thats understandable
    but what it is not clear to me is what is going to happen to all the ipads where my app (with revocked/expiring certificate) is installed. .. can my users still open the app with the revocked/expiring certificate?
    thanks

    This cert was already installed was the message I received when I tried. It might be that there is a default list of certs that are added when Firefox is installed.
    This will tell you what version that it was added by default:
    [https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/included/] via [https://docs.google.com/a/mozilla.com/spreadsheet/pub?key=0Ah-tHXMAwqU3dGx0cGFObG9QM192NFM4UWNBMlBaekE&amp;single=true&amp;gid=1&amp;output=html]

  • Expired certificate unexpectedly works under JRE 1.4.2_06+

    Hi,
    I have a client trust store for server authentication containing an expired certificate.
    Under JRE 1.4.2_06 (and 1.5) the expiry is ignored (unexpected), however under 1.3 and 1.2 using the same code it is considered invalid (as expected).
    Why has the behaviour changed?
    Thanks,
    Martin.

    After looking at the fixes applied between these two versions of the JRE I've found the following against 1.4.2_04...
    4945571 consider removing validity check on trusted cert anchor selection
    But no information exists in the bug database regarding this change! :(
    Does anyone know what was done as part of this fix?

  • Expired certificate message

    I keep getting a pop-up error message about an expired certificate from jetpackgallery.mozillalabs.com.443.
    The certificate expired on 08/13/2011, and I've been getting this message constantly ever since. It just pops up, regardless of what I am doing, even when Firefox is not the active application.
    The details say that it is from Equifax.
    I'm using version 3.6.2 on a G3 Mac laptop, OS 10.4.6.

    Start Firefox in <u>[[Safe Mode]]</u> to check if one of the extensions is causing the problem (switch to the DEFAULT theme: Firefox (Tools) > Add-ons > Appearance/Themes).
    *Don't make any changes on the Safe mode start window.
    *https://support.mozilla.com/kb/Safe+Mode
    *https://support.mozilla.com/kb/Troubleshooting+extensions+and+themes

  • URGENT!! ERROR WITH EXPIRED CERTIFICATE USING JDK 1.4.2.05

    Hi,
    I have created a client/server application with SSL and have found the following problem.
    I have made these two tests:
    1) jdk 1.4.2.03 --> the certificate is expired, I obtain this exception "No trusted certificate found". it's ok
    2) jdk 1.4.2.06 --> the certificate is expired, no error occurs. WHY?????
    Someone can help me?
    Gianna

    The problem is not the expired certificate! I know that it is expired, but I don't understand why using jdk 1.4.2.05 this certificate is not recognize invalid.
    With this jdk the channel is created. Using jdk 1.4.2.03 instead the certificate was recognized expired and the channel is not created between client and server.
    For me the correct behavior has with the old version of the JDK and not the new.
    WHY?????

  • How to replace/ rename a certificate after ABAP refresh in STRUST

    The system was refresh to Quality from Dev.
    My question was how do I replace (rename) the certificate from QA to DEV in strustsso2 or strust. The version of ABAP is 7.0.
    Thanks.

    Hello,
    1- Can anyone guide me, with the steps required, to install certificate in target system?
    2- How to replace PSEs in target system with ones, containing new system information after completing a system refresh?
    I assume it is done in STRUST or STRUSTSSO2.
    3- Do I need a new certificate or can I use the existing certificate?
    Points to be rewarded for any kind of small help.

Maybe you are looking for

  • Control key (^) combined shortcuts does not work on mac book pro

    All shortcut combinations with the control key (^) do not work. I´m using Mac Book Pro 13 (late 2013) with Os X Mavericks 10.9.4

  • How to install an SRX400 behind a 2wire wireless router?

    Any suggestions?  I used the Linksys guide to setup the router behind the router with no issues.  The second router acts as its own access point, accepts connections and even confirms an ip address, but will not allow thoughput or connectivity to the

  • About UserDefined Fields..

    hello guys, I have the following requirement....in the AR Invoice i have created the following UDFs with the following Names--Billable Days,Absent Days,ManMonths....... about these fields the BillableDays field must be showing the no Of days in the c

  • Delimiteddata and number format mask

    Hi, I need to export data from my report to a csv format in reports 6i. I installed patch 12 so I can use the delimiteddata format. This works but I do have problems with the number format. I formatted all of the number fields so they appear as desir

  • Maximum memory Linux can handle for IAS9i r2

    I have installed the complete IAS r2 on Redhat Advanced Server on one box. My box currently has 512mb of ram which is all being used. The swap file is currently using 1 gig. This is without any users accessing the system!!! I have got the go ahead fr