Troubleshooting Error establishing a connection: Could not send an Open Secure Channel request

When connecting to an OPC UA server using a security policy different from None (endpoint different from level:0 None Policy:None), the following issue might occur:
Error establishing a connection: Could not send an Open Secure Channel request.

This might happen when the user who activates the OPC UA Adapter as a service is different from the one who generated the application certificate.

 

Case 1

The application certificate was generated during installation and the service was started specifying a user other than Local System as the Log On account.

To solve this issue, do the following:

  1. Stop the OpcUaAdapter service.
  1. Set the Local System account as Log On account.
  1. Restart the service.

 

See also the following alternative solution:

  1. Stop the OpcUaAdapter service.
  1. Start the UaClientConfigHelperNet4.exe using the account user that is used as Log On account for the service.
  1. Recreate the application certificate.
  1. Copy the new certificate to the trusted list of the OPC UA Server you want to connect to.
  1. Restart the service.

 

Case 2

The application certificate was recreated using the UaClientConfigHelperNet4.exe tool and the service was started with the Local System account.

To solve this issue, do the following:

  1. Uninstall the SORIS OPC UA Adapter.
  1. Delete the certificate file (.der) in the installation folder (C:\Program Files (x86)\Siemens\SORIS OPC UA Adapter).
  1. Reinstall the OPC UA Adapter (OPC_UA_Client.msi).
  1. Copy the certificate to the trusted list of the OPC UA Server you want to connect to.
  1. Restart the service.

 

See also the following alternative solution:

  1. Stop the OpcUaAdapter service.
  1. As Log On account, set the same user as the one who run the UaClientConfigHelperNet4.exe tool.
  1. Restart the service.

 

NOTE: In case the user to set is other than Local System for the OPC UA Adapter service, this user must have Administrator privileges.