![]() ![]() Once you have created the JKS, you can dump all information from the JKS file to check it's all included. Some templates provide starter code for general usage contexts like Navigation Drawer, Login Screen etc. That's a quite straight forward way, which can be used to automate the process. Keytool -importkeystore -deststorepass mypassword -destkeystore lls.jks -srcstorepass mypassword -srckeystore lls.p12 -srcstoretype PKCS12 This step creates a new JKS file with all the information from the p12 file :-) Once you created a p12, the Java keytool can convert the p12 into a JKS. Openssl pkcs12 -export -out lls.p12 -in lls.pem -password pass:mypassword But like Domino needs it's own keyring format, Java needs the JKS format. This format can be used by many web-servers. ![]() This can be converted to a pkcs12 (aka as p12) file. In many cases you have a PEM file with the key, leaf certificate, intermediate certs and the trusted root. Having that information would have saved me an hour of research. This release includes the following bug fixes and improvements: Added support for custom extended key usages (contributed by Jordi Pinzn Garca) Added TSL (Trust-service Status Lists) signing extended key usage, OID '0.3.0' (contributed by Vakhtang Laluashvili) After a keystore entry was deleted, the next entry is selected now. This might be also interesting for other applications. I found a quite straight forward but not obvious path. But for a server you usually need a new JKS file. It's easier when you have an existing store. The server uses the Java Key Store format (JKS) which isn't obvious to create form an existing certificate. Creating JSK for a Java based web server Daniel Nashed 27 October 2019 23:27:38 This weekend I have been looking into setting up a Flexnet server, which is based on a Java process that needs a certificate. ![]()
0 Comments
Leave a Reply. |