Ix) Add the truststore location to your Dockerfile as a JDK start up parameter as seen belowÄ=/mnt/devdir/comp-dev-truststore. Viii) Configure your secrets with the keystore password and truststore password Vii) Configure your config maps with appropriate values for the keystore name, keystore alias and truststore name Vi) Ensure the keystore files are on the worker nodes V) Upload the keystore files to the Secure API s3 Bucket and also to the directory specified on the worker nodes (this is executed as part of the terraform script) Iv) Create a JKS file for the truststore and add the root and intermediate certificates Iii) Download DigiCert Root and Intermediate Certificates from The Digicert Portal Keytool -importkeystore -srckeystore -srcstoretype pkcs12 - destkeystore comp-dev-keystore.jks -deststoretype JKS Ii) Convert certificate from pfx to keystore jks using the following command: pfx client certificate from the Comp admin portal Openssl x509 -inform der -in gen/qa_r -out gen/qa_cert.pem 2.) Apply DigiCert certificate to the Switch Environment Keytool -export -alias apis01.qa -file gen/qa_r -keystore cert_keystore.jks Openssl pkcs12 -in gen/qa_keystore.p12 -nodes -nocerts -out gen/qa_key.key Keytool -importkeystore -alias apis01.qa -srckeystore cert_keystore.jks -destkeystore gen/qa_keystore.p12 -deststoretype PKCS12 <<âsandbox.p7râ<< d.) Generate the PEM and key with the following keytool and openssl commands Back to the sandbox keypair, right click sandbox keypair and select âimport CA replyâ.On intermediate cert that is in the main keystore, right click and choose Sign CSR,.If you want generate a CSR with a subject alternative. Depending on the type of keystore you have, follow one of the steps below to generate a CSR: If you have a java keystore, execute the following command: keytool -certreq -alias -file -keystore .
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |