diff --git a/kernel/kernel-keymanager-service/src/main/java/io/mosip/kernel/signature/service/impl/SignatureServiceImpl.java b/kernel/kernel-keymanager-service/src/main/java/io/mosip/kernel/signature/service/impl/SignatureServiceImpl.java index 50bdfd62..34f343d1 100644 --- a/kernel/kernel-keymanager-service/src/main/java/io/mosip/kernel/signature/service/impl/SignatureServiceImpl.java +++ b/kernel/kernel-keymanager-service/src/main/java/io/mosip/kernel/signature/service/impl/SignatureServiceImpl.java @@ -619,10 +619,10 @@ private boolean verifySignature(String[] jwtTokens, String actualData, Certifica X509Certificate x509CertToVerify = (X509Certificate) certToVerify; boolean validCert = SignatureUtil.isCertificateDatesValid(x509CertToVerify); if (!validCert) { - LOGGER.error(SignatureConstant.SESSIONID, SignatureConstant.JWT_SIGN, SignatureConstant.BLANK, - "Error certificate dates are not valid."); - throw new CertificateNotValidException(SignatureErrorCode.CERT_NOT_VALID.getErrorCode(), - SignatureErrorCode.CERT_NOT_VALID.getErrorMessage()); + // LOGGER.error(SignatureConstant.SESSIONID, SignatureConstant.JWT_SIGN, SignatureConstant.BLANK, + // "Error certificate dates are not valid."); +// throw new CertificateNotValidException(SignatureErrorCode.CERT_NOT_VALID.getErrorCode(), +// SignatureErrorCode.CERT_NOT_VALID.getErrorMessage()); } String keyAlgorithm = x509CertToVerify.getPublicKey().getAlgorithm();