Make sure the list of trusted CAs is up-to-date, as the absence of the required CA certificates will stop you from being able to make secure HTTP requests.
Next: Limitations on IBM i