![]() ![]() ![]() srckeystore is the PCKS12 keystore file you created in step 3. destkeystore is the name of the destination keystore file you want the files imported to. Keytool -importkeystore -destkeystore -srckeystore -srcstoretype pkcs12 -alias Now run the following command to generate your JKS:.To keep things simple, use the cacerts keystore password. You will be asked to generate a password. out is just the output file that you pick. inkey is the Wildcard Private key file from the server that generated your “wildcard” CSR (certificate signing request). ![]() in is the bundled Certificate Authority files containing your signed certificate. This will also be the alias name in Step 4.ĭo not use *. address as the name. name is the domain you are going to be using the key on. Openssl pkcs12 -export -name -in -inkey -out Run the following to convert your SSL bundle into PKCS12 format:.They are all now nicely bundled in a single file (ca_bundle.pem) Concatenate these file:Ĭat > ca_bundle.pem Open a terminal window (command line, or “bash -login shell for Windows) and go to your directory.If you received your certificate from Comodo in "other" format you will have a bunch of files, which will need to be assembled in the correct order. Make sure this folder contains all the certificate files you received from the Certificate Authority and the original Private key file used to generate your “wildcard” CSR (certificate signing request). To simplify things, I recommend making this a subdirectory of $SPECROOT/Java or $SPECROOT/Java/bin. Copy everything you need to a folder of your choice.IMPORTANT: Make a copy of your $SPECROOT/custom/keystore/cacserts before attempting to import the “wildcard” certificates into the cacerts file.Ĭonverting Wildcard SSL Certificate files to the Java Keystore format: ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |